Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/01/2025, 09:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e291b37a7fedf42d0afebf844b966789.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e291b37a7fedf42d0afebf844b966789.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e291b37a7fedf42d0afebf844b966789.html
-
Size
53KB
-
MD5
e291b37a7fedf42d0afebf844b966789
-
SHA1
66c50dd2a92a7978bb0cb732db5a19cd9c74cf5c
-
SHA256
4c73f5e1d115c968fa915d0d0ea6d30f6aa553599502955a69011d22f6d2f27e
-
SHA512
1e67ac87a6086d947ec64039d23338a6e9beb64d6e7e40d3a8340ee4fb35fb3a87517de458afec1def6af9c009c15f9392f319bb4ef93f86dc84d0f008fd4b0c
-
SSDEEP
1536:CkgUiIakTqGivi+PyUXrunlYH63Nj+q5VyvR0w2AzTICbb7os/t9M/dNwIUTDmD5:CkgUiIakTqGivi+PyUXrunlYH63Nj+qv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b2fa18b2bdee694f9c867e27eae1a82300000000020000000000106600000001000020000000193aba0122bb7613387cd25b05b4438b3d206be36e544ad3a8a4efc2ecc35e57000000000e80000000020000200000004395d80a719daeca840428dadfe004051d2eb8e60eea54842a231e0aaa198d5b20000000d82aa4ec15a05350aa38b1e4e03d0cbf9879a90e82edc2a8f60843fa391cbc9340000000572f5453f535cf3f729b2c5a4de3889bd257580ee45ad4eb1ff287f0d039dc5026837f903ba536ff7c4206784fb98e95223dc6bb13b13bf49b426cf8a3b4d271 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3096a2381b6bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{61458251-D70E-11EF-9EA5-F2BBDB1F0DCB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443526091" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2016 2364 iexplore.exe 30 PID 2364 wrote to memory of 2016 2364 iexplore.exe 30 PID 2364 wrote to memory of 2016 2364 iexplore.exe 30 PID 2364 wrote to memory of 2016 2364 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e291b37a7fedf42d0afebf844b966789.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5286a8eb8ae16f2cc7594d6a9ccca2419
SHA1a42a75c8edf80a5abb322281af34fd3d891c2396
SHA2566509a52bf7245c364c51381279692019aa3cee1dc9ee4a90614a8e8d4ca45530
SHA51263cf122108f0ad4da73ac9cba079c2ade0a807d69b762a7922dceaf9193a94abd20c559006c8c0d82b3979cbc70c64f2b1a23c7ce4721838e47b0500979e6313
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f46104d5b4ab598d1af729f6fd2375c4
SHA1aa8ad237b9a7e19b2835d08016ef578f0fb6494a
SHA256eaf66a01acee00969d542480a4ef7d628df7b912235345592e8267397269024c
SHA5127ab26869bec59579d54a63bf2710df39a9234a8f190ae92beea97f8ca510f6bdff8a137a9f2a700d8e10b1a47dd5eda3555d6f4a7824a6c217795d0427ead10f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b57f62472ed5d59da682a26eb305ced2
SHA125b3f6d57ac29067da9d2454e992ca96ad78c6d0
SHA25657e7849a39d907aabae3ddd9089d96eb0effcff39e29290389b3d3a95eaf8bed
SHA5129c74cde12453d92a17a3eaf40aa70e3f88fb4fa9cdda28f81efc32d6aed60cbadbcbb8ba9aff254a2c796bddec4a94fd9d1657c0a5409a1509e201ceccebae9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572e4f0bbfe172d6fe9827b14bf1a8c61
SHA15ac95429aad61877d87ad79863b06e86fe9a298e
SHA25684a653d185d676dbb2dd43b2b05b876e31d588af26fd89d6ba54effeb44541cc
SHA512be94d6d15001584e754394fe619f6a42642601b9c1e70e7a5d6bb143b304d9cc9fdb97da1bec34b3cde5d0758e3437932cb65ef86934419206976158463eba2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0c191e1c243be48fb8d083655711194
SHA17333fd96e93d970b1e2e8ae8c4fbec42d6525499
SHA256b61c43030e6bf20f700813abc44356809d72bc053299f3486822f915a80f56f2
SHA5129dbf20cbf7e4f39f65dcd274521fe662476d494f33b1d6b94569deafb6795174f3af03b40469d5919d3ef0581b9dd813dcdf1ca3f1502f4e261923dfcdf41573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53874b9bc0d879c9d9cfb9cf72c4823c6
SHA10a3fad4cf2721742ae0f05c3e1ef898fe157f2d9
SHA25603b0626fe5a758a5c64ac873f6b790edd3aa2a1e4e5bccbee37542bb14057f3b
SHA5121c07adc02e17849c81e9ca8cc1a605e449c5504af06690780e4667c9dec295f436f326ee18d7550d33c9c0e3fb27e39328f4b904a6b09ac1b8149da0ab63d37d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cf114487cbdf9538735b1902f802220
SHA150673014963536e908d2870f371ac416d2975e53
SHA256dd25f63bbfe466ecb46858b76ac26f9ddcc1e6a6646ba40b674eeaac32b1d9b0
SHA5127a23390f91af9b409e3f74c5a1abe4236437e1599dfd3b33f0d306eb8e1cc4bb0099114196d6858c8fcf7bbaad3ee9a9d1214809d9f88b8c6c20a38e37a06bbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea44e6945c3960f69416b43845d3199a
