Analysis
-
max time kernel
141s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 23:29
Static task
static1
Behavioral task
behavioral1
Sample
ff7f3cb62b557a6af5d7abbd0a1d2323_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ff7f3cb62b557a6af5d7abbd0a1d2323_JaffaCakes118.exe
-
Size
7.5MB
-
MD5
ff7f3cb62b557a6af5d7abbd0a1d2323
-
SHA1
7aa75006293e429c930d54b14f16768c74341611
-
SHA256
248e8f6b6623673be409cbceb146eeca34f09284cccdf7fbde45dc70013ce34c
-
SHA512
145fd52897f655cbd04db5dc72733b4104f897ebd6e4c9ef4712349826b0e7bfbfb30d8e14e936e7ad8925389aedc22fb1cb66836e6c04b077b120707d954d1e
-
SSDEEP
196608:Zh3CZzW8gaXJFfkrP0SAOG2AYVarYtceeLWSlFD99Q:v3IOnr0S3ZCHln9Q
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ff7f3cb62b557a6af5d7abbd0a1d2323_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff7f3cb62b557a6af5d7abbd0a1d2323_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AC1E1C31-7EBA-11EF-B656-D686196AC2C0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f08624c1c712db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000f2ed64e210433d355f6c83173b90e3d72a7a80c4439876b066d08a1ee47f1c26000000000e80000000020000200000004ea9827b535d12781e01be736f1d4b66b888388d0b82df3a2625b397d6fc5e9f20000000f70cc5a63aa0699de757d865c17b2469492ae8b471276254bf51ab7ccb7230d8400000004f1519badbb8b94c3a9213a47e2e70c75d932f9b03cd633936fd08f39a2041a0b8c48867eee9ad0e0165de6306ca54e1d1b2ebbfc25d16e4dd4cfe3edcf12cf9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main ff7f3cb62b557a6af5d7abbd0a1d2323_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433814435" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2432 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2596 ff7f3cb62b557a6af5d7abbd0a1d2323_JaffaCakes118.exe 2596 ff7f3cb62b557a6af5d7abbd0a1d2323_JaffaCakes118.exe 2432 iexplore.exe 2432 iexplore.exe 1912 IEXPLORE.EXE 1912 IEXPLORE.EXE 1912 IEXPLORE.EXE 1912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2432 wrote to memory of 1912 2432 iexplore.exe 31 PID 2432 wrote to memory of 1912 2432 iexplore.exe 31 PID 2432 wrote to memory of 1912 2432 iexplore.exe 31 PID 2432 wrote to memory of 1912 2432 iexplore.exe 31 PID 2432 wrote to memory of 1912 2432 iexplore.exe 31 PID 2432 wrote to memory of 1912 2432 iexplore.exe 31 PID 2432 wrote to memory of 1912 2432 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff7f3cb62b557a6af5d7abbd0a1d2323_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ff7f3cb62b557a6af5d7abbd0a1d2323_JaffaCakes118.exe"1⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2596
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -startmediumtab -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2432 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9e895f10e90138547fed3240d5e3a7a
SHA1409478a70e4c16adf7a083235ef276702de8c7e9
SHA256270e2e001afa3aeb53f5a6f667c2079b525ccd903e5c7910f45e99f8b58a3b3f
SHA512016b91b9dbd05a64847806862d4d70754dd2a57d8eb6f0c904038a519030c1f86facb92438577a7d63a184823dfad82a66dd6b0e6e8d0ad2e316da02c20fbcbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e96990376eb4d4ae04742d378e5131d0
