Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/09/2024, 08:39
Static task
static1
Behavioral task
behavioral1
Sample
e218dfcea986546b947f51850363beb2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e218dfcea986546b947f51850363beb2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e218dfcea986546b947f51850363beb2_JaffaCakes118.html
-
Size
4KB
-
MD5
e218dfcea986546b947f51850363beb2
-
SHA1
b698acff3e7dfd21956021c7ee0cbddcc5883969
-
SHA256
17bd576db52093533c9767f4c9ca9b8613d2cf75f676915e536b2038c01af128
-
SHA512
858262e084ea77664b2b6c36e0c04c8a2a5819c1bfda35a5314b78de6ca90056208afaa8766c79744ea3ffade3848f35501868ab0dd8efcbf087ec949f0245d9
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ogrNEZgd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000ef7416489fd6f129076b7ed322f8021c5ff7f6c9f124dcbddd67afb11e611f2c000000000e800000000200002000000019610e560bde98f780118b64362ffab8d8aa36a1a72f730e1760eb0cf35d09cf2000000048ef8ec3150ef2b4a5fcd511a88fd2685a5118817d666a5da7631ebb040f7ac340000000424ede181b8890c6421f31f64fe4784c09edf82dafc4db96f607a1bb848cbcca6050da5f128b763a6e1da422712db3b0e88e3ab7d26d48381c9f577375ac1cce iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432551462" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{14A23CB1-733E-11EF-B939-7ED3796B1EC0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0811be94a07db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2392 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2392 iexplore.exe 2392 iexplore.exe 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE 2660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2660 2392 iexplore.exe 31 PID 2392 wrote to memory of 2660 2392 iexplore.exe 31 PID 2392 wrote to memory of 2660 2392 iexplore.exe 31 PID 2392 wrote to memory of 2660 2392 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e218dfcea986546b947f51850363beb2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4768302275971832417decd287f5ab9
SHA1d05c57f5c24638f5a0acccebb6bdcc83ffcc223d
SHA256e2e8754934ed3433513cfb287c0ec98046718c298c3bc245a2ea60313abf850a
SHA512390fe0767480e6a74d16d936018f5717804c5610e363e6fa1e0c9012eea48f99437b73ea120386d5e4ffac1453e358145c03b24a17b96cf3b75ae6f275e9a662
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534918d39b6f9ea3f08ba8fb7fe16a13b
SHA16f1e6bbb1f8476ea72c09e267275256183437fc8
SHA25647ea07032f8222c6d3f0e382deeb1ecef1be31b467f63f814cfbb8f7262b2bd1
SHA5124dde65ad798a28ee436e672c94d6f918b269ea762f9e809bd6f3ab6e922e11736dd9e1a95d9cb1c1c1ea67221fbcebc1f9b3cb1ebe1295b8051bdb6e3d2fb1f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b195e5bc76c76bc3223dedc05877b7f7
SHA1434da0b5f31c0713f8fd7d1a134a79e6fc86d16a
SHA256c2e10779946b49366f9e0c62ec477173e04ab2064c49b21baff36e2d9125cb1a
SHA512ab1e6a31835ec00a536b03d8930160659829c6d70adb0847bfc978dc11de58b10cef0048ede5b90540a74457755a06d9ec047d353c08cb0b718a9aad1b79bbb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518e76c9fb5ec2b0cf52755f7c22ba481
SHA15d4418e44c660845ca40225b528aba76d4842d26
SHA256cb773ba281dd1cdddb3f0f9d0be288c86442896e17183be0cc0cf855a2656fc6
SHA5127bd806db90d496c9239026de60030761e4faf603a0966f20005f83d2035c1e6838e0b9e70697dac0c04c11648a76226a6efd7fe7c0cb167b2cd31b2b39ed2381
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f99e6ff05b717da1513c2d2b961c077f
SHA137dab558b69b8339bae3560f063b6369a2ecac40
SHA256f2370e8f68d8c5e491b58f701e40f8d0a109d975b62ee02a10473eaab95ea09b
SHA51240eff563b286ca6c26e5ae77c30d1a0e6fa2cdfa2b1c32b5202349541d98c3ab6834b97fffbb6d02f85a48ba3040e4490ac37ad07f280150465695577dc471f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51abf1db864d687cc9356bf09ffc7dd4a
SHA1b02a1bfce8462ba01395361fef771db853e53326
SHA256d032fe097402161047cb7322c07b6d4402cfdc792abea1518385388b0e181c8e
SHA512b1e136192cd5296292ce789e0c7e06655135ed3dc1445883c19ccd1d44ea6fa9f64b8332f315a59cdda7cd77418fca48910fdaa413861dce5393df134f55cd59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5407558b2bbe25b52e18f2d4c4b6e06c2
SHA14f3aeea81cea5748df83680df3610b5e2554d78c
SHA256c9c4c66c73d120b284905d4aabb7e146bed7d5af5e160127affdd3844d51b6c9
SHA512600ec2e5d6ebda960f51ede48e76ebb8bbb91d57dcba3046a3d73fc7842039f3d9b78bbbcf7fbd3d3d7f8e03f01ccbe1e44b828694abe029963aef88a9b98341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5949ddfdda8990cf0a8510f53049f9f99
