Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 14:59
Static task
static1
Behavioral task
behavioral1
Sample
b3ecbc2f3611ac7705ce9d9c2e0232d6_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b3ecbc2f3611ac7705ce9d9c2e0232d6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b3ecbc2f3611ac7705ce9d9c2e0232d6_JaffaCakes118.html
-
Size
7KB
-
MD5
b3ecbc2f3611ac7705ce9d9c2e0232d6
-
SHA1
a3043f3c314e410885cb5ed0166266fe7ecb178f
-
SHA256
5baa6c7519dbbd7a852ac47261539c10eedba76237b42ac44b5363bd8209af70
-
SHA512
a34a55f7ca6391e3f785bfe42483acc6342d4d4ce7214f1911a1e49d90e66f4634acecc4346803fd611e9ca5b7984f07dd9f33e1dc8d1f892a0adbb14c837f7f
-
SSDEEP
192:BQhv1BfH44phxKtHDzLi+ydSg762Mxbt54uPDbuXregc2cz6r5d5NDlYy:2h9BFKtjC+ydS6Y1Hd/z6lzYy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000608c36fb220e55fff10cec47321231c392c0e162433233cda649b15b13396b7b000000000e80000000020000200000007a8f855c696c9fbb73798fe15e159c5b6cb3eee8d79e989e089899106495612e20000000150b386f940f19ac7b6ef2241ba8cd012ce5f153ee3ee6b6f744523c8f227b1740000000bc313a8a286176a30019f956863e913904008521f91759e5af8788b4715cc7303adc4e5165b3bf7035983b0a7e706fcbf8789758a5be6584edffc0a12877f8ae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F44AC551-5FCD-11EF-BA93-6EB28AAB65BF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 105df0cedaf3da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb78000000000200000000001066000000010000200000003915c5a7da429b2bb8860364786e9f8469b94cf40990ecb014f4b5e9375a617b000000000e8000000002000020000000036be11f080352933aaa18df8aea25d5d567c9d94216999dad1fe8a337ca9abc90000000c3de2e96d4041c5ff7205788baa0354637fac0ea0d9ea669538405f0cdb6e04055ac8e0210b07d08d5e573bddf0d3a5b22f05a071d6a29c4a1c324f2c229852947dca1de0b35a9a8533af975cc5e32f65e4c1ffdd41e9b49bfab876adc4b3d5ada750f2174ead41f12d983e443a8296cf6ff58492495946097f86daefe927e28f5306e90a3580f90d5ecc49ba2b17bd340000000520d1d0ff5eca3948c95e7e88ccae5744256bd9ab9e7ce2b4d5648e8892115c3dca54406ab468ff0989c42440467b39fce2eb004c28bd4fc41d23b533bfe7fca iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430414234" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2004 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2004 iexplore.exe 2004 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2004 wrote to memory of 2764 2004 iexplore.exe 31 PID 2004 wrote to memory of 2764 2004 iexplore.exe 31 PID 2004 wrote to memory of 2764 2004 iexplore.exe 31 PID 2004 wrote to memory of 2764 2004 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b3ecbc2f3611ac7705ce9d9c2e0232d6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b3abbdac6ba4e1af8ebf0b87721c4cf
SHA1b7d5c76ebab05ccacd5437c8ea51079ce95b1f60
SHA2562b548bd635dcd2c1cee9b2319d2cb93a5b54c32ecb396f5676dea5250ed2f075
SHA51262b0eff6be4637e62226ca35393c961e8cd58fd19d14fdaf4ad7e62a14fb6c76c852811d0452cf0a9239cec568096009e3e285e76c6760570361dd45d3ceafce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59256fc2774113c84995b1e2a3aaaf0a7
SHA1373eb0b8641ff829a7c8db884a2a07ce55f67c10
