Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 15:48
Static task
static1
Behavioral task
behavioral1
Sample
2ce86d93287ca588f20b20415dc21a6c_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2ce86d93287ca588f20b20415dc21a6c_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2ce86d93287ca588f20b20415dc21a6c_JaffaCakes118.html
-
Size
109KB
-
MD5
2ce86d93287ca588f20b20415dc21a6c
-
SHA1
9f0aa654d78cc3ca332ef48308e67a8f0398590b
-
SHA256
4a5e25bedaf85f6cb26454e52c83706e7bb307b060c5e80dd5f35c3062c6ba7b
-
SHA512
7dba772bb1df0fafd9fcfc59db74ead2348cb8dbb6c68170aa2bf702bc8a66f09768e156761739a0613e85c09e29d24ac184f2011a2f957259b333de700662e4
-
SSDEEP
3072:iLjC5aFf2aKlWN9SQY4ThzElHhTHS2uO2s:iLjC5aFf2aKlWN9SQY4ThzEGs
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B89366E1-3D84-11EF-8266-E21FB89EE600} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b00000000020000000000106600000001000020000000e8fad8dca91e8fe888355c7aa714634f4cf6eaf317767ad7b3b42d1b8806ee41000000000e8000000002000020000000981e2b22b8dd285ad06500eb5cd03bef29823d51aca0e51d2dec26f7fd27691e200000009df2f07b3f6148e022aa35ddeaedcbe1cad3dbfc48ebf1f517cf60e6bd68fe7640000000032ab934c7c578077a925b44e3f568afcb0da2d746046346ea4e15090bfc8d70316ba23fbe8aeeccf09359ec368a62d9fa65dbc3a5d0506aa9cdd91b310e74fe iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00cc4d8d91d1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000930ed985b08cdd4cb38e38023150682b00000000020000000000106600000001000020000000b6bf42705a93f530af9485654664da043c2996f27ab05f3dfc2a51afa59a3834000000000e80000000020000200000001a187f7425cdc347f3208637a5c9053e65da4dfbe3fb5559e83a62ddfaad205e90000000300e19170d591cca59159e76ba2b762438e3af2cfb284beb9dd1b85f0d9d7701c86e19343bfca9dbde9cc08e23d5743b3177a2a118e1c457f08659f487eedcbb6cc9d6c1741d72300c805724707bccd912bc17981f54cc8689ac80301db0333d7de5e1c8d4c3775c910bb9c66d74a32475c6f8d2f2e7fbef742b5e5aea55c6fde2b65e945db65c7bd5a5f488686e606740000000bedd572a0bc58c35d5bb2a78c90322849fda07a1c9eab39a08a9ffa96f0b63c32171cec9b87bddfc12b84da5dd67079906886a7f8c5543d590d36520316c3d0d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426644439" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2660163958-4080398480-1122754539-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3044 iexplore.exe 3044 iexplore.exe 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE 2480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2480 3044 iexplore.exe 31 PID 3044 wrote to memory of 2480 3044 iexplore.exe 31 PID 3044 wrote to memory of 2480 3044 iexplore.exe 31 PID 3044 wrote to memory of 2480 3044 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2ce86d93287ca588f20b20415dc21a6c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582b4d8e53158a159c42657f7c9e8c10e
SHA1bda84c77fc47525e8c5b0a84498a59f5e69376b0
SHA256abe693b80cd4c23dbbe9db8d11f3ca981e681476946a2688f9e09ff986a87da7
SHA5128c0093fa114e49a119d0c60699a90b385ab1efc05d2fc671540e834fbd822ae4d499714841051e9995ebabeb869b0ffbbdf41b5d040cfdf654e7576a6b281710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5549e4fce986cba4fd4756a0c3cb5c3aa
