Analysis
-
max time kernel
137s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
02-06-2024 19:48
Static task
static1
Behavioral task
behavioral1
Sample
8f3794a315190d6303f65ae5862e12a4_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
8f3794a315190d6303f65ae5862e12a4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
8f3794a315190d6303f65ae5862e12a4_JaffaCakes118.html
-
Size
13KB
-
MD5
8f3794a315190d6303f65ae5862e12a4
-
SHA1
77ff4920461b0b8e8ea1999eda8047f98184a286
-
SHA256
6d30fa6c9ee569ae90879695e9137074a61bfad5aace9156fa54d2f081b13ee8
-
SHA512
17817239ef1d8c4acf7f6b2766b8b7796c67d506923bcbcc459167d041548e6c40a610e8d9c4b35620e2a80249b6d1f197a7302a35d6e72a402f9b7ebd062932
-
SSDEEP
384:wcGcq+S4poq1NfGDGPuSfZbXtUIYMIfakzCYyAqi:wcGN+S4aq1NeDQBxbUikb
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000188cc624bada334f93436ad8f08a7613000000000200000000001066000000010000200000008bfd773f9cb1976755f993712dcc84422bd1e5886abf48c6da2b9c0ab3260216000000000e800000000200002000000077a2dbab5173aa2aa131a06ee9e7e4c1f4425f580f67d869a6460aa41f583503200000004a6fedad070bb8be9fb61e609ff1089b6e3c441412fc5a4800d98572d79c9bdd40000000960d9396f85accaae3cd7a1d1e311a3b6ea2d7e3479608149613933a8171f9bef6e58b51921a9be71f47d09d8ac6ea386cde751f3d756dabbe4c709e97dd1008 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7003b42526b5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{117B5891-2119-11EF-B6F2-56A5B28DE56C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423519570" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1188 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1188 iexplore.exe 1188 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1188 wrote to memory of 2524 1188 iexplore.exe 28 PID 1188 wrote to memory of 2524 1188 iexplore.exe 28 PID 1188 wrote to memory of 2524 1188 iexplore.exe 28 PID 1188 wrote to memory of 2524 1188 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8f3794a315190d6303f65ae5862e12a4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1188 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557cd9f5bdeb66ed242ba02c2d3dc4cbe
SHA1aae105975636f86621cc3c8d03485891938bac83
SHA256e522fab62cfca6a9bbb38cea5fc7958cb1ef6f5fcb15b56103e21fed1e08e456
SHA5129901c90be0e919461e6a6d089d510ac399b219cd24c8892dde4fc3a37e502db59b1033b8159c0cd0ccb13ba5c2bb1b77e30f90cc272e1e5e7061693965479d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1d678266db82f0542b11f056293e6b0
SHA18dedb2b717ef8f632c2d49d1d07de177881f8ffa
SHA256c788d99fb86e5635585d61d27c12fdcd107fcd8de0a2d4bd077091eaeb17262b
SHA5121f861a40b631c1746d22132cec0118600bdc61020ac2bb945442c014526d00d22e913e74efb751c7137c18d980b05528adc05836c6d492e07e006e8379150be9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5788328cd73e05e0b5001b6ea0e77432a
SHA1a2de948319a6662863ebac03acd22eb44f2bc052
SHA2562c9590609eada5cf1620029ac0356cdd43516c29100c2772d7e7c2893687fbed
