Analysis
-
max time kernel
105s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 21:00
Static task
static1
Behavioral task
behavioral1
Sample
e106ccaff6fb3b07982a14fa741c0fc8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e106ccaff6fb3b07982a14fa741c0fc8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e106ccaff6fb3b07982a14fa741c0fc8_JaffaCakes118.html
-
Size
13KB
-
MD5
e106ccaff6fb3b07982a14fa741c0fc8
-
SHA1
6a4041737afa74b84ec2969e39397ccbe101c17b
-
SHA256
869906c8034f2220ec8e9bb3eb32c4be1399a03cb3b7f69ae87b8e537b340316
-
SHA512
47839fab140993e3290e8005298168e37947fff7ac18218e3437d0dce14408004304eb80505997f0a4b3d41b1a10c57f4493c9cb864b1c47a573141daffb1ab5
-
SSDEEP
384:nHnoQYdIc8IXQrLwWesDSRsql48zwRmcSN:HnBzbIAXwWDSRPz0Ry
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{737425D1-72DC-11EF-9704-E62D5E492327} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432509532" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000efe9da9c4c192c79369803b4bbce24f0e2052b981bd780d305bb6333a74fd45b000000000e8000000002000020000000739c3a3b46bd19de348697535ca75e083e03d53169e20c2485ab109ee2b8453d200000006ef941d77cd10f210213341316e29a862b8b9e02244620b9b6db048a6c84adfa400000007aa34058b048d817a24f2b1eebb30a5cfb0725f72867e9d9f9043cfbc1caecdbb6650c9cd1f7f2dd3a276e3aa383202a7c43bd25af9135d6cc10db7b5db51e11 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0a8874be906db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1640 iexplore.exe 1640 iexplore.exe 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE 2760 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2760 1640 iexplore.exe 30 PID 1640 wrote to memory of 2760 1640 iexplore.exe 30 PID 1640 wrote to memory of 2760 1640 iexplore.exe 30 PID 1640 wrote to memory of 2760 1640 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e106ccaff6fb3b07982a14fa741c0fc8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2760
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d62239fd62ee2a0f92ee8e4e720be107
SHA1f5d3bda1edb2c274c8948ca67096d16be157c29a
SHA2563bc0ee69ad3475c0c83ac74a83e1d0423da1e4d1064c0a1a446e9d455fde6467
SHA512bbdaf8594afdb25c2556f7fa48218aed505e745a3b803bec264ac280e44fb54d0678e7b76cd951647c91eafaebc3d3f9ceb3f89689517d2e4154541d9932838c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563918095403c642c8ec0690dddd8823b
SHA177cad1a5857a29dceb6e238108b3ff3b5a871802
SHA2565340606ee4e760c7bc72d1a472f1dc48daa8003a0ca007b50bcd21c04c969568
SHA512fea8ace05f212bb6afc3c459b8bfc40a2a2ea4880316e1fa85c86b5792fd148a2ef336236a5f1b85a94adcc04043e9d0f2d9b35e2ab5f36feeffb91b10c32bd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5920e6410277a7d7d67322fc9743025e5
SHA1ffee36a2514cdefb61d6e2b0dfa5bd1aef8f2367
SHA25666c0e589c12fa78f250e23563ac5876f0411c6fd2886b43f01384960f1207eda
SHA51223fdafbfb9cc6cbb74a8db905be4fec0e9bc5c0b8dd57d8d565a806f7f638556600cc26acfeb23936d9f78040e3bcfe06d3e73e5ab36acc562a1b46bb5e0f18f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539c6b9f757f9a02db05996c71405a592
