Analysis
-
max time kernel
121s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 18:03
Static task
static1
Behavioral task
behavioral1
Sample
316957b161528f9e33435e3fdc842cd6_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
316957b161528f9e33435e3fdc842cd6_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
316957b161528f9e33435e3fdc842cd6_JaffaCakes118.html
-
Size
11KB
-
MD5
316957b161528f9e33435e3fdc842cd6
-
SHA1
40dbc5330e0e70133c12d903b08cb4a69efc2ae9
-
SHA256
97a76b69c434a899e910c3a426583e6c4cb8ff4863dc337708ee42bdc7a68bf1
-
SHA512
c26c03b01da3b3231e8df52bb3f3a2c8e3a6e6849dbe11150f9d4c46825e474488b396a6bb8020293a439b3c24ec5b4440d6405caccb225237cc1713dde47433
-
SSDEEP
192:2VXlIsr03XU8k/w1wvqyKByJnH6GKzM01BLOXuBuLbdU8d:sXlIcuXc/gcKByJnH6GKzM0BLOXguLZ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 400ef7cb30d2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CBC02F11-3E23-11EF-85CF-667598992E52} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426712761" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c7000000000200000000001066000000010000200000003e46211ea92af1d6ad89f0971fe325ece4c60d414732931e3900cd4c84348b90000000000e800000000200002000000049f9a8e07acbfada2c9b8ce1c456774eeeb5690107188673b74b63a830f79f8020000000b70f0302cb746e2583df1f63296b5550e6da8c076c8899e533dfb4a7760eb96f400000005c3878b0c6e275a58abecb386ba65724e42a991fafe3f65785c4936ef270046f7715713e58afa0c65e038d8a659f4300bff07f58165495b9843432b5dbb3c976 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000e5607cb9f1c8007998b5ad1cd3e9873fd801ccbb5dc49de77620fc70c6670d74000000000e8000000002000020000000c5921ca322eb1a042a819cd0c64b89962d6a00d026092b4f7dae589e381ab2f1900000009eec545f4ce211d03a9b83253dfe315c83fad577ab69099907b37573ae7714d065328eab06e15bfbbc6f8c511a905f522d0aa9b97ca0987b3e50d210d776b5fc26f1a757279927013bfa3490054af5909156cb8d2fda0b3cfd9d9b32fa81c5233c35a85e4f7afbf0046f1229565a574e3d3fb264076014556bec367fe7e7d21b8e973aae4bc6cb0c30cb5e02daa37b5340000000c7c67b66b9b79608047c7115cd7c7494946c7718476eda6042b9f0b5292834c30ae8c48ca9e39812248c5b5f760e59e2f48578f9de4308bbb01131027c32ce08 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1400 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1400 iexplore.exe 1400 iexplore.exe 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE 3044 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1400 wrote to memory of 3044 1400 iexplore.exe 31 PID 1400 wrote to memory of 3044 1400 iexplore.exe 31 PID 1400 wrote to memory of 3044 1400 iexplore.exe 31 PID 1400 wrote to memory of 3044 1400 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\316957b161528f9e33435e3fdc842cd6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1400 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ce66f75c721aaf17213c96a6e18c470
SHA138d52239235d365f2051005b158c619414c0caca
SHA25628233c7a90d84656673f5efa8cd52af120b9b6d438087b64ef50306abc57bb7f
SHA512a8d8b1d54d1fd5e09464be511f1c141c06c85e431bd7e305a3302c87b4ac264212aa144170c62827ddf7307c5532fc49579bc243c2bb0a3c76f02bc77bd9eb9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a28ff57880421298fb71a55a1b8c3bf1