SHA512e9b1c87bee6fae5a7625cbd337c6b6e9ddd8f39e8c1cfd7fefc29606e315e3488d62dff7a54e4426f696b31549500a4879160432291e403354fddc0f45c1fa42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5002336c2fdb4af054ced3e6abbeda9a7
SHA152190ee71c1e88bfd9918056a4b98ea07cfa9a88
SHA2563c0bc0f2e2b412b43315d40aae39fd594751d3a790879522206d5ccb8cdb1ee3
SHA512e5725717a46958bdde24aea72184843d373399febaf0dff556330cf7e2ff0457e5929e9781977342d00f592293eba6faaee6f451081812dcff1e7fb1310c3b2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b78489bdf5effd09d27841f3f4c7093d
SHA1fc211784c1939fc65ed2c07b30195d5c70c32802
SHA2562351ad11f50885c42564906becc1346de3a24a13e6ab29975ef10b3fdffcbfd5
SHA512b6b2e3bb57a17124572b5f4d376e47fe9142721441147d0949b07cddc5dc0f42b7d944a80e24c35d2996f1bff97e95bf0cc4000ff4af8e5307c1dd9d7384497a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54aaf33a230c9094a80971b4f6eac2bad
SHA1f3e3f22c0177b487cd85502639f88dfb2a06ea0a
SHA2569b222e0c3288886216a0ccd8912c07402de5af4058c442bde7c364ddcccdb6ac
SHA512bb48363005a226d0fc197c588cd4a83c34921461eea25048a75e740afc38ac2a925ea4e570c6aba373d286e9e7d20c593e40ea55261b9f3d11a61c909101811a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545da09105883ddf13165924b9c79fd76
SHA112b5d7daa62f126e04c2a255a70971fe25c16715
SHA256c83a999111f4b87300c87e6396a5b919454b4945274720c89d84959ed007f98c
SHA51298319a727a8bc0e6ff3d6b875e31bf35dec484cb1fc065efab416c668a7c9d090bc5478367dac7e27a31c441db116a91d7f8f0e3fe52fe6a7b61917a18d745d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514a69b47f863b7b50ae5e7e6d1d2249f
SHA1cb0508ad2734b6d25186586c8d7f94127a62ab95
SHA2566f6c0f33ce914c08300831103697e8f843001e288fdfcd55370b587c40b0360d
SHA512df201c8265a512fa82ea773e637f13eede6d420c575bdcadd52c546308bf58a955ee6d3fcb871b3b3f23c5b23a1fb91079566732da21f76f2c4290532d29ca95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502b57f842cfc5c10c3a08136f03a7075
SHA192dda40066c9cedc8fcc433232b50835ae7c8755
SHA256d05a7a5dd528aa0cb4e5cbab6930fa055299de9bd703673412ccbf924f381c0b
SHA512cde14e82c7b8cf60430c10abe30acde3dfa9230d24f7edfd800fa2afc409dfdd3acc8a97aa6483d2f2eb82bf15940cdeeb205f95ac485d4309d4c72e5a7c20a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57934bc0b256dbb2a33b0639c33cf2b05
SHA1b321fbbb4e49a9eef526d5cf29c310a5f6539015
SHA25681b4cbeb4f5f351da783241cde86dc60e67d77650a5abc8cf7d613f7fbb8d3c5
SHA512dd4d4c7ed6f943dbcf9bc09f39ecd6bee9c61653f84ef65c5f6c99d8d0109b6b9688a7a5c682a42968c11158021695188e26e1d76cd7625acb62a5b301e97288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c214aa3583dccecc4bc67c0697aa7274
SHA1aee0a5b31d96fc1fcf0373a8ddfe6c908f9323d7
SHA25655c3e02b7326a83018511e9136549eeb090798489bbce0da097266465f2d9fb9
SHA5126c2cd1ad4d227e6ac04f3864e41cf08b4e5ababd9030cb9da363477117eca4bd5727f8c485796354a864ca2598a92c2fdbac79c5c0318229148caffe2617ad02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d86b781cd67726d222d2257d9cf95fa
SHA15ab29c6c0864dadf9bc890d4d7ff43325d8a2f37
SHA256c6dfe752a224f902409ede0f5c6652722ac7f9a5a86ecd0020ad70ebcb9b809e