SHA1d1ea69ca559a9516d33c91eb8337d349561ec9fc
SHA2566859a254d6eec6df6a5f1cc8ff4bc7823ae66a218c672efa4f8243392d2f82b7
SHA512272bf48827d27b2cea8d932be2e9b4e3212da7c1e628e090b8fe591be1f8c5628f73980fd50e5a02f7755a54386199b4dc67222fc302a0d7aa2312e5b90fe16a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5343e38ca8ec303871ec4acd2764d4233
SHA1861dee060e9d1fb80634f7a19539674d45e12e8d
SHA25629b8bd3928e9624d9d3408cc35bc6dfead75988eb7db8ce181978ca02f835b6d
SHA512ef53e9aeeb833eb0d85ef237c5ee784c3ddd290ff42ca9456852c3eb87a4776523d1aa31bc3e9d54a771799c70b04ac794d5ffb96c41dfaded783d291eabf8a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc77b307417934ae0d468de93e00827f
SHA1b04f8406033bfb0f4f2adad19964e774e7a10102
SHA25673ea7d955d721b3bc8cf31ffee0e96db838cb35e19e4f473766a3dcc1173ad5f
SHA51299a903986d727d2bd1a05f9be00c6020a930e2c350b658f601b936d984b2ff50b7cf0ed33f6630ce4a4dc927e8ac0de70a257b8f9cd108102712ee2f6b22e9b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f1fa503ba5c2823a5d88a77dc2052bd
SHA1aa9b3c46135865863577d29e458b2b539f421cef
SHA256cbd364e9ae8ce99135db809987643c8ab690af937c7ac32ff1d98db8608e8526
SHA5128a108105dee71a9afd027cc919db2d7dfa8463c6c5cf3236890f946e43e3da18e02fb4e76a1db219630dcc802468efe520715cf96cbb25426a3ec2a6f58836df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5040d957357ad76815dd42ced92620240
SHA14f5cb12de1e11514b45fbff3ed2a0cd5cc9fef10
SHA2569f6acffc05830bd66aa1cedccf3a9445ab10b648b210ee52a0833e420093d479
SHA512c5bccaef72513d9940f5a0e0c41159a76b4ac9a91e249008cc04ce6e6f7f5016d27b6ef24f37c104afdab552c594a285f4e52a64004ea3946f63f147d8125b36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5534cfea02fc46e4fcf6a96299366d8f2
SHA1ccfece22dca8d050b107a229a8196afd5cbf61fd
SHA25633c411899a362c7f9d2c890a95f09f7227b2936f9fa0776b219b607d80d8b550
SHA5122bbe651d53047c7f7c2c44ffbdd1af08926429bf0dc9c71c729d9079ae7fda2c6415600bdc0a8805148f258faf321fe9a7e185ecf533a4c25c4f2ffffb30970f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a83032a2efecb1355ccb4ceaa036af6
SHA17fee91e4cd5e20c54ad93ac74d1c58c26907d4f3
SHA256f1838ef53f97f92fd1b8b745f5c289dd14b9950afa6605970f1761c1db77e5ad
SHA51276df11b2473cc9bf39157a47b87810c3600cc2de78305fa7e3c761d205ba32e3e51bbf5b3e91aa06f8f435ffcadc0ec261ffca885a7792a1bdf5e186ff5251bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5272a2d44fba58b78afa9713e58a378ca
SHA1445f4de554846dcd0a04fd0484fc26c8f847b5e2
SHA256cb9b757e1e4df4a18bac81aab400d23d5b1ff40404545a1790eea7119c9425ce
SHA5124ce560385b880fde567036b5079da431e415de165f6454aa1ffb6e8a56bc0d804a99fa8bc21121ec5e5c917dd25d5c54fe797aca2aa2e9bd8cf81fa496c278f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d28d0b929c52a2c350746acb69f40b20
SHA11fc30a79cfe424c9fdf000eb2e15b02c4de4b56c
SHA2564c1ccdb724b96fba4c04481f9af3f06b1dc885b77233653a993c5cf1fc36abac
