Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 16:41
Static task
static1
Behavioral task
behavioral1
Sample
a68c53e7ed9b7096e8601befb76f8503_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a68c53e7ed9b7096e8601befb76f8503_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a68c53e7ed9b7096e8601befb76f8503_JaffaCakes118.html
-
Size
24KB
-
MD5
a68c53e7ed9b7096e8601befb76f8503
-
SHA1
902657a61bf2b700ebbca7792784889e2aeb53e4
-
SHA256
34ffe627108319a4da80461204849b2bd142b0c66a11a841500b428a42800015
-
SHA512
d7749fdf1eae3390efe978470757f9132c7dd1e00bafab3fa1cbe389db8eeee1c862a30a594b90254d7d644cfc2968d0f0d259b1eb6fff1e1398e95dc4668ece
-
SSDEEP
192:WLZLwKQJUOkyWBRUOez5UdQ/uQe/4UigVkBlrPB+p+IuPi6bW1ThC5WafW8Ohp+4:fgRUlU2/IX7VuE1TR5ZfpTF
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BF6DB1E1-29A3-11EF-AAE0-7E2A7D203091} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1064e097b0bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000f3164b5a532bfbae01336f8fcb441363aa99a787f0ad2c17b3c12397cd881eb2000000000e80000000020000200000007d9a571609880e251ab6b9dea432bd1e3b7be5a9d957ba7eb3930f0e75b929b490000000de0d93f5ac51cc50b7009c7bb59f76ee056aa532dbaa4eacfa3ef99bbf19bce9463d1fe49978aa1384ab154dfb673163cffa7ddf77510a9ed067f706a23ffd04440fd864637b742711e369278ba5843865642e8435c2a54aade00e22156ba2d000d606f622fc37830357a81b65da69a5c21b6aaf2579930006ad17a2bdf25f35d5ff4559830c6d004d0aba8f55e934f940000000ee3f3476427e37cdaf736945881d8dcc888fe537a5382562ba541b7ff1bf8b5d1ba9fda380f6d480ef306dfe6d5544a8fcdd37150ee179689ceb17d5b50260a2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424458743" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000472dbb318029ec2508f5565b4bcfdd1dd0b9e3982a197f680c9ec96da71a97fc000000000e80000000020000200000008c8ce815312312458944400de9df5debfd68c00c83470595e1b85df933f611f120000000267be67371ffbb37008338ce62a0cc302d09bd44e3a8e2b3f68b27a200b369a7400000001d5b7d37540de9f3b2313ab4460e00f9bf6a02446ad649b7508e6c1a7c01e26e30b467418eef5fc1588cc45d520ee8ff4dba8b25e52785f7171e25913db6a711 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2708 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1704 iexplore.exe 1704 iexplore.exe 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE 2708 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2708 1704 iexplore.exe 28 PID 1704 wrote to memory of 2708 1704 iexplore.exe 28 PID 1704 wrote to memory of 2708 1704 iexplore.exe 28 PID 1704 wrote to memory of 2708 1704 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a68c53e7ed9b7096e8601befb76f8503_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551fda00fa9ba4206df372424eb1efcdd
SHA19b1ab9421204c58b42d938cb9a9b98a3aca60904
SHA25600d9c4bf33d9b735754600ea432119ff7ba32c7de00b032aae01014dae6655be
SHA512e7650121b7026717899e7433b1928582e4cc77a51ff41d5ce271e0391169ab75319e79280dd1d6c10f4f8603e84a9ae370a3bdcdc752d24900e47534fb9671fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ae9d9eb0bdbb508cfb609c3cb48eada
