Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 01:16
Static task
static1
Behavioral task
behavioral1
Sample
cdf0d0738f7ed30629fdf45d9b604e0d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cdf0d0738f7ed30629fdf45d9b604e0d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cdf0d0738f7ed30629fdf45d9b604e0d_JaffaCakes118.html
-
Size
50KB
-
MD5
cdf0d0738f7ed30629fdf45d9b604e0d
-
SHA1
6f42fb20604374b6f8436eb798724afaeb0e7330
-
SHA256
4afa36ec4b7ebb1568e4cde6325470f57f791ccfe7d31171e9c0bbccb4126e86
-
SHA512
16cffcb645fef617ad528c7d9c00973b6702b92731bab57d47d95852789a93d4d772d54d79dd00b645cf350ec6e9625121bab4fa465b6b8fdb10a262f06be93b
-
SSDEEP
1536:SV7hotdca0f+UdhF7L7E/J/J/ci/1/1/1/1/1/1/1/1/1/9ddy3Tgo:SV7h0FFjppppppppp9dk37
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E20ED131-67FF-11EF-BA91-7AF2B84EB3D8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50c616bb0cfcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000dd9ad60e92b32459108ac14f421bf064897c4a4697d833e9a9b9c17e6376ec5f000000000e80000000020000200000000cfc73ff18f6c126a2b046c6ab163e7e419c7412df48e286a953d8e3dacff7702000000000bb228e33c448057825623e36d6838a22eefe49e2af75bee8d71840dba3ad3a40000000ed874603286e84889d3c407c002d8c1ebacd0bc0832fade0d3cc93e99804fdd8c9c9ba0b4c6deb1ab5cd5fdf4509551a9232bcdf2a7d8e25372ad9030be206c1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431315286" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2472 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2472 iexplore.exe 2472 iexplore.exe 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE 2176 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2176 2472 iexplore.exe 30 PID 2472 wrote to memory of 2176 2472 iexplore.exe 30 PID 2472 wrote to memory of 2176 2472 iexplore.exe 30 PID 2472 wrote to memory of 2176 2472 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cdf0d0738f7ed30629fdf45d9b604e0d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2472 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d743004f3abe7864c93ea1d87bb74662
SHA1b52e6574ed6465e99b571aaf5c94d061104edb72
SHA256cb271c52e3bf4301445c364b1ded5a2b558b6b80f9767992a4b93f76be185514
SHA512e1056f71c487d32405b77ea1a31764c00a0f2761a92062795064e06296c7d25bba2cea318db2842ab3102393116fa45522b098b911913393130502bf6da03413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d6478f874f7741986fc95a0f3866542
SHA1fa5d9c30a868e53d3d2d40fcc2927d750bbfb9bf
SHA25686d53cfcf261bc5de3fd891ea66de53f60f304d3e535c15dfb0802c18fa2b7e6
SHA512007eee2294908c269af1c12b92c5a897ce86730d4441c6753c28ac2bccd2290a0a47a22f0adf209aab1c7d3d8eb2773b2c0f43238591ca8ca7e7046b3e904141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e90fde887146f22952cb441e148cd701
SHA1e9ed312c62d93910048e9f72b5e1129ffc79313c
SHA256be60e734ed1c3d71f43c92fa5f9a39753f5f5753676616a4f9d0417256d6c4c7
SHA5126a7b6eb8844ef5f48f94b33971e14d635ad3a647547b63b8f91e6098796d4ab6859fa877247ed61fb7867b44c625f71b59becf19ade915e1a9e4461bef9bdb22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5922ec9d66bc92f927ae2da992f97290f
SHA131f709abbdec9130de1afa10af2e218ebb59df28
SHA256a7af838c3fe797d8083604a9f6daf2071406496624103e7ba5d9332ee68b02c4
SHA512c8ed3e6f0969e48da9b96b5215bd0e59466b9628277a86962b661dad1e1f1ac57f5338f7738fc47260c4a0da93506a43da3fdee2e4685a2a24616571d968327a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516aa7821228899fb1831b0bef1959c36
SHA1bc8d9f491a466634f16a5eab53d63a981bf78e7f
SHA256dc27e478b22b81b6d164d5acc1b1b7964d45cedb35ee2aca5a19e529222852ca
SHA51213587a777d0a234691f481197d1c3069a3c5bfface6b54aabd4265fb8b08169622cc6b28e0509a9933797cd32279a707969fd35bcd5529448b1161f929ddd936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504b4a5fe8e98254807042a83d60979ab
SHA133fadae3f85e05537d754ff19bb5da027a180169
SHA2568148aa19f3433483757dfa7c3067a7939307a9473bd63a0b400ae89d7dbfbde2
SHA512488b65e8abd52f51c9168a5e9fa739e087cbb3b456b21eac1f0538464399b837e3886dbb073566cb7784ac897b03fc74ab45284463424d1bac4819cf817addb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501724c210e82aa6e16a103c11d4d5774
SHA1ef777d9311d3da28c3832a4aca517fdae53bbe24
SHA256caa6d28360cc155eb9a57a9962b3daa7743f5fbe10006f86721c178fa6583605
SHA5129ae64661a10258b40da476b12ccae09d05f6ad0779aec25073cdab7bc1002d5e9d0f979bc47e3cfba1b813cf45057831009c9a5bcde29dd352f54fb1e1d07264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5262d4010b69bcf87a71feb7438d2822c
