Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 08:21
Static task
static1
Behavioral task
behavioral1
Sample
de0a8e832e0cec63622e179c2dcb0dbf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de0a8e832e0cec63622e179c2dcb0dbf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de0a8e832e0cec63622e179c2dcb0dbf_JaffaCakes118.html
-
Size
21KB
-
MD5
de0a8e832e0cec63622e179c2dcb0dbf
-
SHA1
add4c4c0c040974fc6b6fb1ae5a866c785dacd40
-
SHA256
0247b47aa081b349a6806dc1826afce97e302948b71cd811205a563dbbcc36f6
-
SHA512
262db023218e280a7788683a9122caa62a177cee5a5e7715041bb5d432d26f76a139484c9035d238f1ec6d20e8d14623f24536479905b0ebd7cec399e1208f22
-
SSDEEP
384:ziMKcRAa5r9DIiXbWVBD8c03R4hvq3cmEfP4ycbp5xzVcroDJZTO4u/:ziDa5r9DFygc03GOcmGP4yKHJZTO4o
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000004e2d2e09b4841fe28b85c8413c943a846536629a7fe0b9e4933191d8a378e728000000000e8000000002000020000000d943ac11708f718e0ca213d1b9d5426872818534b4dd477a57b3bc33f00199a520000000d616f94e554975c90df2c11cd6dcc357a545eb30d9a8da189afd88ca22f78f0940000000ef2a445f4b5dc4d877f2d62be0391ddbaad8628d5689f075b7310d7760e9f6b22d28b6de17e329e60ba378acd64f2e71bd4d510b8e7b39d053b257b8959a52c2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432377537" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{213CC081-71A9-11EF-AC61-4E0B11BE40FD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 800deef5b505db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3040 iexplore.exe 3040 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2708 3040 iexplore.exe 30 PID 3040 wrote to memory of 2708 3040 iexplore.exe 30 PID 3040 wrote to memory of 2708 3040 iexplore.exe 30 PID 3040 wrote to memory of 2708 3040 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de0a8e832e0cec63622e179c2dcb0dbf_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3040 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb808d050351db4311326607e558fc84
SHA111093aa68c59149f77d296a69285f3de544c418f
SHA256d8f6eb0defdd6bf0badb7c998ac4745e991e56c54ad71e30b50ccc60fb02810d
SHA512be02a0bc90c1cff7b20c21dd6c51fff549d9a37c1c2718efcc40e2bb0ed24083b6ea1373f52add334b32f4c40e63ec7e6974e7bd6d6f44c9c3fb2edc25ca9f4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5549ebf5b745156d9a458677c98a25fb7
SHA15dc08de68c75c6bcb6c30e1ddb029ead43b13dfe
SHA256f87d581f0a8ef5f1c338f73a14fc53fdb349791bbab193533aa174549fac332d
SHA51260e3f3c1399bbcc4dd25e562dfe706ad4a35e431bbae1d97d4eaa90eb3301cde516dca6ae58fb635da9f42e5cb619fb6d293a625b4829f36459bd21715a6b61a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9154db88dc1d826d39a26b5a413928b
SHA1b51a5b7994b5dcf4e95357516491d44a53a955d1
SHA256c2c1349e8c8f1c5454b0de8906674755a4375882ecbe1c17087ddec72af6a4b4
SHA5127834fd89a51794894f069ab01d92d8b01c68ac2f6d70dc4759f993fd52d10f9cc37fe5a8d49e14ddf3be51ff6d90786ee7d7f5a6cad00d1856beac76759f5099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d467aceddb2819a213eebc5846b2c593
SHA15d6a9e1f9e094b7ebd7ca76b7ee573e9fc5f02f0
SHA256587f64d0d0742ffaee46c673c1c0eb857a974ae5bc566e21e7d7e4704328f3bc
SHA51264f6c6f1499b9b12d227f97d9e45795cb825b010076785c60825e4e38fe2576378bdadcd6ab77beb418532cd1915c420a882430b6cd4dd144327fe4b72684f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd0dcced53d78355b85c310aba44d3df
SHA1bb2c417a69f8621400dec916cba06b23b15aa8e7
SHA256415f99b031044af88fe37c855f55df382714c8783bab143fa09cdb62116b6c56
SHA512d69fd155f9408b0884ab5c31f94a8a9f63388667882ad4917a15af758b388fa6466717fe6c3e0b12dad162f25f265b1a95f2e537ae90f49e2df9bd07ba270c1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5427716f8c0bb84dc87a8c2de7a6c9410
SHA1b4b9002942dd01c2de9e0e051c65ac19c13380e1
SHA25648d92d102774d385a0c1c451c21a2a459264072b97e6ff35db7781c051977d1a
SHA512ce20fe909abb1f48a53174a0c737098395d7757d8a5fb9af24934c829468fc1fd5a3ac6625704de08b8a9f94c072c9f46b52a057ee469d262f1a69fe528b280d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bccb31a8a0a575355ab3b1a4aff7a313
SHA1134ad485cd1daf20bb9696e431096159782d9ed2
SHA2564f458bb1beea80f0bfe6b7d8a6a6f43e1ba951ba20b9442f9dd825e4691304dc
SHA51295a53504e45df9ff628e40d0c9e8e82feb10c3f499582d0994e2845cb54d05d1ebd82c8b41c9e7cc3e94885172114ed5e661776da3153fccfd849a212512e54c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bb7b232ec5671e15fc2208fc0bfc71b
SHA11c32101e1c5d61825fca91194594a5a755598cbe
