Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 09:57
Static task
static1
Behavioral task
behavioral1
Sample
f5c01e7660efed0c9f5e675ddf7523de_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5c01e7660efed0c9f5e675ddf7523de_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f5c01e7660efed0c9f5e675ddf7523de_JaffaCakes118.html
-
Size
68KB
-
MD5
f5c01e7660efed0c9f5e675ddf7523de
-
SHA1
547504e949ac32bce46336340f641247a88a6250
-
SHA256
0e2972390ca775db6a875f7f3682eb71215ce25f1be17d656ffcdd9240b9c3ac
-
SHA512
58457a6f1045faf0e5433c969646937394ffadc80046376beabe18f3baad483c65f8ab8648b6f0f32971129255788845bf2bb95adecabf5899fa2356343bcd8a
-
SSDEEP
768:JiigcMiR3sI2PDDnX0g6ZcMmu0jJGmuooTyv1wCZkoTyMdtbBnfBgN8/lboi2hcc:J0J1ITcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8341B7C1-7B24-11EF-B36A-E62D5E492327} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90725959310fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000007983b0d97bd411798acf03a4658673c2679bc1d53e32fba5f1d8eb5fed3831db000000000e800000000200002000000063121e1c969415a3657d6ad13b8caf5fc7888f11a35daf01626cc5ec3c8863d0200000009c92485c1e2a8ee7ddbe6492aed32a930909d7edcc180efe2e170526e032fc2a400000006769cd03a531fc029194f12168bd5859fe6b139260f46ae49ebaa213ec7a1dbe832115489b71040ec796c1439d117140c2c80d0095d5f0d720216458e9991c46 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433420089" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 2196 IEXPLORE.EXE 2196 IEXPLORE.EXE 2196 IEXPLORE.EXE 2196 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2196 2252 iexplore.exe 30 PID 2252 wrote to memory of 2196 2252 iexplore.exe 30 PID 2252 wrote to memory of 2196 2252 iexplore.exe 30 PID 2252 wrote to memory of 2196 2252 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f5c01e7660efed0c9f5e675ddf7523de_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588f086fe4567b6541e3afa7e76179b78
SHA155987d13b9b9dea4f2bb87a430ca9076f88f9699
SHA2566d21f5deca6f9c5bdf2295e3c201fdcb29b27fc732cab196fdea184738059288
SHA512dbfc11cd5aeae717188882015b978cfe021d2be0d07ff734534e6e1a5fc20f7830e060e21adfadacc2c4ff4cefd858cbf58283f8295bf6e45b216fb7b71fe8bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ada740160001b38cefd86bb12e18b38
SHA13c861fd63ad117c5cdb16a6f02bad5480d2828ec
SHA2562935da276d79fb1f65d432014efeac62efcc3c6184a4515aaaccbdd259a835af
SHA512eff20d8d7968a21ac16cf1868dcd59dec243830a2c94beaa5108f1b7fd216ee52265854c038d0eb463dc3c17a2749c0c14fc015f08d813c9a4f130ee3e1f5601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7664fea76362b1a26059c74cdee1d0e
SHA16e51bb3cbcd19eaf06a2d2588eb4a379327a48fb
SHA2565f93e30be47ac4669540ad2d59e40527c3745fb78114f4e9f5b38a06b1fc3fde
SHA512f6c114571d550ba0350bcff47353da144610725cbab89f60a8a10ef011bd71562d42cf2a4ebd96f75113f68cbfb4b7e6898d7d13f4fb6f16aba5ffb2f13d6b9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d06a8812db5ca39bc20b222b2851a47a
