Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 12:03
Static task
static1
Behavioral task
behavioral1
Sample
d1e3c1d4a2ee1dac1ad14f1ea1334f30_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d1e3c1d4a2ee1dac1ad14f1ea1334f30_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1e3c1d4a2ee1dac1ad14f1ea1334f30_JaffaCakes118.html
-
Size
48KB
-
MD5
d1e3c1d4a2ee1dac1ad14f1ea1334f30
-
SHA1
7fd6192070f98d7a2d40531f99611ea9c1d8af37
-
SHA256
751e74b4757b19a1b60f4682009a6a1ba0f45118df88912ee9360b5f345e3685
-
SHA512
05a3c9b62d3b3dc3f994c95cc2a7945b856ce3e418c01ebfb815e1c994484835da9c163d76ff8267970a2970211917138a39c0d715d53584806b5f06c194d2da
-
SSDEEP
768:cX/F5YlcACEjDKeGF/iwRqDes3IyuzmiCsQzvY8B6oFs3H:cXdelcACEjmiwRqqsGzFC9Y84
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431872489" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4051590f1e01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000002f6466122bd95dd74a2fb643b345d6ec019efac2f1f23278ad790166964bfbb9000000000e800000000200002000000050a4793d5027eca1f322f9772ee59afa78fc025b06cf7247ecc3d3dc57b9c33a20000000462fb899114bc5a976b0a5dfca8aaf55520921166ba56c441e8624c2111200e2400000002088fcca53ae48af0f7122d72e5ef216bff7c94a5756e4348fcf37c5eeb69bacb0a066ce1058326f9d8690b73ada6e53e68147b32c87e3e17fd23c1043e08845 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36CBFAC1-6D11-11EF-B913-D2C9064578DD} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2380 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2380 iexplore.exe 2380 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2916 2380 iexplore.exe 30 PID 2380 wrote to memory of 2916 2380 iexplore.exe 30 PID 2380 wrote to memory of 2916 2380 iexplore.exe 30 PID 2380 wrote to memory of 2916 2380 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d1e3c1d4a2ee1dac1ad14f1ea1334f30_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2380 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5010ee455df4608c9ce53dd236b6a4c83
SHA1de1401326ff9287c95bad9b89c5a2607ce64af11
SHA256988873c26b1c0d23ac2c7517a9945dba1747cf2bef0fcc9b846df8c1c7e7ae24
SHA512a317a08af3573517480a848a1125aac589804cd76483775051f2a7372b22556a80cd6069b26d78d2521295ff7eae37ced89888ed8f884ce5c745f2fec86123e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e71f08d569514afde605252fcebb0a6b
SHA10b66fca8cb953fbfa488b3f59e995e9866494b09
SHA25612fedbff156abfded8a4ab79ea5afb99ab7541cf7488dea2d7d723618ba408d8
SHA51245e04337b1e8373f020fa638adb3aa8ef72ac174bd97c1beed5730999770875bbb4405d9641bd8cd1e3619aff982aa722bcb093c731e8fbe8276410073c473b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd2393fcfe959fec2d822627c66cfe69
SHA121e58b299a13ba5b57bcb1cd38bc873c01073c3b
SHA256d7a6da9972e2fc2027015aa44f550229a9b66b722237a05f5b2066c07a65ffff
SHA5120f9c81194799cf8701f364090e72f542f8e1ba3db0e6ec551d984171f022488405b317e0a93cbc56a01041cf49b727b1c22d2ffb606c422b6760cd3163be956e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a79ae6769e7e85b498e714c60b4687a
SHA18152fab83f48abe210b7e314da31e58fbcbdda1e
SHA256f4a854e8660d103ea713e87ab8a8ddec74503a2b0c6b05cf04e14f9a393a2a1d
SHA512121c97f59d91f95c45588ae0e2c5bf317feb4bc47f5ffa1492630ad61d895d61564ff31ed55ab21ca8df09c5ce713e40f2ff9bf0e7228c2b95d59d6addfec62f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a76facd7183955e8b49493925ffc1690
SHA14249caaf67ec3b802ca0a192f746ac3aa89ae2f7
SHA2564491dcfa388b7da7a81ad480df99b67f53b4aaced5cb0171bcfc1918c0525e82
SHA512ac77686a24d968a7cef21c1032f98ef329812de975ecf4775fc542d3067a14c50032690ce1f44d7cd55ac18f5039b3ae0a4a8cd4de8106df34c65611bd627ae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5378ea3ca290370a2cbf59a53475b7149
SHA102a55aa9b664e4356ad6a70670e189c2d7c3c798
SHA256593917d6e3902e086a044e0a96f73d0032401fb87b4a3e2303ebf35ff0c9b06c
SHA51282d6e45fffef67ab47d94f426786fef96e8b22f8b53fa538bf797b78fe15563213ca2de00d69f7daa036f6acadd289d5c0f1d7cf1f80be45a240edfff762123c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0a705ab29ab7e74e7ecee58b2a47ba0
