Analysis
-
max time kernel
122s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 13:59
Static task
static1
Behavioral task
behavioral1
Sample
c0e4f661c0ab06b98121af6f53b2dec7_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c0e4f661c0ab06b98121af6f53b2dec7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c0e4f661c0ab06b98121af6f53b2dec7_JaffaCakes118.html
-
Size
6KB
-
MD5
c0e4f661c0ab06b98121af6f53b2dec7
-
SHA1
494fb363aa4d9319e57932361d697e7d98a01f19
-
SHA256
41c268b30b01ce1829e0347658f71cc7a6184e03a3239958d1175b3a81321c26
-
SHA512
5531724ab5f60bd0abd8d0d1fee3b56969abf0aca2b32145677efe312fe5f9725c50262a5c62cc2d1070b3949c6f2a7f668bb95a00fe92cf67de29774c6d5e4d
-
SSDEEP
96:uzVs+ux7DMLLY1k9o84d12ef7CSTUB9/6/NcEZ7ru7f:csz7DMAYS/I4Nb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430756255" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{489246F1-62EA-11EF-AB71-E6140BA5C80C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000009e48a187410f56a55dc27b7e48bef3e3d4a643333f7fa5c44707a180fe4f2c11000000000e8000000002000020000000702fd3506986d556b463a5ddcb6545bf29e6cab4a302baeaa622fc5872f937172000000043daea15cbc3b4663f406855e00e2fef60f2dd2513a7915b735b0493b40314c7400000009b0d3f6a0bdb20bf793d362801a1f53612df5a7db5e312c3dea84f7b358f9cda74c8c7ab9509b7cbc7be71efc3d2c808087a4c6de6d643c0b291a27c4fb5e83a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0ae1338f7f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2968 2072 iexplore.exe 31 PID 2072 wrote to memory of 2968 2072 iexplore.exe 31 PID 2072 wrote to memory of 2968 2072 iexplore.exe 31 PID 2072 wrote to memory of 2968 2072 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c0e4f661c0ab06b98121af6f53b2dec7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c8be48ec24fa74021b58d8d14dc3ea0
SHA16389d8cd5c02edcc6ce6432944291528c5b3bd02
SHA256df30665263120b1b930fb6d6934f30b90a936dd99670ae084fd1ddd2cde634d3
SHA5129b9b091d3c70aa8cddeba69020b421885fb83ed830c4001785804097f50ef19497aad4f34c7b83811e75c5f1e8864fc9e4d19e5c0e5f6368b7df3c25c90a4df8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f09a8d5b98c1f359c473d8ad88b23a0
SHA17e344baa59447be61c36e07a3cab8e6369a582ba
SHA256f9090ec60808c1937d86949893f993dc4f386c826964261c6a4aae92190e6a97
SHA512159e8e5a303d3d2dbd2aed0f19ac5689bf7e78f84951410962d8884a52388bd53c9800d374d342d8a901e6985865e544bc873aa2fe71e2b621c58b8d439d33fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5066b558d8c32e49096497778dceb1065
SHA127a8c7e065fbb26bc54a00059d827d9899dfde15
SHA256578bafb2498462fd58ea07db3d89e2a8e17f3739950ac991e6a09e373a2a93f3
SHA512393b3bfdf43bcb961662a02314004c07693d6092cc7187bd26da2b44501f88fb3f4ab23a7e4c98e7caccecad65a5301923dbceb6cb3f36fca4f3d212fda33423
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540eee84fe9ff372ecfe912d9514370d8
SHA1d6204ebdc7f10a2cc140482e695a0758084d5be4
SHA2561e36c6f5803cc4519246509def5f69bed4b22cb6648285edc7de24429b0cbd0b
SHA512e0273e735a2b274b0000e3af5361f039836337a50b4296d6987d588a384d8d85d14c72c2f67594c1e15e2d5e4aeb63ab2341b818efe97b947b823cb89a049542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54008ee5c2c2d438f608a015e29205a90
SHA17ed0ba9d133ead47d1dc9abeaec3399d1f16e9c3
SHA2563386e313b102c3908bcc192b62d2cb9316bbf58beeebfc8242bd11bf58b90d5c
SHA5121e7d0adde95b25f5db0e23dc31109b982869dad6764ab5a1ef29a39b9a4899f24a7a8b0da7d5b8e81ccade0ce80d47c93f8e5a84d5bf4e334a2fbfca0e8356e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533f13730d1bc95fce9ab88256cf0954a
SHA1b61b0e18c4f60aeb4fa74571469d054d8062b472
SHA256c2c8ec415a05a0994083b6faf8cd68f1f7f0a138da2c9cc8e65a9224fa8f85b2
SHA512aba89e3da0f19e936e3e2ee9679de60d055c8e1e652ac4cc7e5b191e5329906326328a6dcd4b3fa079ce97193f9a674a25402e840054cabf61ec3a9f3df0edfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa2ef0f01936dfddfb344d146d38c984
SHA14e9f41e1e46f267dc698e08b493b8b4200c3a0b2
SHA256c35f889af943bf14a799dda72923f42f5b6cad2d4aa67fbe675652948f99e7c4
SHA5122c1df00632adb4b096c4e2a6b26a41865a49502622a53ba9d1098e1205fef470505d1e096ec6b10f0fe40c00a4c66927ae429b77bbf0be25438af81d7f7c80f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5920ba1e089395f05849cf3e8e46b3912
SHA17cc31fb971536e8f39edfb1d5c9bd507d6ab5b48
SHA256d077055092c041245b18a2f4ffb0bb87fd6050bd4516ced5f9c8d23e5ff8a6bb
