Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 20:35
Static task
static1
Behavioral task
behavioral1
Sample
dedaa732fc40600dfb1d919112fecab3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dedaa732fc40600dfb1d919112fecab3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dedaa732fc40600dfb1d919112fecab3_JaffaCakes118.exe
-
Size
25KB
-
MD5
dedaa732fc40600dfb1d919112fecab3
-
SHA1
f3ce391d33ee67c2d3feb340c44407f199ad21b1
-
SHA256
c74246c039b90a977a2bb873a39d06a393a18a957870e61948f5d55acebc129f
-
SHA512
52d6765245b926f7c08cd12b725ac4717bc4bb84ec12d0d48af61d3254a8b97e7f252d93303d011533020f49337a39e929dabcd5240b95668d9f8adeb2d9c693
-
SSDEEP
192:L1UNSS2JJpRM9QWHjrzt7EHAS5K2+Hqr9ZCspE+TMwrRmK+vhOrbo:xUNShDM9QWvZ7So2ceM4m5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dedaa732fc40600dfb1d919112fecab3_JaffaCakes118.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80014f851c06db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AC635691-720F-11EF-B0EB-7699BFC84B14} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000e6c195717348d293b3fc3cd7beb78f3e94d9ab57414533b3cd041eddd08882f6000000000e80000000020000200000003fe4ba32c1274e64d05a1239bf25844e16ab999812d7952e2b3d0dabfb18d7cb20000000cce9fc45f35a9963baef9af896f768853f60fb49d99cbb810a8f5ced3312a12d400000002010010475fe33f21b43f814e0a511fbf4b6bcf921cf0e0d842591636ecfc4c02647763745d859a805caf09d37ae32deead0073cd63ccb1291be380b0d0df74f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432421579" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 888 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2248 dedaa732fc40600dfb1d919112fecab3_JaffaCakes118.exe 888 iexplore.exe 888 iexplore.exe 1604 IEXPLORE.EXE 1604 IEXPLORE.EXE 1604 IEXPLORE.EXE 1604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2248 wrote to memory of 888 2248 dedaa732fc40600dfb1d919112fecab3_JaffaCakes118.exe 28 PID 2248 wrote to memory of 888 2248 dedaa732fc40600dfb1d919112fecab3_JaffaCakes118.exe 28 PID 2248 wrote to memory of 888 2248 dedaa732fc40600dfb1d919112fecab3_JaffaCakes118.exe 28 PID 2248 wrote to memory of 888 2248 dedaa732fc40600dfb1d919112fecab3_JaffaCakes118.exe 28 PID 888 wrote to memory of 1604 888 iexplore.exe 29 PID 888 wrote to memory of 1604 888 iexplore.exe 29 PID 888 wrote to memory of 1604 888 iexplore.exe 29 PID 888 wrote to memory of 1604 888 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\dedaa732fc40600dfb1d919112fecab3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dedaa732fc40600dfb1d919112fecab3_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://ads.eorezo.com/cgi-bin/advert/getads?did=4332⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:888 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1604
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574dac01e6f3bcb86b8c7a33bc9d0ca25
SHA1cd1ff6c51b3a7730773107eef64bc4969dde6e71
SHA2564cf59cde09e0f4cfe174a675f3ec9d42a59bffc0cb3b3d0bb4cef7bba8c19bf0
SHA512207561d7559fd9f1cadbb87a2bf1956540cbdee331481bc8819d48adfc81560af821af6dcb479f11327e67c05aea1c16f153721ff139f3c4f255e5098ce35647