SHA19f186af015d53b88b01059fc143d24074f0a054d
SHA256ed40e20c6df132c75354780f7a2b07b4c4bee4fb00480f9835ee88773e78e3de
SHA512f35ec6b664ab97d9144c3e7cf7e3a8edeb42fc45f202aaa94de8a50e9d821c5e98ad6108024059acd0154f16d911edcb46cd8e9db293a442226ee81253667483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582a0758bee67e5dcda44e5b479dbb759
SHA1fd32bc7ed56bead3351511f125e8d27f6d442f20
SHA256966f7f7f3a8f6b44a9d6760b1c7074689c6ddcc3462781a593096e6e4afd2c1c
SHA5128c2b1bfe82128f18cdbf545ad615f2ff0fdd074b31894553bbfa300f3c0ec8483aa23f11710c9b4b047b858a183829558b5599d2a9c51426e57057c1a3e5f88f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff57237dbf8bd62d3d3e787cdac95c04
SHA10865b0dc682a761ec5c16266df4013c39a4f8560
SHA256b902b75beab5410f651d13bddacfb8c5bdb42d27d85bac1562c6957e74336893
SHA512089da432bcaec3c078e2a6cb074d1a88e4d30107ff6181d37e912d9eb3f94502b885acf589e1dde3f862b0714cc3ef4b6d4c9db6c4a0aaffb5c3dd6eec34849c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520940efa4d38b741f33052e6cfd71f47
SHA16b2fcc4f2d2b7dba8467c21e85c7ff1f23484de2
SHA256fb6ea353e5bb0249da6d8e0351cc7956d38af426abba103e13a95a4bb7a21da6
SHA51292c7f65f2aca5d8bd895da12f30d6ae3b84882201ea61549ce6c7bb62bb5939be7db5d25339f9c05476143e4569f0106d057460174930f260c6534067e88b82b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2cf441859464367b6360c8f04760adf
SHA12e7d99907e1ff7a314fb446c22dece049e126390
SHA256a606b390e7b86967495b73fb3ded74d8c26938ab231215cc852730b80d42388d
SHA512c01e7adf79b6ddb52eab2bca5979df1150545c0c650def77398511551cf86134c48073e0c1a9b4d959cac4309fc416a55723419ea808ceb3d6d767e533e296d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564da5780054f01951bcbfb5dea0fd61e
SHA1f401aa96c293fc27df8982ca2f683db9904d21f5
SHA2565e26794301047454cdbde3d7917c736fd860d5ef366cdd985bbb11cea5a5d6e6
SHA51266816f2bfacdd298f9fcfddc7958806fa74615be390233133316ea01c57a546b67e8544a887b7922f54c5b2195b18d67f8a756ebf443230179c1593c4881e184
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547e7136eb13a79219ee89172b76806c5
SHA19dce34cf65647b669325724e221c8485bc9a2507
SHA2561796b83c43ed45b349415bc161dc8ffcadacef7c193872e026d8578b4345c873
SHA512a5fbb7c4a29f443cf36c1d68c18b2b2f9cac2dc9173bd6fefbbd6d963b114420a448da88b19cc5be0bd83f01e142f78c1c3e8efdde6ea83bc40f51d4ffdb3362
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e553305be8e61aa35745964cc59316ae
SHA19eddfa42b9703a5d047a1c7895cbe1cd40966dee
SHA256cacec540969bc455d6f21607ef72aa57d69488bf392cc3522b799231fc95464c
SHA51253b1bc98893c6989a88ead58cfb46f1e7f93491d99593467e6b74c462d9809c5ff8a13f270410f916220905cbef70694fdb9e8fd8d15641c53b9013e4684f66e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a5da7c303dd39f6b08eb735126d7203
SHA176f09efba0e341fdb44a057c2632a9662f83e818
SHA2565c3157b27411dec4b7aca118342992329df65b71ca5856062d5a2badc8c473ff
SHA51220a01548343c212eeb6297fa33ab4ac20e4ca6d07f545b1f9176b6d2db379bd7d9634f1cb559b0eec0ad7d38e72105ca7039f6c37e4f92b27b6a903279a5ea4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55df460536ccba2367d0a036a5a19801e
