Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 04:07
Static task
static1
Behavioral task
behavioral1
Sample
f525116fe78675606f45142d2ba69207_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f525116fe78675606f45142d2ba69207_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f525116fe78675606f45142d2ba69207_JaffaCakes118.html
-
Size
53KB
-
MD5
f525116fe78675606f45142d2ba69207
-
SHA1
6779f9cc095bc6d578c886db495c00172d0de17f
-
SHA256
d853a8fc216c30552074f8dc80ca1c81c3ee33b69925f56bd2ff8084c073c6b7
-
SHA512
b7a99e0a827bdb61fe685e1975effecd8614e2b5192f8c312408eca3b1ce6178862dcb29de2cc6046ee2aaa607087eec06286ca6ba1629bedad8ce3971950804
-
SSDEEP
1536:CkgUiIakTqGivi+PyUKrunlYm63Nj+q5VyvR0w2AzTICbbJoj/t9M/dNwIUEDmDS:CkgUiIakTqGivi+PyUKrunlYm63Nj+qW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000d41d9c1bdd7fefa1338c82077d94639b4c40d99666d87360b7f5399061c4aea1000000000e800000000200002000000070f0b8786aa7263b4537a3cf068e872a9b945a8832e0f252c01c682e9ba226392000000091f592b3a1912769f923e3d1baf8f78af1a77b921d23f43cfbbf487c39ea1db040000000b3cc1781108bdc03f01fd3b5912705233564c6b8423fe504da1f53c2599ecb32d2949563429fd468ba9b10ee18093cedf5c67a0997cbb65cb2dd1e8b391d5bdc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B3C01BC1-7AF3-11EF-833B-EE9D5ADBD8E3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433399125" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00f2fa8a000fdb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2060 iexplore.exe 2060 iexplore.exe 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE 2228 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2228 2060 iexplore.exe 30 PID 2060 wrote to memory of 2228 2060 iexplore.exe 30 PID 2060 wrote to memory of 2228 2060 iexplore.exe 30 PID 2060 wrote to memory of 2228 2060 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f525116fe78675606f45142d2ba69207_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538bd3b85637fd3e0480364fdecae5a3b
SHA18dd0378dc72ff0a4f93bba41fb312dfe3c8bc9f8
SHA25623073bdc2cbdab174ae90f179299703482cda21693e7ffcc17e18c6a13fbf42b
SHA512c5df4b228bfecea2b76e6d08fa4c74accf47b492f778d3ae49ea61700150d44de18237a4732e8121fb4f11a440e982de072551976ca17ab7f21d2a0719a51847
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c39dbf3e0c397706332e51450191ef2
SHA141bab291a2648654befc3a0a16822ee49d213648
SHA25676ef73d04c7fff3d5e90239f4f8b5826f39b2c471bd61d8fb3c6e88f1b400de7
SHA512f957436803ae344795768da109ddf0a88f7006fa23e024125e312e398f28dcc85d5f177df768c70c064b7c7b1e19ea64dab50c19203e870faf0006c4fdfcbd87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550e77be062f3337c18bb950bb4a4fd24
SHA1bb89ed1cd89ac0068da48102a319b176d591dbd6
SHA2567909c61d357bf11b3f5503f9d99ebf908c8ecce4326586fb2d7438397e948dfe
SHA512b83ece69007b1c8d1ff0749c8ca78767bb3a11129a617ebfac7fef13f584b2c51149c86896bb443bf84c329a6a5e30ede4909914172dd0b27407ed56ac779c36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520b262425049a9fc711dcd2892f5138a
SHA100fe37968471c8667b03aeac3815771a7ddbfbc8
SHA2565756561e25ada149281ae8c4530954ed65d2412c83ee7874bbc77d276b96d102
SHA512c18edf2603d68a11f8ab7e58096fa58a00164369cb8c86dfeaf17ba7f5652ff91b45c2826858e4f014504246d4cbfe193617b5b295119781a1e87e108c3aa2c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d29fd5fcf42f174a8c00898e3c4f9c4f
SHA1949f8e98f9ac137aec73e15fa3f8ca2b2df8d8db
SHA2563304976d9b0be48c5cbf8022da79ea4ed82a499ae80d06907235702f2bd34b82
SHA51290fe3615e77d8903366b7cd28cc12236ad419c5e0bffc87e550759bac90151444a3ddd2b5bff8b7922cf3e1eeefc6fb022b3869c546620a086aa2ea81b583561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b9ac9b5abd03c485577efed0d7edbdd
SHA159996f7190979a8f15b54fb35f4e1da8620f7e9f
SHA256e1f46f4cc1babeeb17e37634a0e984f8c14a106f7b65dc8455aff54f8a2247a2
SHA51269c4e622fb590ab0fa195d44fdd3a55e788a32662a815b605ab888b020267fcfaaf96dc978d7fdefba957d1fd1eb7522c773648d9e8b9635fe630eaa28d4f4c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e0b71abbe079f31d87a327250ab4b57
SHA117c43bdd5b005bf91b5fd043f1e58e4994f7ebd4
SHA2568ea1a7171dc2b6c6ea87f31644d2462f8111b95101102aa235a9282ffc2f7f4b
