Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 21:16
Static task
static1
Behavioral task
behavioral1
Sample
3201718a9535b4f5e1b74e72272e916c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3201718a9535b4f5e1b74e72272e916c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3201718a9535b4f5e1b74e72272e916c_JaffaCakes118.html
-
Size
25KB
-
MD5
3201718a9535b4f5e1b74e72272e916c
-
SHA1
28c15a90bf700c69782f5e0a055a9ecdd409146f
-
SHA256
cb5b33ce85a42020e535fe9d1daea0f16f5b975b64b5c94ddbe09887b953ed6e
-
SHA512
cf5f10df6c29a61d126d6be37d436da7f945a710d3dcffe7202bf1c74a326b026080321f4d6cb2539b876eea11b0b441d2c036c9f3a9993deb84715c90534dd3
-
SSDEEP
192:3ZDqEuCo60OBnod1oQvV+p3PCTjfuKNiVZ2xJq8HOya1yUVV7lvbFSn5KcyeRjJx:pOpnvAwRwgwml/5/5N
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000000a18abb7de515353f7579ea190cfdb6a8da5294b3f871625a2270b0e0b325fd3000000000e800000000200002000000024280942b47b70c298b89e66524dbe72aec223d84f4e545a5f76e2a7d7c941c82000000057a112584fd88e0c4752d06cfd2f918693a7f71a5136a089e5987f8d40347da640000000b27a45c2538024087a534915cb0093a769ee13b4cf117f9d3216498a76b6c591e625bc9a7b3258f1b2f3aab9eb2f79de321dd6761e0f8170ac896447829f67d9 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60e55b904cd2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000b88a9c6d59aac15a2f750300b47f89238251c9b2395c55a7169335fbbc4ff0d4000000000e80000000020000200000007d0cf41ee108952b7ca3e84ac633ddf335f5ec04cd0463f22cd64cbd14e748d2900000005a657e072584be0bf174505d6980ef52d667e3030c836c862a32dc892b33dea240dcd3e689aa3bfc0fd41ee70e10493c1b0e672e7d29b24b741b7ff1242e6fdd512b95db5b48df3e62551f0e07b19aa92c2f12208d606e329cdb6bdf3018c502d454ca81a0b6e13d96e43777221e545ce29fc795b25ba6fd28040a389bd0aa3093c91ad25d901661b97dc85c488ff51f4000000024653e61e420dfe9e9b1ed85bdac80ca22833ab621f8fb93f877dc250cbb35029c50a42f135b551f79c478ba1ebae1f68cfa6007761bda9761884d6197f34c03 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426724756" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B93FB2E1-3E3F-11EF-B5D6-4625F4E6DDF6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2292 iexplore.exe 2292 iexplore.exe 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2432 2292 iexplore.exe 28 PID 2292 wrote to memory of 2432 2292 iexplore.exe 28 PID 2292 wrote to memory of 2432 2292 iexplore.exe 28 PID 2292 wrote to memory of 2432 2292 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3201718a9535b4f5e1b74e72272e916c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5482cfa9f2c87fd903f14466f5141db97
SHA1a8fc361f10c8412f50e4dc6922d2d1b56144ff99
SHA256cc48aafecd8e6160e7923cc7456a2b9aa7108293655d852cb4742ee892292076
SHA5123f61e266505c5a893d06dede6bfa71b4eb8667fdecf15bfa25d495c972e7ea51d5518ed72d77e12e96b2d397b7f191f2457004389e56c07b2bf3858d53155a6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bebdd6ae003d253c72f202c8075483d9
SHA103d691fb7c280168a3ffdde1acef34d171da2a18
SHA2568eeff65033d003190c74b18b8b0bf003cabfba87c8bc96f28a1407e09776dc82