SHA1df8ecd89736898c60ab9d0ca615b7f8869aabf98
SHA25668aaa566a6c0be80470b19cc5c6ec00bebbd2011d8f884b00aede52dc44e594a
SHA51202dac6a30570522a047e2f02450b9a5be88a234d4a0ac3668589e8ecd529b590d6ca002c7eb973b6960544a28d37dd34bd9aafb619848b235889b8d12dbb8a95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b01e3a7c930b605af8ebe909d2befe3b
SHA11ed301c65d443e5277c2e6491d820d1fff4d384e
SHA2568e623273136ace1fe2a7fac52513f5e0aa0f5b608ac8b76bff4429ffb813819c
SHA512c1b76548e49b88a9f7a9819ed2b720d74c56859c6c01cd2518638e0e6b275629724193209e7b6ee8059aa4fb96eeaa3ab22e8bd1057e31d875a6cda309bab59d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544ba9d7ed1baeada6edaf8c091356ae1
SHA166813e1129733e3ac7485ad20e6f9a381aeae8d3
SHA256afdf437844c9b57213943438b211917f77a7a564e6c05f9b6b0ad3c9d4233f0f
SHA512bd403e18ab76c1f3d6bbf2617e372b762da899a38fff3dd7ed79aa6e58d74459e75547df91d4dffce06a645eb9a487b4c3098ecaa0be8c001af2b0b590c88bc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f222d7cf82a5000d33c06180f049328a
SHA13e035db1394df522fc902e20e48656f4f105a4ce
SHA256f6be0bd425d8949b066b1157db7d09b11b0d6868d506698afb7063b80d334d31
SHA51251f40ff1d164f4ebcde393204b4e9e59ec5aa68db8a4f1a8fe9badf6784a4e1f0fd470e8937a7e2b9a809d17eebc4da9ef321469ee3ba1022f454392996ca782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b7e177fa64827c59426f611d90674ec
SHA1cb760690dd8f2088e4835554db38f8f577bc47f1
SHA2565a0dbb96bdb9f22f425a3a8953c0aeb185c73ddea12a461bbc1aad269057f336
SHA512d84067571bab94154239bee7c1e7aece91799189e2d3fd16695d01bc5dd95b1e90026a3737d82634d7ce9f10b001ccb90d64d66279ad04de80cef1b2dd59c9b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaee1b2c2d7d86b579051747377832e1
SHA17e1a95cfc658c200a240554ad94e22872181a6ec
SHA256d188dafa4a667c586bac028b20878000e77ef64c94ca4408475224e1ccaa0075
SHA512189f93e58bf7dc9a25ffaf58498fb7b3db1f53171f5a6120f52655ae257230e6e34ccf087b7b37319ecba625f95d5d15886ba226ed03b67fe951a70397d022cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572fd01fc66a2973a7ca5b1c6c5c673c6
SHA1841d9d6df1aecee7a7a39ca938ae87b14a56b83d
SHA2565a7f9e3991be9a925cd4ca1075800f6aadcaa49aea24a7bb63c2f4de7cd91d67
SHA51230052186fe3d41d39bf9c246ed9048c8774a52b2e747d3d2644c1de7ed6c325d3fa6615778ade29f78ab7c31fafd7858aefd4fa82fc68e5569039354715b8bdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab7b35ba58048d7b054a9742541d48dd
SHA1b88cde3d2c2b7e982841d07b90eceafcc7b28d0c
SHA2565d363df99450b0b7962c619022378f1e0fcff81c4bd4b4b45fe488aba77f990b
SHA512e5cd20a089466300613707f24d3b00eeda1dc433362f594fc5113065a361132125213deeba4b3c6043620693d1b58fa91a4c09429da598a1df7bfff77377168e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536798904991a6e3043243f55535929d6
SHA19d5bd5b786308a83256d93dc4b1f8607ac40cc9d
SHA256e84a7c84cdcbf5c51446e78be50af17fc611a44c32b1f5fad46ef13594e43aa4
SHA5129b8d494fb93afe6923a96cd6fc9139f4ec8b744dfc1a1f62a74cedb5cd0b58a608c39b92a1c2acd4bc1cc2adb3d9ad81e1545a90f247a0de9fb26f8fcf9e7123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5103141cee5d1b541b5d3cc53e154190b
