Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 05:27
Static task
static1
Behavioral task
behavioral1
Sample
f54967c72ae3b6a6cd1bd8f346d3e60e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f54967c72ae3b6a6cd1bd8f346d3e60e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f54967c72ae3b6a6cd1bd8f346d3e60e_JaffaCakes118.html
-
Size
53KB
-
MD5
f54967c72ae3b6a6cd1bd8f346d3e60e
-
SHA1
0e7d726db7d2ac094dabe5beaa3103362cfd083e
-
SHA256
1792e34cb5af4be8bb8fae29312163bfb59de8f3aa8b4060f68799e1c679d7f9
-
SHA512
a31f3ed55c726705f74ef4e3050c61273d53d600f806db49e1ec133def33adfb40d97532e063b7d9ecb1ae381a57022506f248b894f4c323fd5523794ac1dd09
-
SSDEEP
1536:CkgUiIakTqGivi+PyULrunlY863Nj+q5VyvR0w2AzTICbbtol/t9M/dNwIUEDmDK:CkgUiIakTqGivi+PyULrunlY863Nj+q4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000007db16c98e1b1ad9144536664116a58f54989b9bb6135f467fdf8c7b072051302000000000e8000000002000020000000e15acf4652ffcea024dc162ca4fe5c186a2271d0540232553ea28e9ca63e5ef320000000befc206d54139fea81916e13b8bf1e8d47079c94e092eda1bd7e72bede91a0c6400000005be73bf70263570b8aeb2622233c6ed3bf7cfa8de15aef076f734c0fe35ed7bb921059359455f62e225d884ab6700f28daf2bb84feb5380f01d5bbc5b381ddc6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D911C8F1-7AFE-11EF-AF16-EA7747D117E6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433403915" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e009c1b70b0fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2712 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2712 iexplore.exe 2712 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2668 2712 iexplore.exe 30 PID 2712 wrote to memory of 2668 2712 iexplore.exe 30 PID 2712 wrote to memory of 2668 2712 iexplore.exe 30 PID 2712 wrote to memory of 2668 2712 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f54967c72ae3b6a6cd1bd8f346d3e60e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2712 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eab3f691beb644a010fd1b104c18d0d
SHA189abcd6581b80a0653dc8d5f153598c6ed255ac7
SHA2562ab2c477de6ed542f38b3bd90f6a5f1935202695ee38c1d0efc59d6af1a63ccb
SHA51205301a8bb1e494f76db461115c4083bb03d8cd011a3961643e4c64fb1da60262c03ac0b234317a8ec3f17c32b0f20e34db4e66a5aef77f556bf34abc73b2186b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591e65622c09e10e0d7ee87d47ce11f94
SHA189556818e76e28d0e7fa6a85c69733a5072966af
SHA256f21b52c328ff429ab000221ed96c07140b473776f85dc2908f90d241f9b0ff70
SHA5126b87b80eaa59f04ff0616343a0bf294da38e11854f9a9f74d53776ab7a1a6839be8d9c699fc6c604c51fec733949ba55ef135815f8e8d45890758a9d66c22413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590f0ac336c052c6472ca624a16288408
SHA1e1770d4cc840fa29b335a5d7a246ba8110c48be5
SHA256526f3b3ec3695fa8a448c0a1c49932dd4c32249e0c2873ca0cecfcbe9883db61
SHA512c4061252cd92f877214d9b4bb25023bb8e45cd85170cfc75ed2893e7453789f15fb24713d56b63a8986c2b3311a5238f109b04e0ffecb530367e76eabb354d60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588cca68e5b7b16c60e4a3b0c6b7df4fb
SHA1d56f3cc4016b664a9227b8f0ec3f73470f207787
SHA256fea3682cf3050ed97a78d1ce8991b3b4b8cf2109ba064df5e3fcede6830cb136
SHA5122bbd438a25ccac071285e9917506e2e72232ffa1a626caab5fcefa7b03ae6f74224b9c3da9fda43381171373ef6f92da4016bef6fdf87d5579faa4b3a55bb46b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52844dae3275e40d18ec9a998ffb3c05a
SHA1bf2b111487bbb21cfaee49314ee7202ad7d663dc
SHA256134efaa9f6cac71a75d0a6b71be5351a836ffb1eeaf7ed4f41d830b47bba9206
SHA512f3a439c177e299590f2db868bca384f547ea3ae683f24d13a3f3fa735c4fd046bbdd45c431e20b340e5b8f94e72cefe94a3e290c20c3790bba56889ac43b74c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f261ca9e5646092b7ac7b2a2ce965887
SHA16bd4d44cc0a912cb76616001469635be88b129c8
SHA256c57d0206af39855b9ab08ea79265e47a610b23fd90c1c6018488509de605b383
SHA512ef5f5204009d56be16dda3ca443b0abf60de62953dac1e106ab3287c9d53d1f2b83f4189bd129d4e8614fa20245b62bb5b45e2d1a629be57b86a4619bc33fbbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bee3849bfb3e80f3aa138b0518132400
SHA13db84410d460942154f4dc1295b8bd74d60dc9bf
SHA25694ec2fd4936e29a89de4c4c5e918cb612d64bc9b008ad857457b4e37172a9771