SHA136c6178f925fe093d66b00f04a0f70d40bd9c925
SHA256d48aeccb055bcf3c950dff962029fd35bce4f8fb221b720b4d7b4b30482808e6
SHA512af311f3cb6bf8210e060c3fd97e047f98d8b6beab084365419ad14aea03f35242de4774bd8ef1b9feff1e127e717701a9c2a9e3bc5cd84cabbcbe912a2772917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5647ce32f748bbeb1111872bc121a2548
SHA1e09a8f9c5400a9ada0dbb1aef4ab0fc316754e18
SHA256ce8a7bb397971a57e1c844677cceab5c5f3ae9b0cc63b789c79dd39eb2f318ac
SHA5122400004ba84e62328df54f4956c44703ce75e7751a576a2c0a3c3ed86368fc60ed5e7023f369bac42261ec9219a055a4aa3725433ceb016251306a0675130d5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf23fa4bca43306ba799ca9be49db5db
SHA1a77b037270ae4650aecfb2b9f1b9557dc025ccd1
SHA256f1e413368267cac3e12eb7ce99b63b22d5b3bed472e2808535db78c8fb3a47f2
SHA512c94bd2110ff396bf0c268dee63d02c7c69ae4e60c0d557a84fccce5e53ace20e0d7595e79b3d84b9876109f73eea9b4c6eada113365599eead690ef009d4edaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4aba49c8c8e5b00f3210e89d4d05bea
SHA1252e5eaeac1d11f9f9e70424919238cd62b77193
SHA256e4d5a531a4646fd6bb50846a38da106b5bf1067ba543755de197a1be98965cb5
SHA5124da6c207975c84a53e2afa1bda42973f9fa4a912ff1328595c7ff63e56fe94efb554361894ebdfc9e8926d31e5a3bc20de274004d085a3ed9f25a36cc1edad57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54132d77d2075f8f5038995749e487fe0
SHA151db405e615ab952f74c3512539cf7a8dd3b26c8
SHA256f38e338249e27b3271a6e90cc77f24579008bdd804288749294e799528f73f08
SHA51289aef903c0665af782d6f413336bd74155b9666bfaeef052ddc8f7733954d6482f61eb99bbab5410fd47101a56ab413a7e7831d2b036dbc96e442a403081fc1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc92bd5dbacd6dce6e5fa76cfe1a90bf
SHA1b4a53e79b45c760bc42678ad6636abccb728d66b
SHA2566779db719ff504f06a48fbe6c95a59dbc9cd77d8a1cc4dcf1c2a79693f2ed8b6
SHA5129a8cc3f679777145193ceb4aee4c436989b47caf8fc7e358766a2c738c0c25c0fbaffb0c931f898ac17ec221a6af4b17b6f40a3dcebbbb9ced5ddadef0bbeb3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53058d0074b12cc2c85664f0eaabb18a4
SHA13f073fc37b7d4f30849ed42a36e103c926092f85
SHA2560f2ce82932fe1c6d7aabe430472ff371508b196b4a129ac07a2124f766754573
SHA5120217994d48b6ebe1d7eedf89581a0675c55fa271b1a85ee1d3f3408194dffb2d6f428b3820b0d036f3b7629c738d558d20fcebf8e4ad4dcceec4314e013494e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e00a5d6d352fa0929376a98c03669868
SHA1b40fec851a2244306449d6ca64da42b21a62db06
SHA256acd568b264bf0352477285eddf41766157f81b99a7c76d0bc640baeba2a986b4
SHA512690573e0115c303b5558b4e69c58715cc4b44a9bd787aee625be43094077c9930ef49bd66688be5a170813dd94893acc3b1cec137336c88adbe407794bcaebf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552ae7ee61a369604836f56d6250d4f0d
SHA104fca2a549797446865237fd77af55f895d7550c
SHA2569ac6283cad6891b88aec0f40800a96ca4e72978c6bfa91c58c981bae8396aec8
SHA512f00bf2c604a66e957b39f4752f963132230421e162ce33bb22f81c2abaabce14ca7ad1b30640adfccbcdf37d9b907211c7b5436463c26434f8a7c3caf085246b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ca086bbe4dc857fb7c90804d22a02c3
SHA1bf32ee1e54a00488e7a975bddbe11a197b59b092
SHA256440ece85d4b36be8cb844f2aad0bb9e2aec0718841ce738c1ae4f060a911d927
SHA512acd85feb4bae4baab986d7fc8e9d9e3c7d8d3b1b17c80b0d2fc4f1069d5556b418414fc24e3f499b1e33fe0cecfba03f2026c70ab370cd2215df6b2d02d85338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d41948c11e5633f7a8540fe53ce75578
SHA1f954f257d4ebf942e1cb6b034658621bb4e26d7f
SHA25649fee89585c853a0bef4125f19f69002f6d03d2b53d84dbc98c5693d462d3214
SHA512caf678db0530fa08981bc1aa24f3a6f0a7c4c95f15a5309bf6664c1e6a91ec0d81eb5aa16808fb2d845d6247cd71169b13a726d10daf04469058e804652986fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5285a8a753fcbbfede66d10eaf5987daf
SHA1aaa29a3d3ffe33105dea4d6353a399338dd1a414
SHA256f9ff4aefade7df62f42471b4794dafe49d2b0b8a28c9baca122a197e1bd298f8
SHA512e2faffda965c94ed5bc572d941b2fe5afd00a3436723130832235b6135ca5a250457b5a5f9660ce5cb6ba02768e5a170feaf9a092a5e3f81d90cb6ee7c80bd69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c117b3841088f2f03d47c8a46bf263d9
SHA1eb8aea12227d72e1a114eef7ab2514a484565d41
SHA256665bae03f68631c8ef5e03f687f2d188e51460d6b379570978e18258bd5f2d6a
SHA512c43f683a3312705b5bf306f7324da3d22db29d17ff873e2ee2758609ae51eef060799a974a579fc240f8897d25bdfa071e7a0dfae115463f850663ce1fff93ff
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b