SHA11a62e1dd473d6ae68f25935d867946686938bb80
SHA2561ba314e0fe712bbcd73a7285a71ad8acdb56822970dc30ad9e9b68b051f687e5
SHA51254c8baba1375c1cba0ac0f5507845d75bd258877eec6b71893c5165141fb0134731592047badd542a8cda53b4fdde6ecef00ed53e6b00896a3bc1bd20b1accd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b544230832a631a93a8cd8dfbff6ba10
SHA176443f9bdda2998589276c154ee6e615fb2a8e39
SHA256004a47baa753bca60dde9eee50e4691dad0c9494c0a105d6a861358df3e42bdc
SHA512d254eecf7e5cdc25cd48087248210c8886ceda6102371210314d2dca44adcdf59a94890c31ee09e402836d5191f476b8df277f834ea51793953a353fb1d3fc0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5ab42c4bce74cfb74d16818e59c2b50
SHA1394ee651d00903c12db8c62a72843a4f0f09f318
SHA2562cb1a7fc6155de9aaaabc6c99cba72d7e87b4787baee002e6348fdf84a2ea992
SHA5125ffade000cba46266c0f79ceea9ac05ebbfd20375bc9a38c5d6e4cdf3678db8f5996893aa6a6338e83141701a3d6f7dfb0d01722404ba48b75e79e15b65c6c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e78752363a53158f34087b6d2b5eafe2
SHA18215f7dcfc4871d7a40e513c25ab1aa0ecd54552
SHA256a5aeb1b2dc75e582fd8d4d2464c5b148638c10be05480978c6869280ea42802f
SHA5127fc02b3f2f600fc9a8bde768af71c647246a151b86cc90da7fd8e3fd64e985c59ecc1d508532311bef040e8ee6dbd7cdcd65baa15c23f8f9d58fced19a3d1e71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52305a99dc53a217a5f0330233b69f31c
SHA111a2316b2a1aa002fe010109b57b05915b5b1669
SHA256e5579fb06c8a0bfb7b39c5a87a6b595b28f2db1d8fb1ad81e1cc01143038dd2c
SHA5120bf1399aa6c0325bf1e3e385adfde65e1f14b28bfa4ab49b3dbc51cff657e946666fff23dbedf58abfac6a41de2816ffc41eb41135b6444f127458bbf576d9ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e56143d71a0e5a483b9eec48e43b8cd
SHA1b4560dcb559353b2a30ab27213daac2753e52aa7
SHA2569ce312a8acc4c8ab2fc2e530b35ef55632babcadf0640a116204cc681f80178f
SHA5126805dd53fc818f930592d074837258818730a2e63e9bc7bb7152221a4b2b95280f76739ac03a493b6cd5e307c3fe9040e56c3ebda6e45241483a989f5b922df0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d0458bd6dfb3f10bfd26688fb28872c
SHA12fe866ad44cab9461f13a5328471e83422d9c933
SHA2566dc49ea3fb1539c2528c8c7efb962b4833a9b0183cc0be1bcb8cc8b47f56991b
SHA512daf9025ee40592d8f39e3b379afb75edc12fdfcb3400c52a24364706582e61603c9b064d6f257d92dc2e76e87ce638e3feba186715da66a701cf4e62ba8ff509
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539f6874e3b4c299a1c7026cddc6b233d
SHA15dd59c749878d816bddd51aac530e7c97c39ccd7
SHA2565c847865b6f8a53b8256f3dbfe64f303e7fd0c0f1f0bcec44cc5efa044dbada4
SHA512269f7b1a82b6ebad3abafb47bba42fbda2d4d86abd181a5128ec77284ad8806a7247bb658b01ea5cdb5a72cb3ad4ed4ad5d17850ffdc3722c2253af18e5d6e4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fd0b212c9caf482a677dc1e6542fb03
SHA11274bd1943e94a46daa67f2cd88f78ca51e087e6
SHA256c7c2a1d3f7c6d4cdd804ed025e00185af09c14af96341322dd4fdd4ca40da969
SHA5128f24bce75faa3d148235b1ed48f33a2c4e516559ce4d67163a71e6cf742fc751ab6dd6763b113753cf1fe18e08f11227a2f4bd027712760d43bf0bc115f8a213
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b