Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
c0ffc8eb2a16195091b6c061ab31a3bd_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c0ffc8eb2a16195091b6c061ab31a3bd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c0ffc8eb2a16195091b6c061ab31a3bd_JaffaCakes118.html
-
Size
461KB
-
MD5
c0ffc8eb2a16195091b6c061ab31a3bd
-
SHA1
4d94a1ac517e693ee7949d797ccf71fd39d1d00c
-
SHA256
b353a2fdf56de52417c9d5f728c009fe27d818e17eeafec98c58883e287fa814
-
SHA512
bf0a0a931bb67822624f001292e52ebaf4fb1f44c21b83abadea96f2fcf3f80661849e2f728a8dd8989fd268f7758b3b344d14bbacf36b3795be464367b9b6ee
-
SSDEEP
6144:SwsMYod+X3oI+YdVsMYod+X3oI+Y3/sMYod+X3oI+YLsMYod+X3oI+YQ:r5d+X3R5d+X3V5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f00708cc00f7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000053bdcb9edcf3b297c1e367b8f872d35cdde6d82746b5c37b8fed44c371488223000000000e8000000002000020000000f0463ae53b4cad58801b4b6cbe098023cf30748cffcb5a7e8495da5c5c8bb53220000000db27afe0a910b9f9719252091637c33b64af19feb80c35970657ed1ea40e949040000000629a7db2b894e01e4f743becba9d0d0587b7897fedc500359b4eb49f12826966d3478e233eb7799c7e0015b5d06bcabfb52004102ffcf9a51184969291489f20 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430760405" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F377CB41-62F3-11EF-BD41-DEC97E11E4FF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2332 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2332 iexplore.exe 2332 iexplore.exe 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE 2796 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2796 2332 iexplore.exe 30 PID 2332 wrote to memory of 2796 2332 iexplore.exe 30 PID 2332 wrote to memory of 2796 2332 iexplore.exe 30 PID 2332 wrote to memory of 2796 2332 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c0ffc8eb2a16195091b6c061ab31a3bd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2332 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5253ba7bd0096e888d0770a49de30894c
SHA1e12c4cac5b1ab0f727ac0730270bb1633a7815fb
SHA2569426fed45e93068105c9a42e650e0668d9328c8ed6a380e0e68d7138b4bd2b1b
SHA51226d8f76df4c5a8a0f8f3e97aaed7fe8e0492141199cc115cbbe5bb931cbd53611ede930253fc62fe538cd1d8baed9debc17ac8e90e195999d219d981f0b0a02e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c85d745df24281be64e4bcbf51244044
SHA1a9f6e0287958e3a7829642fd1073d6ed8dcb3d45
SHA256a3b033c8693d9bde10eeafa6d1c5069a95dec0c88889df62738a6840095bf34d
SHA512eda1e34cf9177104a4b3ae680626c7aa819606f54c265ecef0ab4f0d930a771e194c8019a3963666393b2aaf5b01137ae125ef9f3d8e81e558707a5ab4a88620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee7da4eac8d7193cf36248f42480ffbc
SHA116f5449db26d4318fbc094b577bee63177652975
SHA2566cf0176995cebc450f245719f861414b5a85213c39bcec6399b9416e985234ea
SHA51228508211213e8ef751203d0117bcba3daf927b71acc4175730108511e1221b256eb5c536ec4e7bedcdd76b56daef7522c8b71596244e34d0cff9ba2c81955b07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c9fe516e82ad68e00ad006142fdb558
SHA1e57ba155f533963c166f64e6eaaa819ca9d737f3
SHA256541bc0d96c574ae422d1406fcd71d091e99380e73803a1d658956497404f543a
SHA512bc0c661e6910b171045f80b02298121f9ab91eacc6351cb6f38d70b4098693102c8d25dba216302a6eabbd6945fab875ff5fb8b88e551e5cec8bd1a8e6925bad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e55c57073d4420c1fcc0af811a114d3c
SHA181430d56b8b7038899b5899d917e9a8d1899a75a
SHA256a7eccbf9d1118a7fab193f32d05bff22ecaa33ee243c3afde1bd4fea7cc2c04a
SHA512b1d8439685a669050aaad731b048ac8978236afe09502f3a8487e50ceeedf67e0115a3430d671220740ee9b99fd8fcb90fb5c231ff4ac4e363d762c500857145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aab9a2271d8163eee4decdf61915492c
SHA1d93b2b17b51ea6ef764e60b8494f0f60d5b2cfc5
SHA256f5128d0a7ebc00e4ffe193464a968fa7aecdf1608564e9e92f8e00613075eb4b
SHA512de4ba4901cd6810af3a247af3025a820c3bc905ad2092372fbc9a4fe67ed3c4b8e73d3f47ec7d1a9ad82d075639d0ddc1aacd250d8f2ceca9d1af78c588d5234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57afe6d95998c5b00c6c3c52a4e58ec0c
SHA1e1a325686db56f3cdc94634973d16b06d7e2e9d2
SHA25659c96febc6037444770e13c94510defe74a9dffc021a580611f7c8c26db83bc5
SHA51219a36b0e7611855fc9d560c9c3d400fc292b8d5c9dec7da126eed8e7022f05955e99f627c4de13731d05e34c0925337d152b4625aa4fff30a825aaa047e0ad6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f964c269bf1aaec95ea3a48ee3bd96c