SHA14ad99a602ecb1eb07062c5a33143674dfd26f76b
SHA256a860a2e4a7f3ed163c4e2bdf84f57d49e972feaa59c44ebf8a336816f0972821
SHA512519f2228885fb467dd7438d78afd597c5b9aef8010f6e4156417805c6357dcf8655aa7f8bc2cc1b302b7e561d38e6405127c1a86cca46f6755f648fee38f3a8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a22cc1e5c0723a838a08f749e06ca5dd
SHA1eace0f6490747202943ab403ec11c8c98d9f078d
SHA2566478fbd69ef3a4bcc9fe9282e599ba3feb6553ffebfb35e9500e197807d7e401
SHA512ab1e28e9c3e11abb7073a0754a45c73ebfe24faf4178abd4951434bf6d657b8a366a815350356abfc6295d5a6552ea6860331f0cc275e976e1e8ffbf8b921d52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dbe2d2536454b74bb5fe73963fb247e
SHA12a1d51809d4c628245770bf1f807e4e05f80bba5
SHA256242801916d643666675036a5a4c51ab110e665220a1e46e8efdf412a0960cc7c
SHA512306fc117dff72a223b9be935a2328a1f932d03d2307496ca61196ed158cb308d8d0815a0d327d768fbd668259ed1f27c038c2144c0c89a24addba53a959ce2f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc72fc92d625ca728649d10986f01706
SHA1c4f3ad842f529dd630a5b86831850281d5407cde
SHA2561b928a627783b393b7091257dc79830535df4bbe494e9eabaf43b3c5c64be9a2
SHA512cc5c1d6d74f6d23fd0c4c5d99e9a4fe3205bd311ce263ece20063bd51070371146d19ccca8da6f10f129812bc64fbf76f523109ad09afeb6e1d5c4a1fcb54d7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9ed59744eccc17cc7e9af9cb98544cd
SHA13ac4961405ee773e132d4c24dc34165908949871
SHA256fa38265f3fd09af2781fb56886604a9ea574b27fcbd3c5e1aa2e146c8b9f5009
SHA512a1e5f81f8b08434860de9361c9bf7cf0e43d00f4e1b86e2eb02b885cfeb0a1a8e0f72af72dbfb5459bf476ef85c526c8ba21084356b8379d8a859023b9e4e7b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522ea3f1309713f3bed1f4a25a13f8601
SHA19bc716ea50d6dceefff34494ebaa7da0644761b0
SHA2569340f40b93ec0c8c16d107db6a035db0558baa78c729978015be29b8b9742fdc
SHA5123d45d1cb2c246dd718ba9f452ee6ae8157b226ddbd0a63daade05619d3c5ce0bf17a5538f283325c0761550dce709795f429b0118f40619997e74ce4f56a712e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5195e8221b483e7f98e0f6d30d8e0cd5b
SHA138f6b7b4a4c3d5f15c560fd6727bbc8f248b0df3
SHA25671ddd99b09eac29f612702fb9d8df44aabc403500f89f12d2601fa91bcc14887
SHA512696d565a66de2d0a1b76e6925f55cd4f219ab0647686e21aa4ab69e207bc5ee03ee7a7113ee9ff30768aab4d777533aec2543ac16aed2e1192048cec659663c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5272cd2f54794c3eacfffc68c1a19293b
SHA1137da78d74517269c5727b556faea94e505728f1
SHA256689dda44104aa87388c982a07eef81174e561efe45c1e3cc5d007b31bd87ce02
SHA5121adc14df72d6ff8258e716739dbd7a578910d526b0dfdde768d421705a7358e97b16a1b56294a547c20a55c9f3eac7ca09f50f6de1dc9003d54717474a16c6a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f5d755a592e1bd52c45b84ed67857c0
SHA1b28c3fe9e9f5cecbfc840e1f6e913d2181aa5f2f
SHA2560b853b0b20cd86580a59b2fb7cf10e430851ff6ebc7c1871c43cff8d9abd6021
SHA512ba8cb1935730f4c483043517161b2e7a7ad7e4e80ef0326f6b43d63c88021449d9eef3736c11f5fae9337113badc0e2a3b982357f37f786707fc7be211f6d854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD55831ef2a7132cd4d35e59d4bd2063c02
SHA14f4613311b99f9af9afbe371a8ceab92c7df9efd
SHA256a5ecaf5c8ec65fe9ed861350cf8f625bc5f2cab1402891cca76549200a2adffb
SHA512a69afd702f2180cc354cb85d21349f4d4634afb3a2bea43720842dc37cd088dd8f2d9b24d7ba8da230b9d3883fb1e962ac3e2a7e5db007b191473da6f15940b1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6XUZ2JLF\signupbutton[1].htm
Filesize114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\YW15VCHK\transposh[1].htm
Filesize124B
MD5e90d8b1b2d6ccfd636695c5c2702739b
SHA1ecf3c7118d6bb4ed2a2d5db0c872169e282c85a8
SHA256c8275ee305a445611a508f26b7aeddec6d7a3381702613677a4489e87419f24b
SHA512d780e87ba84eba507022e414a2fac69903bb132beaf5f08ba491388ab223495c4973165d42b6d20f6c7257214a49a4fd9cd3c8c7386d847fb9a805584a2272ab
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b