Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
79s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
da9fa253be246cd1e8faf7b8fdfc91ee_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da9fa253be246cd1e8faf7b8fdfc91ee_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
da9fa253be246cd1e8faf7b8fdfc91ee_JaffaCakes118.html
-
Size
11KB
-
MD5
da9fa253be246cd1e8faf7b8fdfc91ee
-
SHA1
9f7752882d047760d3e9bfe5ac7daa0632ba339f
-
SHA256
1471b150606aea33b916edf10318e9b734ba7037a1adb8d0c12e4b131cddc814
-
SHA512
9995c476c631a3c911c6ceb1dcc0b01bd547a3c7200221e55d5b37c93372f0ba316bf1ccec58dd29d68b85e08b9632c53081fd8797f7941277b8994a637dafae
-
SSDEEP
192:vukmO5hEt+mM1gf08QVDW/9YrBzBxz8iog7N1mhkPgsxCeTUlHpp1aKpyCV4V07:vlm+ha/j7QdW/9UBr8rg7N1MaxrTkn1D
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000b53767f94b01801f59a585b71ea12878a1105fb2d23eb1b0929429c1540e4c1d000000000e80000000020000200000005d3c4cb56433556ff2d2417d64c556ed10ba8006138e0a297b848c169f91aaa120000000a6f29493b8b49ab2cd211cdf6d106982c17f196291cdc8175007f265085d3b4f400000005856f6b031331120413405d466bc65dcd19ef1c17f7dd2ff7949b1b7fe1654ffa995344c1b860cb7493f4d518ce50bc94525d52f27aac4febef6dea2bb8ced25 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 501fa2fb5c04db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{26C97431-7050-11EF-968D-EE9D5ADBD8E3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432229373" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2264 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2264 iexplore.exe 2264 iexplore.exe 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE 3008 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 3008 2264 iexplore.exe 30 PID 2264 wrote to memory of 3008 2264 iexplore.exe 30 PID 2264 wrote to memory of 3008 2264 iexplore.exe 30 PID 2264 wrote to memory of 3008 2264 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\da9fa253be246cd1e8faf7b8fdfc91ee_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2264 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6c9923dd7fe12abe896d27ef7eb2b03
SHA167177243536725bce04eb02123615914567ff954
SHA25604f7a8704d199d2ac4835cb941e3e3f56b65e925d47458401421ef7854d52db4
SHA51208408ac64769dd22e2ca5cfabfe16ff9703c05cf1d23a7eaf79c0d219b031fd9eac94bf1a40aa3f9dd8a8f323053385c94eba3b64270137cd81f215350559193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e1926734c2f6c6a09792e857afc0425
SHA1c54c3cb533717544d0bdf764a4db1d6d52ea661a
SHA25644c80dadcb32320e31f1a77a5f71f619db22d159fb40e3ea2247ce35553db724
SHA512e48cdfec87f61d7db9863eee209aec9c1502e1f0430a95915bbad2c98105f43c29497d97546bdcb82425703f973d24dc80b7161dc20a11f1ec57a31b2b174b4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e469c778fef19f218c79532f3afe689f
SHA14dd37659289fdd007ef1fb875b89241d3d1b18b9
SHA2563e6dbc38488f7f9204692d7a923de7b5e34796ea2d218447cd2259234169904a
SHA51213a09858dedc9b6b7629b1296eee11e39b185b3f3c2314cbbe2d096065faff3aae711ad7c25fd1602ac777c760a5ff144d625185eef270f88ef385780d399345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5863747aacdf00cca0a09fa86eff8dd80
SHA11007d6c857f942119f9e5e0de0117be393fb2fcb
SHA256d610cd72f14a5d36da7edeb3a600d6f770f71ca1c28667bab1f37813d0387eb9
SHA512c8b8fa1966f53a9c49db1e8a7b7d257c501751abb6113a56840a8a32dc36c622a5f9389379bd4eb5a98c275fae8631aa6992c1550acbd248a77dfaf1e78d71de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1ed7425230e2d6409b74972313eb227
SHA1eab9ea2dd2f3679647597be714d1df54c6472db9
SHA2566cbe72650840e9930d8c9be14581230444652530b7462d5ed2538b89e03cbaec
SHA512e0771f0ed9575f82c96e3925404b9cd49f6d697d70105a89de25468899e988eb83164865dd25ee071f84f28b3828bdca84e4d9adaea3b430a437010657feda65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d704e5f7c527ece9498b0286e1737f8e
SHA112734be24710c35c1abfdbd620bd074ee8e7cd2c
SHA256de78b45cc7c70cdb9ed341a970bb5718074cf4e0663ebc730d04b6ed2df66df5
SHA51225c7e5003c54300e311e409197a022d08b3fbd4c8ee970b602d6a1313b919f9f71357e230438fc1165ad3366d8dd5fd43cdfbae1455f1db94777c7e7a155c499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b97814a78386065ba038e288ee718147
SHA15f201ee0a74aa9d68b95e1fc87dcf4ed4a98770f
SHA256182158a99bff2465e1843ef33d45164502e3f0e4bcfb9116801e8138770b8538
SHA51225ca3f9f5323df231ddfb2f1fb132e4c8407bb0593f5e9748bf37fb37f8b9b744b326f47e8f6b36a063997eb7c613e32a7c5f1a9d209587823da97b7293b7a13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554ef8931e307b2d96290f1da09f500ff