SHA51230d84a320ea4c0f72eb7bba02e4671e9b39a81ce61992db75ec0862888d3e4af4992193ba5605eefdbb9ceeaee8f68596838fffea7af8b0a0981bd37c49f4b22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551fd51d0bd5c67a43217dcfcabbd047d
SHA1ad469515bf53bd6ce921db5d70e3da4e922ccfcd
SHA2561775669dcc24257ddc649747080fa0f7db13f5dc26ed8367cc24ff39bd7f65bd
SHA512e20c4a8e6a35a181b5d8ae67d2a070087a62ab5cbe343abab771d1c352a5b66046d431f8e47441eb3101918827c59aba19450cca7472bb9cde1d19510d5d54d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519356789539a7df3228f79ec028ecef0
SHA1b9c91c9d861dfda207b12517d96e48c88ab90fe3
SHA256b66b0782f03bc7fb35fffc59a1fbd4162eac97cd22d4fc878903e63836743378
SHA5124e303f81a0216281e1e75c8c71189c87813e9438a7f6e9be0fb16f0657f274a12e12bcd5f959632af649a3e74b6b215f352f6fb81a8bfaf39af40d50b01e949b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a889db23b20454f8124c51921c577e49
SHA168f2499e1314f1f8955aa1968158661f7ded9bae
SHA256cea0fd5636fae3578a39b95eec166fc48962f6bac116a7c6add75230330d0339
SHA512269856e72a516a9ba9e81eee553db2e84535b734158d9c7dcc8670c3f7540c3bb995a3f5f093f08a5f02d375129b71665b95c7d827f880d3b9cb5bf8b5ee40ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586365fbefb43d172ec853767d7aeae95
SHA1ac959cf4aab452667ce85cd3da9b2105386f9cf7
SHA256f2828f0ea682c4cf7ae9a5e62baf21be9a4f004800f80403d6d0693cbe8bacef
SHA5124c9cba8242268263e138ec7518eeb21aa9fdd93067d5fb5a74ecc1d0938eb27f87937c8ca4d5ab10cee2fcc3362b588b5ba9ec84d5c116bc9aa5aac82c970aea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d121273f47d51c301a01c1fb353bbc9e
SHA1a9db345bd22a3846671f20d21ee0bf7ef5e667f8
SHA256d2a4ea183d9e3f78002c0c006015ec38c8dcdab454d504f3a588bc63700901fd
SHA51204663a23301a11c8484d72d86a15bff0a8a3362c5334ef86c9d8269272c1119bb9973615abdead24a7c7a332abf5295b25c1931e3c9d2ffd2356247d8762c5f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5640d2d4aa83c953cc9c48aa97b30a655
SHA189070d1763d9fd65eaf6691d00dedde586c56cd4
SHA2564a26d548a2958d05380a40938bc14253d2bc9478c3dfec7dfae0b85995f79843
SHA512aad4deba493360ab3bd754c931d96e6d3ed4264b718f628c1047c0e301794ccf51ab73c73de5c9dfce84e06c16075ee5cefbc68c073d4d46419141367151d575
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7265e586b11a072ce80386e113e24b4
SHA127ace9b667ec72834770af0b4da1f110c146a4e8
SHA25602c066ae29b60b467c4ac00088e4ab09947fb780c05a087b287f2027d148836f
SHA512c12a3f64aaac45ea483348153aecbd58e53712c473e66338548140e44ec0cefaa93f2af1639791e2e33963d080af2bf51e1fbf44e8109579ebf5d112abedb754
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57da764c436aaa582ec8fffb5f1937a9f
SHA1348077b9900f76e12a615c1434be8ce3d655c552
SHA256f698ccf98b8828d4b6685bb2bd0c9ae094deba3554cf309d2566dffff02db019
SHA5123f82e568fe2bb5145002032b54afc923473288552301800a23805b5a8ae5c210ffe8a9bad16d3c9f2e82094b291fca060f34f51f2aa01215bb04e53a84e7c56b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5436304d59773589508674c74e5167d20
SHA1a0c9b0f7ec831d47ee2c6e662ad6bec81f6c7cff
SHA25619e66fa7ec90bf86db9ea3a8a4d822beca18bf2771e07b40b0a0e6b1ef27f52c
SHA512d59e79011dbe36c8bd3da0b43292d06494e56c5235c42a0bbb5fa522ee5c9523c3792be4e5305fc6a3bf63e9c055290152badf9f91bd32fae85dd9a016998d77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558d476f700e2319729bd19dbe460dafc
SHA1495d14019ecda3864a3c709f6f1f97e04caed693
SHA2568c235b4fdd5a0c3ab0a7a0993c8b5fc5ab924dd1829de562470266f6d87fe111
SHA5120ac8112fb98fa7f6afa71202abc77699ca131c4fd1a3846db161a6388ea2ed51697dec81a59901a76900710911fb205e72aabc5dbad4eca075c2eef32c678664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f13ec148416fba2ec921d2cbe592a6c5
SHA14b415e2d9a73c67f219de3b535f5823253365017
SHA256162bea00025a2c493f002bba9fd55269444a1d21b003c8933cbafa2a540c7b56
SHA512f3fe0a378f8bd0db4f629b0d2d596769323012383cd9023cac36a373fcd758a9df24d910acdfb35ae2226c1bdf562eeb4a53cc651d9f6e9426dd5845b72ef3be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e81e7f9cbd8be7791b81dc620d1e71c0
SHA15c393227be47bae1769aa36150ce546841350e35
SHA2561ce8813619619171543d99df6ea6c73e02f969665f3575314cf00ee183edde23
SHA51246882ebc729f71e1ece311e2e34f58541d206737778a14ea69cf733039f9da363ec375e4a80e353f0672800de1b14ad3e2bb140e37ec6b894d8407e0f84d9467
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b