Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
44dcc2130f5081755fcb6b6a0b5d29f9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
44dcc2130f5081755fcb6b6a0b5d29f9_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
44dcc2130f5081755fcb6b6a0b5d29f9_JaffaCakes118.html
-
Size
62KB
-
MD5
44dcc2130f5081755fcb6b6a0b5d29f9
-
SHA1
c8fe28db8d494495db81cc488ac79ecb01f757da
-
SHA256
9aa876677a5aaf49a53d1f8d3e9ee49e429e30fa101d6076164851b23a874eaa
-
SHA512
61fe3e16a71b94f65ae89b57916d9bde60746c3ac6b59e8dafbdcf50507bb46329398635fed88492fcc172e5065d8dabe09d93b96e984e540568a656b4b4ef53
-
SSDEEP
384:SIqi/iUuLRpx4NFuJMnT7XNbP1alpvpLkLwb2pmSGfpk+ERNImGSPLMAhbyWCbEc:SI6UUxCSMT7XNxbQ7fsLMpIc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435112894" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e096e8b8961edb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000005f4dedd3439666b69fd2f79f864e7a9044278164eba7ed9683b3780076dd282c000000000e80000000020000200000004ef0b07a7951fe3f4ff53877a12a3646e20321c63efde3e0874228dc3da67d2290000000404415faf9bb59b0d1c28ed5959868f2b45f1ec22e9197762be835c5838c689a70ed05ae37c095697dcd9e2300b85625e33c993f2274313f8e2920cff52537f40dfb1f251f3542d0595b8d2a607f06e14f0b45d3827ede60c92f0def9149cbac7227b0feb6f7b40c19407a85828593415b167b270adf0d84bd30f91a2657ecd4120ea4b22be4e2f345682e2f6a9ef74540000000b9b7226fce9b586092215d674f2a9c84f8bb337f65a1ee2cd21219bbcfe721ea35c0c5cb9a8b9baf687aab89a0f5f6e0d25edeae29c3aa74c80cf6dcfe8bc34a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E1A81381-8A89-11EF-AE95-527E38F5B48B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000004e6f0eed43d80def9f40e0f5dfe0ca3107c1f4e3403bde3cbfe47fcddb1614d6000000000e8000000002000020000000c3552cb088f96c3c1b96b8c76f56f503e0f22aa071e3d070f47f01a4e4e739d7200000001f6b10f27138f78b103696dbb9a5c65953eda73ab72063e92deef430ac51a477400000008c899e7b0e4b81b0fee883ba3f104011addc763ee9d504348a6f433b0ca98d68ad860e663f67624d4861bded583bc3bf59ce0b14a59f4df18af7b0f1d5cc0a51 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE 2784 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2784 2196 iexplore.exe 30 PID 2196 wrote to memory of 2784 2196 iexplore.exe 30 PID 2196 wrote to memory of 2784 2196 iexplore.exe 30 PID 2196 wrote to memory of 2784 2196 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\44dcc2130f5081755fcb6b6a0b5d29f9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3ae9f74bfa55eddbe4c89c8fbcc9066
SHA127f9e9aebefff510a0f5e960df21c277d6c3c3c4
SHA2564afd0401c97dd7078321964541bbed014ec72edcc0661a60a02c9d24aa274da0
SHA512371dd804addae9f7d1353f29472da6a79749b129395291f278f48fedb15c15c6da33fe5ef07231492a05e3cb0bce9a743b9587bdf99f0690e7cb15cac85cd2be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529bb76fe8bd1c2505243b45fe5d3dc1d
SHA1fe10de4c12302ec8ce1bf1ce5f7c15530bf45c74
SHA256bda4485fe9020a6df834df84a235df76999430ed24b38809763fe008635df040
SHA512664fb2730d10764436b6f2b74ca0ae47cf9a4f990d2651eb0602ad8acee137e29cad9e7e8c506e61281483a5a5e3e893c5bfe7327c66ff537608d23f0aaccad3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbcb518d8b0dd702343d4ba41cb946df
SHA1d9bad5afc0cb49e3bbadce79e2ebf6c0113f7d72
SHA256829f2fa0dba552cd82934b742c406e26c8eb3b2631be6eb36e6be005b56e2712
SHA512f203871e21fbe57a0d9bbf257cbaa99790885884aebb4277113ef92642be99bd256c3caef30e42a87f46fa7080cb7588fcf13f11c873c3f0fa71a8b58747990d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8ffeeb04aeaee1f0fe36251aea912fd
SHA1527e1b073b4e12bc31036efa92f0a5641c40c533
SHA2562d11fe0de66592800c4315388f0792a018c43d6dd8dec478a9e9c4674f7a8978
SHA51231c07a348328f607fccb7b7fe41b3cb82e0d05305a2cae1da7ea137e416d57a6951883214ca055a3b54dd82540a7e2ef21eef1a7578b04feab14e9608d780f0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed71f864b863efbcc8790a802e9c8be6
SHA139a3178ef40f230cc6e91ece8599b79f8018cdfd
SHA256ff504d74bffa2f288bc41c049b7337614dc50af98019ca92755bffb63c56bd91
SHA5129fb4606bdcc6d926638465ca7f82cb6ff6fa525015ad28f9fd3837654a7b7ad5833feb948d52c233123db30afe6228a41c7439214d0dd6532647bd13a8071ec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb61c980b87d8fe54d9b27b2c09bbde5
