Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23/08/2024, 00:22
Static task
static1
Behavioral task
behavioral1
Sample
b9a451430d50dc7f79ec5c06e22e1320_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b9a451430d50dc7f79ec5c06e22e1320_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b9a451430d50dc7f79ec5c06e22e1320_JaffaCakes118.html
-
Size
1KB
-
MD5
b9a451430d50dc7f79ec5c06e22e1320
-
SHA1
5ed71c49b64214c62e93ee65c7c3d0da4b61e3ba
-
SHA256
6daa320afc480734d6a347e5f77fc1f62e4622b00a8eb2ffbb8b88685d2509a7
-
SHA512
8532b5193645a98c657f98fd3a8f832cc30de4895f406a7bd646b2becf85b01f2b43906e1a0f8cec169b780442a754aed42a7280e8fe16d5a02dc33b9b90ca68
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10b5a693f2f4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000003d26d3695f49e5275a83c9a691d5b4b8978a4901faef55fef3e2df6ff515ecc6000000000e80000000020000200000001a76efb9ec9cfb49c9fbdb4a944ad612bec8cdaed8ceef02086b6ff31396fb162000000033302ee68256eaebe71a23ee75003cf1f18dbb0432003e45cfe5a5931646fc18400000003c4cb38e0f6dcdb13192ff53dc68a10ad1742944770a198e8ddd47bd0aca6d81f2a8b51db7ad9d79e274e05b94f3acc1c807b84329fe4bd8a06dd73027686595 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000912cf5e81af5617eb2c4ebbc45a9a77fd4effb31af301b06ca34c08f78dcaf97000000000e80000000020000200000000ff1e031cb1464089842b7a58288d5fc7029d98aab17d6f4425693ae7d82f7459000000084b6a13d3d319b43bdd5561669bcf6a98e1689e52c9e2af29e832535cc6cbbc55d1ed3097a970ca25596825c011121674671880acb738b73fdb1241b40a50e3df355739a42494fee20e76a24d514d93e00b67640696b7675f9b1e76f6c02a922c528d004c826076f11263158f46704e5aed7d9843b38a5768f04d09a45ac09486eaeed9359ba9df3fb707f175c42c68040000000a8cfe9cedf820c1bb98710405fe7fe2d2f163c4ee83daa81f5d4817b31f7a535e8e9791392563cab1a5bf698264ec5f85411a53478afd0031a632092e715e1d9 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430534402" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BF2C0871-60E5-11EF-B161-F296DB73ED53} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2564 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2564 iexplore.exe 2564 iexplore.exe 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE 2856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2564 wrote to memory of 2856 2564 iexplore.exe 30 PID 2564 wrote to memory of 2856 2564 iexplore.exe 30 PID 2564 wrote to memory of 2856 2564 iexplore.exe 30 PID 2564 wrote to memory of 2856 2564 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b9a451430d50dc7f79ec5c06e22e1320_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2564 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ec4180be57225093325eeda92cb39501
SHA1498079c9c7136309bcda0101ac81049e14fc3f70
SHA2567a731f4b5c1ad605db93c0f8a9459886c64245c74944fd88d58bc2be72e8a000
SHA512a4a98c1805b0b0f85161d2e585a3c02443e8a8743066cfcb4b751fefc786ab5b99ff3bff5b78bb9440dd8e855135aebc237ef0f8f8b274618b90edbf3acb96ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a0b1add2a517b38e59b10135557cef5e
SHA12bad3490854728706a7525c05e30946e2eebedce