SHA256c520767843729fe6810daf2e9ab57e2f4c89a49fb791aac0ecd8756ad6ac883f
SHA512fa212c7774b918bd83a45f3dccfb193e0e4cfacf381d9c28430b38bd1f97e2bdcc77c6fd03c449b96c9549a67e55aaf74ad8d4dc3988522fb750f037d7c35d4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5826baa7d60f7d7f4bb99542869b100bd
SHA1e4872569805658761808b3c2a7eb95df60917ade
SHA2568340d5c4009f6cc6d5df6e6d3040a9a1130bdf54582546d19039dc258e22596a
SHA512cee82a15273d13092578c27f38b9a3f8639456e779ba1c09e43eeb56fc0f5248a7bb274dc8cc328e353c7e96e45a6a687554c683346daf95abd5695f66335378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50484d69b5aada885e7a59b7f5f4f7c14
SHA1476274a06a4214741b309371c755b1b501f6b24b
SHA256ddeb0bd284ba7fcf7abe8bce63c643f43c3f5817ad9a3bf9dc3f10d9b7d74ec4
SHA512107f8df1ee84e36681b8bd3193cd07163a3d07da9b62d78fb560a43e4308c996c9bb0111d79519a5b9703da253524f33be95456810813dd9f026148a89f7146e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8eca659dd2eac2ebc997b43889c943e
SHA1ee08c94b71652dbba4899de3257f9073d7c07170
SHA256371dccc8055c5b1dc29a5584afeb03b2eb86b8f0aba9a3c650d4341a26c4d14e
SHA512d69a2a4222f1982cbc680a8c6f834751130cb252c0f73f492cde05a93cb4d6047004eb18110417551f8210a5fabef8eb1caaf59be4ec4803cff65ab1068dee91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58242c5ad7131e30f275dedc907fd0d2c
SHA10362e5ab250ca0dad9282dca2ffa1e02689f1cca
SHA2560720575dd5f13d55ea819d7d1a5eda987c3fffb5e6c19d3ecb7607f087acc682
SHA512f18adf7dc1ce71cef24f8e66f72e6f1c0020e7a8869f88c9574d9e3d8ce942b695ce7dc4bbb04c1bb18213e143a3df17d8ad802115fe33716aac83cd5f9741ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52131a75d3ae730a4dce891900826e1ca
SHA14b6d3f7a223cbfa68c7732f9ffbba7e8fda37eb4
SHA25644e0b99572e969c5a84cfca5ef184e881f30a0083a69f72e597fce503257f0fa
SHA512431a78aaf125feda312ca93e2252944af298500b626bc0f81348dbdee6793fd2d6761c9a16651f53c4c0a994ecb6e1564abf5f6ebf8dd19f178d750e01721d0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599e4b8e3fc37da574f525531055e930a
SHA14ea043ec94faa76bd7f0928156996c44da35cf68
SHA2564b0ed1210f1b68cc57980df5cb6e47a9138aeef4ffd5c54bb64b4aa61248a767
SHA512c1d59a311b3aab421df310c976dba5b17c13ce1f594cd5c7918e428a4f9e5217136eb818fc8277bfd924386e1473c5e2add47cdebc1ea7ef27186ddaa0d0a227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ad46e4c1b9824b0edc6cb57b620f3d9
SHA12a23007c4a3547bd92b4478b9126c3f4e4cd9175
SHA25665fab85b9ab8555e7d524bdc793eecc38a295f969b3846d9949375e0fa7afaf7
SHA512e30dc411c80d21c2f974f41eec2964c8823c706b916f50fcc9b460bbfe35fe127fa2d66eba092347d982a62d7063efb4fddbc217386598f03273c791104d852d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b92ba555effe17a42cbac6a57f8c4e2
SHA1ec994b1af920b14b8b160a531e09dcfa9e67f6dc
SHA2561fb2124d214834d786bf94ab600b6cfc6244acb7bf2fd098713e2f9ab881b206
SHA5126ee06c26ff168073d5d47566da5a02e506599f97952740048b11dff4ed8b89361370e4e743870041c673b5a1b115df19174d3e168ba993efcf5479ec76265084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50750e3202489aa7bd49d9ed7ce43ac74