SHA18438154a299a1f27d0c8f8342c360bd82edfbd19
SHA25603ff82b463f96c35c4cb85e1c7d0b7dc722d36e7bf56313f983f7bcdd6790ded
SHA512d55eab8ac7ffd53e1d2438be0ddcae2202099ed70d129f8fb9e54bf0f3a39b85becc51e119c1323cd1769d4bf2b6215e5a3ce4536c323ed1367865d1c1456cec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da2bdeb2794e2506888c19c2b9615ae7
SHA1dedde34c5eb818749f646f276d5d06d4c6dbec63
SHA2563a51f1d77c0b0257d3d39a1f8e544e9ed8f27e096680f2d0822221cb2b239a09
SHA5128b0cf2f4c7dcbb91edb08c48db73585fda52aee3800930eb1f8afa9dade9331c1ecc16f445c82171c1716be263726941bc008d1a058ca6d896c807899f6737f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae85a0d4021f2bcb6a2f41f426306615
SHA1cc036e6b5ec88bba744b14940ef1f67c25f39092
SHA256582de88545cc9454557f00bd513130fb181366db7d7fdda711c47e308f92fc6a
SHA51284592fe87abb5e6763d92e3728a332890d5fa684cac283cfbacf22ddfde26c1a993cf80bafb29194227c4ce89b6d6549a2445ee25034098017c2fe21989393d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515d2e4ad492745501bcb8b0df677b72f
SHA1768eb851ee6585257aa639749152d542a8ec4aaf
SHA25639b3b8ebe9fab5ab8785dbaf622fbc9f27d038c85a1333f21cea1b648a37f53c
SHA512723635068b6d24e1f32a610c2f2d17507e850a62d852dd5070a2bb9fe2fc617d40b427c7753905d7c1500bd484b3ce4f4a65bedec49441d8dcf1ac8cbf355d00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c576b9dfc6a0b1730203ba3ca60acdb5
SHA1781f0f03bd1f437e6c645eedc6c3598be1252eba
SHA2563354d6986d1923a6ae6837fe852f2d698c2857a2f6ffa0cdbbafa927fa30b4c9
SHA5126463873daeeeafeab63566af5111d8d76eb2f6fffaaa9ce4b8037a848f6858e2c3427d9c136e8238e10622e00992d30432162551f4ce37e481abf941de68cc1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566571eb871c7f1bce4a3fee22e42eaef
SHA18a4dcf68d86b0dac717d59b54c1078761870c552
SHA256641b5c44a1525489859488c2adcb3b055be4d0d68d0cb2403551d5e0b637f3db
SHA51243281f1e241bdeb0ab50bfef069d5abaf5ffc6925e50b6a06010994d1125f24fb6a87b68f259413dd18c029fcd61e0b9844bfefe1dab21ddbe7cc28f43023d06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc96bd1d42314ee92c931b4dec73ae87
SHA1053c2c60c69bda77d45e6416f9639a1e297d80f1
SHA256ba5b42e8513bdc6098c9586ac77fd884845b21c237ed80564be6225092c630d5
SHA51252901631cd3013bd1f380ca72a6e825452171f0ee962268357046fddec62520d9e6c6842b0bcc0ad06c45d5ff93eac4db693b4b714cab7a1a036b0862e992f70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3d32335dda1c980a94ea06e8a76f0a0
SHA13a7c8facfdd475d48f3c90dc4cd769e24efa9f1c
SHA2565c5cbf3f649aa3dc4bb96d0d7a4a595848dfedef157e2e814bcf39346dcaebdf
SHA512bcade8b51e29d971f27b1de6e809a64c15971928485810d39ec03285df2e5632549917f4a9c4e240cc2e759d226f61764dfa38d122a532a4d6aa5495842a31dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d16748784bb883ca3f0fabbd19874793
SHA192e0fd39e8e1d53e939d5be26f3f2c20fb111d7f
SHA256bacc7ad5596b33571ac29faf02ce5e3936fc8e4a9449beb3ad59c8ce663f1b5c
SHA51229a8d84eaf5ecee897daa102e1961d3be2804ca05e1a8969e48bc6bcc3912bcf188be132806f0f1cf572f245f217fe0364c4ba86a644169478b016167a73b379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e6cb437460cd23fa2159da7895f796a
SHA12fa3335ca84e74c649c9a457191823152382f889
SHA2566be69eb4c63c2c48dbb47ec82a3a4a386c2a5eb0254c5593efff88d6e7f1db24
SHA512a162b07f9640bcd57afa79459e46772ee1b95e8337deccb9f4ec002af991f939a6f6bfb881c926f27387c6b8c60daa0f2a9ee0d81fc6f10ea4bea75f2107b507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7a471e9c5a842e4b98f3a1cf2962cd0
SHA1f0c5eade3a29887e00cc3c0371f992fae5f08450
SHA2562a961f637b6af7cffcc83264684aa602d1fbd78eb570ebe97a147340d58498ff
SHA51230f291e8d49e15cf6b27d353e1cee79fdf67ebbc4fdcd79a3ed46f67576c38ad6008feac9431869ea20667715a3ffad055d822282b8130786cf6c983d0b347e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551f29b6210d478c5b80dbdf1e199a296
SHA1d49569683228a12b418818c61e7128f1dff352a3
SHA2567638f8a15743ed6577fcb6cf5da9c6a605c162fbc1112ca013a07ed7a775f3ce
SHA5125650675fa424ebf906c2f57084798b276e8db4f16af31ce48dc2d07cb6f3d9a08ceb01daaaa8234ad91dd5c4d4e79107cbed84c4c600d9da20f42e293f5eb7eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e233e9a6e3206b59fd946b4a29526556
SHA1b276006231d0515963b89b5b09db8fd0aafbe897
SHA256278d4969f8985b9a158112589c9e88308acaead17917cb7e3354414ff7869daf
SHA512f996334112be3aa5f04b4d5b76b6167a1a8bcae3274aafedc311120f6932b916cca7b871d4f6186710f3479cf2cea84094876c24c898865d77fe78df0da4faca
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b