Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 06:13
Static task
static1
Behavioral task
behavioral1
Sample
pedo.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
pedo.html
Resource
win10v2004-20240426-en
General
-
Target
pedo.html
-
Size
208B
-
MD5
162b8f4938fcca1e214126b98603e291
-
SHA1
3dbd6482877413691e99eb3fe8f92d7fcd8a2ff3
-
SHA256
59a6278434350c1a24c11ffceea410b0aa1602b230e4964ef482f349c51d0ca1
-
SHA512
41a4faf16343b3e9fc4dd23142593d3e30d22e9a600ff58492b3abc65cd572c13aa73f5c92b5d185e98a6479dd875b7ae84adb03f1d8cf5308950d66f2ef47a4
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000007e37954a89ae1090d585fabaee0a9fa03f46597c8e557ed853abaa60e0829c48000000000e8000000002000020000000969ff083194c3356aff2c0f4bb44cf0b5d496c51a6d21fbcae6b11127fca739820000000029d6e89ac92adcf5d99f6d21b4ae5ae0836310cec57618dec08c206ff3c18ba40000000ebe9d66be068efc869780b2f9a5015d341fc65fdf2d5a262a57b1cfda390610f1849a7f10cfc1771276cd76227ce37079e2c4ab5192d3dd6a3e92cae393c77e2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423384282" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14221F21-1FDE-11EF-8004-DAAF2542C58D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9038a1e8eab3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000e9be78de032b9a5cc627e7e73bcdc13549ba3446c34ecf3c030d1fdd7d4f2a50000000000e8000000002000020000000eabc964638e731a46ae0239a53264141a7e43e219b6013227a6e78a05b2cf24b900000004ab89a454322fe181e2a0c7d013e90ae88fa84c3fb37d2e42c40166003e7ba84abfd8afb3f338047ac075fb883a7c45ce001696157c502f58c0631c943059019b40ffadb1efa02100e274e1f5774a2ecaaf86f363b83debfd069b976c3f0dbec7590134c736637af1fdb458cd758a5fc243b53fddd2c5e1dcd055aae89d3253790c4904c56823f1c21f602d6bef14a96400000007004919c7edd5f96c343ecfdd8145b54935be1686f5480de6b48aa85ffeb64f3dbe6e08c623df6a93e268b60b41732e542e97a4660e050d316ae5e987dbcfd67 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE 2240 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2240 2420 iexplore.exe 28 PID 2420 wrote to memory of 2240 2420 iexplore.exe 28 PID 2420 wrote to memory of 2240 2420 iexplore.exe 28 PID 2420 wrote to memory of 2240 2420 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\pedo.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a313676de7880d9673fb62d61a7a42db
SHA114da3ae63a43c78336d1427a0aa8078ec4633f38
SHA2567322b93421ac53c95cd7f7f6b3d74b10f3d6ac17dead74dd8b3860af2238c2f6
SHA512a25102a212ad85f84ca82e78ec841691d658c5b5074e33f36210891d1ef308ee707125a16f6fbf520ea0df56fe7a6b6cda4a0ca0b1d02c9fafebc0e4edf1f539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538292082dd91140714eec23b6456cfa4
SHA1a1ddfbda670ed468e54d4ed97fcffdfddc2aa13a
SHA25630afe129cba0cc2a9f11f0bd39fbbaab8f8efb7775cb573bd2a4798958216173
SHA51232353226e12b3d8179f3382f76263fb54ba0b5f3c125d116cbeff6f23d389868e70f0b6d745507f6309984db2925c0c79247a306ffd0c4993a52a0b104664557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ea9aa79a79aba6fa30952039068ef5f