SHA1e86a2672a5b9852f778bdf58e2c3bb3ff0db1d2e
SHA256d69b3a6a142dd087929373938d595658deed88879534748d551f7b4a87921ffe
SHA512584a3364e74a44e76e0b4e780e099ed2ff6536d07603d489306a986c6611903f70420abeb56853848439b8089bdf916614d08b9ca88b52ba9f533895a8ae581a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5153940bad93b0ae80abb22838e2d570c
SHA1478c245fb9c623528dadeee0b8168410b6d91426
SHA256253f19f384fbb7808e2fd368f3f851eebfd470d924187219fff0e38b38bc8cdf
SHA512fd73b0a3429c44b1623b13b35376b7d1bd14e1369dc0efc5c559d292b4cd88d35fb67c6c74a8c7c4fa0339252f8384ef03169eb6ff04c93b822fec43ebf85018
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a68894cf5f444165578e559bb555eb1e
SHA184eece99e21356238d6880a9e69bb1a8bd0a827a
SHA2563d68c455fc7a6df020a04fde654ed687a745715d1d3d041d62ed2bec28b4b32f
SHA51269f779aa659e7a19fc2d490cc8e86c0c28a77bdb2a10422f7efdfae43e753aa77ec5b7225a47c965907f841577d8818d7fc5e264ab9628139b839fdc4a3354d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b881e629278352be98acfb96f038ca3
SHA12f4635dd6ff756f8d96ed68f66ed471399927403
SHA256d7b7e9b3f267ec625409415d2877f2d578e5afa2f5c61ac9c2d95c9445793b5f
SHA512b0fc3dbbb742c834455c7d9c616a470c4c40af2eb8e7c4868c33bef644c41da7fbf25bea31464543859cd273f048f956d94dc7dd03bf3ca91ecaa8ca78ec3f24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ed760b12c0369397eada2079cf5f3eb
SHA1f60044cc1eb76e8d2c3186e067b04fbb9838bd64
SHA2568180d4af606d83519987aa9b1b3a93b8271f0eb1abcb6cd6325b32043cc63ce6
SHA5126a22927f089d793c991c6d66eea698bc920826aa13f08649420e5250f7376b4895e692515b13e33806215382681f956deed061c2b2e2f61c9ebd41021a16289b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586028f7101f114bb18e2ebe8f3293755
SHA1e05e46f359f13d8d145db479150d489f21e8d1dd
SHA256283ee891a3da26857bc93106271309505cdf841bab6fb33f57b5c9a01f6c8901
SHA512312ed243a91f258e18c8d91789739fa8706966a16c6bc8f477a6b4296b6e64ae0ca2a9ddd9d8a77be77074f31d87cf9431f530ef5616802aba6318e5df812ca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da3390040c1817be968ad309b9b73519
SHA14be0f88e3a67b93fd41a0ddeb90f3a660d54acbd
SHA25671e3b2866bbb210dd4145876f65d4004eddec2e7c422f87bd5a2be98a7a7cd72
SHA512b93f961c59e0f4d4887462f6d1b9653fe49a311581be15e5f6b507846f9f035413e13ee99172ccd27a448071a994eb2ef1c5abbfdbe5a743a323861a4cbd0f4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55860e43289dfc9a9a7e88f1773849c59
SHA1161ffdc753351151f41cd86637d66e747274864e
SHA256bee76a8814925a66b4c09f2f34713c53b4a9ed10228f2908842f36f0132a80a2
SHA512170c381f8ccc65d886772d67391c9a9fd30a341468551b72862ef85cf9e316fb501f16bea3474ce2df3d058d35f58af0d92e71f5c5a22a8b3d89dd5a74406e0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57097568c055a264c812f95b56a7d7dc9
SHA1ab0d5ba82dea24625d3cdb97af628a27599217f1
SHA2566d52550a18693869367cee227a9737ecb4c3e57de93a8c025ad6c6d0521e3c43
SHA512a48040960b2e90a6de3cf0f1a0af91f57498af2b55da613734f5cde7ece359b0841e320115c9754c81fbf033c62315e0030c9b9ccbd60de858b741fc3bd7b951
