Analysis
-
max time kernel
143s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 20:17
Static task
static1
Behavioral task
behavioral1
Sample
ded53acabef5a1114cf062b7ba1998e3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ded53acabef5a1114cf062b7ba1998e3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ded53acabef5a1114cf062b7ba1998e3_JaffaCakes118.html
-
Size
8KB
-
MD5
ded53acabef5a1114cf062b7ba1998e3
-
SHA1
a14faf510d9b8af83ef8f571e079d109bfdb8ebf
-
SHA256
296cbe3bdc32b61480ee7c2cacae4f37ca5d4eeb4292549720f16918656f1541
-
SHA512
a59c151f4e64360759b40fbc5d3856f9a42c6a4de8d99a276460ff6be12cac7132b4a9336689e906171cb90307533d78657b62c8c5284e9ff333260b05d420bf
-
SSDEEP
96:xKZsZ6zrTnrC2L6r8knXrFI/83cz9b0EAYwiPAV73qUGgujAAAOAMkEM8uhMrFIQ:Q3TnrC2Lt83cz5yYw3OlgrlvMkUF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3BA4DC01-720D-11EF-B909-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000006a897d4c918792fea9c928c0814bdbc5355928c19710e30edef0f77411548c14000000000e8000000002000020000000f9d29f83dfee6f293fdcf57b6331bfcda2c9f9d3c6c65d682b80652235da58a920000000165ce1680bb1e0e6d5f3fda341310a82e5faa112188285fdb73454734bdae6f340000000c38f886be152b37b976d252b3eec53e334da6689f51f3d83e66831b208499df5996337c12e0d16fba52608836b160ed7369c33c6b366421340e9ae4da7513965 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e09fac531a06db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432420531" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2096 iexplore.exe 2096 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2352 2096 iexplore.exe 30 PID 2096 wrote to memory of 2352 2096 iexplore.exe 30 PID 2096 wrote to memory of 2352 2096 iexplore.exe 30 PID 2096 wrote to memory of 2352 2096 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ded53acabef5a1114cf062b7ba1998e3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e68cfcfe4faa45806e0460cf5cefca5
SHA120080297893ffe2fea61055d1b99039aa9996480
SHA256495c8f89fc9d3205f7652d9d0818eff90a218405ba6dd6153cfc09895a785606
SHA512e5d347c4a1d76da05f2b129dd53425817e9bd69ed86709b564b971cfd9f0e748cf8de6437437f5b163449133481831a774cac131ef89bb37a9ec7341740b04dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ac452cfb03a934f08846c70b1bef952
SHA1f67f5cf007451ff20bad90a3806a58a169ca7d46
SHA25661cb03f5c5188a95b182ead503912c2e0dd7b7e6681d0da1f02111ca4929221c
SHA512bf4a89884ee1b691705c7abf467329c04dee8a94d5fa7a1cf8b09dd4bbd1c31668095d57f8f7ad953934ff55a2fdc489dc3a26e1a94f1328b2e4d273fb663b7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb8f62a3773638cd089e506ea1a7c7ae
SHA192fecc545e91b0509f50b298736801127ac903a7
SHA2565dc04f62125fb95fa997989b66820152e5767f194eff768b67e8212a1145a06a
SHA512db143c9be434af776f3f0e108ad0060dbb3fed404ddaf4d318b5238c413703615edad9c32acd60208aa85609de574d7e594bfaebaf07ab98ab4e5e1818354e76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd6bac895b4c9af1dd8e254ccfd0e754
SHA154520621901d8bd0f4cd8f7a5a37a991a8798d42
SHA256b47c216482d2815d2a63f7b66525558c64cf868275cb721bae58f490ee5e411d
SHA512f2be8dafa1f6e276194286e87043a06d5b1e2e5b9584c103f3402b6724b7a74ec1225945dd9ad72df2cf0e426f718026c1bf7f731f1e427f9e93b49bf00d6e4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5facf9886cf6ce3f848bc84912d7603e6
SHA105b366ec21544b9da2bf8833700bf5efbe24d049
SHA25695b5fa702a2189964da914b8078cff4332576c279d475ab153fa09d2936d6375
SHA512618a720b4ffca08c61d3e4cde7118d1bc2721be4bc23c978081f7f2ca1dfb289656688f21ae438da8d3a371aa5428a652d95d992b4bc3c4ab67e293d2345f71f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dd4943f04bf583a196fe3c3b05566e5
SHA140ae9437d9300a5adff7a6dbc5a25e54a62578fb
SHA2561ed0e3ce7826608425a9ff2e5bd9a87db87dd92a12a9cf4f05e2015312f29b4e
SHA51268365a9fee09cf9582d413c9ab6c04db3a28bfb1e182613b7c1725bb3968621b609bcfd4484ce653af0cfb5595ea4424c9c16c60d3c83b7b9e4eb19ae94fc2bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f8ea67b6599a104488b0c48cf05b7cb
SHA1d8e283985a4d37ca3f1b752bb70301148280eeb8
SHA256f0b9cf6a62d4493a8e2ed5acc6b1b668d27331c735f9166d2ea3f453274a84f2
SHA512244e257ccf1f102021d547482b6466ae781527ce9d29f197e0c3aad08d239da3869e5f411e649ba23454ab389698479943e9fd972869b36bd152450b30f80755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e5239dc10d2a832c31e7a3f0d253fb1
SHA103e3438f51cd4db256a780270552a9342d516d28