SHA1053f5fe74c17362a674c0d856d47f2698b963fe5
SHA25656f090a4ea8c44cbd67f40248f2604a1e7a3a13a75e3181f55d07d1a8cdf5b7e
SHA512f32f0d270ff5c234f873f002d377feb2786c4c320f7aa959ab896fe77ade797e13cdb0b2c7f0bd615e61ecf82604d6a31384c07855c55663c88c8a64e288babe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2b1d0aa8e529aa4b384a13d6da5d5fa
SHA196799f81be7e599bb42d9f3ab30a0e0485a86c00
SHA256aefd46a1a12978c9f2f888feb26d51408c96b20767485238f860f21e004ae1db
SHA512e752c5981dd486eb3cee047488f06928f778bdcd3146c4ec2821f61da0e0281e146322e09da7ddb45a2fcfb2a89c005207a60a98b370675cfb64806e82829848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a346e9f1e1ac488252cb291275b59750
SHA12583cbcc6a5911359940f1e21d9bcf510a2caa72
SHA2566a3013a5af45b366e7a20d171c22e73977e473ba9f7172bf1d55005915c4ddec
SHA512e1baeb5ef5604401e4672112b8bf1dd8698d9fc0d876578a33c4f6cc59b66a70c2457e8f8a06e713fb8b051616996472f3d240144689eb356e566c6de0233d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd27b251fc61ab40b8426a7bd6f974ae
SHA14d1e021505de223d4d2e6d17e553dca92c9ad6d5
SHA2567d861c4ea61bd10b84156bfd971789c1d1ef430f52e93dd004d43ce43ef69221
SHA5128d8174712b8e0e1ac9601a608ba1118f1bbcaa4beebf39c3b63b873dc5dabe5e16fa8651eb136f2ee1551a41e07bdb899b93c0b867a9175b9d5a9c8413b6aee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c815a6d2c198cd85b5c875286c1c133c
SHA1aaf2c1288c79c76231d5f3b6b15a5bb6a234b34e
SHA2562f4ed5769da95ecbe288bf544d30d46b8f9f77edbbcd56bfe53952ab2dd155b9
SHA512c1e1dccb34c7ddc01f671fd341d2ddd754f010e78900f9429cd1beff6e19123f0cbd1029d29421087bb9189192454a1b437e257c2a088d3889e933f5af619ba0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56df11df1f74e59cc6da374025892a02b
SHA18b6fcbaec1d8c60ee3bebe0031bbc77459b43ff3
SHA2565e390361e56739cb32427d6ef4ed3dbf83f94d8ce59eb7773d481d970462b611
SHA5128f153077b2688a30ceaf7a669a40420813e272808855fb2abcb1e3bd79688334f5276c9009088e517e9bbc22d248a747aab19c7cfa95884ed48e716120e45a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a15e7d5d47aa58600334df2d9819a097
SHA144215592810836025287c7127bab5261e3ff48e3
SHA25631190a7e487ccc83fabcd6554036b0e3958899140a3e780c7bb00313e69878db
SHA512ef890fcfd77e8dc5267bc78a46edf2bd268d5269eb6d57259d95e0e81ad1c3f18a351c20cf166dd9820c976ee82223ca57b30b395907b3b721b4af8e1edaec7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b608e7d2a6f20e21865880e36f3e3dcf
SHA16a89f67f819f30f2a2012739ef8cee5c1c4ec3e3
SHA2562d90513ff2981cfd7bc245288bd56f20f4821d6cac7b656202f9f06b726b6af5
SHA5125ca87a6e0463a8bf5580202c5fb687baa0dea783859fd5400e1396edd35562306a796ad9f9ad0703e6466a7026874c94b6a39e4a1a6232b30c7ebc7e7ed28d1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540453b0fb5f658a282bd88680fd1162f
SHA19ec29be53271562d6cbc3fc98814ff07c6a38849
SHA256d3fd2e0e421f11d8cf3df88f791dca211dc1d5d77b1626d62ac62aafe7a46854
