Analysis
-
max time kernel
68s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 04:50
Static task
static1
Behavioral task
behavioral1
Sample
ea9e243076bcbfd0dcff227362f14aa1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea9e243076bcbfd0dcff227362f14aa1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea9e243076bcbfd0dcff227362f14aa1_JaffaCakes118.html
-
Size
460KB
-
MD5
ea9e243076bcbfd0dcff227362f14aa1
-
SHA1
6358832a8e271cef4336c4b8f67110578d75a677
-
SHA256
4cdeea4c36fa0d6d5feea270ffb2d36a4748bc7732de4bbab8ae868e4f05706a
-
SHA512
ceefd7b2dc6027d840a6271af3e50d1a64560dd0ebc8fe2d0dd15314f356be8e31c05fb74a968ed788107c7b5abf534f1b54e0f63b01c3cc05b2b37ba3ee38ce
-
SSDEEP
6144:SEsMYod+X3oI+YSsMYod+X3oI+YV4JsMYod+X3oI+YLsMYod+X3oI+YQ:H5d+X3W5d+X37s5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432883288" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000094eacbe8d31a1ecc0533e974e1593ea9f4c9d95835fa01a12584df8d0dced9b5000000000e80000000020000200000006ff9f97cf827feb7afd32354f8e5163f71a673d6db1ba6e7e5f50097e4dace5620000000d3e5ac7c9a1a9caa11c6eb2eb3081a78cb9c68f13afbaa4f0235df793662880f400000001af8e727749cba000774e298d53ad7a3085740c1b5755be8dec7d2809a94897e29b41b3835c810441e41058ce22f9661d4c08ee022eaa6250244e677c1ad6bdf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AB9C40F1-7642-11EF-A6BB-F2DF7204BD4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0be88844f0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2168 iexplore.exe 2168 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2964 2168 iexplore.exe 29 PID 2168 wrote to memory of 2964 2168 iexplore.exe 29 PID 2168 wrote to memory of 2964 2168 iexplore.exe 29 PID 2168 wrote to memory of 2964 2168 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea9e243076bcbfd0dcff227362f14aa1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2168 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5976657526fee771882d1a3e931c64d05
SHA1ff2679d3f2ccf886ad4a4bfcefd28ee0ed453d01
SHA2564e968a7286d72466033752628de140aabd6d5f329ad601ea3c44bd46b2d53102
SHA51291bc4038ef0e7744937c25ea3ec0142eb2ade94f660c2171ffbb875f8deca377661bf5ab5ddbe0419de6db550606f7b4f88c9006458cbf499d2f5896678760bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a99958ae8d3486b12f7d8509ab053b2
SHA1a3e5c53ff5a611ffa3a773526fa4a501857a6dbb
SHA2562ece4bbba14d653d3b4d270b2d228a28f9f51a4b5e4d0854f21293bd01a80589
SHA512238b600751e982d727df36ea466d8c1f4c5e4b030622c2e310397c212428c1cc0e2e8d9a5a27c9c19d6e20ec24fc179646d2e8e4ecbc0243e8f4a49d0f142bae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ba4a6d79f80d4b5dbc4cefb8339a6bd
SHA179c51769e94c6272cc1ffe642c381b19b9b76d0a
SHA2563d32c7e6dd2a4c8be814342d707a2a2579753d4442bcd35370d4b72ab9b6927a
SHA51284c6b02d0ff78ec46b3e6c3e41a8eaf4d494a4a9d4cc29d2531e136d1e97257a62d0d62a91039ac43c2112cca5d4e1b5970dfd15887e380c62c2cb9b8ef43a5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500af7a19c361239dab9d1f02a33bef02
SHA1c616e2a04f7c5b1c4787370c5fb58b02522f73c2
SHA2561742f904f8f2695369ac5d9935199c3e1ab9cc59edf7f4331c41bbb66a73add8
SHA5123dfacfd4e13a960a9cb15e468a4addc7e39aff19c857e5ee533d1548ac13e9315f696e86bff5e4f015b2157f5372c803677dea5e352d1c33877fa8604b0efc9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfe9141878e9a7038badf16ce6e9c0c8
SHA1460e2fa8894e212657964191f9e2646f2113d1a6
SHA2569d155ff864ee3fb4d86e3ed1500471f547246d36274f52035d9745b01975d9bb
SHA5125fc00cfc7d457162568f1a741449e746b6fe62b16d467616af85e418d23c5122cbdc5802d758ea46874c05dc96172045990aef41fd8458e99606c771102db7d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597208c576ce04adf5442491ded8ecb3a
SHA12c4ef8826b79556e85a43c4a6f00bce8fde95d7d
SHA2564ef2af7032186874386207da140c1df0e62dcf4959198e6ba78b7b53a55e16e5
SHA5125cb09cf5d3c96d07d18689700719c513261568850997b865162b39a0df19010be40e1a9c64a53069eb28f61743787ba16ed21f64b3a8269444c5e40343f82b27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff8e3db2f2c96bd0a002ce9ac8357ce1
SHA1499cbd916b0f32b2aa00bb59c78938f280f33cb0
SHA25653381b5430457194f5affcff99f91d6f67a59842e66e745d573b98a70156ad3f
SHA512cac423c1f7874283a4e73397c2f85a7f98978795abd81b37b445ad2e622218e4c27bb1c97bb7b12b18bf8ab318b7fffac093407a334fc1d4003c2309edbd4b08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534c673c76f53c73fb6c0d4dc35ff7950
SHA196cbe1820db8c8c8f4fda48641829e33ff1b7094
