Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-08-2024 23:01
Static task
static1
Behavioral task
behavioral1
Sample
acefe0c6e919c4ffef204fecbcc1111f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
acefe0c6e919c4ffef204fecbcc1111f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
acefe0c6e919c4ffef204fecbcc1111f_JaffaCakes118.html
-
Size
53KB
-
MD5
acefe0c6e919c4ffef204fecbcc1111f
-
SHA1
8e12c4df881115ac8ed75e018e12ea7433ec9be4
-
SHA256
48fc366beb409ec4165cb5aa8db7aff90aa0df5cc74fcbd7bf4bc5aeb594825c
-
SHA512
3ec95e9d2c4588438fd0c25d8ca78d087de1efd3893fe84b19f0400457c5fd48dcee7b153ddffe0c0d5dbe85858aad0a27a6d31d5f1aed16d4457c30b4a9ab43
-
SSDEEP
1536:CkgUiIakTqGivi+PyUTrunlYk63Nj+q5VyvR0w2AzTICbbkol/t9M/dNwIUTDmDy:CkgUiIakTqGivi+PyUTrunlYk63Nj+qG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F6C62E01-5E7E-11EF-AF97-4E18907FF899} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c003c1cf8bf2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430270357" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000b546f6ba3ac17101190b2f707febbef29e73c04521ecca3eae944db83ac7ed8f000000000e800000000200002000000055d7d70715d432a6ee3cb1796fd4f3164fd6a33a3dc8fae43325635b8d186d5b20000000f4c895a8ff0c3f055ddc9a8ffa25f2a370b1efc84cf8be0eded0c11f2c6a80b240000000d0af1432df17388f9d9c0259fe3cbff220f05af9511602de06ff659dc83b2e661e5c803bbb52eab6bff6637d9229667282bf53e952bb75299026eec74e6764e5 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2316 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2316 iexplore.exe 2316 iexplore.exe 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE 2696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2696 2316 iexplore.exe 30 PID 2316 wrote to memory of 2696 2316 iexplore.exe 30 PID 2316 wrote to memory of 2696 2316 iexplore.exe 30 PID 2316 wrote to memory of 2696 2316 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\acefe0c6e919c4ffef204fecbcc1111f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2316 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5893bface449cb459558f68ecc3296720
SHA1c5dad9609439fabba2956f6a9992052446663349
SHA256250c1c916ebcd7fd415f86a9e1263d785add8edd1cf1c5481119531e1af6b819
SHA512a4702fa40db2548e6702b9342f976331b4ab91d89b7490d11ec97902d8b3663f44135b7d742796bd335dbe7a9a5aadd49fbd5d71af308b0bc5f396527001c522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c2fdec1266a9273ccba14d34469a0d5
SHA10d7747e6bd36ef7862862f12d17b0b22492465a4
SHA2565359f96ac6c40a78de8473ef6442db190e4cc47338c56abbc901dd311a004d9b
SHA51262c2b2e01cd409ec1f9977d35d8cd63dc82d1c2135a7f9921207f59a8d92ec79eb7e65aeefdf81935abff2b0894cfe61d80d016e6c46e19c033f36a34f697bbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1d005c761c98d226753c6f483c0e78a
SHA19e91a16cff10d272a1ae2abfcb0ef66a8cca456b
SHA256731b608f409bffa15d4b0e9e2a32b3cdc5ca64a33515b40cc86f3c623ca843fe
SHA5121b53f0caa517f8a38a5c4f67147b6802a44efef1e5190b1230eb5bfe6f23ee3e8fd059679c219372a3525f80937366d5d36b6be1bd531e2b022270fc5d39ec12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5453d091953aed081e2060b26af94f44e
SHA1d03ea9aaf032049be43750e6fda939351f3c29f5
SHA25627f77687589f21cd9b51e7d7c1f60480cf95c91a209bf9ccfce356622a220f72
SHA512f8a3ad6bcbbdd5ca1bb373f3adf5867885909ca5e7f9897a59f0673e2a3e3b9a0a0667b888eca90a57895abb2dbed344f785ef9a4bb370805aa2202f02abb787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2a9cd08c4c5ca6398802a9825ce14d1
SHA1eeb6b84949ce516f0417f3523ef47f42dabe842e
SHA256a76d3554c7be50134db37fa53958e27e2ad55b32b94b9f64fb7c6faa1fcbaf7d
SHA51279cdedbc42bf4defac5d7c4a7f7c88154fcae21894ea7d318b143305217b86bbeac72a8b7cc04bf6b54d1d432c09a53cdce997b314d14cc70509b808171e35e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527959886b48d3c3dc53c4518b901ac94
SHA1124940001cc1d87b6a1d0d0de968ae53044718e2
SHA25624445afe327d34f93a19e5d74233ab0a0d0ed256a975133682d5bbc7fab57a72
SHA512665ba2c95f411f81a3b6ef339162442ec514426e2a81f6711f4de30458f302e24def1ae8742bfe160094be1e793484c79ab576f551ff6ec4e487ef6039f11ec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cba2463880f0c56729783498155cc0c
SHA1dab425489928d1540264c3291221dafdb9309841
SHA256ff1c788331107b164a75cacbe617cccaa5c2d8b0c2b9a89964c182158dc74c46
