Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20-07-2024 05:28
Static task
static1
Behavioral task
behavioral1
Sample
5f3156dcbc0f2646979bb602b7123952_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5f3156dcbc0f2646979bb602b7123952_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5f3156dcbc0f2646979bb602b7123952_JaffaCakes118.html
-
Size
83KB
-
MD5
5f3156dcbc0f2646979bb602b7123952
-
SHA1
3cfbdc753eb9e52bdef9a5a93296ce4b0dc8e681
-
SHA256
0fc9dc377a86ad1b1d2813a25d52a446910f5716015a004cdff435ad080c6aa1
-
SHA512
1b8fefeab5b71307c58134421184500569541e202a025e8cddb4570e92a143445c1b21519da5a732c3d5c82de6470fbc70c1ce2fba106b156ba0236b2bcb783a
-
SSDEEP
768:eQ/ducHOv7GT4OGNhyiuJxJMYtjrVEIuuu+uk4P/I8qR:vucHO3OGNQiexJMYtjr5uuu+14P/I8qR
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427615156" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0ea31ae65dada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D993B0C1-4658-11EF-A6D9-6ED7993C8D5B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000f1d2609a0222ebc4317ef457ab9d95d14bcc17810654a339c3f80dac549401a4000000000e8000000002000020000000a005a65a61023ace8cb285dfdd10ddd15ede7591cc526660413628e4c814ff6990000000f18970418a9a610dd942e3858ee1454ce2cc275c26327bed9f3bf605f1f77116e1eee2fa067d3b3414647839b078d72a56358f1a2f5bd1801c89a0b594347df84391ba5592a55d13e5858b433468a709f9a9a80aed33c93b3011f308706fb3fa5a3d98c59c85614c36f8806e1dcd2c8b0832678853dedf66a9d00aaf3976338433b82e4b8e2e7f3261533fe649193ba640000000d845edde44a0cd536f44c30e833933fa2defb7832ce6b900836ed75b1dc54c3c604cc4391f57ce0c6ef0466f5be8657d8eb2d67e4cc94ed79fef8454a0db6721 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000254032c51c33e5c6fb41a6d7b76bf873230bd9118859915f128153be70afe3f8000000000e8000000002000020000000b57dfc67e376a310b28b1adbb7a18bc48e6af9a27f897fd3023d9b1f9e39940b20000000539332e127a4efedea2a3a1c5f354e2017162796fd1b052ddb36b3bcdca58b9c40000000d2f085dbccf8eda6e98c97a4ce1c999fefaae45f1be87d1b2a8f201f4c7bda9f1760a24d27625093eaf740144d37792336ddbf9620edb45f6dd4975b1b3c7b18 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2068 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2068 iexplore.exe 2068 iexplore.exe 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE 1032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2068 wrote to memory of 1032 2068 iexplore.exe 30 PID 2068 wrote to memory of 1032 2068 iexplore.exe 30 PID 2068 wrote to memory of 1032 2068 iexplore.exe 30 PID 2068 wrote to memory of 1032 2068 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5f3156dcbc0f2646979bb602b7123952_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2068 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f2a4c0a0f0b4d2c41266a17dc8407b2
SHA1df85d99deb1230ac78cd61ca289734d47f1f92e3
SHA25655013b1c288fd1e0a3617d06f78fb8b995d5a7617569bac8af9dc31681047dbb
SHA512f1d08c6dc9b39db10d06c96511dff2c8fddfdb30e5da7b44c12918b2eb757eff62e6b5e9045a146228ffa24aa714e33faa5024baf0ff4048090b8da2a8b92029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c7e86c828beea54df253b2a953d0659
