Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
c1b68542138f13eb202ed06274f7ac86_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c1b68542138f13eb202ed06274f7ac86_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c1b68542138f13eb202ed06274f7ac86_JaffaCakes118.html
-
Size
214KB
-
MD5
c1b68542138f13eb202ed06274f7ac86
-
SHA1
cc316bc2f41fa2af0b08cd44251a51ce072363c6
-
SHA256
8ca1cd49faa389d0466e0af84b1dd788a3bd43575847f277eae9112704822ca7
-
SHA512
b786f97a535007ec13090ae2ec1e0e7af1960ca68c064ff706cc6007ff0f83f9292aa5a6f6cfe44bef3f58e8fecb82ce6910f9eb1a39cedce85d221c98b0a23c
-
SSDEEP
3072:brhB9CyHxX7Be7iAvtLPbAwuBNKifXTJb:vz9VxLY7iAVLTBQJlb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000003a8ff286cf3079cdb33043fd90c0a78be6c3aefa41a85b2e8750a2a04766adc4000000000e800000000200002000000001aef07b2e5535fc06b33418ea025217d0ceb5f849a355289268fd29b4ad895e9000000044ff508ffe72404554c592ba922ab08ce8a6e4a9a5170bac31999ff743e91f08e09515f616637003cc44183f936870f95b0b7a6e1ddadf54c4ddfbb305864e020dd04852cf853e10dac28fdc761682ba74f781a1ada22cb775f47c5d1e52d0903ee21f1aa892dabac482d4551383fda6bd2d59af014e4921bede71d0e1ff6d0a990747b6c6007bede963a46dbb5a29d740000000e70d8d1ec8af243c1a4404f3a81fc79f9ac2e25de64e0794a5c347a240c84b9049e06c6757123ff701be3afbc55c1789fc44ce139ad7e9f9892a53ada45c1a66 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000e154552c9c71e10daf2fd89bcb29d613eb88e9a61d6169832aef292f054f72b2000000000e8000000002000020000000ffbf1122621dfa825105366dd8a8b48dce07c82bea24efdd5b7923a531a31885200000005cb540f65b445e9d47897e364cde3981907d70bf65586304bf961c3744ced16140000000420ce1c133cc57b5ba1877316746be779c7219d70ba6e8b4b8608246971f044762840888c754e8fc3b13dd82d526dea13b894fc950f5d36ba43061bf9714c481 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f080be9b3df7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C561BE41-6330-11EF-9188-62D153EDECD4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430786538" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2716 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2716 iexplore.exe 2716 iexplore.exe 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE 2728 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2728 2716 iexplore.exe 30 PID 2716 wrote to memory of 2728 2716 iexplore.exe 30 PID 2716 wrote to memory of 2728 2716 iexplore.exe 30 PID 2716 wrote to memory of 2728 2716 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c1b68542138f13eb202ed06274f7ac86_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b2a5e03b7d934071c4a648466326074
SHA135444832d1cc3d48c1e28a245cc576b610e3ee50
SHA2567b5e1beb228dd71bcaf2637f4265a8ddf619f53e8ca033e320b295ec307b76e6
SHA512c3d4c0f12ac9f0f43475fef14e1894e9b0878272657cc716ad369e770b39e8993dcdfcdc68f6f136fce184017a81b97ffbd2d8502040e8ec637742d3cf176492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c588fe3c335294b263e3079b09070ab0
SHA1153418f8e11615c80a6c60139703153627258609
SHA25623dd8e8fc3f6130ef35928b2cc03e379252e65b16763264e5437e1b079f55da2
SHA512a9f0a1e3ba00cec28982267d9bcde83ebd2c83531955b2f6c282f9c118b5a85819bcdd2cf497b5a4a39f1352f67cd8523aaa36898ea94390e75c633f4af8bd22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efc66ca618fbc2fb4301fe10820c929f
SHA1c12339bca15bcf5605d0a51c582d7a3f4e7a8847
SHA25665a3e04e81dbce150962920f794b10136b9cfdfd8e835c497e3a61a5be0f43bf
SHA5129caa056912359ff3ad095c47e2f5fdc005efbe4e53fe2d59802eb5be03b8b90e2ac93c6ff117821953e1230f5c9ce10f25a81ffb39acd90c0266ea87f5813798
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c328e3e698a827cbbff1361c9f44b979
SHA162d9c5229bd455af37d10b1bf5dc32468d2b8cef
SHA2567dfe2ab38842f72f57595d61354cd1f2a30c4beda86b893818c10ddc3c18a3c5
SHA5120bf969cc7fd6ef83386697447224d7a88c4bb53edc48672cc6305a4963f335354d2bb8b440a19033ea84685abba5c60f42fca72169362847b8985feafdce3ba6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d3c1ea6d200644d5aad70cfb9e6baca
SHA158c9cbeaac93e80e2c2a5ca6cf1b745e16981b0c
SHA2565cc5ed028b5f62f7c8547e31219ad28ab1c46d086948e3566b283bae3c99697f
