Analysis
-
max time kernel
136s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 19:06
Static task
static1
Behavioral task
behavioral1
Sample
43bd05203a46719af9969d1a81ea0d8a_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
43bd05203a46719af9969d1a81ea0d8a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
43bd05203a46719af9969d1a81ea0d8a_JaffaCakes118.html
-
Size
214KB
-
MD5
43bd05203a46719af9969d1a81ea0d8a
-
SHA1
6afa81d2e46bfc11c2e4f58a0bd76bf22edb3267
-
SHA256
05dc2b15e8e0cdcf48a3097068968829fa74576da338757278a2a206a6882786
-
SHA512
b6779435a2a99e1df8ff9c7af63fee463711f5d74c704b83cf456f6527020a16cdf03d3e60f6490842b20abb45274f026d31b3018aa450bc527c1b1874db837a
-
SSDEEP
3072:FrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJe:Zz9VxLY7iAVLTBQJle
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435094640" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{60D5B071-8A5F-11EF-ACA8-72B5DC1A84E6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000d3246618242fd61ec672f573f30143ee8bf9b7c66fa74097ad2c9c99108af715000000000e8000000002000020000000ae2c86f1c4285fbe2cbd50589d4ed23eb93cae7d40753002e15a9707ea80206b20000000704c454c20ab9b8f274c585a3cce9600dd3c57dcb2a827a2dd92df2a9444d680400000009245896f37c0d1415c08b65b9c3859940990a228dedee7ff99829c88470939f60f6a6ce8a5757dbb38f58c97b1860545f9d36edd0d23e758667d3894bbc1df30 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0f375746c1edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 3016 2372 iexplore.exe 30 PID 2372 wrote to memory of 3016 2372 iexplore.exe 30 PID 2372 wrote to memory of 3016 2372 iexplore.exe 30 PID 2372 wrote to memory of 3016 2372 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43bd05203a46719af9969d1a81ea0d8a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ce0a21706d73be94b1c2ca66011f54b
SHA1709788e09f251dc23b577c1e401d06e60a6fc11b
SHA256c51491bfce0894466d784aed6f2d5ba1e98c403edcef9bd44e565878911e08c3
SHA5123f3cca597f23e43ba4852f8ca88c14793d1588e294bfc3d25584924431541aee708f530bf22ee442a599dd7a441d9da42d50a8924f5612586ed2283024aea8da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d0b21f33748db6359be53bcb616ac45
SHA1d34ba4a2f83c402f780463d3578a619d8bbfa215
SHA256a269a3ab3d035c23080754b92528b0a9c3563e767b4c3cbfebcb8cc48f4a5964
SHA512daddfcaf7bb45df09497a229854a79bb7d4bac13708370bdb1e1dc16d6c185f47d7c475ec3cd2c84abb17753154a41a0a40d868a8f47ab6ec5d5712ff3a95b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e80cecb61e52e9aeb5d4c73032bff902
SHA1ed24217c076482cbf0f52fa150590ebedb3ad015
SHA256b1ec4298eb22a2a799904448c2136a9bbdc3c95d7f74dc89ebad63ee0ae7778a
SHA512666253e664bbbb9131a06404ffb9ea45d0b7aed2b82e9ae709f2e43456afd291a97d433714a50df1320d9d4d52c2c3fbc441e7825a574e99b80b1bcb47f54ede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552d8afd5d9511324dd85a145e6c54fe5
SHA1207165f290ac33a15e35db47792a021dbb6aba2c
SHA256e8812612f0f865e2a76882566b6f193cbbe2e03e8c358bd8cc0935c7b54481a9
SHA51208f49b3c611d38d2e21707255328defbf872a2d45a23823e4f7cb6e782c68ba18c2854e6c966aef0754e80bc0f298d7bc9aaf5b2c1e5870d538eaa133a143570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9452ef1831e73389a1ccab0746906d7
SHA14c60d39099e1a494a68c39d89b322aca89dc0ee6
SHA256a3032303d4b72148380cc26d466308b79ff39b0695b3e1792d3db837f1ca1734
SHA512fcbda8a8db5a3789a1eca94d606645e77e285edc632e4bc70b639228a050e6251f5d9c4555bb395ed7ab9102034d15d425dbfaaaae5264f0cb39b36c54d52b2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f475d4a47528994a49ff95b17137a53
SHA1ae1ec50a9d54299bcfa9357cdf6e83bc2cd86242
SHA256b69325ec7de7f2086cef201a94671155d2f73af3ff784bbfe0877c9c9beb2aab
SHA512eafde5a352d2fbdbe7ebfc44ccf2f490fca38fd50a7039f3b477f9aa75d8501ba68f52e9669e3650392d5982b049d50a055767981ce49260261063885101a8c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b000303d72024ed3a130d0458f8b7413
SHA13ffeaee09bf9022815fa7755a299120cb5cef9ab
SHA2562100577f5c863ac5d6b01ae2701761daf1aa03a4bf693867ff8572cb40346045
SHA51219ca20d6ab87f4187998418005a9fceb2ff05c15e038096fb0b6fa386731be474c8b81b8e0fecbf73069bbe298b3fb07a12a125db4490dcaaffc6c5f5d8c0297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d26e2d601c170ce6adfa7121ae0ead4
