Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 17:14
Static task
static1
Behavioral task
behavioral1
Sample
dad61dd0e69ddd3796b319785ad87270_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dad61dd0e69ddd3796b319785ad87270_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dad61dd0e69ddd3796b319785ad87270_JaffaCakes118.html
-
Size
37KB
-
MD5
dad61dd0e69ddd3796b319785ad87270
-
SHA1
284824974396eb24eab1bbf301f2dc9f173155c4
-
SHA256
41516840d1a9cece4592585f921bbe15c389325a1a9adceff567483ae39dc1b2
-
SHA512
6b06aadbb19292564c7a04b16c48858b62df8dcf1774da373fcb1d46b782960432ae571c469c75e61a70153da57e84b7d8304db587fbf4ffe9f6d3b16e100a9a
-
SSDEEP
384:SIKJ8gdmsCyp4woge+8TTip2yeHip2SXr9+isU8c:SR9X8T96Ngc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432236738" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000005221c571147ce2cb82e510738c047cfccf9b53a74d578920d489620fdc7120b8000000000e800000000200002000000029bf874b5efe9144a2830f6d4d9ffb75d4308bfc3672eae2280d5905bfa231da20000000569030fccaa5d7c86b61e7a9e212f5e4142fd3ca1ed83b295efc8a8132c3c9a0400000005a0c957db48078c8044f57f3d301b298efd78eec9d355713784894389aa9e2c86412bdcec715744467b0a9239aff23e40f0c86b2c181ef0c1ada1352c446882e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80a970396e04db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B86F0C1-7061-11EF-A839-E6BAD4272658} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3060 iexplore.exe 3060 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3060 wrote to memory of 2440 3060 iexplore.exe 30 PID 3060 wrote to memory of 2440 3060 iexplore.exe 30 PID 3060 wrote to memory of 2440 3060 iexplore.exe 30 PID 3060 wrote to memory of 2440 3060 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dad61dd0e69ddd3796b319785ad87270_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3060 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50397dbe9c2ff994f1c879ee4200c0a6e
SHA1d36e490da2930f544c7cb958804591dd5f1eff73
SHA256e6204d8d81db42a49359d611124e7dbbccf96ddd1b5df201bafc708e68d47c74
SHA51202b06dcbc691a9671153c3bad6f3887f59c2092a26f3fd0e304dac3184d45ea3fa2bdbcfe831c1f8a92b82b87cdf5e7fd8947a49eaefa07ad318d7b17fde3f10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e1d9e0183125034261687cf25d1fabb
SHA1ae29ca28b2079dd5281b0f8cc1149f962719c4aa
SHA2560fee69bacb7d147fc5576f4b11cec6c5acfd8ef8745128bebaf6a2084e351684
SHA512810c4ad3ac82ffa6ed02c2231b69e4de64995a9dcdd5f7865363fced47293918998c1615ff1d8e02808cca379677484c0c2159d467314b07def77bb0ec35104d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572a1bc2a99b45b8c30499c6c6e1ea73b
SHA190a16f5eab3ce45029b6fb7b82666954d26bf3c1
SHA25638c8c27d8758b1ebed963f0f60784e8aeb3db24059e3be97b46a2a604ef1707f
SHA5129bf624babce3e7cef50fce884e60848d979aa9e56f80dcbb745d141e0ce655f4134c765e6c95862c6a918a008b673364ad2793735a186dbf7556af26f4d3089a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556f290b986a5ff91093247e5bbed6344
SHA16ed459a9977472c61fdcc2929a4311a2193fb805
SHA256990d866c78b4a8f378e27daccb3cfe4938783aa47cb85ca4c2f929acabff962b
SHA512912dbb17766a564a66cd036d4c16ea073f08b99369c1f17b3bf87321989a20e1d8c22fc2892ead24c6fbf7c28eb0c56a068a93a3c7a2e44604c377665c6118a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540a23a5eadd6c8046909fbb700f60b7e
SHA19b99f703c7d4b229aa226d3d7ecacd6a88293acc
SHA25610ffe13084404609a81a73154b9b7f3555dcc11f7301d173384b6b4dd979509f
SHA512da5793a80e56683d1d9e513e66558985e16ec72afe89c4e5aa2e88ace0c4644da2afe4bb292b4da5569b414b128d7e89a0b205edbd41de65b3498b5401884a8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c531afcc6ab6c1d615e507f504eaad4f
SHA1e835aeff08c0b4e4d14a7883f98c2b435cd51720
SHA25602556aa893285de568311e8ff638c3fda80e82f2325580f8d4bfdec1bc7cc478
SHA5126ac079f8b97a322e9a29d4cf1b7b74ffb07b496bdb9f91d795d20743d76260a72e23a6ff51a8457ce9fdc5e12dd5358e397557e3c4052a636a73c2142c4fa310
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f49c8d059173470fdb5332fdcdfbb1c8
SHA1782151fe3a5bc3f37213f736b92a6bdc8c4ee1f3
SHA25643bf70af5e0036d4503931d1f8321e5626fd48280e2a6a77eb0a5d59c43c63ab
SHA512563261d099f19b49d9e67735ee79e6999397e8ff4b4ee70b4e6854dfb3969872b0aebdd939f88a6f6973ad78d8b1b5fc192b989b8dc73a929d8894fc6fff8958
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc5ce283512086b9b6c402d70382fd92
SHA1a2a15b8d26d8b2d68a14f39b89131872cc5c024c