SHA1c768a68122527ad226f6cb2801ae576eb99d8855
SHA25643fb977bc84680ccf37ad2efc112ecbcd7a4ef1e406ac07d8bde1f58276b7ad1
SHA51243f7fa8e5d8eceb9a0abfff7bcd63e889db8cfc6217b9586e5222d0d3e9b52a68622730b2f5093c478847c63b0df077b4e38e1f0e10935d63800f0ad4e671a5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ec03caea8965507b02c826cda6ccf94
SHA14a55bd8cd23872b0e53df296bbb5373ee3b47b14
SHA25688e846d28a75c282b6f74bbf10e698e24b502dbdcebb543d7c886b7a52bf9c81
SHA512ed38c9df639f0f8d79b83a9cbe02b927b9023854693e7aa7c8415125a98bf2cb5bd084c41795da731744bf17c8722df29f743fe36462b1109e309896bb49c3c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5852b2c213b4a0b1aad39949e61e8623d
SHA14f6babc6329698fbbbdf4c0b49bf242062788da7
SHA2563c244d642d155ec3154c727b149b7e7d3afb24e7a798486e1bfa7f717879fe81
SHA5129f1f9cc5fb812e3dd7970eb751f618b9b6a543e4ff35619ea1dcaa482f89423f90ae09f966bb5eddbf581abc7b7e330a62f3a132c715817e173598a2e02a4669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560a6f25d0994951c4842425791ab70f5
SHA1e8e09e20d76ee78b63ab1526a17483839d798a73
SHA2565612d4b9cef46d827efda6a15542a7e53881978e38c3bae1b3ef2b29daa29632
SHA512bc5e07a60a20bef3487420e56b621cdef560c00335d4fcc86fad1812154d0a9bcad1676dfcc32f70ddc73d470c55d0fd0363f8c42b96ed090d61a4d003df5b14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a0d1b2ac07f4496544bd104c621d024
SHA144df892dd2dcc2af3bdfb105fcb49823a679d23a
SHA256c5f0e98c9cf92583421b0616a30b575a18c94afa452c289d03e2851008a8f4e0
SHA5120aedfffa16b1ce4d20e55e8ea064084ffdf6fc90d7a14d8f5a0adbaa15a59941ffa5ccd955b9a98a1a21b3a40a5c2467fa18958e90b221e0fac4a66e14c49dde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55623f1c20e9979b9d393dd2fbce5147d
SHA19ff0c528163806d336fd4e049ea8f0af15da0b44
SHA256568ae922c570f95c885e34ca938c612cf876d1423263c86cbfb0011c653df665
SHA512b6e01d37a5c533a22ed910b3bedeb4d8584597c3670672c885e51dd2b6dde0505c4328b129a42b285a1a7ac775d42e347d8524a2f5e10b43d213680018854aaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c074453f83689282d30fadbba290a891
SHA16bc4ebcefb917b7e23f91742dada1a5ba6c788f1
SHA256d6e6207547b4447f9fbb1befbfa3bedfa48b1d7d90e066a8586ee6feb7a9936f
SHA5123f2f1079dd896382c0ce7d6c7bec8de6fa51fc5908986351c31d1326b281971e78d2b5727647833c65bca022f031d818674481722321da29ac8b8e9407ace742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558e05076fc1c2767a90c7d078cb5cf13
SHA1a99bb3e4b1ce498be53cc76f9444729bec3fc008
SHA25647bea9fde1a0c7d31209d65233bd5770d936cacbd0b12b26620b5f271141a4ec
SHA51240e399e276a6e089270562ed4ee24e174414d8dc00ac3e4ce168821481a8bd480e1d4ba1a7cebc7770c5c69e3812b75b91feca8cbfa1d4cf931d76da4d30a1ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596f9e8c8620d9e4aa091605578f68012
SHA16761e4e447518b43ad7cfb6ed0f48a7a085f4b7d
SHA256aee7d4babb183c1bdb358d5e56fa11dc12c5ce428a6cb2494541945974aacd90