SHA1175de9418e38801ff63a5800380991d23b4241b8
SHA256f92660851cbf40f8a26dfcc01d5eece98230fb21c164d7395dfea806d7a5735e
SHA51296f85552868e3c899fdcad3b36c930d6e3f276a31b13f2dfe39e69c60a630005d4e049327ae83521be962a8b679b82457f5e19662a9435eb717b1ea274c9feed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5569d0c693c22eadcc7e00652c655c813
SHA11591b69c2d529f4b8b35d462d9421d0ba986e123
SHA2568e14edaf5ed4fb6831ff246634ead99e59e07c3cd642ff5c33c5adcec8b125f2
SHA51252a87fdedd62082ee0dc63318bf9c3bfe11c0d4c95d4c4cfda93e141d0a9f489c9f8620e657aa0307208aa6599f028e237764cdddce083c7a338aff9d39f84f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554a8773ba19797b721041eb0867db19c
SHA19fd31bc86a7175b262b7d74db259b53e7aa3f1ba
SHA2562b103e26281647ce740109b92d3a2eae88ed2e71b95d21b6812170ea290dd731
SHA5123bfa7bf7718eace777179962a9a0024cff4cf7e35289aa743ebac249ba31d58055ea0941695ea50c2a47596af7f85293fa058840102a8314c45d63a939361ef6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580f2f031cc71dc11ba1ad60c54af5cdc
SHA142579f5354fa0e625c68cad185dedf34ad60fd49
SHA256348e11130bc10d324d2143dff7b6b68f315f43d1ba9ba833898458a50a530b97
SHA512b3700e30331407163f093e91ef2448cc6b107fe2a983bbef2a6c7b08eab0e174fd692a8787bc54bffea4723ed874f1a3521abe8eef2009d9c8115b1553ef2db5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfa61ec680902a4049aad9d502cf6adf
SHA1a88ad77fedce2b782ac65f1b0d9f302f8ad6aeba
SHA2569d1988b804a59e9490f511314b55e7eadba39f5fa8fa0c4b039ae03c69c05cc9
SHA51240e6df21e4bf64c6684b754d2e9279aaa3c576a212e1f3ef8351412e5f2625f3499ac4acb0547705a0b14fafc8e99e885fe7291e5ad66f464ce218c86491e941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af5bc169e6b56fa1f36e5735e87f629f
SHA1acfc3ad7f304ab6e62a02a298a6139c893e15233
SHA256c30dcafe6e212ad50c5833b2342695d6dd306753dabb6b41857b4c955aadc092
SHA51224aac34ee97be6a714ecb79f5b331980b14e9f03dbb18288c920a6ce4ec9648bd05cf652e20cdec7bf13921b2820f25041d1d608eab794f13dded8050da91a95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7d5d817ec5d57522317c91d45376e63
SHA11245bf240539116d3fe0cf70fbb260217f6ec3ca
SHA256d6015b2fabf16c3c501e5827d3ecb6fbe335a1f65e90bff7b9e2887e12ef1f21
SHA51255fa5876ef5309c6a63c5a239b4d960ba34e60b4515f700714f66722056bb1d12161e5e993116bf060d9b331e4d48438747960bdfa0b7ca46eab3636c968a785
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e8579d0a9244f6a284e0aa6dce6befc
SHA1224be7bb82c407537a4b10bc8ef982fae6171e16
SHA2569616950be4d2332a358ad008700fa5390ac651717410c10ea3762d4a596fb472
SHA512f83fdca2684f9e60345d0cae12485f59dba14328941e330924b7b1976b534e6e778e7aed3a89d6d5f5da9d24436d1dbf2eb4744197a232b377070781e300cf82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fd8af1fe24d5d6a0165d5077d97e1cb
SHA1c72847b4d2cd1bdc7a8b1d1d27fa0db8d80679b1
SHA2569eb13d1ece3b5bb9d64a7e0d1f2312d7fde82c3a9c81cb6ee03c7ce47888ecdf
SHA51269d5c24f56271aaa728b2f86049d1bcbac798d2bc3ccce60a26cc7c95e97b49b2ce747b21a76c89649df7b0f20405b555140c4e818cf5a901bac20ac737fa363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535926fd4563af7140be9aeeea71d0a1f
SHA190e2b18bea7c78f3d8b85795e0c125b9e5d86e30
SHA2563490486967c090bd012b030c514f99905c7fd4b950c87037410e41e80f7b8c33
SHA512cd101786640a93dcac8ecccd881ead1ad461d3754e7a1fb6d9d3f2cb8674187e72c45a114f22421675e7d4d372c62e06671b5479f72003abb36f83e73cfe2c65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505716e5f68b7f7b2be15a89a89436115
SHA12259c30da79a3454afb2ace24f3cf776eed59642
SHA256496a5002d0827ae03fc8a7369120d3ef261a85466f9a1641fa622bf540ce1cf2
SHA5127247d8badf34a2c0fa4ec85b04c49a17288664a84f59818063cceda369f0a65c660e3acb3b6289f8bac5a8be5970be87011726c22858ff1aba622b5d47bb1a16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f86bfdd3baf2f33c13cdfc3826337ba
SHA148809901ab4c17d9f02dd8354dc88abe8723a8e2
SHA256dd2417b2d54bd6fadde8a42632614d4d199a446ef54038208c9f39f9b3badf5f
SHA512f7a131bf9eb57cc5c712cd176cfd9acd295904a07a1dacc7e7f552586329af24dd7c31e95c9d0a94dec72d679a02319b9e7a93fab5a50632685d8f654cbb954a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DJB1KT77\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b