SHA256ccf4ade7d3938d4e15bf7f1f80c9cf6ef475994942218e2c9323411561264b92
SHA512e6499a1579ce1dd890424d3f4103aa3e5d78f80c527f4d0f5d6ab46d74253f73c5846133182fa5a388526c7d5e70567b89bdca5673207a63247f8415ddfaf5f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ee68bc949d97a7b31bbc39895be9b49d
SHA193ce978ceedad2049383ab3fb83ebb5f4b0ec592
SHA2561388a5fbe92e640d5cd133633c94113503ca64d98c206cefcf33ee3a0efcf87d
SHA512a13d61a5f156d034d57ede7801c51714ab15bc1b5cf8eed67c82aaeaeac8b114c7e5e61c2b0e9a147cef2d5b17012b57964ebb66c03251f34b79bc667b4f2c41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD542bd75ff6e5018e4f3933814e535c154
SHA108f84faedc260cd992b4ac0f024032d4ae2a2097
SHA256b2423544ab0b375fc4ee3ae1f7402f204bf70ceb31d09665e1c69f9a80294091
SHA5126184a7f392f0b0ad9dcf61cb4f64c6f4214f9e5343329582ed63184a5e808e8f14cd413cbfd739496b301b929e35c03b0161f568a4bcdb7839d20e60dd30c5d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f68559782ebda5ea1c53fbe1e23aecde
SHA11c1189a8364df14ca684b4d6fecb2bf5c11cf16a
SHA256f437811fe8f09b20d2374022bcc57ca9397cc6ac31e6abe866f51f604aef9a1f
SHA5128c5e638ba82adedea72e71e11a6e6078b9555fdf2ae8d925fa3d74490a4a47d621bc207ebef58f97fa65a5415419d8538575bc99ea90fadcc892bc0ce0beda49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5035239744f440eca44a60e263e126b06
SHA1558ed6911cf072ee9e79b7ed29c47825393acb93
SHA2566ec4a8768573f8fd0e12008a702b8658e119eeb9059d27d9d36f5e0465cdf8d3
SHA512a98c27a2e9411206e3e3adff12eb07290a54d71bb51af285a25e47edcb712315b6f20f5356efd59c827da05b7a94c93629b5b4b308afbe209c77cc79b4afb9a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ee9d0ccddfe47b83d9fc3244e4a6b8a4
SHA1c4222838117cb6e3af3ea29abd80b902eff52e3e
SHA256c8adedbcbb00890cfb192f5a9ebce25c195aaf673ff1b047bdca555a3fdb2c51
SHA512620ef6c1b5c53a4d205dbe62b74a144f4234bd67c6a0beb7bd9170d780b454d86ca04371fca574f14b585c34f086f0170198c14cd54c7777d4b83050eab179a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD597fccf9be94eea0ddebd6bedb8c9e13d
SHA1966a66dadd98f2a75e9153c4a9fb2a52eeda766b
SHA25610997b07f26f219efd4c3ad57ef8e52161a05ab1d2e94024eaf283738b0ae5c8
SHA5129a7d8fd3602f7cc456d4cca2051c5e46896c650e5ead215d391f101cd4db3f524fc615abaa506aeed47e293ca195b264f2357be9b05caba2bc5df25e6918eb34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5caea591dab3ae26a02aabfd17587dbe1
SHA12c71df8b5d1b70d32b3b5c88db946f029bb2358f
SHA2560baf0b9ec30de1ccba4d78c5ed427aaa34df6b2e469e108428c07b502bc310be
SHA5124739507784c94533aa3d65a8ff770ee46bc09134abbd37be69fa227098e54f441916f42221b495829691f3fe1880bd5778ab6858a00b8435301e676991493df7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD536fccca30005dd80875c104f480f3dd9
SHA119abc5651fe278ab2ee7a2f166e36f4ee7d20db8
SHA2564c382127f0aadf534acf17c3af408ed712d1df7a1f4a32bf6c572b4e813054f4
SHA512d235c5680ce5173a37dd477dbf42b7976e66153be10f3208ea6d5622f6777da2a41c1c278e35e866a57a5623989937db95a7d8bbef956fcbc3a7185c7059f663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56807b756fca8740246571d58716c8fd6
