Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 16:16
Static task
static1
Behavioral task
behavioral1
Sample
fee55f959d1bc2d43ff9109fefcb72e0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fee55f959d1bc2d43ff9109fefcb72e0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fee55f959d1bc2d43ff9109fefcb72e0_JaffaCakes118.html
-
Size
77KB
-
MD5
fee55f959d1bc2d43ff9109fefcb72e0
-
SHA1
c77267e8a0596993fab3caf49edb399196151811
-
SHA256
82f75fa47d0a2196fdf13639132d0b757bc8ac77d0bc52b1f4c9945fcbdffcdf
-
SHA512
e639a0fdb4c13dd112d44aa11062608591e9ce2df373c647e99283267c15f7adbf7e9dc933b1ea82e671441c1104b2ef60b0c0f3164ae088f2955e0c10f76856
-
SSDEEP
768:Ip1HlkSgOriWNeuavoBgGLEIW81XigshMx1t9/bjtMjjozERSRMyGLmDnq1go8vB:Ip1YaNEIXiXc1tVKjjLik8vLSwZNnNBR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 008f76028b12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000000fcb95f72490dc99738b2679770fe3247cbc0b2381c714ee6c93a040ca5bef2c000000000e80000000020000200000003a9c0694c5bead7c13d23df4c3fe363d43fd59e3b7880ba736a0436e90e9021720000000c58a532adf9b1ef99fcaf862c4d066bd4c1f69f60b4146c4e973d2b334cba2df4000000050a21d77b4c671396cb90acedf9f7d74e2fbd742cf4d1d67b124bd59cc3e66e10a9d6d4a39af1e6e930e35ffc541567eb3dbe687e560e1c9c6aefcdf5ae33179 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433788450" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000e4c7643222c35e7694ccf69fe91956e99a9cc4f75611e813a0f241b0ccde6503000000000e800000000200002000000024d5ea9cfdb87de5e67e9c6a21a455aef2de24b118df3b0c3eaf82ecb23c82909000000026fbacadc62eda193973f6652e496031b588854b46cf7706f95d2fb3bd159243fe8e496df8c2aa1660634f214cb337fab61ac3b39c9fd6a84ef217a2df8042a2223799dcb08033c57e9f6123c70d7ec821428f5e3a953d2b830503f5e586d11c1b3d3b65eec68ec6f7f122e6d2ed8ee3d99a4c14608eea964d2cab07518c564263b3bd23bfbc8239fd68baba8e42365e40000000c50bc780989bedcda6c54c32eb4fab5718822db9a2324e536b1c9d51281126cdefd47917c0b845ed9e82219f19a5257869563ac38f858e0349017f51c5f89ac2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2B82CC11-7E7E-11EF-808B-E61828AB23DD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1528 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2276 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2276 iexplore.exe 2276 iexplore.exe 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE 1528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 1528 2276 iexplore.exe 28 PID 2276 wrote to memory of 1528 2276 iexplore.exe 28 PID 2276 wrote to memory of 1528 2276 iexplore.exe 28 PID 2276 wrote to memory of 1528 2276 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fee55f959d1bc2d43ff9109fefcb72e0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2276 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50489b897362358472115241d96e12ec1
SHA1bed8b7e168e8e6c505ee379d5a11f8c845062f9e
SHA2569bea2c77c78853ada51570f962224335acf3589e0296eb868516cf5b5181549c