SHA1531572acc4eab7bc411998d37019d7e40cf2947d
SHA25678471d36b92c4fdbed4fc96813c2ea91b49951d3960d4f54373996e8a4dc579f
SHA512eb78042523cee411ce81c634d163dd7d8ad8057685db25ec9cd01bbf636500063c0df08236d5cea408587843fe3e4d2d4d0bbf72ed20e501b90c2610882e35f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbf8f2d6d97d94b3315aa4ad6b45b316
SHA1a6694480031a8257674bd4d26695da8cd43c453b
SHA256d99ffac6b2d50d183d1d341e7d5b275a123e8b72a6d567782cf12a9516515e62
SHA512b6518563a670fd62d6289e3fd8d98eca6631368639e7b8ed44c59ecf9e3a9af0eef93c787b93cbfe785ced5ed920afd402ac13eb04ea4fe82acde929cfd70024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7f495a104c0e4f55b85d18b7669b54b
SHA17587fddb633de833f4e322e66f6fb26da6af32ab
SHA256ff4753b5d91e8efc074610421a32a6d6cb1791229344847d3d7312bd16427845
SHA512992a5c438b86c41b6dc390dc44b15349ead13951ad9b1727431ca9be56467a48111cfc8dfb1f40669bd1eefce4ffe88a8821befa2eb26aaf7d3fda5ff2dfbae1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb925549077cbf9d9a67eff080a9b496
SHA15a0755630465426a105e83f8622243064b8e0392
SHA2565ad68a1be77bec4da3ee82428ef8a58f2fe490437497e6b43aa064e95380012b
SHA51210dee590e000aeacf31088032196088b440cc795561a62382b7118b8f46d6ce03f82da0827e7f19b0876d033d8322ec1a16981ffd21750d3d7095008975e09f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593d14234c59b74ba2fb68a1623141238
SHA13bbd5837286c9e45eaebfc56b885b33c571be800
SHA2567f57865770f07eac151503bb396778aead252e76ded2bcc2a3111dc8b5fd26a0
SHA512b98ad1db49032b656c1ea3ebf179e26589a449d9ee453e1baaad352968cfc2f448a1d83364d3da14956b09d27a709a964942cdc315139bcc50acc4b732169577
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c2e9753e92bf77ccc97d222ccb83737
SHA1ca14b087f7d9dc22a97b0f955312b17086b52356
SHA256313827a077948cb29180c53e8f574c9b1e1225c913dc101052b84020d463858d
SHA5123524d8eba7b1d168a5142b606c92cb9f2225fd47a3c26d2060af99d54817da4c0d7a8e8e7cce76b8efd7ed906e87e50a7c6f545f0c6a74c2c29396eb2eca6651
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be7fc6623dc5689a50c0e328407aa93c
SHA1b6434a83db81a904865cf1c37f904c345c208929
SHA256b959781de5b7bf4a93cc2bbf4ee6fb6cac87eee380e9471c8b1a9a919347b1b6
SHA51261d4eafdf9116d4b704b5210d00334825b8d9c0117a3d3f2b60c3446e884ad2691a494130ab405ede636066949ecb7c7911390b281358dbfb5cd1deb97c2ac65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5665cd4a4a144e74ef64351e9794eee18
SHA15fc1dc3c2a78ffdf64366838a772e8f502cfb8af
SHA256dd3706cd0723c08529beca73d327a957846b4350f5c773feb05bf55a1aa074b7
SHA5123111d01a11de0f9f2ba6f7c8b675959534bb6b891aefd40feff52cdf6b3750fb4f29da909cc90df7f54ff4cde458dc508c20b4f641a89ca62f163ec552ccbe11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b747a94b37eb64ef8979ea23fb71dda
SHA1a44f755d8173a060f62f8bfc8f56f12edcd2013b
SHA2566351d24063d2e6291a3fabd0b3b3a1bc848e59db10f88bf45bd8334e9c82f2ed
SHA512497331ae563b3c83104351ef6a96eb0ee0c82b0b8a602b96e01f5f31a6c5de8da9cad8e5b250e92ffb7c1a00dbf2107ee8bcee54d8cbe87249714ddab1b3b161
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538369714affa3c31c2e5b524504cdf9e