SHA1721a6c0361b9360144dccd2db1e5388eda3141a4
SHA25644b68154e2cbfe77c008eb23c473539cbca3d865f71b41944aec5f905ab961ac
SHA51217b3da92976d4b42e7f7280642d850b1f27f098f5e63c6953991aaf8cc6d0336b6b4e30bb4031a4e5a7fc334a44f4ad5a007c3adfc97f1909d026bc813c9d5d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55daba75109213b6f7beded577a2c6459
SHA122cd6383fb025bd9443dda5b56bad8116288440d
SHA25660c2f23e33b45f8ca8559ceeafa4fd5fac6dec78e588ee3ac8744de609ce0fe6
SHA512a090a01c4156546e13d6e37476df1a1a8a0aebd11dc05419306a4ba46ec2929fea30853910a31c5f7bbc33d2a9edec72c936818bbc1cded12518e45f7b4223a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bc6998f48a3902e37c34efac12b3312
SHA1ad726d24e9ebd049ae457ae53588e9828827c5ba
SHA2566187874a19b01fce849c9dc6fb7eea6ebe2a9982c1e50f20b15721e1e8b22bb2
SHA512974b5cd52c0bb6ad234a4ae46e69a3d6b18c8b0d3f7a869ae96cb2fe81c1fd29871330e3f9325efca846c043ca93d377286a4f50f48b26f8539ff388e974da6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596e2fdee9d0805e57fe965c5da7e45fd
SHA1cd9d22ef63bbbdcfe86ffe9b5596d565a6433219
SHA256c43018f466c7f01aa3c745a62e393885aed8a938bb1884a9cc9c35d48bc7540d
SHA512bca20b70245fef0bf2c81b56f0942faefff8e0df33735cac1b56d468febdedb31f411261089df981547ff7066bec25c6f55d5d95ee6363b275cf64f59c13c85b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c50b7f802b780b9b19cc84f9f5bd55b5
SHA10d932debac36bc53c6ba0da0e6742417545401b5
SHA2568d720146b62d08f81f9dfcc6ef60648a6d5891d88d433fbe5e10d866cfa9987c
SHA512ca20531177af9aeb9cfeacbed00ac82a0b7f0c2dbec85de82a7fed4a365dfbd3afdae3a0c92e7e5d8267517e9f343b15b50ee507db445f125ac51fb515ee46d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a47cb59cca35ce56a9130b9ffed89a2d
SHA1596a072a1a77e8ccb2531cbaba42728e1a214bea
SHA25616027403815f9b2988773afea56338cc85db2dd8ca2f57001a0f5c4ea5524826
SHA512b4ab92273ed7fedcc1ce7165972357a77b738c5687316426131c6d0b49324b8edd8618c4a78c868befe4c3c65ce70279aae78ba543216de644314615d8c11d60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f30f6c177fc338907525eb875cb9173f
SHA15a6657f1440e69966bfe5bf9c83767e88553502d
SHA25692db006ca7c33fc01e2a40da8ded7b47052116e4a27f054638a63a00f1181a0b
SHA5125166881b7395258f490942f42e40353498955113057bee73f651bbb08803103b1e664288d1c3abfeb57a9e1827bdb07546225c1e6ecfeb44afc88a2ad8683098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583a6b71bc136ee994e311105d9ab0f7a
SHA1478a49bacbcbb11422d298b6de996dae1249bed2
SHA25661cdbf3f3181d3081abcbabc53f12edada2224590b75257a8ad03c6068092c4c
SHA51224c3f95a98af85ab41d04eb877f7be6565b116d38c774a3f02e051c38a8b11b7fe069f44691d186f3d381e493de919e2312ef228a3db1369a894fcc0c51ae944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1a69804cc1f8685ec60a21d08535623
SHA1110e994582bbd5f096550f5ab52d3dc8b86eff1e
SHA256a3b55a6e7f4ae9b914bad1d115b0f645a30e9fef9b86ae942db17e193bb71398
SHA5120eb4c44ab36ed422988cef319c9a97a7e7af2baa97bf0f76ede975d0519997e79907a88739138d1d6dcd4b9ceb6a3159d93d9e605ae7236452261fbca81f862c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f49d42e71dd65d88eae5c3e157638ae8
SHA18e3fb386cc11be3c61d8fc05e931bc52c576922b
SHA25672506e3c47837cd53c4bab354767a25ef00f39cc481a7ed4096a137afdbe226b
SHA5124efd9b914a634889c7fb75ef89d8a6c66be8a61d27b8b3e26fc576e70f78712ce4b318b99a3040251be5f02f6e0f953698761f41d11a6bb3cfc2fe2796c6ca3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508e192314c115925c786acf9a11e20d6
SHA1cf2a8d06b13e4e0738660878b5f203c03f8d11dd
SHA256add18838206a6cf0bb118fe8a126e95e14d1def524ca84c585d6e61c7b64df3d
SHA512e5c3b525c183f606132aa0d6b32c15576601fbc33c51f0f700b5ddb2328b5ab13c2f9eb1b0bb9b32380c4568b9bb98fa5c6408ce8b3568bf8190244c5652197e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0cfd28a297759f7bd1323ae87fade4f
SHA1d234d060b1f03fdb5d0bef00cec7966148b638c7
SHA2563227b2191742c79c32d2663eaa4d4c88985f844f16de621a2036824cba33b2b4
SHA512fafc4c857d5c6b5a13784259a26d7ffd9faecd75f4cf85e6ce8d7b153e7089e89a05c6a5293f6bd10c22ca4a226d0e6aad7b25608639753a7a95c99e725b4414
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d153d07e93a01e04326fb9853d680f5
SHA1bdeb1f0a1e6634bba6eb79b16966f4ceff00f3b7
SHA2562057af78929f0fb45c622cc012987b52cc6a7f48ade0964785049fcad6795674
SHA512551c98e4b9c15e9638bc30ce3d77373fe548cc10be4a9ffa489f2a571e046510653ee86817b1e49912bb5f8959bc612e4f69e8c55fcb3efaefc379f88be025ba
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b