SHA512dd5f67b5e39c7d91380f5b6303eb65393b2b82e46bc76cb1a75b7e3f24279b436c4f410347dd085bed8ca16a8d02191d9127988e08dfb6bf6aa44657840962ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d68a3a214ffc1a2e24d564ef40fcb741
SHA14cf1aca1215164587dccc1f008d5fb984fe703b5
SHA256f9838f00de1899bbe62731dc423d8dab5750a90361bc3f8b2cf16aff50cc7178
SHA512a4f1f761a6190681b9695d58b9197a39ecb51a8185ea1e0e15c5e79e0440c5f8799f331f7a46ca365cc2f5297542b43c388f2a5d12a7699e46adaac0f2ab1ec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8912226f6549ebeaf3c47698e60bfaf
SHA11721f8313fae1bc7bdae8cb13327fe13d4e7920b
SHA256f79ca9843aeee0a1da6bdcd803cc16a4d998186b9269da3039d2f94b21b4ab22
SHA5120a5949d674d9b540ffbcf82cd0ff8224a3e39f5f0e8cac6a807fa10d5595622b4f9b2c38703eb6c0e1208e8674a04f1b1c1aa39ce3351fa219c2fa5fd20123f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f01e0e981607253bfe6937a8680fc595
SHA1085a048f8a9f48fe40a073239673fc19cccfc368
SHA256778be837ac8a4a966edf577361c23cb2beeb01c1e69b38455e6f8e6b322fdc51
SHA51292405db859cadbc1208723e77c48dd4b64073a61e1aab67f979d7eeb3080eb150110c0e6baab852c0f176aaa635195383e1273359c0be1ae3f06d82a1083d08c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba557eec894a97e106ae069f28b2d601
SHA1f1b62b1fb3ed828b266eadda444e2d53e1ce32aa
SHA2563394f1c16bdaca7fe4742b3ec135999ed747d799aee5a93e27b70d99cad9e28c
SHA512c47d30a521471297dbcaa17c27211eacded57985a404ac409b607dfb1b09df6e9c585f319ca7e36624360609933065b33c8213ddf121c2504425cd259db446b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4002cdd88d07198ba16ad9fb51401b4
SHA137b9026782df294813f8c7f6a069df2bc11ac9ac
SHA256558c08ef8ca560eff05aded719fccb0f5588f6394d985d8a7e9372d937e33941
SHA5123662ae653e5b7edc6296c55ee19b85872a5e53559d9028f2e68e90b708c0e710be47fb3f1a4b06db4aadbd7f76918496fbcd0dea8c9975231e43ad6d403561f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556d580d726da89bd37f0ff397902ea32
SHA19740ec40082099ddda45eea1dba919bca1f4a5b0
SHA256924bc967ca62b9322863effe104d9597eeebe631cd0be35398ba88a1425c1c1a
SHA512dc16aa657e21bd7d220b902c1ca86d9a94f4fe3b4485db267c3ae9e0c1acaf92cf2cad511b78ba0c5241d39a91e447330cd27e1db9926e1a3a1f3c31fa3cf7f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d477ae32a4fc4352c16fde8f3c218eaa
SHA11ec7a553388aeeacfa357529a4b44f5981efbd53
SHA256f2717717fad0ad094e677e87cd48c8ee5421ea34dd238d272e1bca0d2e47f570
SHA512871a2fa7b6bb53cd3bd257cccb5bc4948b9e1c0e80923525c52d12e60112bfd512583363515649554adf588c28223591ec9d0ad76bd70ff1dc598b301f33bb1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572bea29c4af4be69044f87f58a0a2b53
SHA11231b3db451e3ae661e93a91bc034f4326183b4f
SHA256b175d05065f71fdbbd170dc23ec5cae5e8320b9b121f18d13b32953c1126f0b2
SHA5120161da3b52914cabb9befa8ee3f40a75f3c99357d40c981f9cdeb33f44d9e5c7ac93f37843e44fb132afe667daf7193fd8ef2e9ff57c244be478aa2701ea582f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532e26e2a0e2cf7df75c77b87c1909c2f
SHA183653c18d5d17ff3273ea8c5e0ddaa9838b53fe5