SHA1a780397db03765b928c7e3b924fb509b3fbb79f3
SHA256a49ea6d9829c448da9012c2e824ca78c8c28983f64d395816cd41cd1a975f693
SHA5122693eaf56d6f99d4587415de235f720b0633391b3555e60d3a88b1bf87cbdddf83e394c4d2a8e45c2a62acba7c77aaadbc0b61414005fff69ff57075578549a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c81db745d77ff1e2ddf480366082a189
SHA1bcc51afac686691b4d5214b65712a8c552ce63ed
SHA2565028f9ebd37171cb7034f7da1f7494ac0af761fc45b38100eb445d958098a25a
SHA5126830a96260877f618453650a8f342a9c5003546fbdd5a8f03f5d4e8b66a5655464b5100bba10f93f29b960e3dad29c8ea94d4f92a51a1149c2ec55e6890181d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56ed29f760ea8f2d7bae07db893bd0d79
SHA16daac8ffcd64571e7a9610e616f0166bf2d6f70a
SHA25696dda4a31efd5090de4ecd8bc174654ee04255be843bb604cbbf88340b02971a
SHA5127835a7d916701a9c5947f292d352d8fb0f637b0b98ebff73a97d7e06ba018ddfe1bcfadaf62310ad0d4453ebf46a6713587359560c1666433665b5ac4ba455dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5127657ea87ff842ba5a338f02d1ee1da
SHA11882a41c56aa9f724b3d7e70c344b9b45f7c1246
SHA25677670cd27ed4d29a7465b72194c52cc60791f0f27a48b922f45ad77fafc023e5
SHA5123876e99ba07e389ea5699ed3d358aeebc7c441e387738f8cb6a296b2b6a23bb946ab5d6963d7b5316ad56c79430e3b8f8124bc13654bbd2bb5f8606e4473164b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50ed195885fca0ca16d1f288fbe387198
SHA1fad53200a01e800a099593da38a709c19cd31d03
SHA256dea8e4341863e86344a09665d7e04128853d8d5bc92ee5cae98a129e8c8833c0
SHA512bf9ad8ec2cf802b86b885c30e50b0be2bdbdbcb39853f59c42450a5a8db0b16a335ffed9b7cd11b3f2debdfb95934f799b8c611b8d25760b50fa6e82aa68ed33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD595ae069da9a89325491b2f9f60922efa
SHA1316554aca36722e0690162db7930a037c57f233c
SHA256c031a5ad291bc5a54eaa9bf5f2303fb9cbe86c99e94b2fd2ca5a4fc8203aa006
SHA512f35112e695a6683496f66d23ea2e3a3fcaad8b977be0810594d0f6fcf1bef7e07a630bfdd039fcdc9287245db36f76acda58aef8b7bc7b2ebc3fa7cf091b8eec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55e27d6375bcd2387d22ea69b991fde61
SHA1668dbd48c9fecfdacf4f64389225f255f7eea42a
SHA256bb8e3153cea4f3d830ebb680d6a38f2c4f26b2868fd9237045c47da52e000084
SHA512a777f5b15ab85f4bac21049c15d20924dd8dcf26f7b77c37a21295cbe68a2c308ab37d1bd4e70c8d262fa973cfb944ed5fec167aad81c5b60d09ba315afa2b36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD527721de3a06df52216e926d507f54841
SHA16ca69999ea28133bb6f1e412f2b758389c80d458
SHA25601f77ee26b7ae8f705c127336b8b1fd6616032c42798ce3f3d47d9d59246341d
SHA5124681343a9793be2a1e738ddfef9522620f01932daa753069e901f49b943833236958bf363113458bc0bb754ceb3afc0eb162df04dbc0978dc595532b641e897f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5aa4ed5bc3c286d7ba89adb0af714943f
SHA1eee7902ec3f739d007babbf41f867c8caabd80ea
SHA2564af671d9a9b629b398401754ff76e2c86d202a95964228df472ad5861883b3b3
SHA51200fbca383e1db46ddcb542a05f786ef7cce046160142932c6b2050b75b35a698606cae651f25dc8a7127edb5f985e73ebd1a783728e157c258dfe9dcd3717904
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b