SHA1b7cb801daadbe9416a02260b9d3b3fa8dd63ec02
SHA2566b887042b29d0c3274d5eeeaca52da3c161bedd7ec4750fce4b902cf8aeeb768
SHA5124e94c06efeb6368d9e2184b8ffd9ea9b771a3bc67320e91ef336fee3181ec0d6148f85ce65b16702bf2a7a2ca048d0df51a477d1aa5b904e6af754a6527012d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0c04989e3d834ccedb4029ec2086dfe
SHA1854882d9d2df6a9b43472e89af0d1206a8de517b
SHA256cda3663de1c6bb1232b5173685ac23bd3d117117b816d82977a851040294fb1f
SHA512a08da4c6d99cbbf21decaec3090921621b56a78d0cd2472a04f4381ec3e2cd296be126cc7c65580af0dfa14ed05e7abb4c4e30ea8585f1f749ea9398ea58858b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c50faaed4f430d1a2cd162d841aa2ad
SHA18e7ea0d962a7abc43bb6f3843fea66f260a274c7
SHA2566b9eb2ebe78941f424eedf456722a470de9abf6025dcba3a1480176cdfd8e485
SHA51216a50cb3337c29e561a7206ac24d121c4799b49846bc1e4be67339df16e421dde658fda53c17dbcd91f8ac21a7acdb3b729f5f08951c922c9a24a559a7092c6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fad44515f48b09d776a0d21ca0ab3713
SHA1c96948d41cea60fdb0f7c0d09bf3d2aac8b3e088
SHA25693fb1994e9672140ad7567d4579663902fff239d1a518b5b4e931b352fdaeebb
SHA51242776f1793c2e11a162c7bdd0baca01d78fbc169ef17d2f083d592cfcb693a5d1d9eab28048fe0c5b6c5087618f7142b50d6d3f204371a22e97fd18a975f4ff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558b127b084da404ff9865412274aeaf1
SHA15f01505c3f4ecd1fac8811eb58a38ff61eed5cce
SHA2567ad7626fe7e91f2c17a6fe930eee4476896d3b48609786344c54f3d0406affd9
SHA5120a2c7c38e359cd1716c31e207e8ed33888e3281b40e21a87a7c774df0eca1bb63c9985f5dcbb467fea008224cf248f134b58935f266034d055625fd6d0e40ccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef50b4337493b7a8ef2cb57b03a8b7f3
SHA153463beb661f41828d61a9598fe90f8a42967b15
SHA25659baab5076075dd27fa3be7f24be37005fefc312c866b304efeb97991f08a2c5
SHA512cbba520f545e9077e8237db07a373c0bf1665aea7458083449f6660dd289e873eae1b87ac43bdff89286839e94233c882aedba986440fdf22e09b2e4ceade40e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e07bde1bf7ea298b81baf605e3b94713
SHA130fb673ac75df0cda131ab80885fa4bd4918873c
SHA256eab7fdff014ab1d268c34f50b6e2e158fbc7750ffc04f912a883d28b22b4b48a
SHA51229c94229263700059fa375bb819d89168bdc8b37f5648926ced511a0b76f9f9d6436db1372b9b4ffe8c59566f33b104096460bd1b78232f81d8637f8729b9bff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fc23cbfb76755c81f1fa767861e03e1
SHA1f0814c3c274d712b20e72037fc81ad5b23dbb163
SHA2567c9064ab55ed4bc6b7e9a3e540bb0cdbbd51bbe14131938142744ed897717a7a
SHA5120d509f68c7190411149455ae9eb3c48844db76c7b8a839121a320e1c31ec8ac2a56d46c0e7c804701514aa3f60c2836d715eec92654f65584065637463af456b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535090de1d6eb96dcee1f939a1303476d
SHA1fd658a09086ea9c1b4f6875b1cd3d24591f3a549
SHA256760651673a2e6183a81801d695b6489f081ea7a9b3dde9733dd6145dc252f978
SHA512047c5df47d18c0b130bcaeea079663fca279298774f40d517a8fefea5327f5fd419e9ac12c1a4397bdd899a397066cb0398e7abcc3d29ff8cb3afdfa57ce79b9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b