SHA512faa3626c8258b60a00dc7a9e50a08c4cfaf96aabd6b3090db56dea418423dd133815b97970365e680e375c6cdb4bc5468bea7c73deeeb5a4205de59ba4583a41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588c4f73cd06c4dc8abc06a2aab8afe94
SHA18059790d18e0e05436ada7e781c54fb22fb2b855
SHA2565c6dcb775b5b24410f2df98a6a98dc46eb3784408eae9478325136282ff61468
SHA512014840ea90396f6d35fd8fbf8c06ce889b175e2e43324a9259460b6aaf2921f5d9246cc59d8dcb4824dc5c782263011aaa352866bd049a61a47f6163c8ba13c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee831b956aaca72b0d2ccef7b698156d
SHA12ed15b955a3d3636a7ff482eb415edbd18882b3f
SHA25677f42d0b8b47fabfc53335c1c888b51c2e9adb7dece8c83f5509413a3796e518
SHA51220f4fec85ec8e404e0ff4c5f1c0d9ebba25f59dbf0bd537aefbcb783cd5430b29e68bc361d4ac689c02b4ddea62e051f726b9a8295c72cc4fb6d5a6a2c2d46eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50896246e4a565ac4c7c87d42048b75c5
SHA1464e145d686f0784cbe33444cbfb79552a4fd744
SHA2565473dcf35d74e59435d245e6fb21284229a2bc2303bf6b84add57240e1ab820c
SHA51225621995616fb029bce612cbfdd403cd5e8a9a7c2bad8123c096248b35f82cefdbac703f08db31138e0fa39a2f34fbd6014141810bb05777e84c3bec229e484b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556dc62bce1f8236647006b3904671e55
SHA1b13525384fa4841185813cf94add2e0aaf6548c3
SHA256250e1132c04f78669899fec404d5d3e0af0afd1c22c962296573c12e019e7efe
SHA512ca46ac571a79856539079367e22d3a67c649b9cba8964397795de2632da1d2c198283a14dc356c4b9e2c9bd357c66d52543718a8f88c30403cf560b578fb093c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513a112680d7b6cbc7618d455975615e5
SHA182f66d711c3385e1b51a9a389c88293d1bc15f98
SHA25689198152f8a7c3e32a734644daacda4d55746d360b40b07925e25aed0270913c
SHA51202d00ee8908cb9dcd252344c812311a19c0772461613be19790407ac0521a5276f4ad9555ca9ffca4b04686dc6485f88a6fe4c784250d251c97a654c228d8ac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53273a8231d75b4fac1608aa6e75fb0e5
SHA19a74063d9d3f0904aafe3b56f7c4a310a4554a00
SHA256c6c189cb09d06cd693e2eb57739053d0eed6be4c1567273e3903f1e28f27864d
SHA5127c83cdcde42e515dd0d4b5faa47578b06c4fb9d7572e52c9c05fb2c48971208758f339c5b48185e5d6dc58024cc485ad25b9fa1e73de006a59f31679f91efddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504f54f9c3cb4eb5ebdb98d753ae7959a
SHA1568abdc34326aed4dbbdff3ab191025ec65561be
SHA2560231c9bb41b0643b05613feed3fba8d6fc778bbe58be0e3a334b1c0071849f07
SHA5127b90fbb7c47d7339fc94c0f5cdd82f46020f749cdaca3db5b20a75a1933330f59d22a5993765090b13ef239d0bdcba03150d045d790c174ff0b2523cf2024d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5379a11c5f838b35aad8703d0ee06596e
SHA18f19b6a51c906faf05f5106b643d67c6f4efc2f4
SHA2568c75e7f96c78bff48b97898ec4fb0ef0e33e4ca05302161ceb6cbd3dc98efa30
SHA512165113f7b191d0e27da2ba23939aea4d9a77a79f6aa3521bd683b7cd2e5e93586eea8d80fd17746bc1206bde5a966646372f02011e56e6e441aba3f11aed0c79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc1e51413c4d49208914990aa47bbc25
SHA13b52e1389e3de035f8b6a708280132f657bc07e2
SHA256bd6eae4be260a5b7bb0dcbfdfac3ae4b14ca93c399d9e492a55f0db3567f6b12
SHA512b87e20104018a6c5f05a5341f43407a3fdfb0f0d05599111fc25c55aca25c6100ab5f97b723d7382910403198fb631c4265c4a95955e85d43e1e11f37c86bd9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea7bde38610169f9b24dede44bcb7bc0
SHA17bc81129e7ee63af626e6e1a69ae632b642effd6
SHA256664694900652ca680c1e2be57310cee78ec83d15e3bd6b0f41dd073447ed550e
SHA512c49d2497b33104c6d47a943508872783dc97a703183efdf21862449bf34edd725d5344ac08aa5905a54c618357b627fce1a03fc6b0cadecd87cf9e264501c5b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9b46b3a99f24e02fe52a572cad30a3d
SHA15bbcd26a2d2b668c53aa071baa1f8204dfe4c569
SHA256916a9ce8487b086509ef4047e202836177f43fb3f61f073fd5f5afd2626de8bb
SHA5122565df01255c36d469d375e087e11ed24c2c275534145e651f3dee520db7ff84a2d972aba33064b9c132401a70a7691453ba290b9183183f617f6f44c2631598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5851df08577919ccd39381e2b1cef7808
SHA17541d2dfd51883ba6d87b981ecd5644e17644047
SHA25655a9b42e244c4f1388f6e271b6faa290bc2bcc7da8b7a76fa45a5e4e85da0436
SHA5120ba5a3a3517eb4efae825cf319d02890795bb88dd41adb87572c404c3078a2688d64bf40855e7e51bc33138a8726e6f01294c12f24746d81801a288104bf37ea
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NFAY0EOS\upshrink[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b