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5a89946923f25ecb47aa5cd398cfdaf
SHA1572028aca8306bc8f3afb8813f22e3d383cbd025
SHA25698ebdc53b0cc916f16991fd40de415213c58075de14794a899726114001492e2
SHA5129d1af8825abe63a00163b0f560fd4ea79444071527f505d28bf62f9b164d2718ab01a4fd81f49f6100249a675de1053df690d667b4d6e45fd8dbea87f256efd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b5937c2a15a592342338665fbaef562
SHA18e6e04b6578778df627297de4c46ddaa50e7287c
SHA256ae75d8386fdaca49e440479a5aadfa8da0eb99f9d22da57061ad2c02500c56fc
SHA512be721e0b372e95d62e67406e19bfe544fa5c995cb795d6bcdf6d449d02c50f94244f1592b82352b2883980bf66ed97d59035ba97a8b13ebdff003a1f8e615dbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559b360e6044dd4595bec7db0a4573195
SHA192fa1ddb86dd3b550523d764f4fffb654e047394
SHA2562ee02c2d6b3e9396a8cda61177acce1964193ef478c2d7744815c1794b480421
SHA512ee3d13a1d709517d427f325b072533d8df85a5e6b99455165cb5a6b1d54bf19d4723a6dac7d1f3b3209ba5805a213f84f806f371f5a723ea9ef9a3da8314d40a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f62f8ee8a8ce6614c1ff48ab92b2fd46
SHA1f843549ca9f9da6833dcdcfbcc849c204c0c9f92
SHA2563c8513bd54e06a21eb3c571293d961be77be8449b185a483aa22460495e03efc
SHA5120d56843b697182279c3b01e975730a5f785524b8fae359a69efba8607528f5c2aa008b37fc73d8b9292f9a861cca8e7847ccbf4b1a2e9df281d9078556259ca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0df2a4fd14cf1613117ce9a36ca3a0d
SHA12f800c7bd9c75e76541ccce27dadfbd829664a59
SHA2561c1896f71035ea3d1cf7a8926d22a492c42fb304f8ac98a2bfa90711efd7e502
SHA51265bcbec287a5d8a05dc002475b6048e5fb646f6d5f6c4f1a4ea53643fa5c57a51d05528680275a00dac022941d8aad86cbed9cbd23c929ba32927bb91e6f7f07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f27f85d9c10128279283c65f545e7c5
SHA1186530db856e0225506402c1c191fca3eb2a8675
SHA256cd7a870a2a620fe47f47b360f250f656d57f523732af11bfc1c31c83e1175142
SHA512cfda3a59f3adb79c876cc0e34197e11f9e95e5f1aced5b0fcdc7529582162b3fbc5d890068c7dbec46a7e0fb8c225a51bb7011938e4e62433b7e030251266aad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0974def05f35fce2d4b93892a5bd23c
SHA1243b51d3540b859d469a3b028476896804f2e841
SHA256d1606d26b612605d964bbe69c62b9b809759554c5335e02bc7f5b6af4188ad27
SHA5129b54af349bbd53782e2471f43e66c92ddb0ddeb82913dcfcb4307316594d28a9acfbb051f2ee4ac2ff0a3dce4d8b9f90af5fbdd51de98241d6d008d5a388bb9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b094de5a355b697be1e52d964f4d484
SHA168ea9df5efd2281c8e191a7647ab04ddaf5029da
SHA256b5344d1d520b338997d1568f337ae0818d3fdf66b326f2cb3255a89a8963af56
SHA512c2a075dd2398866f428ad8099222c587f00433399e13d100e790c9ba4655375bd340a41e6658431384a09fe79f0cca03b2e59c098d65b2fd02dcadbdb8869b23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5babbb3bd02248011af9716d41927f60d
SHA1e324a379239fa411ef1caa4e14eafafb90761916
SHA2563d931e225d3927392da139a10787f397496603e713105b28c25a45a88771fab4
SHA512ad566a65ad7b091f212c6cd6e5b8a555466a252ec4d78255c75d416823ddde1c66857b4e5c8fb094b4b8f3e381744b4bf078231503f20a7baeeb1f003e325952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f65af05a7ebcd86a094428468d56606b