SHA5129de2754e8f2fe88ce64b4847f47a3b94fc0122c02e8115c9a7c640e8990b2c57840e6e145b8cc59b666ef7d952d618fad93b481bb101ba269adbbb562c1db8de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577ff7cafce905cf90e55809d94476424
SHA1ab07175be849a11bda75cf95e431be1f008f283d
SHA256041b17f999921703211458ea082f785e01abcdd85efbc2d4094052ef7ccda331
SHA51284978db8cc9ba3a5f810d31471daab89d0bd8f61ca79d0c82a17b40e6d38f24d553959a502cd76fe18754940c71001e185b35e61446814b3ee1045e6222b7810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be0fe14cc689df78a2497590df88891e
SHA10bb328eee966bc59f4315ab1698fc64ffea9af0c
SHA2564ff58df78eb1915768dc60735f7c41f0554a521f781705d1de219c10a98ccc69
SHA5128bbbc21b513a4fce40e054e49e7a7d06f91c6bd84000785bcf67953015e3dad6c9eff2ee94fa424cb82a225b5c7040956a183092007e1420b8fe9f6d65f57735
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b6d0cb103abf663bcbbc6b4984adf38
SHA107c834541e7b7fc58900bd008c8401c28cf08f7d
SHA25676bd6639612a08634e87e1ab6b08fae73f908ae3d5587dbd9e89b3fc42d49c69
SHA512c89857605230f8d45f9ff59ac2d40734f3b5f4c5cd8d0d3dd07be175cb4c48ef6425943bc497a4fadbd47badf1946704dd8a25f4fc014f2190130a5e4de29e1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb6e35bf7f752df45de7b94f9ba63956
SHA162983ae0080e58cd5f00c246a11b45306acc63a4
SHA256c9e78640d0d89b027e9870d15e646df2659d51cfed6ea1f3648fcd2e8adbc507
SHA51290858bd9b28db18e6a33636fecafd761eb42d2681ec5d36c0518ccc99309ac7daffbaa30af47dfaaf8905d49eaa2bbea1b7ddb989f7f6612cee11757080bcf39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d9b3776f7a148892c5dac99e14dcdf0
SHA161a33846ffca1b0c9b3fe6af6467866c00608c41
SHA256c773fa7cbeb9d86aa4c586d0a237b0d4843138fcf945b76825edcb8b7abddd50
SHA512a43e4b79c69376d8aefb053fecf9d49c5c6816c65d4aaa1ab5d5763f649afebff5574a4368fbf2b281797bb7ab0a49b6551c19652d1a85b37782cd31d4123b56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529af3a32c04683e22a2a1aa52895a4eb
SHA123bd2ffd65272774847f3ca19f273d934c470308
SHA256e5a0881b921715a2e97da4b7ac0eb3e56fd944bd2c5a7b3e34ca02b0d88271f6
SHA5123bc604a2bb8e06facc97fd72f2a2ab3d8ceb2077f03fe6d445fea1d11fd7b99021c5638b6465f3966016f9d6b78fe22828f45eebea57f906090758cb8a67d7b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56abadc39d88ad0bc08cc6f45c7b338ec
SHA1df5fa5d340653b2405a0b5fe2b1f21039872a225
SHA2564f28958084e2cb78acc709e4200fce53a2eed61176652adf92d984e758a37093
SHA5127deb1c05e93eed6c8ec9df2c82b9572f80a9dd87069e118aae34cb06633474f22720c404aaa44c1bf75fb61f0a484b15fc22feecb0e6dfb1dfb6adee66e7a7af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583cb48e41459fc981fef6ecfba1bab60
SHA15b23c45d31c432c1fdc59c71136aa6f5d607ea89
SHA2564cb6aadff16e4710afbf4dc62cf33e37e91ab2239f350d54fdc8c6e796dc0926
SHA512335f92921d8a369e411c2b76ff19da4301f8089e75b7bb16c10a3f595130fba6d6ec6fad4ca7ca84e0f29ab0bd62de996b054508b64823eebe763e5a5fbb5af1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e4ef349bcf90a2a6c23b28ea84291ec
SHA1fc41dd3edf4c4f4ff3703a3230ce3cf2acd3126a
SHA2568c62868d2fcccad2c99ec40d93272c21dfe4e471e572cffd179034dc4b1b75e4
SHA512370202843d891adf1a5c669dbff835296b15c6127dca2e2fbbef31b5665569953d8045633d36dc42b7228fa0c4ea0c69facbbd535f85493b838116b61b36b5fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5710d8c768d4d7325a157bc1ea481dac9
SHA14a778fb28063cd03090060e92af2a2cb0a9b7268
SHA256ea3b2866ccbcd8ff7466c2f9a495ba2629af970af1445a180a42d0c63055b173
SHA512736eab54da0025854cf5734cc9ce17e0cbbcc29e43a5bf43d3eef5482a956dca1e8f9bf3c34e71251e91833808885d0d6141ea08d18ba8025060273b2751b30c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b2d728517d3f7096fe1f9858ce5573c
SHA15b8d878fe09bc0b498edbd0ac915c89d2793b51e
SHA256b506cb7af1758f29d0656830efe55163f652df99c2e2c323da65d42c2675fc47
SHA51250f6a8cc47ba3bfa7c8766ca72b46e02f5d7bdcb954a1c096c9eab86e6dea458461b796912d83bc4af0291f050365588fbe5d7b151e6ff2a78fbd1e260385db9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d65380969635da84f6f7dfcc40a2ca6
SHA1abd1743b83d98031ffe3f07a2c315be98d860d8f
SHA256cd9e80d97238c317a008e92f0656bf9d25683eb55fff33cbec89fa9be7825d10
SHA5124f34ce217654f167d54e69fd940f7d41b3a76120ddfb14c4809b2e7e389ad70b83afd4fe36a4e416e6305f171f12fed85e81cbe6476e0a2d02167723dc947509
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8H7UVK5L\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b