Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 16:15
Static task
static1
Behavioral task
behavioral1
Sample
f6636941ecbbd5d64248fea9b4b4dc64_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f6636941ecbbd5d64248fea9b4b4dc64_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f6636941ecbbd5d64248fea9b4b4dc64_JaffaCakes118.html
-
Size
10KB
-
MD5
f6636941ecbbd5d64248fea9b4b4dc64
-
SHA1
bee0f510b7e5e6e27caa90a1df2cd94587e6c4e7
-
SHA256
691520f286225bbbf2d95d09051dd5852c52d57a85bb50ca9ae7549506591c85
-
SHA512
ec73a7c80fbc5ebb9819243edf6fa68d8651609113f2a6b3cbe50a1bc90d8d04f556a02b5849ca5ebee1f9ea2cc955dbbb15e0b64632c1a1a70dfc2aa18c5e0f
-
SSDEEP
192:neWqqFDOY4oUCe9vd5pcJVfR1+yzvJQ3dwA3zoZQ7zv+vP61QAiO3:pqYpUCe9v2TR1+yzvJW+ozKc7+3w9B3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 507a7144660fdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433442820" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6FFA2141-7B59-11EF-8B64-E6B33176B75A} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000d37a58d0a3ab836d92b86a140bb1b50b1135e746aebf7d0370dbea9cef26244b000000000e80000000020000200000002eaa6c1246ef1a635b4f6d3cb36f04768c645cff1ec20c9ba7dea9557d659a7b200000004ad432446c1fe719b5c777ad41bf392a913769133b89943fac7fbe1698e69dfd40000000957787aaf5f91bf3f42188daf45f8c8993aa8b338abf1dd9056d21b84632b4228c1be34cfd396a3a1b15826b8dbc5b3d79e31cf24185596025e5088776ebfc9e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000004292be256c24a4e0fe2e4a41d15e859e678abc1c41c5ae07e67fa351795808f1000000000e8000000002000020000000b3924f7c5d559713618d6a3cf1670e77770618116b0c7421f5b7b073b217d8cd90000000ab35a91971b9ac66e24e08acd7c972abbb59448fbdbf8d52c256ef09d84d6d145c39ad994ff68f246044fb62aa98e13aa4647478fa414b7f244ee9642a8c4397dd80d38dd9d28327d66803ed61b6a6b51deca3678d7eb1a4ff4d726114a1459aeb41c364a09411628ffd0e2da66036b01a46ba10410496a6d09fabc23366690d1bfecfc0a90c1e222fab95b30cd4835d40000000c0bdf3992be27a11f7d902ac186bfee7c043915f20af41f5b30df7b8dbb8d49b0b7a31dc87fb0a9341cdd54437b378b14c71bfc4e4e3fda9de32a688e4ffdd52 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2532 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2532 iexplore.exe 2532 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2772 2532 iexplore.exe 30 PID 2532 wrote to memory of 2772 2532 iexplore.exe 30 PID 2532 wrote to memory of 2772 2532 iexplore.exe 30 PID 2532 wrote to memory of 2772 2532 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f6636941ecbbd5d64248fea9b4b4dc64_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2532 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee75a4b5b042f4304ce6ba8cfeb2eb88
SHA1b3dc5163e8854098d9a928fd94f3e6698051cf29
SHA256d59697a6ae0474c07a92dcf29de89c147aa2d332036a3ea9c79877dd59cfcebd
SHA51287ac9a49fd4f0d9805fcc6d9f4ed5e427d4754b7e7c50dff019d65fcd03cea9dc6fa94dc24df1d6b43a9c0c94f848ccbfc7adb397facd066d68a70bbb09ef6fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a636edc9ad22e8b1c8e6210e36f304a