SHA256813cdbbd5c95b2ae5ac7e51326976a5b32bee08af2f62b66794816ff058f286f
SHA512d412e5e8b2a23d525e0f154d3e6d88307c0c54244abe94fb735eda140f7509dde2fed7c98e957f6a564a05258cf7fd3316f50a13cdbf84a78f81bf4726c8c0ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579e829b45e748fd71d42c1a0654f0637
SHA13145b51f98b571cdc1f19b7117804a7e22565299
SHA256d96ab1684841b710b5022d12fd3aa9d68e94ded97765a854432b58a3727c00fa
SHA5125bcbda356f921c1b944e4a6c1ef58cc1c467728a0d1bf7b6c5b205ce5c045c92a83c5c3dce15674594a1d3df0a136a2ea0e2f642ef5ee0f6cd95767702af885a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f81415b62d2f614e0ecc96216c18d57b
SHA1c9e8d30672fe13bf41fcee02f9e778b65970ffc4
SHA2565184ed49ecffd9d9995f8b73332ebf65bab2819ea6c08c0ab4b7482dc8672f93
SHA51240f50881e7ef04412d931451d5e81a4d8ba6bca57206c82eb593334731294356c2193cd675cb16dbab176220456a1583d8fdf3774c9a196b55f842311a9c08d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c0fd3fc27927cd404b36b83ace8bd77
SHA143ba1b8f4410d93d735d81b0b27cb84ccbeea68e
SHA25639f9a0d7effd389447afde2186558837c0e907d89dc3385b5597d5b9e58435e6
SHA512252dbeec424b7e4e86b294c70166f731e717c063170752279010f390377da1955841095e7d7af73b9ca5e5bc3424e671686052f637a0fa175ff2ec226f8d66ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509ee5a8219b72d00097824ba9653022c
SHA132d11d73d6eb9f3172b192d719a1dbc225518cdf
SHA256f43b87307e2c7c199b88ca0a63b5dc16063fd319247dba86cfe50f3560564e4c
SHA512dac5bbfffc8c5042d9a891bac9a7e6f49e620d29fe98198d1a6d540744efd4479dd9d4f676e3d66d8f9d35c48a79cc45293c0fbd59066c9d36dbd0b9a274c044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ac0dc1f1f3514dcad2b13495412f942
SHA16c089e69ed92d51283e4bfac9debdd4513088ae2
SHA256f269064ddb643fceeec6b85a145bcdf6229f13ca91736522fdd3f2801779d78a
SHA5124e1a4af07c04c4799292ade0c3a90df5802590ae8c9e02e6a2dc04b457ee72fabb2188a3d5e6be4002ebc6612a67939a2ec2df1aab14de20d9837670ce111be6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58632b33b1c83ff8296c246df3c201eb0
SHA19e13cb756326776b2d12e06847a2b01f82641084
SHA256bc3c218c9b0b65f84a5ad6e35c12768c949b1db8245b3b218f7b44c6a6a8be74
SHA512d537564339d582b90c02f62f9e5e035fd59733acf175513370ed5974bfe98546825c90145b36fe6d491e3e6c94f30cba6b1e01b9f6223e52013af84e7d3027f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519d872c49bc309b8f94886d013eb8fc2
SHA178666558161d4718b72e45f5d4b1e9f2b181df22
SHA256f424b66c910ba5a730c697a91df66f18199d3ce868b1281b79e0f22f4cedce80
SHA5122f02978058eee2953115af4176afde1ad50e803f78079831b0beb83be672dc0963f8ac59995d42c0e3295f9ad0428c1251a14e1b9a444666f25c860a992152b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50295e26b083aeb18d03606a70347d524
SHA124ebd7197eb83d1758ce2a671868c2f86976861a
SHA256e0b8281d779b6eff20f61424430696e561e12de9518f69e55382ad1e392566fa
SHA51286bccd31c352afe75fd359c6fb61c15c51dbe6daa9404a2ba03dccc3f1025641df58995c80e10d42a22ad1f8e77d3c9c0073395260da9a1ccd5a4047dcb53543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f60a2818b1b986c5baeeccd94826e86
SHA1ea2a089720602d8d128f5796884a73f640c85180
SHA256ecb7e38b30d1081ae55a14433dfdb4be9b076e83a5b4158d53c2fcc0d8409eb5
SHA5122e15e28ac4307655aa3808d1b7a61731bd9e8f0aa3f681430e267afa225c5c778fc238551f642730ae17ccc86a6b469f5f251f44e2a683ee0244a43dee568600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58db17edc08ff0c1e2b74fdcf151bee0a
SHA124fbd98ed04949d9b3dcbad8ae677650e3ad4eca
SHA2564c7da6840ced53afa0a3f0c974ae57da5ee3a4625f7393da8ea300d3f739a676
SHA5122bc40a43542c9ed1e1052b580206ba13db15358d12b4fb8499e9bb72a5e9267426f5ed288a64e23b3229815c5af5738d5eb46c0f232505ea701b180003316ab5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9db520873f1feb2a9ef1e5f16786df9
SHA19f2d2e01e6f955551774a7874348305f822164fc
SHA25683db42746e369090349fd8d82cc79c4a288a12920cc3f46496617d4bbeee54bf
SHA5122b6d0d5ecf41e2da83d4ec08ef81125309ee322c06336e228df823d68b0e24f2a844948bfa281a7b0a2f7a59c407eea9a353221bdaee675a47cb0ce0408cca85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508b2e771b760f6afe837fecf8eaaa675
SHA1d96b3b3aed4e50cdd03023109eb5c7e7623e8a45
SHA2560577da3e71f7f06d5e32674af68c7a4bbd996d3b69e7f4718986ca8e3b6427a8
SHA512b26048787a734e5f2b42900f82ca57aa5328bfd34ab81c42ddca74aa868d6ad820a796ce44582ad038a70377a539f19e0aa1c6cd63ef9e7fb707750ef5d2eb8b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b