Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 08:41
Static task
static1
Behavioral task
behavioral1
Sample
006e58f2cdc39c6aeb8d85c32531c6b2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
006e58f2cdc39c6aeb8d85c32531c6b2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
006e58f2cdc39c6aeb8d85c32531c6b2_JaffaCakes118.html
-
Size
6KB
-
MD5
006e58f2cdc39c6aeb8d85c32531c6b2
-
SHA1
8ebfb1dc7cff1053ba50cfee7e75616562cd0ba7
-
SHA256
bda2d037fc68f06eaf7f46eaa91456ca4d69c99a12653f357a2866af72ce6b33
-
SHA512
2d4613dda3c9156f7f0436488aeb8fb6389857d556596117184db7397e3330d7d2cd39588bc11f3e08875849163496c64e0cf475a8aff33890d5cae67a7fd4b5
-
SSDEEP
96:1jfyC5AQZ1MoH3dCEAru5vvdJMX2E469McGcNd:tfyC5AQZWo0JrA0FHMbcb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000012d1582b7cadb739a3acd4285f7fbbdba49b755ef896f704b6a1150fa64473f5000000000e800000000200002000000056dcfb99f20872284ae36f81bb6d8fc5e66362eaa890c3895427b94bffb4c5042000000075932782ad9b2b68ef4ce102ef8c8f59501ec640ab3d0984cf296288699d4aa24000000091574b3d2e20b5e09d52cbdd2a7ac23501ab0e30ff58c754571095ea69642b84227f969189206fcddd94c9fc24da681f09d38bbd119841c050c20ed7f177520d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6037acad1413db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4CBF651-7F07-11EF-B656-D686196AC2C0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433847576" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1864 iexplore.exe 1864 iexplore.exe 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE 2316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1864 wrote to memory of 2316 1864 iexplore.exe 30 PID 1864 wrote to memory of 2316 1864 iexplore.exe 30 PID 1864 wrote to memory of 2316 1864 iexplore.exe 30 PID 1864 wrote to memory of 2316 1864 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\006e58f2cdc39c6aeb8d85c32531c6b2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1864 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c517c69ef8e386d3009f7492f0236abb
SHA1ef6b5654f048ad861bea23b9678f829a9f768ff3
SHA25601c11f36e87e7244c2124208ab4d4cd875b27dd718fdce7095cf20a97542dd7a
SHA51291381abc6723e8e9858eb17bc5293a29dbdd50fdb4f987ce5daa27f02b6d8833a5c49ed5abaea0d779e7ef637fd641c146a96d886862017e3c60ad660cfce864
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50803b680ab8cb2872c98f7d1da64aa01
SHA162bd391994f405952d16276a61496c38983bea8e
SHA256a59ac3cbdd8d4c7bf4ee880a66a1cb8e839484efe93b8cfa142ad782a89be5a4
SHA5124b56415d9c97a6cd43cd33606cc99d1307e1b75913c7f5118e5206557610287cd8a98332bbd124692ad5a56b0b199f176df40aab744e0ef7a7200aaa2f561acd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fa2fbbd4a644b1a63347525cbfe7f40
SHA162a0f57cf64859dc8c1cfdd6242f837f75282d24
SHA2569b9c283bf11b8a0c88582ae913fa25812c796358f0a89d3ad5690b3792ab48c1
SHA512f64f114f2c1e0f86fb40fa2e5abd28683a14c51ea67cf1d8302a3436dde9807f7766c26693842ed337021f68ced8a40f72db74cc72cd0af99570a8ed841f34f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7df1551e1cc709868cce8e3a1bb0777
SHA1fbd3feca046171881798cbf70f03a59a71ffc3bc
SHA2566b1a63e27ef06cbb73251eb2ad236298b57679c178b216dfb016192ba93b7435
SHA512e71f2e9642154c4305e9e47fd2739306565839c4db8adf26912191a8d062c875a8a7a9bbe9c642cee869498604f5e0dd91128e3afc8459ffbf4d7fbf877b918f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a85c4c82baf96f467dc6307f1dc4a97
SHA13d5b0a806249a4876fa78634e67a027a6021012e
SHA25610724040537e78671afac362914b038155d1d6c66856de54c3d17187ae0c3a33
SHA5126424b322b38d4fff9d0b3f70e25c3cfc9cf7a6159cf564112bfafe2c67207641ffb321a1adb146b5eaa137aa5da4b10e005198518b7b8cb0c03acffb6890418d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511f613ad4a25adfcdf7290fe895cfe45
SHA1f697ce5f60ed59da1e6694ad7bd9e4b52ad86706
SHA2565cfcae4ed294d448fca915756496255482d2516f4ade785c7ba9513747a4343a
SHA512516e607c4e81d7a5db08514f57b267c95bd956ea184f9a90365aa00a2e559cdcc96c20194359c36719a95a4a2858f8363aa6063ca4b1cbeab4174814f2b9855d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be600b5eeb35f8655ac17a713e892480
SHA14952f83f3cb430526b4bec8a9b40dede48fe48c5
SHA256060e9df626e9e202752b04ee6c4faa11fc523a91f0e8a94e0a2205ec3a7d121f
SHA512e32dddc3335236a064c406451b1f9a39d3e2f893d031529c066290d13d0532217a806129da7d627e0ddfc2602ae3b954032db8a7fc3aed6634d4a1428ed99e36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a29ae23a6e40ed4103bce0c1603bb78
