Analysis
-
max time kernel
127s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 07:56
Static task
static1
Behavioral task
behavioral1
Sample
fa04c8ca21cb37a7210e512320c7a17d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa04c8ca21cb37a7210e512320c7a17d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa04c8ca21cb37a7210e512320c7a17d_JaffaCakes118.html
-
Size
11KB
-
MD5
fa04c8ca21cb37a7210e512320c7a17d
-
SHA1
3aa31cd3101eab6e6c89525709a2bd29bffa0f2d
-
SHA256
61c25f0ea0f26f77c1b6b566cdc32cca3d4ee8a3a0011adbed9fae1d0804f892
-
SHA512
95e798551995d9cc1f7fd0f4057f46cd3cdeedb2cb46c5babfc155618c5c143f9d48c815ffe4b1dcbd366f3066e38466dae470b50c9a48970331d64f99bb9661
-
SSDEEP
192:2ValIsr0r57M+x9T82/w1wvqVkt1PSbauBuLbdU8d:salIcIQ+x//g8YaguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0DFF3091-7CA6-11EF-BA28-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d078541cb310db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433585679" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000014d6f16a91f9adf22bcd561a6c73ab5866e709e000aa7329ac8e0e79076625cb000000000e800000000200002000000043ab6c567b46041357ab0fb8a8bd4fb2c40781c1dbfba7b4ff7bb93095a26c732000000007f662a6f4204e1cd972d01c897cbc26b4574ddc4202d7c40ce5455ddeccc50a40000000d8b138f12d2ce8872ecbc51e2332d2d47077d5240256f3889eb472718d2cd4f847f0b4efe6115a0d223cbdd6db9ffcfb9093cace7a29994e13aaa1e52cecda4c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000001df75c19be7fb86ec9dd7253851ceee60a9c953cff956aae7098832681154047000000000e8000000002000020000000018f69c3a264d39f5cb6fd70c4074577eb40d62a182a6dd6010986e0de8a034290000000b141f19601a4878ad37699d02dac1d98e810f29e3c5c0b543c1cf5350017395cdd45d4b2f14df6bebca69320a6de63739df571d4cdb8f9e0387d9b65f1c38345fa8e0a6e92ec0e51acf73bcf608bd4af8b823764c351c8c16960d08e6fab9e06d7b276bf979a9fcabe5bd6305a1e2382e7a41ca5d7ec21fd4501259364cfddfecf8ece7e6f041b5c517dde06ef2473e640000000b30c6de652940a30381396744f5d204049e4b8fbdcf1064b958086a73eac53a6af5c544c36168f75597d2c6ae82be0b4c079d9a59f53112623deafa45e59d7db iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 632 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 632 iexplore.exe 632 iexplore.exe 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 632 wrote to memory of 2316 632 iexplore.exe 30 PID 632 wrote to memory of 2316 632 iexplore.exe 30 PID 632 wrote to memory of 2316 632 iexplore.exe 30 PID 632 wrote to memory of 2316 632 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa04c8ca21cb37a7210e512320c7a17d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:632 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b63899e2599d35858677121d2e790fbd
SHA19658230b21785c4923405e51bdb628f95ad069f4
SHA256d8d80fe427a984a39847c1aa8204537d71af6be25679de4052376151e2fe4d5d
SHA5128cb76f4eb85f385a2049ad9391005b3159e5ade0c636627981aae31d3e0d70b2b56d118b579883ef4ccb0067e950aa2f2eebe70115e4d55b4ee09604d4d46598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b314ed3219122dc4e8e61714adb9878