SHA1518ac5d2ca8686f5b640439fa8f0e07f48ea2d12
SHA256e7f1f0d51f0dc707c3628cf7e8a3c1da7646a73cd22fc51996ff9569d3cb843a
SHA512a24e717c8d3bfc89e470ee6c2ae8f6c2f4ded865353a19d6b18218f7b16c7458375cc39b1352af11adb56548f967b0a8440f7691a52269fe0e4e4da29780e9c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592236fd08c757ddde261cd10540e30e5
SHA1412eafc937575ba56119f6c569e62e1ea61c1ccf
SHA25632b02e48422f3efc7ea9232fbdf698e808fad486856e2725f526b7d3c5880a42
SHA51283f78fa14f41da13b774fc08dc0bd30e3c887ea18d95e022c21c7196d2dffe15fd5e2002fea5ff0623ffd4b33f6ffcf12c0a82b3f0bc4b746a07ef2f69bb0857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3b12488a0fe2b86bbbb912bc95bb8fe
SHA1ea8a5d3c14e4fa3c773634ce4ba8fd62ca92436d
SHA2568ec148db963315581d9068b7fcdde2b2c82e74496eb9c8d183043437a8a7344d
SHA51220ec32aae1999cc985a3362e49203ff51286ede58dc5fd91e293b7cde52496aa15736201ba27267df57789becebf707144d2db292a4f4c50dcb38d2a0cbe75d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585830679d344abac83fdc88fe1e4c054
SHA146a0d42bb39babc9ef43ce2212b978a14a57ea3c
SHA2563871c9da31d374e793e47e3e62b3e96c56fe1de2d8f25d2bfd787944d89f9989
SHA5120e6a712b796f617419f38e353164d11fa1e4eb3c723f45318932b74fef2fded9b57f91f361966196532a0e06576ea4db646acd0a47273db4960374745bcd32f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a3766917fc73aec9fb9a56b36155d55
SHA1ce8da3f193c82821b176176f6e40a3c660a9e3dd
SHA2565f175b3451a569276938d2e3185b177adc1a888eb0331a3913bbd1e1061ad4f0
SHA5121c1f42b25ff3cf9beaf03952adf73b4ad938c21d3eed2eee42487837a2f64d8ca0bc5ce7a821da80ac9a00f01f6acad57144d62c111a5ce82b438b94a35d9b8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be5d10f2db768dddb551d3ba3626e03a
SHA1c7652f898104dc5c6f84c0a9d761f41999bde04c
SHA2566b182b135960d161b77d8b121bb745cfae4036b7e0a0dab4963b0af713256146
SHA5124c31fe0563b303b4904990b77fdeb63f541210a8240f6aad8b893dccfc067d27f287314e09f6bd8557630d97b4c52e50266f6a6c55d7a88e6e4004543b9bd2eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a7031d976b0f45c1ad00c50b43ff1ff
SHA11c8858cd556c9ccbfa63ce467e41bad800dff09b
SHA256220268ee900c189409435c61356b0234438611476eb752d88fea316b78af58ef
SHA512ab793c385804c4dd263e45e4fec1053a29f7a402d06fb29d8379f0720daab3865b019b4912166f51dc8a715b8e3e814f15e0a0b53b20b71a78cd6ad1b088c3c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e0ca339443c3af1e846d97b7bf14b06
SHA1d208a2549f142ef7003cb043f6ec3ec466c68678
SHA2560b786933c2f5f4b4a25531bcd3ab5a13aff40a9893d37227d3f6b5a2c8f657cc
SHA512f8e7cc87af9b53c7da8491642b236803af01f2d1fd8b1e00656ef6e190372d1268fa5797a584344cfcccc0d42167bcf6e51dbe939a237fea81667dc84425adab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56260e8e01f72e42695c0cfdd3b315783
SHA17eefac7d2011ce89d0fed3ff911f25a621f27992
SHA2568825d0a2276db6b4cea0e3007e08565bd92fe7a337a9a4d012d2127a15704a5b
SHA51242b021ccd465a787169706c856218b8cf3d9105abec9b6861cc575733fc6b68f47db626c751dec57f618c16cfb3edcde51f3ee93e4c04c1fdcf27b7ff797227d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545ef88f272f934c4540bdfa60a24ee07