SHA10381610300facf4cd1ca9b025001b7653d0ce6fc
SHA256535d853a4c21d5414d1f7f0ee5c72d291697eb088529dbd613d761ebfc364279
SHA51299ab979a532df12e23b6e8a0089eea6a747c94c916b7e58938c05d40098f7b63072c26cf4867be4fb37a40b08fbc7205b7e838a31b4d9ed3e96442c753496dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b126b35856bf401ab4a67e9cbeccae58
SHA1551204cf9b0db2dcda7aafb92672b7291b183e5d
SHA256b12d80cd051c949c30b9145012f43c8903f3b75df7db01c70d0c252660b6000c
SHA512d764715c159e7129ce3582457166310ed033562fd93e7a595ae285edaa55ec573123b05e378efb9f2e055388eeb3d16780ae5875d74766f5de1c7bbd6718d1b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a82b02a269a9ccb55a4f9d24d1d0fd6
SHA11edf1418b927b7d97ae39dc8406fa0b8935a0214
SHA256818df91a9372e68f96fd139c3e3ee80f2690874855c8fd39e2308838bc350239
SHA512f852859c1196563665d47c153310e788e9bc2d27a48f940f948f74362f793f09e266ff240dded89036581ba51a5e22b42c25eff05aab414dc29e5c2414b8709f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5adc081656b4d94239e769fd2e53e56
SHA14d71ea3bbf51d50f96b50a62e15c396f3de3467f
SHA2562c0d3d29baf101073cb34b4fe6ec9367fa9904726cc40f66fafa89900b318cf2
SHA512509b476ad59ead7418ad28fa5ccc001b299caa411e4ef3110531ade517cba85a9f46e0b0015541a2b28a11b9dc12fc7917fb7877d0cd3188888beeb348ed97f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503d9121534791f60073e217e2158c8cb
SHA17a7a40d0f16594452bec6b0cc430237cf9978680
SHA2566b5a7a1cc76be96a194dd0582e8329a62b59ccd22d2195480c7fbb0d8a4e94ad
SHA512f68a6acf1a06efff4fc33456e7ab3fb5d79330f3cc9aa384c459d70a915889e7a19cbeec0b78834ff1a36c4ba40ec20191b2e7934492a8bd257461be1cb9beed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7290cbabd3d26a38464201a1c1f35e0
SHA190a918435381e7118d1f199c31f1a9ff70381466
SHA256d793a40988d68318c980d1376e336ef8446aafae969281f9d6316485c05cb258
SHA51271d8c4cc0049fe5aa746d5864bff428f97b895f2605b66a0d74a753d87e161d0b57c799b9d43455bf7eb6bd06cef2ca42c79079342825c841b46308494d69f2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55062d463c0f79c6de9e632e48dccec40
SHA11c8de14cc7696d9e095469be3b28677dd3000492
SHA2566d49bf20dfde4a2dc9b117e59e4473eb923704f50bfe97063e51999594726624
SHA512d54a2e0577e09461733487ff152d88eeb10083d0d21695abcf45549bb8826fe6c3da357d03e33b9041637cce74d19198f46e04e5077b35aa36dd0587f9837a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6df3d18833d6a8a9c366a4c013ed206
SHA13512b9c4b6561fb9df495279f68a8ad654049430
SHA2563578d675d867cb646e773f41d49681c8d0724828b2b15fc6dea635443afdfe24
SHA5123c868cdee7ab44fe8657cbd0083b85e1107c7a6c7d00a9cd33e1a6e3dbca9ddbefb4a161ad57d25adbf3b05561d3ab71ed6770d1c3e920fce4dd51b1ff06b21a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56034ee003379563cb20ff197e8b25677
SHA17e6c3be19a6b799ed5cf4a79131210100cb85110
SHA25669f18ea3509812cf36f54f47c2a830a23718738e7923e99090127c2e0d5c89d1
SHA5124f52c320d7d127843dcbbac52528f153ef10c5abf30ec1ba04b62eb383d8056ab3eae3720496a2f8119bfab5cd247958ec6fa91beafdaab5dd764290f7d7c612
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b