SHA12a640c455ca93fdc24607e73fa527a5be53e6546
SHA256f86b49081e00a4c92017b01aa68bca7feca1662331cf6692f9ca909191b562e5
SHA512f215f6735ac69776543a8273f7bd98139d5c41c0c4a53e58f59c9631d5d2eb6c156589c5f680af35fb0bd3f3e8057e062cc7747e55a02d35068b1ff193effdf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5417bd6738a73999f2462ce5eb57b9500
SHA140127e13f0367fcf66ac7dd9803eca728214aa13
SHA256683f68e7463d7758e0e857630209ce467bb26e766ff77b5627eca6e68d6cd12f
SHA512f9d9d24de8f234b775a7bd96ba83dafab498d711fdeead272eb3acc8b3bf0a74f1238376140ea480c0dd43404a0c1abdbe5dad2f6587a9ac7533cf3d25b36986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfba0a1e71a42fd0e1757e74ea36268d
SHA10d9fdab82fda68d8fce7dda848fc9b27190fd51b
SHA256ab9efe7cb3963ccb0238ca472672977e2109386a64fe9c26c6f5929226a77381
SHA5129227cdc9ea1ca1bcd2648a5266b785ebaf8a4cd456c275a0fea4b5a59cc694d0d521c421ff5265c98159115aac6ab198619323cdc2a349ec23130fee1fe98378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf51bed440a87a6de100471ea63741e9
SHA1254957826ea1968468f0b4e48f303697502e128a
SHA25640573f4849cc16f2784c18358d236b2b135a60b04363c803429cac9321d8d8c8
SHA5122d4f42e7ef6f2282addee04479dc319f1e0ca8621a4ff47c08e20943febcb7f9573123a2f5d42d08bbcac94dc7e2a7db5ccc6abc1022b1b98c65bc3b1e81e77f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5568a320789e8cd6b897fe6410b20e461
SHA13cddde62e701d37ecfc45ad5a509a50efd15097b
SHA25673321fb35de60af7a3cab6f1c06031144972e776e698d161b32bc59b12b580c0
SHA512bae1847f9b09377ac3f92ec06920804e85e1a961be7e02c4bd781a72a1e776047a567efb5aab7d5ed4d855fea3e444b5510ae5050579a3517cf4956d7ededad5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ce9030049d0b670a599695a134c1d68
SHA1903fac5d168a4b7798c2b9aa4ecf29c41db6defc
SHA256f3da76fb52799dac574b157c2c1750b11a34244c7a6d73fe100d25fb5bc25a73
SHA512a47fd83b0b11aec11b158ab0356e9b4d216561547559a7ec77e0de1e30394c4277dc83b1d3a92be8287766fa8ceea39e29a844cc1890ebd6249c94437b5b7e44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5030a67b4616eb9f21ec6c10a4f1ed370
SHA127fe90fc300eb336f42f86311f7e8a96f3ce90fe
SHA2567f840bb239d390d03c6e5eaa5fd26501ac07257fae0b06052864b343d17caef4
SHA512024329030f36d417c5ebe71e50ca663269975821fd51271ece4b6ccc1a719b0622ddfad6e283628c2bf22c278b6281abc77c5817f29fcbeb5918f2af2971daeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b3ae9370b97ee095d90477bd2d720e0
SHA190e0fbe20942d25f9a6c3f3cd1894ddbac0141bd
SHA2568e149f2dc4653af6f47e26766098791644db951cc91d1df820162952694edd6c
SHA512951b39b0b3f258f34d59e0b6cde05669e93a04d758b9953e323c173abd6c6ed74f6002a8abab3a92559c0cb2bf986115a5d8ec0a8986a8f95de1a88083a86be9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a320c46bf0edc2c99e27bfe49ee1087
SHA1518a944affe69ff54b3c61e9549f28fc7c024e3d
SHA2561e171df890b15b2ec1f35427073b6cc305584b1aaa3646084da9e06aad695bf4
SHA512ea87f46b547ed480d4d6c99914a39c5a6db58a38ad539551820cb34f1986562ef55a739c3cea2fc666a64bd276ed370945181baf98706712301f3e91d9f3c896
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b