SHA1ba8003336d65e099fcfceee6fbff127c55e80db6
SHA256407cbaa129bb4b1077b54eb1d64902dc8abc2421ba23f23732073ac9913aa81a
SHA512e8d05662ab70d8a6f20a8d742dc71503f991a38116be793cf4f0ae395d2965633340d07714af9ed54fda39bfdd24c49a08d92ae39c64ccdc827d4c081ee4d823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d9aa0ce792c4f136ef1fc953b82e217
SHA1c76dab650a13aaa1f0fb243f710019fd7701d57f
SHA256b6efff9707cb2097ece9c6dcb0e99d79265c89149c665c69655dde21b81960cb
SHA512320cf9f4d080db33f3419280b5e2948b2b7a333f7128de944f201357e7a9619850d864b6a3ec263a8ea521fbe83abe2a8c93a913c5317f2a0d0fdaf9373b389b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba4d2c550cf7e9599a9729d86a1f113e
SHA1dbeed2631ad0234be974aad1511b3dc91089970d
SHA2565835b8ef3b0f38feec5adef4952672d881c357ca9db2779ffe384066ce6d7a8e
SHA512770427739a8d75d885a387bca6219b27a9c7ec0a871c045df0652879c2217e3f177a277d358541587a2b08db52876c24c979bacf5f7002a5ce84a72672e5f814
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c9c2a84e4fc1fcbe68b1f7274d3113d
SHA10523dd96c96f18b1d68171572b957fac3ce94dc9
SHA2560247d5c44dabb292026023a9ba5953f1cfc67c18403090fd23699562d4ce8025
SHA51200920eacb713dc49756a1d6aeafdd0490510cff6f244b4084e234a237005e65d41a2eddea417ecb87877d11b9b24c83aaeee3b66ca8c83aa3b6d76e9c42e09db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f68688845a4ef931a237a7577c11071e
SHA18e2343e3ee02c0e7bac7c55869ade8448264d264
SHA25665875cc00353a9abcc1c72b0de676f61cdf730f5919f317703d5af30d1b2a464
SHA512dc6e7f258685fe2afc4175afdcc54e1595908bffbda896c2fffa295ff5d88fb55185d5c45e88f48f2975d7d194f7edcc1b4306fbe74325e7a6233cf60a5acb2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5293f60c762c0dfa53264d69262f12b47
SHA1a303bd14da8ba2ab4f850f27096ca859da5a8eb8
SHA256bf384b3e8545e3f3f10335501a7cfa68317f896d907bee8a8328f89d76f67d40
SHA51223502cf67628ff6e3286be86194648575cf7d70b0806d5f14c351c0808817da8b06cd07205cb499ce5a70d06b3bede3055688b84a25019728d0285a5eb518cbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548a311aa6484ef2a4b98204a1a0ceb1c
SHA14ad9997871854c0536ca7c67fb988038a2d77530
SHA2567262e2917d99478fa125be761d2bace71a521480dde4566f0f5eb631fe8efcb0
SHA5122371cde6ef71d475787583ebe3ccbf6119fd516dd5fe2db6959591e002b93e78649764fed966925aef74bba29ff36704389f6086af34bdd97d6691615e252827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5966df4ab2014003f6f44994445c4eaf9
SHA1a06e710f096a30d0bc1ad215501feab6829f0fd9
SHA256d28a3410db889431acb3e63e54e2c4086c12bf29ee1d3f47adee03d043064af2
SHA5120101f5a2300e8cf41b3bf628a4dc6cbc2ecca7e93973ffb113ebb9edec5d1a57267c2e7d20ad665a622710a0265afd7d556e8de5ac2bd2a64bef52bb25aaacd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e55b77d651b055b1b5905c59c2591056
SHA1a47a18d644bb31d77ef2f50e3d2cd22f93e71d32
SHA2567453be0ff03cd557401cbbec2d1d8e4f149744d3f392bf9891b04a6235425f01
SHA512734b28e47885c3c0181f54d06729d805530dfb764d87f56a1e9f1a9ee7bcbba1bc0e44fb245550b8e9d590d3afe4e18ce486b78d32e093267865dffcfd3b71de
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b