Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:42
Static task
static1
Behavioral task
behavioral1
Sample
ea9b3969a9d2f2f6148e53ac0b154c60_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea9b3969a9d2f2f6148e53ac0b154c60_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea9b3969a9d2f2f6148e53ac0b154c60_JaffaCakes118.html
-
Size
25KB
-
MD5
ea9b3969a9d2f2f6148e53ac0b154c60
-
SHA1
3de566aa977bbb262fc999a094c94b66b56ae2ce
-
SHA256
88ee659b80fdc4fe9f34b5f13681f98287f7911350145ab8714a62ff2c81bc65
-
SHA512
aa6bdcd61e04f53a0268b23778edb25f9eaf468f18852a63efe22129719e1e6a89062e1dac2de1f02833136e37a507a653a7ca76ecad349a3c4d3768df19cb79
-
SSDEEP
192:Ng9o/Bl2b5nSnQjLntQ/6nQieknonQOkrntsDnQTbnonQRMCLAwpdE/8wuXMwnF/:+9oD2Q/Lwt1n
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432882804" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20ad6f604e0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8B256BE1-7641-11EF-92B3-F2BBDB1F0DCB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000e9b94791685ed3f6fc0197433debeb098264eb596d77a65f3c62aa1776cf7ec8000000000e8000000002000020000000969f50501db51fec631a30090e83e865794ce5d0390a26c9d861289efdbfd1af20000000b87210106f1767bc376149449ed05fc2b8b40f41584058beec5b445e1baaca39400000007eb1788c70dbfa27d1263d0d15e49a8249edfcd7d6cbac327c8151bdda419e56e9d025993e74405ab3266dbf5f42bc8c353a1afeaa7d17c32b0a4d6df7cdfe74 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2248 iexplore.exe 2248 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2852 2248 iexplore.exe 30 PID 2248 wrote to memory of 2852 2248 iexplore.exe 30 PID 2248 wrote to memory of 2852 2248 iexplore.exe 30 PID 2248 wrote to memory of 2852 2248 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea9b3969a9d2f2f6148e53ac0b154c60_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53634d8da07be32fb7e4fd9be42727131
SHA1c103e226c175a3b1bfcabaf722457a58cfb08d29
SHA2562600368245808623f667d72e112107115e0fef898bd78650acee565d110f2dbc
SHA512992c3f24ff395448c6e4017032fee8ce9c627c69d9cfc17278de88905cbc14d041b847d47cd7a86d4848330ffcaf849477dc1d8b16660b061bd17858b8f83dc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d844d5342f90a6e01cd075089f2aeef0
SHA135647b1a236152e89ead377e47da232669db9c1d
SHA256d8b2148517b39a43f390f474396cb91ee1498c1eb4c77b1469a7d0856bb65ca2
SHA512020d9120a93d6f023105dbc147ff36c2fd0a7189c16e84e708a2768d105829ae3ce5c5270229104ea00f1e7c5cbc02c5902e58da991b377765e79fad4be34843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac6409b0eb18aebbad338b19a348ccce
SHA1401d87b9ccce3316cd0e451a8e5ac8e01e42c7a7
SHA25612f191912671f8403c29e2f613c006c1acb03bfb3adc696f5118927794b893bc
SHA512253add213bbd3c68a81dbd6ec670424774e98ffd5ffb9d9509bee418f9e31f0de18ae69554b7ce32f723a0e2273696f1a959cc358db34c68c9d88852aa159ea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aaf8269532da8e1c2a8558838faec9d
SHA1fdd77a0d6797dafb2997a4811a3221bdf77de96b
SHA256c847602afbac0a7bf47fc635274cae8ca0ee10b35f6a662a086672846b7c90b3
SHA512fc9bb2e332bacf4e1aca63b8b584d82f152cc22678f0908a6187029846c13faf88c526346282a068dbb5d4fc2def815a68bc061e1641793af65fe180165d2509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53200f9403bc6669ca8c5770257953de2
SHA1931e17a02f609f50644f65c116bf5e0cc8b4c862
SHA256593699f429844ee6b97d7c6cbe6aaa6feb8ec2e9495e212a03f6575c7d8ad0fc
SHA5124416cc74f5c42d0595d745176c6bd2861011091aa00c77d7a0cfc3af3561e8e0d589c5eff406c33827f840e2e5211ce34b0a537cb68f3ea4b74387e3a115b7e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a22b431bff6066ca4eed8ea535f428a6
SHA104d38864a4985f2e4c977c693c50973e4ca507b8
SHA2566fc76acc5cee2e629ac8354a542c1f9f60b9283943099842f3cee5139396d450
SHA51220c796de55541a2e9483789ee92c27bc585e4d9798488c292208ed66b0ec364ad14ea16139a153a588fa32ce9a685570bd255c162455c31d5236bf37656ccb47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cb379d6bb631d0d44a4974099e072e0
SHA15efcb52266ca61ec0a5757a0a6886678f4e936fb
SHA25612d9e43699fc0f9bfbfbb73231557ccff66b71a9f14af509649354f27fd7edbd
SHA512d332b2fe9fda8ac5ec0ad5ac094bd49e16dd5aca8f0805aa0aa119195a3a0fc1d14a5e04cd404fe9070efcfa6a0b74707ebd1996a7c7ae405f78a5379df13572
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5720a9e2896807da8fc3aa232641775da
SHA17908f98d8f8af6847639f45b4db2acbfa919d671