SHA120513148d91228bf54daa99d47c63b496935e598
SHA2569a31d11025c192ce4002cd5e998e62405be7e2d81a129df7baa22c761d4f6aab
SHA512d8547baa544affe2d922751bc11d705b42025cd3d171ed97f533adf38c4b45acba60bc7328e15acc1f9d74a1579892cb9f0183c6daaecaf607e47c144370b2f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a80ec8a3c02f3a19bd438e31dfbf244b
SHA1d80f8dc5ea80a1762d81946ecb6d1edc5f99ff2c
SHA256853cda2c15eb1c9bb8807483e2dd868b34338c09ab6e497348241de8c1dd87a6
SHA5129a4b34354e457b21f897ca6e7a594aacdeafed5c93ccd9687feeca88147eb4949f1af74d2abddda33bd2e69a63167327fd8a37d4aac5f8bdf558ac79bb09c4bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a198cd3ac719e9449030478a69471461
SHA1214c2cf600caf08aebc5807e548551eb39357255
SHA2565736dfb170938a738670685ca7c2b77a5f6066d7c30ea0ca99376b30abae1255
SHA5128cfbfcb61a2458857213ed37affaf3823f9182b58dc4c36ea25966f6023ad813299d1f47e12c3dd3ef0ad5ef1d3dc03cbf26c1736b5be8eec21d05f4e2eb804c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57afeb4ff7e7fac800b93112c687a47c1
SHA15791b91293b711c6f45a67c803832995e3351a56
SHA256a39c57f0a723fc79633528dbbeeaf561695c1ed908a7524168c7dde610c0d9d9
SHA512e59ef7b2eb96b9c12607b5c38c5dd786f8f5e1268aab0a9aa87bcc57a59968822a00f7b4ddb79edd033433bd30c4480938d8ce84131a86b6dd34e5ef7ce413cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5763530b5c2f48a4e5b9a595ebeff6e1f
SHA1d33ad26c1cdd823ef9620f02e03d18de4e173ac4
SHA2568936114fab920f4a15b3da476a20d61af37505dfcd90cde9f7847164cd64d567
SHA512e4a52aeacc89e4d0fde46bc433527fcb1aa5bee79178a962b61e4bb31883de05e81a5594c10d59b7fb0ccd32aa6dabc9468bdc992dee3525f7a9cf059807de8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4ba1fad77db01825fb7abe5bdecad2b
SHA14162646e3d84d08da52b79e1b7ba94ca20779c58
SHA25611caa1c521309f5050c6e6d789fc0315dd19a5ee27a72ca92622bb243b9e1f88
SHA5125fbef9bbc54e8b7c0c0a7bc19c2c98d8b65692cf45ea3c357254264c85cc0dfc3d231ba68cc1452e1fd0987864fea91e8f1c78b320adbb3dbc4ba04993fe971f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ad40a52d36a6a62c629af41e9cb83b7
SHA1719e21b5b2107adad50240e2f6c0baf2bb0e618d
SHA2567c30b30ac1e823298a70591b5ebaa37a481b45be378f04e3b896675b474998f6
SHA512752b8fcf3d6d7d02dd83df63a3f45a6a56bc74c54b9846bc1722fc9b62eee82654e623ea8c004b0c39cb7cd4b94516b043d8f661875b461e34be73b1d4413be8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5163f303f448ec574bcfe0f4dfffd0b92
SHA18004be496627d69c947cff135acc0b7ed3a6a75d
SHA256491522c59645bb3c2cb5f25f75eabc5e6cb6d3811107038241eec53b327015f3
SHA512e33accfc32efd51de15388f0c959eee21ef98738393e1d4c45b71ae0a6ecd5999856317e076e8b4ed7dde61be555ea1848eeeaeb774a0b7d5a6b22997e5acd27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d871e9c5c6179a9eff85e053fb5884e
SHA1bd063ba693d4c14131ff26a22d1c8634ff071422
SHA256940eac437ec68ed3fea41efdf95cfd6c79e7feb058bdeb012fa2a763051b1ea8
SHA5127f61633619aa011193ecb3d9bd92f62fc1b78c5bd9b97ee964872161e01df023c80abfd62c80fb2f17817b30bf21d3d5665854ed221488c85b85ef6767064668
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a666f8147d5def90d8a030c82fefe1f9
SHA12ead950fcd2c3ed4c5140b71e5b9b9f271facae2
SHA2561337fa48865c85c518564b355bad6be39169353f0db9dc2e07f1b9e5827c4d72
SHA5129a2d1cec65ace007d746aae0ed14c5cc7eee86bac31d61a6993eba10c55315e46c8d2f90cc62bff755113084d1b50122015c8c43aaa6fef09699f59dbcfabd0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540a10d13d7e83a17bb706ff788c0e657
SHA1736ca8353ac53115128dff3fe6565964ac965317
SHA256d53641a327fff6101ce60078a33d283cdf54448e8ba3c01cf3d32709db2c3c22
SHA5122cf2dd43cd3717b3ff55b35e8cf53b8d274d0ff6e3e93ccf825501b1208b071266490e7666a826190e608a803c0c1e7d9a310e697fa74b37cb010a967c2469c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564e91760cab5562ddcd5c65a4a5b1c41
SHA1552c26cd1302c717a593ee76adb574b17c582019
SHA256d8a7258aab6b0d8a2ec983e815f85be9598080ae39bf03118f1d096cc706d3d7
SHA5124419182806b6865b74f999313bd87a0387e227720756fadd9f23c0e72e89741232680a4e3c9c255fe8f335f95bacda92b3dbdecaa6a77d611d7b19266eb158d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ee25b486ff6000449843255e3bd7071
SHA14347f899ea8421e1f0d451d0a23f45b40a89b73f
SHA2560cdd1d16eb3dce9b0ed2898f7a757284edbc903fe7d5c5f6fa7488d0a8be164c
SHA512f9ec87d684fed8a6c23ce7148233c8e7967d79577cf5ffd28b5a7416bb125ce86ff42fda5a0ccb8f97681b56300e1c6abe8267a142b82fc8a331fd8b97840e13
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b