SHA14b2d9862fa15ffd4603999bf7f04e922284d83bb
SHA2564fa359b9468c640de2255eba13eb61d4f60d891792fae26e278b28fffd64c9a1
SHA512ce2c8a25cb487df9274e315b62b391610a4d8fa5e2efa79060c5ebdd2293d66790a4cfff9d1202daeaa2ee123a78f40cb3a7fedc86695ba8bf3a0b0bb77180f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef081e33c22046cd4bec93ca3c2723c0
SHA19bdd69d29ce2dc07672fd17f44a1df696fcdeca0
SHA2560d101a03790509e627c30233c91065b7108293a62883d47e62fe362101f8e605
SHA512222789fc4f4e275aa66f40eb5ff34db5c9d9364d3c2123b6739ab52e606e5f32707e3dd0abcc76f9d589416de12cd686c4f95050e789d2815228fec00749ef2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b1fee9cf014c0433039f4a1361d544c
SHA1d0307717d10077524335ca3e08fd0559012c2c9d
SHA25606d32215fbf071506dd1beba9c986b134eb05b4e65e115953fa09fbecd20f9a7
SHA512191d578673728ecafc84a3f1b38d6e4b9eb164d882bccccdd336ecbb443dae2a42d79db9b9dd465a4323d1003b1b4aafa88244ba8772434383375d51ab94ede2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcd532c186e951bc256e9bd866e1b9a5
SHA1ad8d55352ee7fccd934670aefb9eef67a1389e14
SHA2564c30b99d50d90452d8147552841f4b3ff4e292e1b9bad72d4cb43c1596d90fbb
SHA512e068f9732291b8ee8ea4f4107afe676d94a70e00531448feecf5ee7033c2a3a669c3c3280dfbf64a54fc6536033604929899ae88867d9b3afdafc0db7798f4a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e5f8f40349359584d664b06e53062c9
SHA13b87d36fe162d315ac91428fa9e6da1515ac7b1b
SHA256985d07fd47ff18679025cc7f08ba6442b20ef3a00467903a3f3a02b2cf3c05c0
SHA5120fbe3892131a7aacec481ba7948a1524d7ac1777225db2d67cfced8bc99d262d54a7c3a6bc44b18a5abe9531a510b8d2f2b41753272d986e9993ac74e7c4edab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9ee8cb20e68fb5c3c72222d9e1b3d19
SHA11ac33e0c493dbef2bb94a6924207826f4be86646
SHA25641d6c81f4b945b84817491c528ddf733e64b6aad2372e7c3308148ae9b332a3a
SHA512076335d28316ba9ad366201e5a256e535c20707c1bf9ff07fe782a54e797cce63bed952b8765c091878762b61387cbf578101edc236944653f24ab387a08e067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d47f746188c9ecbef0da7729afb94a1
SHA1c841d44444274fa10ba920d6706f3b2330f07dc0
SHA2564d012fd156cfd11553ff689b6aee253bb75c2a8c5479d0fb692c62803ee16618
SHA51239cf81cc6197b590a7bce2df6b1a9edc8d8dcadb1acda5521ebd2839a8192721c53acda099b19772c207c5e26ebbe620769c08f176749a1f58406ed9da717192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5460dd14daac69d56010e670d86458d49
SHA1f7c8953475cce74008905214c9b873e1afaa79d9
SHA256c8e7670177bf03e6f50f28082849e4ec63b1adc2c746049b88e134763f23367a
SHA51256ad4183e9bb9f93f9d0db8c6f6fd872572677f25e6a67bf9e7eed6a9822e4f0e00d725683830396e88cd4b1c81a60686e235e1a22c58dc7c45c4422e0fce25c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5699b23400f38719969f341d32bf197fc
SHA1997f3b20beb2964c62789d21e8b2f5158974b47d
SHA256d94e64b45dd9f45fa8700e41fd0c155c0f7c176bb4caad7a80fe8c7030ca69ae
SHA512dd5707942ed21eb13e3f816673c0464ca61aa865dc9d2ca16f39e9bbb16b23d0857e00615194f0fde533b486facc6757a43b1d6f3076c9f69d5ca12154a7080f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50feed413c3c084ad0744fb43139c48c0