SHA512c35f9f9f44d30d32c3026068112a566727ebe928d620036d2330c2328b144b80e6d818d76be3ca92686907a960d1bf6d24945c5a6e49c839f236ffdca252f61b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55936f4abdd21f9352fe7e39064fa2108
SHA191f73715f8d2e8a7a265941499405a50b71637f1
SHA25659dc2802c02f4f3f835f29376e6f396d930a4559b3043659a9086e5808081a6a
SHA51203d02cd59b4a7b2c19f552058b542b6c5f6cfd8c1a0d9380ddd82824f93905be988d4455e0bd31a360142103296f9eeab1d4a884d2df730cd5cf36082f64abd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546af0be58d332d8dd6d1a02a5a3a5831
SHA1b30f005f256ddae30544b94a9ac67bed999cf264
SHA2566cbc5bf8fc00be5d867196e80e6751f82b055d55f102b9df15ccbd523788d978
SHA512acb671723cab35f31025bf644960c24e5b51fcacf73650fa10456ab102c75eed97812b4ba1a4c9fd927a6b14775fea2fbbd3daef615bbabb4e7dc5fb258473f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d64793a0c584c036134b8b5a5d10400a
SHA136de5eb8b3ae3f4bddd4a3c22ca9dbdd4cf84010
SHA2566d3624cfb9903000f483801b8f10e571056fcd88dd820badef92d04b9e9fa42f
SHA5124d0dbe971c312b39155ff6d77ec9896c8cfca45d7273c3a6beab155c80a6681f94b5fae1acd8c9fda00563e12de6a161d272cd7d461e0a8cf3f82d22996593b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5847777d8fc0e293f5116da1946f9b387
SHA1a9d641579e6a28794ac3db4e308379a00d2ad2ef
SHA2564ec81f2f4bf499d4df3e465a66e41fdff388be45b6cc53ae6a24bb6c9b2ab2f4
SHA512ed75a41050d58c08c5b0834c98291396310130fc1fe62b6044ef17f875f33039c8a4ecfdd833acfbc1980d96fcdc673d03d4be5472d745c26cdefe65ecd8202b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5768b35d6255335a8b26d9c42b96c05f5
SHA105330acf5a7b7a4a778a808dc9d4c9d912a5529b
SHA2562bdd7024ab8d868d5f79a74b896538995c8b5d431877a5d00cbdcff251cd1cf0
SHA512aaec84bb8d09d120ee3baeeadabcc49f1a6b905898266038292abb62132d36fb0b8541fdd8302881f1df10d38049de23208396a30f95e08f87c1913fbaf57f7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583fd9c678ddae1a4000443bb9e58bf6e
SHA12e56663faa343aab5ff419d7bb3d52a685f460dc
SHA2564e8fd23c30811643c08da20f879470ff2fe528c764f98b4ccbc990988956a455
SHA512f096dd62fbcdd1f9be706c3fbc8011e53a01554fbd87c2e88bcb3e375bed8c9352e61288691566db31a29a216f73ea1832ec6fdce0e76b757929d9098d1b14bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503c44fd5490d3baa9fdc25066568294e
SHA1f01523b3f8d13ce41e2b4b6b69388c961cb31862
SHA256b58c5064860b73e804338c5a6227bdfdc6a416b2512b18d7d8b39fec6d4332d1
SHA512710a9c7312e5433b274404000ffe5c709bb94b47ca46894499cda4f41e9d8e63b1f70ba897055673df3f514ae5e13c348988727aefe5d794529cca43372d73ae
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\902LKC6A\style[1].css
Filesize4KB
MD5b70bf8aa3f492204fc2e23b951bbedea
SHA164b004cb388d5f277be4757fb19c1532385d4c2a
SHA2566472e8ea61b13e431a6d1c700526e766315888905544bcff08cdd476121d045b
SHA512b3a02257def21a9225f918d0d0c9c3d198ca72424ac5d14b3eb0eee972949e0c8b9912dda307870b49ed38cef519f595085f04774247c0ec47a23daa7705d322
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b