SHA256446ee20a56147edb59073189f0894ae581117a333733535fff9f03593d3b964f
SHA512c0a95e796671f1a60fe08904ccfd49d80b138620328d856f4c6a650646e5e7f4dd37305d2fa1443ff715328b4c706b2a3fec6a2a42f4141206119477398b1359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b086c25dad7888b274ce1c88adead1a
SHA18a9563013143e39c27c7c8f701aafccd454f095e
SHA256386ed815d1b72f3ffb2637732fc19ede7999a5434391730fb6505233471d2c41
SHA5123cc21c294ad77850bee0503e5ad0ce82a899fa5ec515c036626fbb8abac264c191ff427e5ff06c4d0f89cae65c0fce6e375025e503bb3c6d195264d648a1306a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555fc635ce7d612ffcb70f386fc0c7321
SHA13db97e3cd687f887ee8d859bd3be80c60b4fdba6
SHA256a5a89894f61cc1627803c59f3999c83824942595640e81ab16514bbece0637a4
SHA512d68abf7b1e109f4c39ff67d8d5c4db20d4ec8385da4acdc67e73455d203310d11bc30e4102aa1cf45957685639bf1e185ddec2dc3f53ca45de5a71e5735ea956
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5118e1a0cb7a79b00ad081da01b101a04
SHA1298aafd51505679bce7a5e5f408fbe69f7017f9d
SHA2563cb02364455a21360a6be48d23d3dd686babaecb6b9e6e2cb4b44e2820f6228f
SHA5124204da969cf40ff4866dad0bc5e2c508ee30965327f0f2fe44975d57b8a2fb57395944569a53468cf37c62113f3260c0c24e0ab86627ca9efe40bee350a35ac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a87f70a3e29f24a740a463120bad6c0d
SHA1458e64d00b822e9f6ad593bb69380adc1853454c
SHA256cbff76ab58b839ee28200273ccba7847db0b7de820b304dedcd090a5e140c7d1
SHA5122cd03d5fe75c67cb412fe1639c8e5de2d11fda7e3c30fabe998e1fec22d16196ae3aa715d78af8e559e2078c699fbc7b506e04617fcc8f8c7ad0d8c904cb37ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be980565811a90090d10702eff7ca85b
SHA1b82deec9793e1ebf96c5030d6435ffadfffbcde6
SHA25612e5da50ff25bbf33b9cffe2b8c5e69ac0e1b12d1aec36e3863612f270643d67
SHA512f2b9aeb516d5221f7cc11da339b558323e73f196213a00769bb441271518cf270e04001560bd3fc79ffb04a1bd2d69e17f40a7013dcb2228760290b1e1ce46f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acf03ff459fc5ab84fe8a6cf7fba5241
SHA11e14de2b295722a4e1002691f916ef9c139959f2
SHA256ea846edbf61eb0ca5a38645bd67064c1e061a8928b6a7840fb1f7d592a2c9a8d
SHA512df4d5300e737902ba06eb71c3d09863408414c262a4bca8652ef6481c7a5ef5935719553b7407e4f6b078065efa2e3ab7ceb71a849afde3f4d3cbb3d5f5dd5f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535d355624e76b4d2b40b65edd3152d10
SHA1d7813ca71c3e462ccf18eb59b4f64e74a62ffa8c
SHA25648c26b4affc609194e7dfe5a84b8e90c31b426806c61024370e8fb433b7fe4f1
SHA5120cc053611ef54a9e8ac1449efe3f2f49a593ea744cc0a0c05f8cf169f6677fc634338055946d7c9a86bc69f55c1a98707dcc8ae28e6ca01d58bc9474546db2ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559f0dca111a58f3b88fbd40f02da56c7
SHA165ad4a5802775786c3586e78b0932847a46642fa
SHA256ebaf1201869900df6b2cafd123589b108c97cb589ce51ec86ea937f2fa87dfa7
SHA5120a0eea5e21fd5f6ba1931bbccab0be7e2acaabdaf868857a97c5fe5521451039b86452b9b51b6d4c72b76106ca214153d57d9b6bc1718ecf7f484573152ce483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593be048354fff004ce3f545485ee70b7
SHA109d956e791d4091a4a6c2403fce514b22db6530b
SHA2564ff9dc6ab6cce4564ba49fda5e4b7b715fc146162196451c4a3a8a911adcebb5
SHA5127b04b2e9cbfe5b71fbc46c118aed3ec1ba3c30ae33e346e28fb8b5c8ad9822b6e970da687aa0e2e5465664972075b0bd553956a9cb773e1ce08f51e676dffa89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a8b9bb4dec95edc3cfc0c9f7e1a8cfd
SHA16235c1d30867b243402710700973706511edb3b1
SHA2562b50932403976678a29c8f2201fea6792eae0f07c250082cb4f3eea62051f632
SHA512545a4015a7747ab5fce2729f13257de3d220e7c40a9420729dbe6a23da3f19cd67ec581c690fa6787b4c827fc7a86a5826355799cfcf6c046ea37e21858f48d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3125c1a29c9176068a0ad7565662613
SHA12943bd4f57784164fa342953ff53faecbec332b4
SHA256a84f8643a9f755efbe4aef8cae98ec21a22889dac4c565d8c87b25f4bab7339e
SHA512a96b034e3fbd92cb4a3c6a0eb31426c57c069d014096b2c13e763fbd97bb083e1798a95b579fd868c6034256081ff08ee06ef38678fc3e77bce6c8da0db7910e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55de9de9fa44c07572bc157467ea415a5
SHA181d545c0c631119770025737ba6f0368ec889460
SHA256a8b4a6a90616e430212452fa68fafa24acaa27f4e0c54bf4c3172c612b8c7535
SHA512d55261b5fa0fcddc36c90687d629aa8ef2889fd24f3da649d723e7c03b16e0e574614cf872f7379138e082603aec7fe4b3c7caad0980302ac0f7b1e7fd61fdd8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b