SHA1171eda2e17440f61173105cb112bbb70f6b1ee01
SHA2564d89ce6a623cf749631971cae4f306ecfc0188bf94c8c16a806cd7b1dad782cd
SHA5129cef3aced84ac8bca77a816c79c03260d3aaa8a69972f013b3822c0ac3f410c5330f51c7e7c6113bb6c498c7721970f929d8cbbc563e2fa520bb18b0042c609e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2d0cf299c809590c7de55dbc98e416f
SHA11ffa3ad2e703656cc7f6eb0e084497f0cbbf21c1
SHA256aa6d7e42f4e174d25946e5536fba5291a6203e2159f4999f0a6af216488127c3
SHA5122d9dea3731a78c8869ce3f90da7209248f0996564fbe40de76388075f5971d016a13a755c82596e6d250995bda7dbed35d93ff944794c8bb199b75e2f1c06f60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597c578962bcae94e1c5e7ffdc84f04c4
SHA1588d57665a742426679f129290f5f234259fb1be
SHA256ecaecb6a96444ad6c83a85dbf1bc22f25c8a4bce1e1224cfa6a484d79f4ef120
SHA512b8de86fa987347bb829e95b892dd5224d1de60f747b81b9758b05adc3a515225104c01f9092c0b28c6857a132298156f71bc5cd6bcb440465516488b367a4180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538e94024839cfa45a7e45fbe9fb4dcd2
SHA1539618460cd699da5ded75841ad05215a0a40fdb
SHA2568b87e71123c7d0e40277555f69fa91714edaa57277b150ff7d722890eda25861
SHA512cb7827b11206f3a8a1be7a2ba5a68c22aec62c9baff439a23f3b4b007084b7f3d62e5a9332838403c26b8a075cf9724930ee21863b3027056f343b6e3edb9c4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b32480ff3edee9c10a16bddb5df771c
SHA1912a7598457fdc2a9c379afb68e03e06b08c0089
SHA25655a1093c47daeace94bf51d04dbcdfbec8eb4a8fd5be47a2db285b6a4af156bd
SHA512d3d9190f2ccb17f0371d35c03a07c7a4d3aa0effd41a2a0e2a65bb2f3be4b568bc6f79d616462232f0e42cb9d084a6d7a74055e92e5db839d71437bd72f7a4f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5927c99b45b4494ed8ce6891a2ef5dca3
SHA129950b7b94f035bdeeeda88ce8ad19e881582bbc
SHA25605ed5ee22a6d96fbfd97b77d44b2d5320e13f5a9661c28ffae0b7ab6d98e4d26
SHA5121da1de8c274906510e232fe4f01a3419366c932dedc399c529cf5777c6354aa895300f453d7c552fda5cfb3afcb38245bef53765a0f9aa3bc91ca239f2559a25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531c1079e8315730e1c2796c82aa5bf5d
SHA1c2bf93e54e5ecdf0d607d905bdb902ea62118c1f
SHA256f0dc6a77267f7c2e918889137149c5ea50ccbb91e84d26accc2410d4f550834a
SHA51222cf605d2ad9b0dc40c338c69b5689ff05c32b82f0dc140a9b695c865354f247bb8b8909830ab6ae06711267bee4944d48eb0a7ec9a3a8c784ec1aec12f442f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b7a251d297fd2162b61d9888383a03a
SHA18dafdad2f69584360f3ad2aee7430387f5953590
SHA25691e3cb7cd8746fd87745e1d9fe137ab3a4248c5c5d17fbbcfc8143e1b700d391
SHA512cf69e03176c3fda4304317cbe99c22206d99c747607e8f131f2774c8742f49278a7c4bbe1c4493948e747fe45964834bd38b9d80195f28b33d2f33a4db33c3cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573034ea2dda71cf93dd8073d5cb9b0c7
SHA15ab2a03f903344745c8484d6bd3a76be95924774
SHA256711330298afa02a70c8a99f4b71c5f85d3c6dcbb2e9a87073a8f6df01b128cc1
SHA5121a67bc718676fc4977fe4b691bfc6af9b3e88bc1800d9a353d899040616066d45a1db4b6d483811a78147701690ffb8042d263474a4c2d2797228c655761b679
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b