SHA512513e0b7dd35956184e35bdd00ce00f54b2bc12f53550b78b15a667e6d50455147139a9914f8773fcc308cbc409c1259805226b2862781ef97437f5745ddd50e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4f7f133459353abd4481c860ebf2591
SHA1abd914f1674fe5a6898f1a7c0a23efbd92d20fbc
SHA256987555b9a6e5b0685de0af8b83be7ec08915293e3b71b8dfa010d98f32174ded
SHA512aacde50da743f7958e960044882970882af186cafa6377d70c90ed7027c90ca4f5c8bab8de5b57482e1c03e3b4ae11cd545b229eb7189e757093f68dc66ab30c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5841bee0891e1735fbc895dfdf371d26a
SHA19fd86255bae747ecd87995648e6b5e0b9d7852da
SHA256344c3f7ecb5c0db982a4c6d4e3a31ff0361f4910340706e52c7fdb365c021f4f
SHA512137d6dbed10216e66bed2254502d1e4a8ac0acdd03863d369f983a03ba9b57f659b381e70f972ae073dc472b6b643243fa39d5b8e0a1b131fe07c4d89c474ef4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d287787ae6b7d6313a8046a786e0b72
SHA1bc5b8391bd352bf88ef0e122157059743a017169
SHA256427b420ea1fb1340a24cf88cc613450c230a6894faaf809acbdfbb47515d6213
SHA512faf964c2add38ea8d48ecc8128da18752826e3361d4ef716b52a92909e1e17b5ba78929132dfd8d48d44dcebb038269a3539ee23e4d4abc59158dbcb7a6a46a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bc066cf359c4c90d885ef1f751bf70e
SHA16ad98cfd347e325ae564adb69c4bb220ec550d3c
SHA2560cc998ce5526ff7d4ae015898e7aba73e8d44ab43eed28109cf9daf203c004e2
SHA51224b24f3b8c3da08c4dc147d52d295046b29fc46c32e4808720675cc8d2f81948cea82fc46f73bd676ce75e23e208dcd93e44697dc1c7546754ae14b7cea2bd3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59575e7f0486bea5360692e69f4c260e4
SHA1805cffe1f505f1da105f1e098e98f268676618b4
SHA2564d126f5360df7c9861f6a4a0e7140bfe385b79290aa9c04f0097070f6b363da0
SHA51271595cff92da2b218630645e4ed5e8d40689417340a36c552debf48b7043e7ef07d771f76d9e6b46cc9cb7dfb24924ba0868b9b86a22c082dccf84d8c2da6907
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0ae21a5ed38dd251c245f65a030e49b
SHA1cab1c550678f9512d38a423ba68e4e3c86e8964f
SHA25688a71f29e8d9ecc8fa9178ebe8ecee6761f8afe08f082bb2acdca4dbdd467074
SHA512e48db066a066ea12b4b78450c7faf44c56bd0793d28477a45eb820264124c55011b9c33247d279cbf61a01d062cde4c32e230b1046c1a27620ed82e0ba2edff4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56659c0f24a53692b4c76cac75532d4cc
SHA169671d1e0db1bcf8afb3aa461b7b6f5084d381ac
SHA256cbc081c8f032d789688cb3ef87f66dde9923911cfce8bf12a01335e6e896a538
SHA51274bf769caabe96f3e7e93d7fac6f9bffaa84b133b8cfeb0d695d33388a87fe5f73ceab22728d2d7ac75232016745ab68261ca5c895c154bf31711794ae280711
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528c939d93eb90402b8e2cdded4c8771b
SHA14d2a0e327fdd2f90865d4ed13bc46dd1a2c061b3
SHA256b168268ab2c6e451d27fada3ff10055adfab761f842285f32f0ccb755370d6a7
SHA512de061bf565f646cf3ab8dacba967b556944d84a283b077843a643748ac8d35781eb481ce67fd65bcd67e88551d8f0d01ff6fa76eb439a2d54ad77255498c80e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5181b5a48a16dcb6b7d8dbdb319ba68e5
SHA159fa8b8bf3ceff66c9cd20e267bfc76f13279132
