Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 12:58
Static task
static1
Behavioral task
behavioral1
Sample
f6107cb521bd6b268284d89718e3b20a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6107cb521bd6b268284d89718e3b20a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f6107cb521bd6b268284d89718e3b20a_JaffaCakes118.html
-
Size
53KB
-
MD5
f6107cb521bd6b268284d89718e3b20a
-
SHA1
e99cb63b72d6c85abd57baaa2c67470d45647cc0
-
SHA256
1466ff724168e4adda442c23b63b25641334bb3e8e138f104c7ca4a26540be72
-
SHA512
631acc4349420262ecdd2917e7dcc06ce882583cf5f101fecc3f9f28213cefeb0a9633071cc3b48f75ecdd8b85fe6668cac7b564f0682c70fa486cf729a9e482
-
SSDEEP
1536:CkgUiIakTqGivi+PyUgrunlYV63Nj+q5VyvR0w2AzTICbbJo+/t9M/dNwIUEDmDB:CkgUiIakTqGivi+PyUgrunlYV63Nj+qq
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000f847fa9835706f85522a577886f253f31ab8625d854108a08a6ee1a0a413136d000000000e8000000002000020000000a423cb3581e85e946f130582086d00e16f0c0127c0f77ed16efc7e9f37df9cf320000000d3238f016ab2d1eb17940d8fdd9e201662b6b9bcf00a192707058c51673bfd5c4000000084bee47975d856bd93f46f1908afabcd091028d86e763badc50d41c3b3566b81543b8975dff9806c2dd74d9b4ed1049faaa70b3d99260bbe734bc2171cc7082a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0b689bc4a0fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433430979" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DE360371-7B3D-11EF-A073-FA59FB4FA467} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3044 iexplore.exe 3044 iexplore.exe 356 IEXPLORE.EXE 356 IEXPLORE.EXE 356 IEXPLORE.EXE 356 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 356 3044 iexplore.exe 30 PID 3044 wrote to memory of 356 3044 iexplore.exe 30 PID 3044 wrote to memory of 356 3044 iexplore.exe 30 PID 3044 wrote to memory of 356 3044 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f6107cb521bd6b268284d89718e3b20a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5947fd46498a149e715a1efe67559719e
SHA1527c5400d15fed948fd6e889345e6fd0584c6569
SHA2569da45262d126eba0111a6bd68cc98df661c33abb07dc9845df8ffb5331c2bee8
SHA51264e5813e44638b1efcd248c7f134303dacf09b9b13662dd6c6dfde058dd9c551ac20bdd011e0a24be5353d0ca91fb5cd7e87a80b0f28e6fa6eefe043cf268e91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ddf4931c5a01726f6a71c10c95b0dc6
SHA1fc4584841c0d669dea5c8ec190d066615592bc73
SHA25668794b75c0275be98be8410c83b38a04b2f7a2f723a67d78e3806469651a45f7
SHA512509b8b7686088b823b823450b84389a34e7914e451de7694ba2e23062a0909bda6fedc833131440eec329895b257a119b968dfc3aa40b2c786422c1ed7823af9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589983b010b45f731405d4e1528467dc8
SHA1690b99c5b82c58868655525b94bc84197ef7dadb
SHA2564cc5eb981d8b39f5799da7ad1cb2fde69a91b4c38544576578a5e07b4ee7da91
SHA5125e989aae49394925a75b88e92b4a3411aa748a9099791e5fbc91b21f1391fa1a5e18df8f259a7fd9787cf28be2ec233d35833feb5f1ae45e527ef6781bdf3985
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca40c358497ac5286e44859302096dbe
SHA10141c7663775d44a7e17c0049f408cddd7db0f8f
SHA2563d22d9dd5ee19c9997d9925d9272442c15b0e31fdb42e396052e57d72ab2348c
SHA51223dd9dce1d38f8f45000b8cb8155a8041acb0f9572b5f8d1c70c17132775d992d9bf213691ba81f108e539fc4d27dab2a189ed1dc547fd30949b955b62404736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559d780eaf47f87fbfd999993d6b74230
SHA1cde3ad4f524b18bc32916fa0ee522061fdf58117
SHA25652d037ba861cd130e5e242e1fb93e7fec3d099099730df2b9741dc647d2cd2ce
SHA5125eb8b96e076a90018586f4ffee8df5479b2b5c8b4eae93271fefe4c264d3ae8d0e772d816d9112fc173f820a6482c8e6c14105997a284ec7c79d96652268bcc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eae0eb546294a4b599067d06de754114
SHA1d982e9c063b741c7666abef3e025f8afa60d60dc
SHA25696c0eaa7c0fadf6e366c915019bd96f8709a5b6eab610926f39bf4a3edaa8525
SHA512db95132de1e35a2e692a495582380bd8aa38d596519ce3699f1ac04d7632e968b67bca080e80cfc992d7bb9b1913ffd9fbf3512468d5d55c966cf2813fa85d77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5effa83b290cf9780cedca9cdab910b2b
SHA1e7ac0985418d86b8f3a2dc327d218c61570a554c
SHA256044f26a1057babc79913a947fb7252b43f48614c9bbfea1ce67fc95e2203408f