SHA12b3bd12d6daa9e955053ffe26f355e548cb2fa99
SHA2565a9735dae135f8f2842d2e3563adb4785ac52d88377ce2be8af42bcf1dc2be63
SHA5123755348661ff85a2fa07997bce0da19400e7975784cfffe459153a21746565fe4a98ecfa3c0946a299dad21aec2c394cd5ffaaccb3b27425b031cc30b7f09c40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5635d51534d9fc6a2a453d640fd9aaaaf
SHA1e62bc8cf2209610694f86312ac9bbe1f110f85a8
SHA256a76394b34b4a85a03bbf348dda16c8fcdaccf5361b638abdac8971372f6d1daf
SHA512c1853c8ba40b7460649694de0f76f579101169135b335f5c40c820e90f90f08d9591c2ad3829e843547b6d2fb746c5691bf47651ed0704dce1f6fa441bf9de7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fa2f59c34b79fa96ecf43cfe2b4ab36
SHA1a88687815bda66c6c1b2392f6b9a9ae97a9c523f
SHA256d95bddf586fb9eaa679efd8112438fdc418c5806162ca6ed6b6f053e0622b95b
SHA51234f1ce7b1fbf28e919b2b4f0792648c7b8330f0c20d867a10833b381b90eceeced965cab5ddfff1745cf51182d25f0071874c0ea0f727f700789a01988499917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55733cfb8db7f80c2cc3a567caa7c50fe
SHA13445665f06b0290e625d561bb69a60e6a7d8722e
SHA256ec43729d58901b18d529f07bc93ea5ac9addc99c706c360676d1bec89715acad
SHA5126f1675d95bd77f33bb9ba4b53deaf9465a66140237ba606c13be27273850069b85dc922a3e0651f2bdf06c260a34ac0365bd96c7732dcb94736de199789157f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eabab65161075c5347f9afd019265563
SHA1e9514cf29c8c798dc415b4b522c876c3cc25a947
SHA2563e8a3c89d78deb95882b105f596f7e3bfd01cc92f1434bde483dcd3628ecc078
SHA512e3537c811a5135e91f0ddb2653a5cf3d56bb969d28dbf874edd67854ecdba996b68701fd81aa4a4042ed05079da60ab1152a4d676127de1346ca256fcdc29be9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ecfb3ee9684030efdd5c977fba010b8
SHA1205a5127065e7884d10fc877f1352f9e49b337b3
SHA256229c9272610d18c14c64cc5fb3b36693658682fd0047e395f9e3cc500c3cdcda
SHA51200fe30975cf780cb60c064a710bbcfb8a5ddd05480c11c486a9b0c209a926685df9055c1cc81d1587b12979090becd196a88a40d87e576eebae21dd36102e4a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdbf62bc234cf28c8fe06af152e100e8
SHA12ffb3bcbc36034b2e44aac292b3c52c69037c21d
SHA2563400f9d7330711632efbf8d7000355267b7eb05163389abff314dda0466e4e3f
SHA5124966e1b77a7a26edb6604a8546cef3d548c6febfb82be405b42a56aafb5e6a63017c61be0e6e4f1e406586f656aabe5fd951c37ec093bc237ae08b4b0ad0d9ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d197f74b92bf625f6a638f19fc50e8f
SHA1edb4aa5b061c92f75cda7faa2d7e7f6b2ed60084
SHA256633bcc91c7e02b272093d5635e0fffe4d8179ee63e515daf5cd1582bc71e6caa
SHA5129d308cbd4d2ed29bfae344de8ae8e312c73b222d0c114727a694900107b27fe8709368b1562bd4fd7d0274b34b243bbfa3d5b23f2c73e2e99d62b0b6eebfe07d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561d327f11fa954269edd1c9bd4fc1f3e
SHA1485f500d472ee4d5ccd657f88653a24304a142a9
SHA2566c46ff071301edb500d6c6a71ac3613e9a0bd9e279f9b6e54d973b3801889ed0