SHA512fb493e9b2e2fc716416fadd619f1f37c88d9c6a0089df9c6f8163f9f90b6f7ca445025a0ed57e51f2535f8a5b6a41f2efce4bdff875bf909c5f91118e1795a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5180832bc2ece2e08122ce3f27a08d9f2
SHA1067160e59d95b79c6fe5ef214418a37aadc3a15a
SHA2561774af4680552ed39d94ee99a13a6bf321a7de9e2bd3d62a836a03b217d19f43
SHA512b15170323a6f34e0642b6d2078f07617ff2a2ba5f62a0d485ed79b5c77ce4c5bc7fc4bda4dede4e686c06c9cb3ed2f8648b7a78d606f53f953576169f40dad3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2e5dfbd457f9a145a8f0f334d105d78
SHA1fb7d4d209f48aeb925dd45f39fc04f48cae758d5
SHA2567a66492738f2f897a48fbd58b98d1ea6df32ef61a858192dfbe0d3bce922a944
SHA512e8d7226d8a28839731c7e2573ea81b0b0075f5637ef3e1ca8f760e901a35396c6592cc6af7681752c6dc6df33ed8cc9e321cbcda47c916b447dce3241c447184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3dd18493aa4d828ab8142acacb1d0ce
SHA1e81c8be6aa1e7c760c37ea50d2d237a0e0aba4fe
SHA25635f521f47bfb38bde7db0bbd0bbb5fedf32b53b46614d8ce333d03b357facdb6
SHA5125fc0377c7ce3c8515c2f6d766a2c6794d17788fd785d947eb99c10d526b963ee4ba711cb01474fd01c33de018f8af670d83a38f2bea2c628f6fee87984f8d197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8083ae2525fcd78505433b1b2f2e1fa
SHA124b416cff3b0e8d6422332390380c54c9ab0444b
SHA256b2e3f7a5a4caad28a43069a76650e9109054130b4cfa345e95b5650a4ba45444
SHA512ab58569ed6b90a0753a3f266241df1570482a9114ca58393a3ff04f65c647f5c20a49cb3da48921501ba6ab27a919e2cba7d5b39d2b2294de8aa91a77e16bb11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d03552bbf76149ec6249d30cc63abda3
SHA175341a6e22110a1147f8d6d6465d4d2c4ada626b
SHA25696272d81289fc0af05c8aeaa49cd649f071fd38b6f38af2d26fc3f73398da2fd
SHA512f41256acf96b1b951364095c618c4e4b05df2c1e0e628bc74f3988904c96ed51d2ff16bf306db55e3698e575663cb0b9ee3444ceb067c692563729b9cef25401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c09af86b44d32c651e135daa5e895a1d
SHA1e8f9445538f949f2164ce9a2832f81197e58b08e
SHA256414351a540c1d608340637ede8dac53a0e1d9e205504ab342a130e3d90a70371
SHA5121e0cfed99c0e95623b71f2be11b828c1d85a518827dc6a273e403582ab96e50886a0cd7149542d4a9f82bdfdfc9c5d87c539bb50345db5b200f496634e0de180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e66d1d9d2d8af43111eeabde0f6a6814
SHA112115dfaf8908415157cbea74c1a9500130cacdb
SHA256ec87b6bc1ceca2b6116310d564be0f285e4a3e18c6c639e308ad658cf3e29973
SHA5124202e511f95fc10dd4c0694aeeed7275527bf9f659cd60b888908e394fc075604ed2b93f11121dc20cd29fccabf320d8080a5edc13422e7226413f333f1a8b92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aac6da9ee0615a3988a6501eaa9005b6
SHA116000eb078ae875bb5814f0205fcda802411c2f2
SHA256626ce74c0a7ed22cba21e92905aea8ff7b9bc971859a81d122a74356e3487a01
SHA5123652a0598ac38fa3d6564ace90074ef3b946e5a628a343427a2d09df142da3d364857c44f49aea9bca72e12064d0911a670f2f16108b17cb9b6a99a41f8ce249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bae75699df51712386e2425a5cebd3a
SHA1a6a79ac34e2fe070d830a65fa434c919e31b2e54
SHA2561154c13f434bc02a51e6ffbff2c8606a58c446a7587c59d06de0167ca7738d27
SHA5122609cbdd953859e1e769a7c617229cd7834bd6c220b01d9d97ceb4ebcb1e260bcdda82e630fd23148206f544716bc6265dfcc7a7d05b13c12701323a55ecbead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cb44e210f70419bb494d0236ccece56
SHA121485101d4bd8425e635e1ab098586a682a45f2c
SHA256150ada47a188dadb42f128c0590f330e3d60b981a9b5a2813a0088a7fcb28812
SHA51249253cc1fbcc1b26baddaecaea9785f51bcfd8fbab14207637113bd51101caece84a318831fe744b986aea5512c67899f395060cd8da1dfc26653967197cd9e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb6ace0b6bf0864e5a3371c5b80ce3d
SHA1eeb62c69f1794d21378bc29b7541d12019f718dc
SHA2562ebefbedf9a120276b9ea2bc68e989081fefb27615d9ecac74881f00f5558811
SHA5123d6f94db50074f5f9ef6e221c285fb38c4f2a4df0b1b337dfb8f9d46f2432a278c7a2bbce40a7d549a7b6561e7652e71d74c54344b525884ead22e64bc4e1967
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586ad26b69a042c94749887fa81d7aa68
SHA1d75102425511bcfcce6bfb3864264eb74f9c2d44
SHA25678e7e5baaed021f742c51ffd50432db6c26fd96b1d8a0eb99a4cbe68cdfb2387
SHA512bb6adc0600195ce0696e09b3c3b25a83b91b46b8651ee76751b730c91114834143de552e89e3dff0104fbebbc804e9e0d5a4661bc96db889a720bb3c3b4053d0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b