SHA1d4a7f720505e94deb4c9453d2d7273d33fad5094
SHA256160e573309b122483dd6e213d3eab25ddec7b359981966d9814ffb0dcf83e8ba
SHA512e39434d7c921fdca7dd4a616abd8dd53472947c1ff4a20cfc825085fb916eb094dabb8528e3a323f7edbce333eb9f6f2794473f35bb559342bc7f2bc59e9adda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5748f83853827130369809161799e6c4c
SHA181e49b0fd6611315fe9947bd2acd273f478c33e1
SHA25626a5763db4c5127558acf49a06a44f439987bbb26cf7c07ef4b721ffb667b254
SHA5126c7b438db49adc0e3537cb0a5c805ba0400f5a778231d08c4a4ad0e36792e56b512bbf253e4b7638c827c59765d59f74794df2ea59a59cc3e3f4e3bacb8ea622
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526698552ee58ba41f8a254f449799acc
SHA1a8a1ff3e6a1d4676488c82f2f907d59da50ddcf0
SHA256c1c09af638ae8ce5f41d938afb60a9f4e594202b88426bf48b33a1ba8b85d3ce
SHA512598bbc6a7b29e36bd0bb19d84a2233ae616ed22b3131f09a9ab349593f1461c577dfa8227278a6aee216e63f1dc702c9e758f77498f9890c8392cfcd7d71a663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dee3aba765e843c7024676d7894c685d
SHA13e8119507f911f8e0ec83db7939d3ee99a045db8
SHA256bdb09fd53f6a6e74eac130db0d90cb79537adc6605127e5f09739d84cdc656e9
SHA5126939abf07e94cddf3d39e7ce9672d708e3dfa6a246c56da97a7b48fc704a1277b58c6786f56e412f45e5f0506b20d84d5132ac3e315ed94af7e2c86516e8b84f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4553f292f3a53443adb31e21a83829e
SHA1e0cbb16876fc4ef5457af5db21e16d9412aeffb2
SHA2569fecdd4a22be1238e55326abd91023445c2249c7b44e25ac71a76bb3fc5158b4
SHA512edbf338bcb350a85c6a7d513648f9ad3968a2adb86999dea3ca16d3b866b8e587816e6bbbda1091d59efdbf8d9853ae8b0c0c69ed1b82634291c15421c30a3c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a45a2aef84ed087a1aec91edd4983d21
SHA1241cd72d507b91e8c79b2f92e8424ba38c76ce91
SHA2562a5bf7c50e0439698591aa148b59fab7f4e02835525718587338259eac664084
SHA5129366572ab603c89f214ae3303175323b7c3b7e533bc72b66a5b93be6a06cd2f8285c4639dea749b0ef5c9fbd83a6cb8fbef29b50237db72d139e8c10923a77eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a14345700c57cd928a84eec4dea8e27
SHA1914296835c1819d86396bd030a6a64fadd73a59b
SHA256b091f4b65801cd0e0184dd3670fdd9573a8ddc389fa26af3e51c568d9881a88b
SHA512dce6c6e7aa148c64b2ba8bdf7c2dd4e0dfec49b4f1149df1713534797da274d7b50845836f17456b251e08e10d82a1f495f1836d1201465e4515ff9d1f4d7a34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5984e528bee0894e8b522de56fb84cb56
SHA10fd22064d8bc2ed136037179ed928fb36b14164f
SHA256c192b49a1b0d1fd78ca420805cbc404f084097ec21c78ebfd6cf9238b408a7dd
SHA5120ff699205ceac02cba532466ac18bb8574fedd293c3db7cface049b7f77deeb1d0ef38b555978f0041b3bf3d9bfaf2d5f080f4e8d901ff7bdec16bf66478b895
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5873994c0c3006b15eda27a46c136feba
SHA11af53db254638ff01eced29bc727f3ef8349b48e
SHA256ee0a97907e1b90785f3b277d9bc66c5ad3fe1b745b5cc16a6643126c486c87b8
SHA51278449f888bdb6cdd86a3d8e52b55ed357f7848056fcd45ed0ffc38439dca1c0895720643a2c0238a4c51ca6c5dd38427d9b9b645adfbc50b4d80e29d7b1cb2cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d551b1f7c7b632498ab1538993148a8
SHA1cf6cd162dea91f95bbd47dec86c49947337f7bdb
SHA256a0967a4bd00087c2dee6e619f75f5fe78c514847c88a31d15e14be91974821d4
SHA5122db1234415b2274b995efde23b019541ba1c0c7be67d898be1eeea48a644650d54551d723d05d036f65d3168b240e1880ccf500036b0f672069363cd50d1202f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ea851360346c912d846be3bff0ccf77
SHA1bf07d818ba4263599ddd11379943c7a465e04ffb
SHA256cdeba6221c2c0387340260d51e50dae1e8ac972ba702d67f7cabbf90aca4fcc9
SHA512f72e1ed2d91899a5373eb2c9fbc80ef581aae1b6258e6c5923d10d3d17bf326d23596c7c6864895de0e9e010926f56860517c430b0087a0fb24125fce44e3ee7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d28088923b5a569dbd58d9359c7a8fb4
SHA12e7464f86a1a3f5bfe83554b1886f7ad060c6591
SHA256c831a157a19bd074ac25ab2915d3af84d8d057e258527155ff8aff96cf59a64e
SHA5124669c62f5bbc6e81dfae38348a5a82c8870549b769879b6dd129daa1b24765f9ed2aa38a21d1a8c3787ded76ce12bcf422945453109a670d89843c2b7f8e3940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6473afd40a4365c16c1ba5d553ef3b9
SHA1865c5efaa4ffcddc53127db3a883afc56e8408a5
SHA256543579a0b058f1730ee089c346dd0613d7ae2e3fde914a761367117a9f4f6592
SHA51262a09b17000e188eb83a5e11d7793a28dcc177b7175faf73f5ce0bd2fac96aa61db4e82be1474f11d3f27c6fd02f287c7764d8f4fd00fbbb06901bc92b078b5a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b