SHA51291bbae2adf4435b38342d3991e1827bd1e7259340fa53ce2705c4732709e9581567f872a1422c0a3edaebeba0696c6a607e3810063cf6fef48e9c7c1693ddbd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eca98be9b1de0a9be28c8fd502399fac
SHA15d470a638796747852c521b403db6630f168eab9
SHA2565289876a4d30826391ec7c454029cdbb1664b2a9a67a20b11beaccd9afe886ff
SHA5122a450e349c1daf1baf044ececd64a5d87b38f98868be40e9dbb48b80537a316275631d09d13d3189629e0d57b3d69769af708693fbaeb98e28b8629331662a20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac17430f44a76399378159478345fcaf
SHA17af614b045e97db023e9a74ae5b2cc3ee160ca66
SHA25636fcf5d47a3116174e67f558ad23a43f324703fe3907aea52530f51ac04b0dce
SHA5122374a054b53c9f3c8cbb88a79f8933fbf3333b91eb08cf1935ff63dd8be99889fa861a2e96fb5eaf78d3d4149a77dc7bf43df5fec1de2239625469e8812db615
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8fce21d24b03a67e4535510045fc973
SHA14fbee3904ae1090f0b69b6f85601644e5394b7ad
SHA2569b0e5e67f71c7e86256b29bd2f006336437fb936c119e46d90373a056f622e04
SHA51245750540cbfa7543ddacfe796bc661f0dbc11f545d2cabfeec391a7cf98665204b3d48ba1492c2631c5a8256f18689160e89257d66ee1e865eeece2afbc6d699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c259d85115b622e59f407e3714932829
SHA1d2b4fe3afee10d48449759b7581cfb4513599e01
SHA25614066217560407db6e691628b1fe0461c49aab927a42dccde8a0b79a61a9b8a7
SHA512a1aff0d8d947127f42c214e19f6a7dc48e0ea81bcc87cb999943f7716b8bacc5bd42ced5a846c0cd32a8db59d2fbf12e5fc513345e87e3732b97579f2bbff05f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea395bf6b66d33d7409cb2cf2c247c50
SHA1b4c684c1f45990ad7f03d12d3ed453d0f5534409
SHA2562e9176a11c3df409f190e8e895cbe27254116780aea899801cb03a3335bc3ab3
SHA51294dedb7d92cc7095af48b2abcb76b883dafd0ef1f07be606c7a14e12b8baf249c3fb713a26a071c892d4297ef7d3c4e2fb0147f6cb4b61f2402fbba7677b09b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50871327da8d657fede88e328a7bb8a3b
SHA1a3a46f91b412eb1ac4633bd912d0e97f7f77a310
SHA256c2d560da1e94cbd6dec01ccc7b2945ef86ee781879fafcbd6fde3dc06fe00621
SHA5126d77ee15a6f50cd02577ee9cde0a94addb6ef0f5b28dc88c1b5cdb31420f7243de59dd4b9b92bb3b9dcb597ccd864a28d6a273d69269cc2183a855db5dcfb2aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6d18543e1def5d5170903f3f557faef
SHA1719994e9692fd40b4d042bea78f2eaba28fedc4b
SHA2567857d7dd692d44ec28bc1661dca1ecca714e8c0efa0c8ecb87a662c7462cd5ca
SHA51266e707911d62b72bc4fcc82b5647fc8a79b2050367fc87ce3c004afa08c3513263e9a95f42ac6fd9ed13f7b11fbc4bc1269bb6417fbe58d58ea1434bf3f76900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bafcf98ac6e1a8589b9f33992283ef9
SHA14e4cb0f2fb95d7f8966ad95353605664f3b46607
SHA256120a7c80e3112c8145aca722e3e952e4e83be2b9391b8372a78f18e3e46fb9e4
SHA512e34242b3bf77bc10a80002b47f30241eb63dde19d2203811146f9d512286e3a03743f4a37134e239097e8da7b6d8d633da78ec47d2b0b6442ec98c3e984ad349
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d2daad84cd4a626a89c27a3fce575fa
SHA1f37ff21a82dcfd39fdcac435b8543cbd54a96eb1
SHA256c6163b6d4a41248a9848bde9da87e7a3c1e1db7b7aac5fc22a033c6da18357a8
SHA51269f8185e82af1d7d32628fb219d132c15d399871ef999ac41490cc5b38b2632fecf843cef3f77278e2cd149ea318c65e715b25e2e1d6f487f35431fe846346ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507884a5103eaa173aba14b968f0f0bfe
SHA1293a06d2fcbfd492a2def57f0138bb22557946ae
SHA25675effd2566c2f88959ca1880a8368edb4e9492c7823b05f21c47e071fc8a6b6d
SHA512fc04d7c0f85b7be653b17fbec9778c6277d3f79dddb397200eaf16582405cb4f2314f7a65bb5651218ff6b69ef5f6d513a2343ce98c3ed8438bd36a8873632ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57509e3ae6ff05e25a02da478f545bccc
SHA1890c8d53e3950e4ebc207b9f892d1cccde39084e
SHA256351c2eb1a9b59e2f039c55d4216ac2d11d8819717bd837d36beae2f49617b733
SHA5128e0b7307c898397a0dd893ab041cf9d35f1d80b5255b14e51b1489def2936324ac45daa7653700eccd82ac3dabc82ee48a8be9df31481f72f2d07b9528d1dea8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f03f31218914857ea14bc3e7e59923f
SHA1904b3c1cbbd65342a369de4d84a8b1b8d0cd4620
SHA2561c2e2a0f25fdff19d1cf1c6a6c691a09cc92157f4bdc9b1ce0fea6d83d627aea
SHA51247b7dbebef0915e539703cbed877ff2cc3fe1dbc8f2ae0ca6be76c63f21e4d06d1959cc56a1f8f0a6549b2cfcf2488836d74804b70a8d1dcef31767814c60cac
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b