SHA51299790b86e05e0bb00ad2856fd8de7aff807c4da08a506f7b534098979d7697a7918c61d9b876eca59a11c3859b87e8f4391d50cb04bd5b223c85030b58847c53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55183d7f0a63c67f7a1b752e9c77d0ae1
SHA1a4c3dfb9b688ad11a22c0f55ff7fd54b0426c798
SHA2562ffa8c451922bb8643abfc0f04867268b584825b0be7e5f2ddb19353c2ff167f
SHA512c77671d70d6b44fa68bfeb6a41608fcc8bbf70a5c34889895b7cf7714ca8bc3651ec7b95935c251f8b20fa36ad2976cc5c15652f80b235f3e7f217bb9206c144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56084e36cd440849807b83f403c0c022b
SHA1986d36cc39298cb9ae7109910877c0225c26195e
SHA2567aaa4bda4734e96795517f84923cd15899f5647abe427d7c934b6b794cf97131
SHA512a59d24068da9a744d57a7e4aefb2374c255493203513e80517d10356618a407235ab8dac4d6921fc2a569f1de7057ff6b14dda168b8d25483e03381c7253cfb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce5324ce3edb14f5e3f91984c4730457
SHA14646541e90381261207351670eb05f891d61d25a
SHA2564bd516888cdbcd9d04fe6e37b64768e5a4238bb3c70d14defd19deaaeb69b2d1
SHA5128555b8a6be8129add7a97b9417eae317dba586da764663d3ffc9534269b41730eaaf4d904a3b77e27218365ccecdefae94836046930b1c8f030aa577b70a507c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5a8775d95e7a0cdf1d8e58e4021ec81
SHA1b5fd3eb61f4f234a4ec790b3ea29a4ed8ca7a7f9
SHA2561d0c7b266558db19365ff2ca03534afee2ae66c245ff4f80e4b050bd3555a4f7
SHA512c203c92b6a0c55e11dc1bedddc96880dbf738178d87f6e24c708ce2096638774fcf7897f8e7e7e999454ad72003a647141406f8156e184cfe327053f6223c292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5048b11e5869fe74ca7613f70ed78a29f
SHA119736a6e923d70ccf82a909d3c860cc13e7c0a3f
SHA2568acb72ff92e0dd4fe70a4d652703b65e02392f119d68b80a273ce1c49f4d760e
SHA5125502e498c2aa9a0a0dd7cc6446913f6eeec8d86257204a151403cf560d4e3c7f420a66ef4c70a9f1797ef83df0ef0a1d24664ee272edd677598838c54be5788f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50329956701123a6e04edb26ba9031d9e
SHA198472293fae21fcf87118eae0f7f0dc962871de9
SHA2564e59cc78c6cdd8913b8574e8047c63c254c88842e24294f09b25b32b2be11fa4
SHA512d011cb4f25dfdbb32d4f35acc01c79438d270a84da71dc623ddf9b326680a513678fd33b47b6b036d445f1fb934355d864fdbf13e654314e4a18cf9fbd3a102f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5806a9de61671c59c3ce0f4b5432f52f5
SHA1389cfb73243b7cbe82c8dcd9f5f878ddabed6cbe
SHA2568cc08a84893de44ae7d90d4ec6ace441e4f210ea5c057f127841a408435372ee
SHA512fc8d403446133243a2dca8b0bb3f16e502943252c48e9ed4332e769b0b8be00e1aa5d62352acb24d08284c2b0b52959f3a5c8e5ae0025ce3c369207df0b17099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a6f69d888aa7dc11691ea1e1509d11c
SHA1193f7e1d5a296bf18b03a21b7d83ecb91ee22d0e
SHA256754d8bce7d37400c72e32eb2a3fcad01470c583b6d15cef935654ed2326ceed1
SHA5120a579fe231795ec401da79fa81a621cb9119cfde62981e50094de25e641085c64f3ad7784720e34403e4132a7d5719921ae79d0f595f12abc2ee9c92abb87475
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b