SHA136aee349125064f9b23d8ea8ee11908da3dbc87c
SHA2569fcb17e7f1e514bf3eaf57be07de8159ec0a1274c8b0ac0f986831dd8b6d0b0d
SHA512906970ad16c46b432e6d74705a022361a0ddd9657a1894ac4c89e331170b09d18aa9642f99ebbac9292a94ae2e2ee183229ae9cdc190e2f739abee48c143d09a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b76ebb9ae0b4e570cc71ccb270ba11ed
SHA1b3da9fcb90631138b0bb833f9b4da47ff128af04
SHA256d81f54e153fee0fd7cc295cd549a85be63c68f447d47aeb91cbc3540fde57ad2
SHA5126a7537e3f7af060eb52849ec419215c13e3e25acf975d48cbcac7245fa74d4ba2d4105c58cf4b7a1e34055de441ce4e53d322304c535dde174dae8de72647641
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c6944cf3b8829081da2caa927a065b9
SHA16aa6736df60ee219a56a6eae4acfcafe21da917d
SHA256842046675bd48bf7f218c41b79c6e139e08c6fa615b838d8ff2a59f52971c12b
SHA512fbcc683cd1a05bf9d3a5d44f8678f2e177b767aaf15bb8ca47835553150ba089a867605842e3e71a97ef22a4f5362fb3bfd97aae8b16d882df90b2c9f1aa7182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bed919d11ba81613171e4f21bfe24a5
SHA1f849387f6fc4ee19dd22611cedfd28cc570885b0
SHA25612bd96fe4996f62096b7849de4e16c9155d8ee0c9d5d026b45f85a936161dda6
SHA512fc5c0ad753112d414d2223a99a26584296d9c9c3e893d32db0fa75bc0ef54e839f1cacf4e201cbfd5d1a5a41fa4f16cdf3a99bff810ea75a6d23969db8e87d82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebee89c4bc5de3f41fb0b2417a597ea5
SHA14255d3c6802ef4eadde46da7565c0ee0af106b96
SHA2565520384fbae29dec495f1a81c60c468a752a8578e20a2210421f5e2836146f3e
SHA5129d7a46c3fba0c4cbfaa00dc9c16cef7299264f8235af373f7c687fdb378c56148639705db8177410147a9d8adfd60678533a39081270e4a0a0f565025afd8f1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbc5ab3aa760ee6ce3a4dc57e1d191b2
SHA13252c9da3d632eefd2ad39e56c06c525e751eb3d
SHA256f4c32ae1ce8365d7cdb42f5b222b634ad13823f1e788e820c625f790b4a31bb9
SHA512277a1bc1c530a70c61fb7d77e7f63395a72e29f1c8ebcd0e871df925ae0289511a951f9e42d70591f28a5a316bcad8d5a4d24bd37645168b44e9724b5a0f7c8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578d830a8ecbd508f5a41f3e12ab3d470
SHA16bfaf8a620cee0841a4b7a9ab42c66e98039e1c0
SHA256be9b7d18238e824c4aadfc05f71bb18809042a8a9032be71603695c3837d0ce7
SHA51235b4d30afa67b14740ed5be1e7f35f09c6fb38c9904afe51bc6b19e17a180c433a6af784a8ffec124f226ecfdb0ee47800de0616933cb1afe54e203e1361c909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e89f7b64358b49610e8716716c9afa2a
SHA1b0943a75b68bcca55151cd2066a8b6dc8fd8f985
SHA256fc2001f43e9c99c57d27f1acf6c08ca46864c671f62d5b22e3ac4fc67f69d9ee
SHA512a92c1871b0fe446fc73778a46fc3d107f84f8e2e2495058ea63586a8a7339023b9076474fc070fa425dedefe98fd00a65317d56b40d744a9b7b06a872d5d2f63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae03bd5beb80f6adb23955a75b79e3ac
SHA132164b86f8f783be94bf2cc759542e1dcc07b3ba
SHA256b8b40bfb447473265e63e97e2bb36af93593d7266e792c809076b6472c80145f
SHA512834357daac98d1fa132ab805c26793b28bed60e5228a7edabffc5e808daca00775c49d76c2769c6befa4df21df4e5dbc14e98b3fb3599378768c2928b675fcf8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b