Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 14:50
Static task
static1
Behavioral task
behavioral1
Sample
fec1b0d28c4f1f470186348335c39cfd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fec1b0d28c4f1f470186348335c39cfd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fec1b0d28c4f1f470186348335c39cfd_JaffaCakes118.html
-
Size
69KB
-
MD5
fec1b0d28c4f1f470186348335c39cfd
-
SHA1
98a7bd19d66792f852bb2b5b9a344f7140374666
-
SHA256
405ec632bedc021cc74676aff1bc9a22a5845f8c33ed727b1b36ca97faf09d35
-
SHA512
58cbe03c6891c91e42f10c9827e8bd0dddfa177a5953e08ebe21d401e1b086126b37be46efa2f46f640be97c3b8fedbd9a09b001d8d7ff017626865ff7d1855d
-
SSDEEP
1536:gQZBCCOdA0IxC6rkY7vuRW9R9FkjXFo2zk7/wyZLhBbkaz5xYX5eYqYjZFoQ7n6V:gk2S0IxuY7vuaR9FkjXu2zk7/wyZLhBn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0d3ecfc7e12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf60000000002000000000010660000000100002000000073ee6fbcff47d7a06973e2824ab6614ea21ffb4560e5b5ac53945d36238a16b0000000000e80000000020000200000002fa0c2911cbb5119872d288005a2ab2ca0961cf54bb7de7e9729be9099c5d03b20000000a7bce07417a68bb1d540d9d7a856f7a33b575254934180c3c8b24b31fb8111a5400000002b654e8867fd26cac75946d4e5028dc754030d90542d06a820f2d1c9dbadc0ea78ca9900c9765361f8f6e74008dd42f15927ceb4cde94aefc4395ea134dbb52a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433783286" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{25828911-7E72-11EF-9D9B-465533733A50} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3044 iexplore.exe 3044 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2540 3044 iexplore.exe 30 PID 3044 wrote to memory of 2540 3044 iexplore.exe 30 PID 3044 wrote to memory of 2540 3044 iexplore.exe 30 PID 3044 wrote to memory of 2540 3044 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fec1b0d28c4f1f470186348335c39cfd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56035f953afd7d81af9d896feefa80078
SHA16295d3343240a64c246c3f999d860f9884d5ec1b
SHA256b73356e5b1c4eca835293b96567aa38cefb6b4a9a38c71036486a65c5ee9a869
SHA5126552b2a223f5257053d4a3a2f2d1f7237b2fd0248fd5244107e93fb48093bdb7a554afecb8588f3d5cfa4bc769122911dea83951bf551e146c2f93c955a9dd4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54586acca0f2b4bea01240c8b3e4cb626
SHA1705c08075bfc7cb41e05bff838fdb6ffebe9ca5e
SHA256ad3872cbe222be674d5b56635e62cfb6fb66747c392e7373ffbc251a83e99a22
SHA512564c8c694e10c91bcb4361e4aa3be9eebf29d271fae8980bbfb85fbb9c9e0f053cc15ff204b2c207033c5ecb216f411a3719f7fffee66063953436e7d3e5ea02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590e485f28647a3fd4c394123b991478d
SHA13c14eddd7a2d51caa0feca55e481e0c210766833
SHA2566577e62399de7aefd990eff3d1d7039c4d116edff0dec5b7fc2e412b150979ec
SHA5124b0294fa2855bc5c7a4f8db4f93378a8d7a99d6b2f30e009ff304971cde537c4f13b97638a908307a7fb0cf6a59904f11980aecaf3df28d2404959acb2941707
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56060485039ef367f99b61c0035bc2860
SHA1000115132f95295fb49e6646c2763bc589263009
SHA256268df39b620e104c94ba0711a25163a61f0dd986fb001e9ac6ee1f1a3267b155
SHA5122a65a7a15c82e1420717cef50ebe8cd249456f2435541645592cd73ffe40a0425b24eb29d684dc585d46ad8fbbb4dce34d2c2059e69d229d94eebc12b5820657
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5246a8017438d800e25f526ce488b6520
SHA11bff5903fef1b7db5ac9e6669547cb099b207344
SHA2563238cab02444dd2d815ee9350a0b22713a4a89be96810a02cb8b4be2ae4710ae
SHA512e6ab6e57929b1b83d839a0010dd3d12f215bdc9862d939806938dabac2d89d4c76836b2e6dd0b65bd86235882955023393a0db70deb907f6c0933646ed6d713a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e94b5df96df59f1157a645e37a6e9d32
SHA198a31986292e5fd54019e7d997f2b3b917ddc0c2
SHA2564b704382696c27dbf066c8c0ed40bf42f9ab0d55ae468ef6706586f281cbb3d0
SHA512fc57a237c848bdfb9892f5c3dfedc0a7c87ab14d160748d59c6bb2c2986a58a8dfd994a17d74ebb618c357bcd3643b05a1a6c49e85e9b8665491dbc07c42b214
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52506b8e4f102eb2bdd8a2caff568028b
SHA1dfe3796c1e9de60b53e0d7e142cb37d17badb02d
SHA2564a397c7cbd46f039a49de1be07f7ce1878d355b4ae332c607cff44d70a0b23fe
SHA5126200d267ede270f494456b3f2ff00d2733a0f4de6800871234ab662ccef16093ef89dea1d725643b2b440c944b95219d5fe39b664dad329870899d5df444d038
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5757433e55c9563726865633ac639655e
SHA1f4169d5dbc48e263bc89ddebf2ca349e128662e7