SHA2565f6ce69ca2067236792349cedd4d63a7480ed74e6defb67ed35f39e781b37625
SHA51263d5f697e1bb70e2a93755baa32412c269fb774ea8a6026926eede6ab3a71f63a48ddfe8c1a176304e8d178f11ee647dd19ec7898b1fe606857bb6d22fff9645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb5506601774e0fec604583fbcb771d0
SHA18941571803e68047fde515fc8644cae688ff67b2
SHA25633c190b9d12e680c8c2dd4d0d1be8a1a4d98733e40f432100013766cf3c462fd
SHA512dc365cbb00c8b931b6bce266abf9d0f44a4a53733c75d1de94545f3fc186c2a9e763704c6df3b5ebb3c34c2ad555c2bd62f0b0b20d622bd8ac47738aa504d6d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547ada563be9d4cbe21de19329ee531a7
SHA144db05d32f6ed0462c1f0096aa365663582eab39
SHA2566a8ab7aa7697ff04a48413ee8d2fd3b1c0ef5c53d85f2b0f94ac48d4f0590d27
SHA5121f29dce2f2310929b6d1f0a2d3a2d363427d905bc2253ecb214db53297ef4e2a65a458683500e24557490641b0406ce64bd995323b3cc458386a773aca742e43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563494ce3233ef28947fc2b770678fa4c
SHA138e44edf8ddb2ce73f16d649203ead00c43d1f75
SHA25608c0ea9259e2409b083e5265bdfa8bc4d20b8083a8e44932822a9bab86105f09
SHA512f2d742425e59df4df77f11ba4cbdaf81d0ac05e6999ba0ef54aa93735e724a7a8be952bc5ebab4c9ff3c0264ea3497410d75d1ccbc9a6381215fe860bd3dee37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b74934f05308cf2a448dad528bd13b5a
SHA174370194e4bb2f893990f6ef6272de41f8dab7e9
SHA256efdbf956bf2f79db13862cf9e9e4294a647ab6b909bc1dc1da7f3a5be75f91a1
SHA5123a6ec4b89342c212f6463fc0b67c871aa483099c7d94a1fa0b6c101fb9b6871c2ed178de24077325dbaa8e87f9e0762f16b09d371cac58f3a99611f84fde15aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503b40bf3925487032470097b84506ebf
SHA1e7d4c470eb370223b3fc63b018e7ac54e21dfdae
SHA2569772a983b74da03974740f8d943875399d7eda916aa21759168d719601225c84
SHA5121e35722ca9c85511a0260557acbf9317d82ca8d314d660232d0eddcca97f163290b850cef94ed77be86fc28eab1c055afe9064fd3d8d83d531528bac70251254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a105536318fad418aa14f9f3a6d4cad9
SHA110696c9bc3f204f9f950ebdc32b0306eb8226852
SHA256d9155042ba4451fed05ddeede0dbb0fc0e1477354647d8341aace634253aeb9c
SHA512de7948f635a53a1f5f88c51ad902909dc839fa7d2171ba30b1c0b001bba5b56e3216eb2ad019ae67584a86c0ab6c052d5937ac33088f9cf7bbd225b5a442323d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5682212943c994e6f40ab4f1cc801e01e
SHA1a08b5e91b52dcb9f0f0468d8968d2c9b82a4492d
SHA256de67f9a5b677fd55a839c1c378ae08dbf159851941d01dc0a0b5c29a6fae5b7a
SHA512e8540774078b2b1a1243aee5e367428237a5290e7c4c8a896ac8a9f61e98b269916aa4b684fac98d4b0406e6c3979471157950c3b6a2f84f2932988ca850b070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7801fa595d2736871106a1d460295de
SHA19ba182b162c4aebbe155c542fb4d225faac0d58d
SHA256e4fdaad328cf4788791e06d40c418f00b94fd0e90fc3e9b4c999ad871bb99e6d
SHA5128bd8852d41ca6f02026775c748604fbf3686caa2963b9152b3921e46fd4baa418225ba6bf72f4b4de31380160d94f48520f175921c22ad7660cdcb2fbfb5c0ae
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b