SHA51243cc49983004f176dd80c6f0e128d82264a61396a3e8f04cf62f314a97fb8a51607ba715aa334911c456722568742968b2dda61a85f7d30923152c7e8e3f0377
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3b1ddc27fd55edce487cf4f3b4d44f0
SHA1b53ef37bbd5d1cdacfe02cd38ec43c52e6081480
SHA2569e6aada5b3e7496c6da712626d6710d67c7f343526820b652a2c305b4e3150ec
SHA51252e9fb1a61698282cfb4ff451cc2ffa055997ac93f0b09d4b0bc40b3769c306f24389cbf749ed9664d70ba316be55ce17503a205c6f2b80cb6a3fdb00bcd7b7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50077e1161c3223b052a67046cf64e46d
SHA16b80dc6120c716eef65158fad7f1be72ca23610e
SHA256b51213fb3e84058e02fb0a307b10f8d81bde6fef2c9f97077f19630c0d41a51c
SHA512d6b4dd0096f0ed2990af49e343f7ed2f33420d4b0bb1530394433e95939d1ff8516df21e423fb0ab896d0b75bd9e010f513b88eed12e383a9ed8edae31e0ed28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5042c4f2560607012929e7f8cffde144c
SHA189b0aa4dc8f73f1065e42c6ceb0f743590df9c8a
SHA256e8b31002c012b7ec84815335a4b752150696ea87152edaa45c4d42ac7dd711a7
SHA5122689bfa1b6c6e809508f3ef35232f33a4cbe6051b5c5a45c4015ce0e8d8665d59cf2b7bcb71e5ff16d15094daf3f771ef07ca77d03ec18c73b0dd1a49e81576d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5925d382d411b20fd60f2ccfded390d36
SHA125d32a19f940ac0ddb6f429da46c6e2f3d85a4ca
SHA256fb5d9f9107c6ad6b6b02cdbc63d8df74a8d923431beeaba50fc6db1d5bcfb3ff
SHA51270564a058c037cb6642f7497da03c6f1c7d64f87309c2cb6f4951f3a1bcea3bb699f4c9f413b03721d0d83dd4a6cdc0911a005d5f093e86e53fe18bccc2635e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ce2e41fc5ee7673150d8bd22b3c06ba
SHA1f5a5a866abbf4c499c957b5311bc4a6da6fde04f
SHA256e39f0800e3d0d1f567eb604535175af6d7ac3ccbbc42c15bcd64d50024a4bf4a
SHA51259771d2d22649e9722245b5548f312726558f1fd72830d7c8888ba7497c2c7ae669ff18e2ce54f513c2c00bcecef6b75b4b742de7869b8d9e0c0e870224f8732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581901919a2fe0760180ffe783f26ce30
SHA1489b4f54ff650eb26d9eb4ca210e1888d47aa1c4
SHA2566444db12d2eb36a559aabb58b8a3a2b1483ed05e67c071ed0981eb60551999bf
SHA5128a8753fc63942e6278e3adbe3587724336c36021763fab01223b023415d737c90e6cc503bfbafa604d18991f7a10f7f5249e6e2823205de3b8ea8767911d13e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5853aaaf9483557faa4153276739c9ccb
SHA194042a9513ba10742a45129bbc27007871cb93ed
SHA25630120cc9c4eebe6888072ce6355c2771e8f09bf48c0b27b1f032d12485813b55
SHA51227eba1b6a101ef4ce5e1f3bd45620e712004c71acc0d7dd213feac3df6a6c479783343f43d0e90cfc16a327d0d75f9e1d723bab0f9e73a6d5d8bafd9a1999c6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7b2cb87b73d462128dac1c482bef777
SHA1a08211601a9ac1934d1b28b0881f12d8f9e56a6c
SHA256b8f74ffc0d926aa99711cfec97676784ade770cfb8f56429414d29e40413aec7
SHA512f90ec93a9c206921e9aded244d264f3f71db07ad74ebb8ccaa895967dc0947cc883c553f1e8f68fe98fdb5987b706524807154eaca827f775f8652d262fb7ab6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b