SHA25689a9d0fc48d2d5f06aa7042b4377384608794d98bf672260a6209661516e2144
SHA51206776fe14503c3c6a6b96772924c7726c8e4ab78c8c694014ac8561e65b7c2428e8d2b2bab7074c31186000e68dd44e1b463ea59f9ae9b5156b934b1a8801fa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ad365e5aa31add03e4bb3e87e411f22
SHA1e6cf19bf55722c9c75f3ca0f4a6038b7f40baa77
SHA256a5a519b7b9f14683aab111e4af77e1cd26f9fb278f255a4dfeea465095bdcfd2
SHA512480918cd6787859dcc09b1f96b205e15f3a72de313a81c6df25b35401fedca5fea080bb0a3455c54b5dee71ab385ea386966e10a4366fec97e4a3f797a533fc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a1a76228db63f77c7bc959af2a7e0cb
SHA11f796659afcce313092e2c7a9de0e8ce8c642f3e
SHA256906ac29b2f56a05f2c5af0d00f08cc3eff14cf5fa7cedb24f88c702167ec3c61
SHA512e07306f3cb22dbf35d095ebfb21615e925281a94958bf2835cb1a0cda91a9904ee3a34994e6044c200035cf8799bacb3b6621b1d24864036548b9ee26b5b6601
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3cb7f7e3b35431aebd5a6475f9bd1a7
SHA159da97b8fea2c644abb31339bc1e094b03776ff1
SHA2569ae640cf1ed8ad64e82c09e72009662b3fe533c2dc55b136b068f91c3ca7d7b9
SHA512bb4aacd84f2660d6afd3759c2cd5b0faac7d1bbd589a00d75f23cd07651668064d2bcac2f7532536a508bc06e584d8122ce14ae19d52e00dde3270986aae5b69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504125be327da591f396b120239994fad
SHA1a242c3368f3988f746987ec1dcde3d0e4ed94be6
SHA2565c1ab146de6f6e8664e8cc65917d61359ca26857ecc29307b3d5b242efc16c69
SHA512d76c50cca05ec5a80d136b6d307617cd9582fa5d19822729872817869c8c4da0e7c7e1d8fb4d3ae1a0f6a2004b378a2971238eccbb773d5a9298a85861048f34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dbaee00929a53a25cee6ddc5fc2155e
SHA1e0e51fece8077a4f081bd90e8f90a6807b667677
SHA25630987776a743187dd3111fadca7785361cce0d079c4cb242e307fd3cb1542bd2
SHA512c64597edb854a2bfb79d9f970f7872941ff2a4f07575fe89b62c8fd0a1c01b935187453c0fe39013fa4792e4b817edc9df8ce0f3630e91db5387181877e0940f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5332a56778a8ba307a88856b07cbd5a11
SHA10176901864f746cf58e38f2dabef1abc2b7be9f2
SHA256b015005d313fd0ee0d0fd1b7d1f8960f83eebc1879cc4ce2c34c1d875a94dd82
SHA51290758395beb5119e3326acd8c63318c2b5147e9829fa51a7e8e4ea7e0b4014d1d467fee920ff9eda490074c8c4bd59fb8d6aca84083ae61f68d2b6bd7a67c501
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5631fe968af54c5380b49ea053c756877
SHA1e8f636d1adf64dcc93df774018ec4760e6767420
SHA2569f3531f77bc9f27854370dc1047424a30649559776e0034ed7084a9d5a24e1cb
SHA512311e14788a55941bf2069f9722a1c49b3e3b940f419ef1694bca67af24344b67327e0c148e8777e3416b3b746120fb3ff5ad7e6b3b46cf10d9facbcf0c42dab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585abdf5d9f38519aa98bcf29a6d942e9
SHA1837173af79d768ddde167453548024657106845b
SHA25671b48678198560073499e810aabc76f7c421e14c66dc2efd9524004889a48a8a
SHA51228d761ba907f95b65ef085c0fc3f23a6b9aa1a329264efb45277370194b65d6b89b20295f45b0ad6beb963b657aaf319f5acbd179893a50d0ea2a2e2790d5276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da995f43eaf6d93b95ba1e9713a8cf98
SHA15572d5353c5dd65100844a9282eabea5eede968f
SHA256e68dec6163905c9ef167a9ac529d6dcd16682e2ea8c1592912150499d34354d0
SHA512c67df122c92204d93af39185a17e3262aa66c4b5f7efbdca9d0a925ca094437c9606313dbc190018fdbe501d05e35ead3387372b2ecdcc5f114a304f28489088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f11500d8bd19e2f47b619a2f9056891
SHA1bd569fca21d1798becf96a40a7ccf7cb76063ca5
SHA2568c98cd6485f852760ed613a968ce348dc643a42fd936d935789473ea414e223d
SHA5120e6d8f16fdd29991c22d57bfbcaf7701f4993f79b78b386cb0eb63c6298db31030b2be9a7eb37700dffd1a9abd8818668d44ccbf703a407cccb8bf91fbeda0e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597a0b9385293d1bbf5864f236315c1a3
SHA1f7892d2f1d3c67fe8401fb7e90432d1ea1ba11cb
SHA25648bc34de948b9a7cb792f60553bfe57778167771ab0caec6c8b31ca2b741f555
SHA512f660ed251bd838e4e654900d08ae7e3b6d9f579e6ffcc6f12a8d8d730ced94c66988901d39b5d55bb91701e7ad34b7450d27534e1c1b930c0d06631c684294ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9e0714937b00c0b487b6291fb06009e
SHA1c16a71beef8081359e2c8c3f635cf4c64f419222
SHA256a3725d954ff208556e87bd8f0a83bc0ccfe8b7245f92ae29e10ed7a0ca3da270
SHA512b7de99eee585e135d8beb6ed55202f4d8596402919b0ce9d010bf4f0a806e8f5d87feca08e3f02c5cb3f84e22571718ed962041850f667129c5d1e3971f86240
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b