SHA2569d61b1c0e7f09053fe61c6cdccea6dbd8ad78dd5a6bf94827b5054d0bd245c2f
SHA512c3f595d34b11c378e32ed0469d6a2a3b3e18368eb3f82bb698c73b8ec2dab2e00436e40a0492a2a824545db239c1e0a36b3b9f3ce2412a86641889953b14b6a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9ca8ddede22e80bfc63d84b03abf5a7
SHA1d7a9b1ac03d99e1294c8bb29f958cb7072bfd295
SHA2566fe57137d55dd0bfba30582bfe76f6558d93ceb20db649cd2d813bda796dfc74
SHA512ddc1ca21d97b4f8030dc6cf8172dd48898edada0cfd0795dd16071fc5235cc82f563dc1f05415df2d95366b3772ebd2a03a84cedd4bed5b2f9dd49a0498e210d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d47f82bd1e1537add11fb687bd8bb6f4
SHA1d595783da0e05a404490842cbac7a1fabb14238d
SHA256f815008f6db45064b20d0ca652ac8bc8806405dc4c32052a554b1535eca4d1a7
SHA512f32ef71f22e561fd1527cbcbe75ea963458fccf10f6412cbb950a4d9e2e76eef59a0ba936ca52047ecd68d6030bf19702545155bdbb24376f48d63b8dd157e58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc731262f44832f17d7c5719404ba34f
SHA12c46153dc04e18b0c75d45fc84ee587215a4ae9d
SHA25637ed90fdbf17971221b3a5be0cfe386d9ead618b9e3a2b85dc6133b12513f9df
SHA512a45662bd14d74f1b8ad40685e3de4d83e423d853ca85ebc62400110079cb7a1863e6260f151f3ea1448df8bfb33ae7df1e3a7c035487cb0ed7b7b5953b7a7e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afb80e7d2ed2ded6dda497b83f8974e5
SHA1fcf4d3f3ada8e14c04127a114fdd73d4fa722b74
SHA2561907c228af88c90c4b107907d12cd7dee41035d5c22dfb0f604bada7fc5ffea5
SHA512367e18f8c0de13d0f4018c3338f2699b49f9f2bafd6438baf5e309799a04bee0da669180d3d8720bcd00fbd3dc1d00d583e5c911b3c6f7a5ce289e0ed65f60b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecfb52b0ff0dcf46bd57ab39a79e1b9b
SHA1722ae8f24533891408daacc897f87299726522da
SHA256bb2e4a37b0a193b298cefc82f6d1906f55c0dc4b5aa9a60fe248dd55244d84b1
SHA51253df24b83ddc85a02d3db6a0ba058598f103983ddbb34d50c4b1498493cb75c692a5cd9dd41185d42a0568586738f05d4b6add2635818a7787ad0483b7ca09bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e2a4cb0e38908e77c1aa532e4cba8d0
SHA1abb39bdedd8554147210c33d4e9dda8abbfbb805
SHA256dfc8fba831bbe812fcc3a5ebb8cbe7ec9336e699d39709c618b3b1baae043cd2
SHA512e9d251af607e2279ddc48a522abfcc8e9a6c62e9210c2406fd2101ec384b84d1de1da392051376db1d4015058a0b2106b695cca58cdd4fb48c287cf17d887593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5724f097286625ed10888e8c83e2895d2
SHA105ad6dd1b4e951a48cca02455596aeb59512f100
SHA2563e91eda142039bfc6d4ddacc205069fe042295904dc2da988b851cfa5c78c6c0
SHA5125e6ceeeb8f644bf20f37021ee3d81477f60382fe67392e335ed5c53bc4aaaf893b87120a119b6cbe2ab7081f1d093f94724fa3adb2998463367a54bc088fa16f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe1d03d99f7862088bf47760c393702d
SHA125242d15ff867f21fbee30bfe7fc6f06f17f11d1
SHA256616e3888c8317690fbccbe480b8a8d5abe4c246cf5039fce01ccfbd27e989c0f
SHA512b06a25addc635fdd400ca48648b0dd97bf575aa509dbda76b7a97bf135af7e28c0631aa6cd32d5d6131e25eb45b9a5ed5f8fcf0281acb5ac93b9f9dc94f99014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c071aeff43fbc080ab14a57e4c71ee5f
SHA13a1d0b8b85729caa4f232c82bce2775d4a5716d6
SHA256154f130012cc3d5bb48d43d3c0e1bbbf482685b711237a97c2a6790b973269c3
SHA512f60729449d491410b10a0a626f1d652682ded8ad643f46cc74371074eaf732e21688a44904ca7c95cfdf2212fc17effe31b7d4fa1110c174801fa62ea1ea5623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f7e2eb0831384a7a57c8e5cc376b545
SHA18d4eba0cc81aac13193d279077cbe836a483af7c
SHA256923512e8026041d03811af7edf894bb0349cbe3c8f84080865e9f76306953ce9
SHA512805c2feee595299d81c6dc6a602d85a8d197614f052b812c939de2663bb494b5125ff4da390ec9cc6802f142d2845b556c302c0ba34ea6339dc6e1419fec4d06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581c9d897589d7a788aacfd737c7da4b4
SHA1fb65c4bcea723c100c5214a74e82b9f60a055158
SHA256a464767341084ce1f6e862d21e48d80507b7252eda9be8fb7763dcb100e24dc6
SHA512b102abcb269bc7e52b4f7e52f557d10270572465e2b6c064a1c17017feb7556f0e916701e130d4fd0cc406db883fe7e4049e0af405d1d0f51f970b993c9c1e22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d62adc57bae52ee23462f7b419feeffd
SHA113f78b7c9cd82a41f3bdac4e6eb445c7c4dfa70a
SHA256f9581422b292f3ab1745220a0dc890f6e03aa2b83da83e94f02ad9c267300e23
SHA5126e722ad6209b3cf773d17b012a19c5ace4efa669c268ff8288881502d640af68d468b1923f625f7f828dff48ab8850cb7328baaebf3de5b7f160ba96ecaed569
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b