SHA1fbd267ba575cfe636dcd9e587ed1b32729faf8fb
SHA256b1facd4372f550a95f5d1cc3ae5191ee98b1e34ba83bedda1bb943216a25d1bf
SHA5124bab3e66290e2d121861d9b0da5586ca258dab169611e856a3bea74bcc869e41dd72ff713ea133680539840f13898dc65758844c923cdd208d33c7e3c877a700
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a805a697794666ca4807bf607238a807
SHA1491e123f8c7b9cd5a52abe7d3a684118ecfebab2
SHA2566710416608044716f1a883d358926c0b2b791eccb4e2ce35b58d05730d384766
SHA51220e0d191cd0e558a602c8f556e6e807ab476504097fe471f814a2a38585b43646ab850b7c29d946fffd6f3266650d24fb7b69776be54d5ee79155e91a78c1ae2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5096570a07426ae440378c00e3ac322a0
SHA1c47cae77fe1b4b08f87fb35997333b135ee086c3
SHA2567397653500d01a31040747a5990d16a72a4f238934f848572e07a39c3738f823
SHA5124b18fc8e32aeb25ebd5eae35db6dc8c01aaaeb09c89b29543971e9851819e38bd6eb6eefa16d1b9a7557a5ab2947cf0de1e546fc26904a2b6377f25a31a120ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d30efc005e11210e21a077ddb66ba8f1
SHA16387d0810659e49bebc04ecc4cfb8e172a4cd666
SHA2569f96b70e226cc2b452363d2cfedce00c798e2510ff98e627e55456f0146545e0
SHA512a1b01fc508de27384797efb2bc66271fa47e10c6e2ef511482dccb985e1da5571c6e6ab3d87c24ac78a9eb76438020ca18c5560f31d9c2a4cd8a9c7dbbd9bb4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5053e66f0a8f9724c01d03db3f50820e3
SHA1dec13fb85d4a7796cf2bf9ad1091133db9ba1023
SHA256e19177253a8790f64801d02ba164a2f5c1819958d1500028939b46fe95e4038b
SHA5128880699039fec68e3c1200dce8405cc830492837753c602f4de61cd1fae16e9f46f245c57fd9a0aa59fb4dc12e9088c41a6518e5386fd62bf668148095d65b2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5124c32ce60ba73cae92de2ddeb80b5ca
SHA164bdb7e91143b26564e87bef44e3145368706839
SHA2569df2f886a08f1b6799620fa8e761843d5821372ae259cf45b15a70bfe072102b
SHA512e727e83b1e1fc7d9e6ffe52b281acb9fabf8830968045e5825d44fb40ed9a8658528ccda2d37ab472bff88dfe814a864c3e021504585f739aaeece90bc2d4d98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5561cea9e1a6a5bd05612a2164da798a5
SHA118ffbd214c8a896add2189c04d075fe00dd6a334
SHA256673af9a1bfc16e71675fc6c97b4130b32560a96375808ea2c21ffd43db252dba
SHA51211ac1aa3b3a8ef5db11fd7c89f1544c830e1475dc35874ea0abb5aa5ca98dca1f78ef1a3412f383c9895d33c8325cd6beecebacada8116203bcfa625083f85e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52884b14f3c7e55ac8b135c5a2159d34e
SHA175753a09de19d285ec7a8ce779f57fb3a5e7d11e
SHA2569cd4b55e71c5adaf4963a4f22b62955a11d03f8be0401db6c9383fb75e9665c1
SHA5123acea275192a9c255ff0361dc87e7ef20e343ed6eea89b396e39bf24c390be88936f51ed3a812c74fa8e5cfdfcf1cfbb835a3609dd66508a5947d4e7ddb6a19c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500fd94c17660bb77fcc5c408a8151bcc
SHA14b6de8ef99a8e67a492bd37ebb73183624a33693
SHA2567c79d3d037449ecaa78002565e86d54ad184489c11cb56877ace97f8b68a3aef
SHA512fd9a5868e19e2065a4ae6b1ad8926deb224c44d2bcb469be183fa27894f2f5870e0c2bed5299aa90161e48b66af7328161cb1740f5ec99d1b3d26309ccbfe666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5339a3423c5507ff7873c53167bd35b76
SHA1df15c2764f42b4e832a749ff908728b8d874cf63
SHA2560583e7a0b9ad25740ecc1ce58f769d97f781a58e4eadc7350fbc1a6081cfd46f
SHA512b283396fde443c64d1c476ccbb78473a5916817957bde92c200936d3c0277d5abab79d38a4447f3ab9142da6276b0e36710f729acca6ce22384d6a5f151315ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587387ca2551f7fe8e08e81e9338844f4
SHA1481950fade7f07169efcdb888805963156ab9ded
SHA25683daf52f8ddcbf3370b926fcaf41f77711430c055b606f5783423694656cc1fb
SHA512da89f17c053fef30cd8e41488df3261260ac97da0924fe682c1f2cea1eee0aa679230e388aa2765629569aae24576034efd39d08faf8c8db6c7d4a7070b8577f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5622a2208f095634483c38ed213ce5b52
SHA13d80b67c15eda767d47073f2d7e19351e56c7f32
SHA2569adafd7783d51ae1de13083a76976ad063ed00b60166b0deb1e7676c7280fe7e
SHA512910115345ce8e0f0f7dc56ce9f89f8ac33693a2131ac4c47d2d908d8f63cc1d2c62aac04326c729a9498e033698df0201800160144cd10642864e89f1cdd454a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b