SHA2564db146901854042663e69fb0c52f7b06fbfec2747bb98d16cf053294e2a5f2af
SHA512daceda5fa90e2382945e16210c7d06ffadf7bd8265fb8e6acd1d1c1b074a0b813ff637ed716e943a1b0738c8ea866e2ac87093ebf67c53bf3a22d5e245aa0eed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527e7fd8a297d251110d08a1424b78939
SHA1e7d869dd51b1fa0748247e9bfa85d6e00507644f
SHA256d321b2267bb6836a94ed6932886e868b8ea9fa242f9528301754a6051306f760
SHA5121df2ea299ab2c55b4ea1bf56901505d9e86b76d2ee415f71982ab6a22461f700bac8016afd53b1e29bee963254f8edd47bd16c91e58c0379fadb596ca9d5aecf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56152367fd3f2626c62f24c05a5159757
SHA12b28adc66c15e9cbe6a9343914284277fe92693d
SHA256de9c547b54f08345bee72a119cd1a327ab51321e8e4710156e7a7826c2880738
SHA512f648d1d9bfff696f782d8d0c2a8fab0e2c8b426ec12de7d98e380dafb8eb68f4e56322fdc0fc2e51adec62f56e15a335c1acf864f960cbe6384ebcab79b91a6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d881bdf26d95672318f1ba9e2b66143b
SHA1ed83b0a84b02f643b2e33952613481a9997091a2
SHA2563b60742b398163f52ce856a0e7b6cc5d706d8ccc8de5de68472fc87ea103317e
SHA5124bb7ec981e30d7c9cde44eecd7ec2fab7589177a30fa7b111710a11491ab8ef5f9b4ca8d8ba005ad27046568d5a177b2c3849e3175fbc4d0310475073a4f6e47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffeedeb479f0258033d0e73261a43e79
SHA1e8bf1619120bb23c619b81ae036749bce2542ada
SHA256b4af28b48d41ef8fb1e22a9f1ca6a595e0ccf8e75ba05d7895792ffd0fb8f1b9
SHA512b477d848c910ab3a802608a61453de27e13324877df817f4444c86733dd29d4929646b085844ca988552befde4e4a197027438f52fb3528d4e7a5ebbfa432b02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541136ba8ef3fa5a38aa34a28882ae657
SHA1a91fd4504f1c6f6c0e03a8a28da129af8c43f55e
SHA256d1946373086c42a690b6a52b197c170081dd3edec7b628885d65c21418466570
SHA512bdc29dddd3dcb1e524bd714915e50fd2dc1ea0e5d68daf06129b19a8cb1122d7737dc7210764d628bc59af1f37a605b524667f9ee2fb5094033c0f88e692b953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c686d06c469968c527eff12c21fed42
SHA130809bc6d6a7536e1139f2635099073d5de11d98
SHA2568c9721594bc931a0752f871b05eeb1151e944a01bb382312cf9f502cf72d64c4
SHA512316db17036c9b859396535fdcf6b15c9df71289393343153a75edeb9e56ef2f20fd7eb781aa69814132dc168d6ca43401557300a1cb7205a5ce0c2a710830e3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec5537b9a5ed2b82eddd16762921f551
SHA1f9878545b7cd19c880e4c3fc62fe074aa090a0e6
SHA256f2eadc564ddf0649cc8985f8c3850c9ab0486bfc7215c05df5546a388e337145
SHA51262979c33b072f453feff66911807c9f0afefa76c6bd55043a0858e7325d9d5bf6d76cffbd163c10a298e76726e7a429b6b4210ee57cbaa04fb90f472d12b0892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5555f25e4b600bf146597d12f6d064d37
SHA10c1a23904224651d408eac427df064ab66b7d23e
SHA256e4dbdb2329c172ef50b14e1efd80f2b3611b5d625822523e4d951d6827472cc2
SHA5123069cc808f89fbbb590c3024ab1f96a4ba02bc09db10b998d267667d8fb58949ccb190b96ba9b070d2ea38a07b77a1006a1c943057d706660355506d9fff13f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5202163f5af3a699e8e59279af476d6d0
SHA18ea7f7e3a801de43fa823f04edf3acb616886e22
SHA25695ec2c8cdabee3360d2bba0ce820379d9539690344d64aa395e7e034137b44bf
SHA51261075a44c43696f74aa7907241f9ca781bb706c8efa198db0ad2821488c57d2f8414ec1583457d2b1a7cfb11b397352f1b80a27c39e96cb0035c040331631fe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b859dac6814d8e74c96907d854d9dc1
SHA1c333d10e62c4832b53a8d4b9e87453f8a7817e9d
SHA256abbd8818932dcbd22522d9f49332bac440209061f6485ee20252e32a83dc7b91
SHA512809128aa9f6d786dca70840b69b28d071f88f20241a2472eeec5723baff11e018e5fe16c38a5934fce93cad18a5ee3b106754f7488bf5e1194d84e3ba861f7a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8e8cbfae540cb129055c1d9fac4daca
SHA1bd2bdd51d16f81baf8062289df8782e6089babba
SHA256a9b6aa49a391d8fa9c7ef574515b49c062a041552205447d81241594fc1c5780
SHA51285359f63645ef0659fa4f3015bf742f727377316d1efb8b4c929ba96ec864da2dba9c41a7d1d7261b7199323757b659b9d70e2e112cc3c4c790352c03422c23a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8c98261841fd79434ac430fab828bd7
SHA15a00d1035e915a0d3dd0e9b45396dc821aa01ed9
SHA2568c6982ebd9cf44dfa96e21dd5ca02dd6c860100ea811f7af05b8e5a42a9e6b17
SHA5129949f7eb048e5f08d2813fb047d75e29c0b4ac576f611d22bf1e556c89834fdb37d970c92b8bbfb8d09e206ac3e46982fd56ef62220027b6760ca6fed5ff8a81
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b