SHA5124f5080fba1bba7a180e42d4f52e15366e718772f075e8bb69686e509264f996fc8159faffa55bbfdfb1dd3be9e30e8349429d42f30d3d0b87f122539620e3617
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530388c57472ee462bd5d87f86beb623a
SHA129f7e49ec70fd73846b5c9a9c3eae264a12224d2
SHA25649e6054ae0bb4acfa533e31e0300fc9fb69c80f40494c736b139f5238ed50354
SHA5123ab1076394d5d14986c636f8c5f9d2a9f53f82ed5db39b14f20ffe2473e9e930ecdc24366fccdb5f2032d3b8b24ff3e5d51858646d3e4d621d404e8132c9529c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5894a891688c3306c11cbdc3b89b58e98
SHA1a9763f9a75b7f82500c2b9e5738edc7de4e6b75e
SHA25613aefbabd28a3cb84aaa3ed1a6d52391e525756943922b8ae1eaa97f32a817ba
SHA5129d21dde8d48a1f6ed8f5b84038cea6335a3525d8e7da691a771c2b2d671814134577e6c20cb451fdb2ee6fc183a9bb7b4d0f9cf4e87537cbec2d9b4bf1f9ad99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffee891e3b3858a5d6a73167a3bbe03a
SHA1f7815bc9abb2e30eaf0ad04e4b5737c47f01e5b8
SHA2566f8185c43773d4f6a8601edac7581ee642219f8de568c73841d3df168e41bc8a
SHA51233a8db6055020191a0c462e76c122dc7d4ae1fc994eae87206e01dc184890fe5049e37077456978133796615cfdcdadf306934559c44f37f53064557b034f3a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5211d0fc462547ec0807550affa70f1da
SHA1eac41179db7bfc1ef4b800f234f85403312971d7
SHA256cd5d4d77c3405218adc1e7e29b4074c5794a8fb0355eea1a65e0a3df83c14b1b
SHA5123cedf6d1250f51e1a9350cfd910f37bdcd166af224862c39821a133eff5f16582061c5ea8890568c1638d7924a5574395172d658e8f0c22e04d7c461386000ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597cbd2996cc9faf9cb39acca4c700eda
SHA11e60560fc8b5414cf7c4e400061aa1579fc13499
SHA256206f001a5901f105318c079991e4dd9cec032e1a631f8ad5ec84ed13942b448d
SHA51239821698e14fc90f5743b7a741d081c97e5211d32853c5391fbf8149eb02a2c6337f820b5a9375df843051beac028ad98506d5798a602fdfbb5d572bac8bde97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fafa7568434f33f61ca2b60f619198c6
SHA180c41a48f34a0dea94f69fdff790b2b459199b3c
SHA256fe2a1fa6bc9ddd5b9a179fa187da950a1ed4d6410b07bbac23fb5f63f7f780db
SHA51205ea4eb0765c9a8ed6ee876f561583407f7c7358844a009d69ed1cdbf722cedfc7b2ad2d7a3643af77f13fa9dd5e8e742e90b2768c8ef68adb6ac743431032ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec2cde4324e79a3bab934688c14bf10c
SHA104fc9e119289d3985c8c1bf4970ca55bf8084c4a
SHA256dc6ba7a61fc246ebbc21db6b99e6fa23a94dca21a858e486de7df690b0fa18ec
SHA51270dd14558831673ae00e31ac8826710b891f31f8c7ab0c49ca55fde95d31d99a30beac6a988f4943973cbdcd06d2128cace588b5073ea90c83e2a23fe904946e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af2b017b1c39ff5ea5a3c7bbe5b00133
SHA1075e1e0f02756d78c3b6209c0b80512be685f408
SHA2564dccc86ce9557aa536392b24c74a0e7e748f091590d49d079a29bdb1d13cd964
SHA51258ef8af3c2fb3db5e5345f8241fc0c8315232a3b3aec1cc6e5f8960c612bf02aba1a21fe918903d2d8f56685eb993c0516c5eff564e4eac224de348483d1a9d1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b