SHA51245bd445a3c1946546daac405cc24ad526cc6411293b49540b400132c8628e1b019e8f0cffbfb7c0a4969a21ce01d7f03c7052980dce5e37fc2ee299cecf57684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537838935d5d28a149714b024da41bf57
SHA1a0c3060bfd4a617ac73063cffc1b26b4aa2241db
SHA2569884356f03a3eb001d431bd07cf3a747766bd50c6a5486188db6c56bd280e396
SHA512930161fd8a093db3df2c5725557642205f34d592da8f855e44d3c3b48e86f29f8a3d1edf8eb1477a2382cebcd7388aeff5e0a1236549681014bbd012255d9dcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a4bfc35b4c07ba10c7828b92aa542f0
SHA15811a61eda4d9e9974c7e112b27fb42edfe8225c
SHA256936bc779347d1cdb8f9941e8ba1b3e0badc2b8c04775599e1e9bb1505b73bdca
SHA5128d8bf36ed1bcc1f817aedf0e07b6679514ce7d13a9bd7a6210703b3961cff036c4333d43aeb998eee60f5320436d71c14770d63ea860b8a2999e7752fead72ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6d65cb5d864846cfa8c2498aafefa6f
SHA1c1a4d272a1b8c4f3c4dfe49186724be85dbe686e
SHA256679596fafe1023bad91a7166591f06ad27f759bedc24ed6b0a365378593095bd
SHA5121a8f4ffa7ce5e740d55410b416876f5439576505f46a3773081f1391ef905c0b38cd2d2bb5e9912924d80cda886a1e89de6386c1e83aba395cbe177931b49071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a20ce4768cd3228141f69f7702c1efea
SHA1e7d54d385bc58b0b8b461cbe3bfec47b46cc9c00
SHA256c2b0cae43a932c483516b3f5dfdd738356e2b1c88d641680cc3347958a5f0376
SHA512a030aec1f567968f3e540b55ea7622a3e3d08897e1e687cfeea8433be6421d83b4c2689fbee6625f565bf7a2a4045bcea259fecee6dca9ab8163e4742af26028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3ec1ec13b69155201918e98e2a96fe0
SHA1af6330884c4615d13c2ba7c631d770ba8d82c45e
SHA256b6107a4fa94c7eddacc7e6ba5cd5498a6c1b0fb8a4c50c57887e017cb3eafb46
SHA512a3354efeceb587d1375570f38c4988060a33b2bc36341c52641d600cecc67b04d5a0a8d51482f934e66f634d05686c2c075397429686d30763cede1f11085336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5017e37fb17b1e97b4945530c2c46f1f6
SHA133b3e374d98bcc20940b8e2a63ccfeb061e6d960
SHA256d72751db42d902fb104bbcba5873b4ae11ac049a52a957326a5b3524d93881c4
SHA5124d8d1a7d41f5f077ff8767aa56339774091145ca9b55919763f3d3193b9baa6621e6e1a032d9fad184f1e9b75a7199415b075c4a3b599abfaacefd51e9b08e33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e455f6b881287a922706bc6a2baff12
SHA16a6bac12f9787dd5b7fc12aa783ddbd03dc3b5bf
SHA256d5047491b5b8617fb50d72beb035379001da6a7968f8d3928b55c79f2e33a6f2
SHA5129d5915c2dce62b1e75eaa3ac19ae7d1904a8133f6ea936da410f00cfd41b9b7ebabe06991b91e773414030966907e9f36babfbf5e5ba135aba3f7339105e49cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bbc01e0d65270f5c806fb97febc9e0c
SHA17f9dc6c69e1798f326030478038ff14cfc9e51d3
SHA256053db5354a47f7461e27ffead7fba59b691d77320026a5660041a8f44f6d4e75
SHA5120a337f11d177a4b8e51236da3a6fd122e06602bc27ddef5bfc0ded738abdef313643ae40cbd7a5d943c8a1ccadab6dab358563d4cbda7cf08c7d962e545cf11e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b