SHA51281ae33870d748c376d06837971c9492e5f3b2b482f0bde39aca2ad3f020e307123cc1aadc13762d2ffc770fc93c004cbc19951a21233de683ecf84f0e10760b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513c0a78b64334196e22a2cf8b132360e
SHA1a782e981f32494040cc4ecdcc17e16eb7964441f
SHA2569db52d171b704e4cebf050cac4bbccbea4db12bf692f9f4089582a0a7371c496
SHA512197237eb2dfa99714e6fae8e9e3b6326bf4b709ba8388170cb1453a7b9e86caab1815cbcada353909dfbb68193f7e96929aa5f3c2e6a72a41bd0511632a9f11f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb82b0c0d2db8841599f378ee082b195
SHA1c9ebb97933bb769805daae2a2fba21c1d6030023
SHA256c8973f14c252060e0113c23544a8dd3cf6398f60d4bb25f361420373079a1e28
SHA51286d87b64dcec84ceb823070a0986c47ef552809b587fd27cd747d68730cf8c3a51f22457ad8c6897c5c8d6570b547c1c8baaeb0ade7131c5ea78af5824b5ca36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c63d99bf2f0b2b4859c77faa158c97da
SHA1fa63471d6f2f97d4081f422d6064c90d64969644
SHA25601cdcc8ea2d021bf7d91e19bdb39cfdaa3b64018bd1d74aa45e67d30d605125a
SHA5121fed98de75ec09d46961e0963bc2b4cd85fe476bc460726db15fa569e2a39dc74bddce4f08bd0f74b5071f9052cdb8d3ce91bca0b40712c22b8d4ff5d1332191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5baf204cfa566c5553d9b8dfa8fbebb55
SHA1a4f9957f52e543b9e432b1376faab306b095c111
SHA2561ab210616dbdaf0261ca60c0dd4c956f9250ee5a969dea42cedd9cac4dacad0d
SHA512f5a6a1574965bdc9d95da884e8b4557e86413323e0c45b9b590f97151feafaaa585a794492aa0f12daff61458da17033473c38839e85538d181359e343e2ac5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54027e4b6574264b2c77b7b3937644e92
SHA1a6b445ca8ccdea48e1b7efffda91c745857e648c
SHA256c58be4a13ea418ed96b5e90b2ac67636b8c93eb5d3c61303f1db91ee64175999
SHA5125ece4f049a4d7fe2d3646fd7fa10c74f41dff10c7364851ea6f2732c4aa138f143547c38e0fb44142188c9192c834af00e74bf67232a7fb4fd67d935470ca477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b513cacc87b3a4bb0bb8b6e41633830f
SHA1e2354db9b192cc0452c3cf9cba01806ddad3ca72
SHA256b8d8f61a94e1541415b77cdec2024f66472bc12ad6db4d517c719d252886a962
SHA5124b317d6468aca8ce196ff09efc820c13757d510f05db99a1adeec6d3be017e4d6e99f128e352edd8e41ab17b468c6ba16ad8b569b9be16f556284da764df3751
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57373ac071c6a9b851596bcdb6bd3e01c
SHA1dfc4e4874eca06e8e760766f7b16531c169865b9
SHA256f5dccb98e9433d4bf867883ef63d3ab2a21ec53e9365148ccc217b41abefe929
SHA51280bc2a43e82109d25576384a0adb1bac097170f5b42232a82b68822c33866c847f2cd51bd5a8d016d48fe2e47ef3cd4d40b80357cee5c3211fdf83c025b28a26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5185c0625d737ac89814c42328afb3af2
SHA1cd942eb6814ce8a0243d692390be35b0364535bc
SHA256e66830eca33f74611243baf5c73ba8a2950ea2bb58522a0ac34f71d6e3ca721f
SHA51226030796a6fa61688ea0a4768b7a8a65d38abeaf0eda85adedfe5d5036bf3a5a76a8c6f93710e33297c161b7be874c15bb109bc93656e8e2fab886647d5e37d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c084c51a0246ad0b5a114c47aeaff51d
SHA1462b55a35e8a3e3bbdcf187453ce4e13d5b9875a
SHA256d79d574e0b2719a56f9358a7744cfd50c554b44eda958ced52a6e9edafd28c78
SHA512b294a8a936633447164b2cff682c40dd03c57064612306f2195e8d725ecf000aff36f7d9c8d548bcd142e9a19aa84f8e472fd8b8f0e1587032700456f864bd37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9af066b59eedf86079e540ed29d5b82
SHA12b270059a80ba4bab17172ce63cb41fe2f455caf
SHA25683a67076ded9000dd44f03f497e999eb720fab78d0ce56f8272de660838840ef
SHA512613e15025f43cb4ad5185f8ebd55a714e8be2bbf6bc37737f3515896488ba97d2204a455dad78f3ce45de7a1aec44cd1f8ff82025ebddbad2e8412ea1bf5e344
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed299fbd6f66841429e0ff61dfb86ec1
SHA1813ba31305a978087fed9911e5c5d2b1f57ee428
SHA256e874028069eb098a293be0e195d18e2fcdeae53d0efc8aa0ef4f08b4e40c3dc5
SHA512753457ed5998c64f13776875780b2754efb5fb30981e42a65dc28ef79160ba233aea2d85138e63b294e446b956e04dac8508a969c7563e7e7e8eb50e3a877909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcfbfb40be9e5d9a6430028d55359f87
SHA1826f32ed508f3799c84b95f96f77d851d1b97f83
SHA25670a22e7eeaa49a8cd54fed70e5af684b957eb33372a9ebd98a5e8334f8288e3b
SHA51269774b50080a4843807f6c7f398471d9d4601c2a8db61899c0de9fdf555a1454d6640df03b2667b1895737c4fc1db2c080445c2ec8c0ef7290286507c8e02dcc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0I0VVMWQ\wt-logo[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b