SHA13d1381755a6e90f1b4d4ef67ae63f3bd768f6af8
SHA2564b8f3aea2c6301a57e9022d873c148f9a4739d86ddc2ec55d57ad7bdd21c1d28
SHA512123a8066f598d4637657a2729d3ca690481b19e6471c199dfeecd710c9d67f1202f141ac6b1a65a1e605ae22ff50e75dcf40c6d478111fa6583ede53f1968875
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58418be177b8054befa9fd9adc87fced0
SHA1d25ba6e63fb760b1517326054e25c183e9bfa027
SHA2563b50473473ed544e072ecafb5db54a5d22e14bde473295d318c010b3c89b01fe
SHA5126f61e1c7bce520d362336f88a0d230edcaf5e6386cad9ca9b1b95da2a429d045550e9b0647f1a548f1af7b5e8672fca518b43301de09598cc3c81e01b0a3618c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad5e60a6afdc63d8949d7f8d6f34d7ba
SHA1d59a5114a754662bea365b77089c018a07883401
SHA25667f70c9d791f73bb2a5639cda81bceffdac44a93828f361016f7e47b13db2f5d
SHA512deff18d134a5d657e90fe5e557ec87b96940b47d94f99e6e7b43c3e099760355f65c348c55c527b1023375a147ab9dd4a35633923192c82ec858a1823767c408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5973dddd5fb63dcc8e138f7c49b759c02
SHA18bd849fbcaf163e5b67f21b977b4f34d2309af01
SHA2563cd50a52364c6fd1d8677419b23f19dbbf95d8f0dd0376c1eda39f548b698bb7
SHA512062527326226a3ceb73ade1bc593cbe6be9a215d66e18f1f9eb35d3e55c9ab1239e1864bbd835b5deed70d33680945998a766b10931fb70f23b006be8ae7eac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561af0d3e4e492a943e209057eb582e66
SHA119ac29d6578c11b42343683a82ea5faad3ca2c43
SHA25662d9379e5f4368d17f355ab12c3ab5d2ca08c0331d2827f000adcb35f18f6125
SHA512a3764c6e0ef671cf07b1911231394a09099e5eae290b8f5afb69ffcc54913ff2ffbc8ab8b49e903956a5b7c55025cacec585f139f7b0b6e0be1990c332bbf5de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a7fb90025523097d965b7537f999476
SHA170be2d2b747d055d702db0762cc805e87ab728f2
SHA256d8fbae8d70c3651ef8ee7248fa00be2adb0e03af6f3fe976956b158d1b547194
SHA5127ee53af2d523bd6ada4ff9f332e477bf3ea35e291235ffd86417fdc4f422b42a7b74d89e337ced080363deb8df284e9b6c77df19585fbd4d19989b43c032dcf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b3f0f8d96e0a9cbb265e1ec0810f549
SHA1b4f67cc649a29c102e5024cfa2aadbd8517efb0e
SHA25623790c0f4ae38e07235a6584df69f747b10958ef4cb07577df3a0453220b5edd
SHA512357806d7ff3d8e96838ab61cbf207e391f24333b1610508ccaf301cba36b67d737c4e2374a855c7c37149f6f024012faa336560a803d7c9b4769bdd4c97803cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d10b5780f94bcf2541920bcd8600a66
SHA168a51d598ca7b546af96ea018a3270ca67ba385d
SHA256603eb3aa81c4485ad3409f4c426d4e6a75e311fd3cba2bd4f1c624c488642c95
SHA512d95fecb3d5be8285908546dadf99d916ac2157db3d01fedb59e6bbb58eff95b358cf087721119be0295dc45e3f7e30a55e8a782913751f57d2d0a14100665b70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfeb96629bf41e937d8ac056e5f0faae
SHA1f56f15363ce4c328b422f0d33ee72dea57a2dea6
SHA256f030e084b7a4ef8328b6121832e6843e40e76759f83ca17895da4a4595d6f3d4
SHA512f83162718ea19d4deb09a7faab5aa36c662ae0ef2930ad2de48ed5db9542440d1656f67cbfce50cb0169a48bf6f0105e0afa006657054fca20019ec2f4effb32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7647ba046d37cdddd17ea5845ad2ede
SHA1a26317a9f92feded7f1c512754e33e552bc0edb7
SHA256bc0fd10665a588debb6326934fd768e973732d4570b45a005ffdd956f76c4fa9
SHA5123ab5cdc36091efc79aaf46e08e44f10e545d0ee69d79066eddd9d33e726692329bc1d429432308c5ca309ca810b4989916b004529ebf77bb5899e3349ef4f69d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d20b66f66050ff4f87f8c46c37dea1d9
SHA1bd38190d60ac5514f74a4a597ee345d790e2956d
SHA2560675a7e4ddb71a6d4e42952aee9d0ec4e6710115f0ff09d2f9e911c657b14c40
SHA512e7ec144adf4acbe72e4785a64603bf2e1b2996ecf902f6f2d147fc53de39a13eb94e4ff2bdbcf086cfe019106e9028a2a5a531923dd9dafc4fa90eb711bbcdce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dc5dcef706bdfa7490395b0ec30c7a7
SHA160a73faf58c10f8e38f8b2fb9f7044a13d9357ce
SHA2569938d135763aac3b550884692ed34366c625a7dc5ea20621ab457678e75d5db5
SHA5128853d9ee3dd13e1b6f93b06e30c301e5faaab09e7d55d57be73b93c915d5261c238a0093453519b997b55208b46447bfdd2ec8cd8b210b56b1f9780b457ecd98
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b