SHA2561dee83cc8669257e4a789051610eb1f59fbf4fb3fdb24aaf37c34f048b2b27d0
SHA5124eaa04a5c3dfdb290281013fc985c002298d1c18327ac4d4e6a6e636add1f5f4d8337bb90040c75792cc618a6131591fad5d52ce9d59add872948f1203906a43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e258d0d183d890c4bc15d8bb366e83c
SHA18a93346e3451f85daa3e494f7bdc38220835d085
SHA256f2f99452e83f64a3d229da7ffd342e42bb1b90594fd2552301899d3d04a17de9
SHA512f65ec9ed280ed0391aecdb22dc9db234faedb9cc5e439e0a05e03346249907dcd86ad36f13bc0831427e733cfe6edfe584ac47cb6805d67bd7b5a59e7cf69c43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588e6fc9335f7740f21cb9f1a02fc05dd
SHA10c6b39dd4fa017a68d70ed2c1b5e44ac9c95d018
SHA25628915eca89ea75239b635d0f344af809a7e7041c0fddea734050e178b46aebb3
SHA5129fc4149c68fdeca7ffb5159c98e06cdc220a454c1a142ac2dab9652699177d1a07be3ccfc1327df14250ac896c0b4c662486582f2ca54b76ab8d3fe99f178a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c760c3d53167bec9e463909720027f5
SHA1224043f214c2eddbf7c84b811b2d9deb9d75f546
SHA25651e421d73cc8b7e2b7929ac5080eac4c1d805a66947af651e3f6df40092a378e
SHA512592adcd51ce590c6dd3612528efc67a5983bce8d7c98a651070bf5980d63e768e51771a2b4dafebaf1edacac2c433ea5bd210a3a9bcf43cd74dbb653fab710f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583e2161d55b4d3108421e5294829e5b0
SHA15dabbd5f9cada154a96b2eb8055c61f1621a6ad8
SHA256e5466b4394670f80c502127c6722bcf1ab542f533ff94004194921e95472c7bd
SHA512cfdff193a0ecc114e1a6246c3190fff5506eaebfb60393956a3b8627193f914fbf3c89e3a9d2a014a34dc20648565429cc33996fe67c0d63c951411bc9dc15b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b8e3e9ae247421aa2a2f2fd9a737571
SHA13afcd52f03074234090e490231764e18d07537ea
SHA256c1ed464a3c48feb73be9db69dcd87e24520865d4e13224b4ffb06ed055ebf028
SHA5127fc6b80fa1836778a6ecd2dc31511e453d5fe8df05064efc7fdd479653fc2444e9ad1ab7a7bd77a9ff71da5274aeeea1971304f9ff8960b3decb2fbea514d044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5450f7a7abf546906cc19f5e1ae81b4c1
SHA176aa2ba1f7678d95458fcea1b2b3b9d6c78dea39
SHA2561b1123847066c53bdf83d1ec65dc4c4110bc1498b6dd42edff4c7a4c94dfc8b3
SHA512a5a82721d2802f04632c0077b345046b510a353e030cebb95f466372824951bbc8cd25bd7cc999ed50ef56212f2e8d678da09426332dc0f3d93ac1e14afb109a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a4f37255e649138d2274787fcffdaf3
SHA1d8c45767d5dd5bcc10150eed132c46d5647633ab
SHA256dbc164f723d1e65c5e3b49d92a9f3c774cdc2abf736ef8ae306e326083e75275
SHA51271a6d925a509da8fa08f72d0b97fda8a565371eb632fbc3a50bea244f230097b3292b3829e9ab6dfeadecd1870d9d8ce5f67cf6432b98a6993b46866846db17a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581eb8d498c5cf2b8166acf1ed23e770f
SHA18435bb87b9a1ad26ac7d1057d1cd9521ff2564d4
SHA25675186947e5048167784bf80ea292ba943d2a732fe015bacc4e3d6afc022f8480
SHA512fb8d603cbd4a875b1c8fe445298aef53ea12a32d46b8e7c2f4a6ec6c0bc25731154e00c6112cfbb0af67d09313a8f5931f91e63a25c636581e5f0a48a5244ba2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b