SHA25629ce20a6cdc2ebcb67cdaf166b1eaf64c1fb7f707827968974f466dc6dcfc805
SHA512b47a2d299a766128900924be4b70fc11a677a3f02a8abdb3e789a70f2a241dd4ea0b520ad95ada11431f6dbaad513677a6a39bcc8e5ebbebc9fd64e12202e29a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c8810032f2f0f2092149181944ec720
SHA125fbee65e8e7988bd146d8d0bef4010d65c94b01
SHA256f5bf7aa8d4da6694811f1a83ee21a4477f87ba0dfc60ecde2aa10e0ea7d04dc1
SHA512f4e87b27e30895f8e24e70a32d742dd4566e1c3f6629fdbe7f750768bf53c3f596c929620058117f3aabece730403f2fcf7a0c5fd502df4c851eec8ecd75a49c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55277761aebd4f4ff59297ea358b275cc
SHA158d306aa4341f1277ddaed7c79c54a81b8b5c452
SHA2569a1a4d5dd7a2787e8cf54292e77db1d8a0db15ccfadf27e280e56dc5c7517698
SHA5122a9d41238a3b5a1bc0bde7dafc91969cd87fcd88e2a087650fc177587ca79f5a76d2a6514cf18ed7ca6a76f24d8c1b82717e7948b3c7a627aae8ee4a3902887e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebc103f4d07337ef78ecfce13676908f
SHA14bffaf46fdbfde577b9c0e583d149c34a0c05dbd
SHA25694857f34a6667dba000c27eabd62c03cf3c137be5946cbddab9a5a551fde728f
SHA512b53a37e67d3aa2455cc8d4762d786715a9c26120701b360b899a2ec05f8dabceb21fbb1339f8d7acdf3fe93dedfd57581d4ff4c1bd184a958f49c964fd506ae3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb5caaeebb9dad8cf4aedb46d23bc0b
SHA18e38a1d5ca1a312c08e7dcfc83465c87d06d2752
SHA256fd70a0cee22fa3b090c143a4344dd03f178e0d978e9a37da378c0c4f64586dc0
SHA5125122d0081ec0672e97c156e5b390a85e06d6da9da2d814c3a9804d4c17fa90632312e143c2f1328e904b94f495f0173ca298d157c07c24405f106bd56572fe1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504736cb11446075249263fa046158738
SHA1535f5e87773a3eec859f90568623e651bbfa1fd8
SHA2562b2b424573de4e57d19c4e2b0c338f0e21fc4ecba18fda8073dd17d1ccd5e5fa
SHA51248371b6d9b81e91775c12ca385beefc8dd0eff37ecb6169784c59936e1795044dd649d6332f5021cf895e39da40852889bf1a4201b9e137eafb63cae9b0d1b90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51df41fa8f5421ac24438511f26e86942
SHA11227ea8fb861c8f35174f2d34e6e41c7a64c781f
SHA2563ab4a22bf6d89cd4cb19d3f311de389347c57a91b7d835be7500f840abc10027
SHA51272ad0af1bedb2b9f9570c99b4efd31cb40649e84e5cc9a991cb50dd49fde98ff5c580cc7b926e3e0209d14c3b9ef4ea41743c659cbe7e12c0c0f5d0932d8a94e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f782711111aa5966990295c980355ff
SHA1fefa6a04ea0b3bf11a668b212893afdccd450d91
SHA256157ab702784aec70fb35313aefd8bc9471c0ce76a43cde908ef553c3f33f68ab
SHA512a632fe4dd9aec874ff72832572f517663e43e17a53e770973c3f52168b6ce1ecd55c9ca2edbbf73ac1e0c62828733e6c391822bd9ac751d0e8780e5906972107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdbccb117278bb42a6bc196c7a18d26a
SHA1386e486fb13fe62830882a005e0361ea3db94df8
SHA256760d43e395db5bd94d4d3085656599aa9041fe12ddd2db799fce7e397e169566
SHA51203fd753d2033dc4cc1fdb821040948d8d656eff2ebcd9e5372a4dcc9a3f4ab034d5e787d716032d6583fb18100c70eac481b97da6dfdba4e55be25853e0efe02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fac7d1dba162efb7a16665f65c27bd9f
SHA1d3a1943b5c0bfd621de01192095fce07a942ef82
SHA2565e879c6432b39df6ecdca070747c59afaa76e5bb0ae8c74cbb0525ec2598051f
SHA512b3d02dd6ee1992725a560a5f35f74eab81bd79732aed7fbf59154d88c69758019f532c26cdf1238103e3c1b33fda38dc8a51571b6211d22652c407554883bd98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e469b145b49c947416e7b2cfdd4a563
SHA1861bd0dd9829cc410152c36c8ec808970d4f346f
SHA256d47746be32379d1dc1a478e05a202409bf22fc8238fa4098f331fc45271d23dc
SHA512fb58f075769024c50383bc2869794f7d9662299deba80e85cd75f53380ef29d033d6c82a50513bc68aa7f77f08b9ac55d7eb7912f3dac8b06d97ba648f39f535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a18cf4ce4fcde7654cc518c5d35f8f00
SHA11c44b258df79ca9eea800ca209b1e1441805afa1
SHA2565671d290ccb51ac4307cd0061e70d0ef0c7e063335bbfa6e6011b0fe39d967b6
SHA5123925a2d12f9435c4546e3970dfff2871bad4d52c6f3991f4623d43b0b48e938ac058743d527bff0aab58513c737e1d2e3dd785201fede3ed6c324338d2282040
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d812f7b0537e992eb9559753b5757716
SHA1d52246597374067960226ded83acb40b6e9181c5
SHA2567a6a43a16c9823688e4d68003ed864383e541c5eed2ddd10c5314427818eb608
SHA512ff36cf6d04579394d2638f203daf8a596debc6c76e0c6fc0cfcbc1ca76c3d9fa0db7ed9372f8cf80e899068524a0ed312718990b63a43b1ed05e58792590c420
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b