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eec92e947ecd1d2066297a35bbae6b01
SHA1dca41b72ce5ffcc5b9c40bf0659fb0da0b8baf15
SHA256e8fdfb7e83aeb2ef6228f7179a384567ed3f17502f192b2933e6d9e6b35e6d42
SHA5120ee398f11cf08bcc16777fc9a570e25d5f8953085c2e9b4eebf768f72d7309061a512d15d4ece81d0e38f23601d2fced9399bfefa1fda73fcad04ae3a4859008
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5593ca861af79bc25ba07b7d17e6e067d
SHA12c7572b52b3a7fb5a77ec7805f2dadecad366f3d
SHA2561d077ba539f972108f6efdab40a5f9601c722d245f78eee27f14e8aa08ef8b48
SHA512a6608207635fb17db91f0b8aee4fc60fdafba3d788a6dee7c31defc1304d3afb5f9f0d56582e857ebf2effaad67a05dd737123045045439c836866aa366782c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e40d70c2fc31234b0e20bcac08b9c90c
SHA1bba51cf3304becafc9b50e10f2fa61dd5086fa26
SHA256a6192a9aaa90ee76a0e564dc5174b9fdc8da761b22e14aed3344c106ab57c45c
SHA51239b4a8e5200f8f7649af18bf60815e04bd0e398ed71c87b743ea1f39d2e7fc5ad2a20b6247bb53cfda333bd40504e9ebe44c2f5324c0a129727548f4069b1fb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525ea4e39069a9957733bda03a4cc29b0
SHA15136eea8760951cca16f0356a08e0e15119a35b0
SHA256e810b836c0aa84f692200136d2be93003bf6311b15c480ecd93d4a433d22bd65
SHA512782f695532bf231a579385f74a3ff1f956c6671407d934aebffba3b1ef1cd1be4ea60e43eef192691df374d4bb2c2094af3de6788861007e425f97402b10c4bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cb50f3f72f51775e31d34a4e26e6db6
SHA166169ed01450187483db21f2844218ec15fc9c7e
SHA25652b5e942fb93f19529cfffd68b9e4d0b8c7c34d289ff00ac48f25fa894c3346f
SHA51283d171e520e9a339586e0335408b5812ebeed8c04b82cc550348f946169fe458d7031d1df9b38ea2eebdddd95ac1f19c9c2c4e9dffd6a644163e3dd26feddcfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51255c720c59eabba0091b871951fa8d0
SHA10d8fb68dd7070ede0162aed57adf09a282031335
SHA256f445cbfe362eebd15545c27c3f4fa89971dec71ffd8c2ba1006938f5e1c37de4
SHA512ef0b93ebd90c7c7eb86ea849d6c538f95b5b0b65ee3f6fc75229be0d22b8fecc581a9ac1ceac62ff6a8ea5085eaaf86737ebcc27d0be1f5729d21fee7b9040f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4b904d667271b16d29f88520199e9bc
SHA1b54e28ea9fe8e680088770c995dcdd2565d990af
SHA25629321bc0498d2588a4849184bd577aeb3ff322b6d8b41593a259f100c183882c
SHA512f8291bb38008dba51ed0407e5c5fe7e6862a2c08bc316775b1553a9b7b0d9e25c699d6821a5ef5aed24cf53912051c57c10cd4bf95fc6df6b7cacc8a2d1ca74b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571ca73e5d6a1c87ffd593ccee7cdf14b
SHA11f39427afc36ddeb29caba69fefaa4e9dabf6def
SHA2562556723f5a9d28a5edf25cbe9d891a4f2ca3738ec19c2ddb2350ebe5f61bb2c0
SHA512ac122cd915b0f11d0682d32569ccbff069669990760b4f13b3934294b9c22d3767137f2ee9d44979037eaf54dcf41a1896de739791697c03bd16fca5de15dc21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57efae5ade1d1baca00341770cea718b5
SHA1a57cbbbaa6f0ff86cc2b394e7d7e33ecb801db99
SHA2560aa4b773d363b17ebdf1de5f7c5355c0c3fd83cb06752a93621a5b4cf2289e49
SHA51276db90952803857b712d08ff6b8c0ffeae45697fca45d5bdd334fd0d573d7b15220628ef8cb48ed08d2162fac57bb602576b7249b420ef372a5d8298addc7721
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b