Analysis
-
max time kernel
136s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 23:08
Static task
static1
Behavioral task
behavioral1
Sample
1541040490964b85392dcf6518451d45_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1541040490964b85392dcf6518451d45_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
1541040490964b85392dcf6518451d45_JaffaCakes118.html
-
Size
76KB
-
MD5
1541040490964b85392dcf6518451d45
-
SHA1
7431fac6c868f7bbf7dad3388aeb219177b41711
-
SHA256
a69f2396ed58c9f9e175cddea7eb7098de38ef60d32f8d67ea5e20927a509ca2
-
SHA512
602b75ec95f19a614850e8c4746ce5e9588ddd627ddcb5575f186119d5b31e4829e680aa3bfec8b98df61a6123c58f6dbbe9e5087ec0990b36dbf83b7fbeeb77
-
SSDEEP
768:5GAxpsVTjaPnEYoOc2GLR8GhQhkQehuVpCg8Cny+FVsOnlq0LluncqFXnrqV9nQk:kjxCJkU8mfr0BSAqD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000cbaed1127893821321233ef0ae1f5b1db2bb545b0d673b667e723e554a4b190f000000000e8000000002000020000000d596f3c92f69562dcd35e2a1acd82de223441783796abd8db902fffc78e61b13200000009f7d45535b5097749ad7d326be6f2fc1b7669952dc6912041bb08a47d75a7d16400000007a156bcfd804442e802a33609fe62590caa80412ceef1a47241dd41987beaa511430cf3e77ba40ff21d634ab7a30ec4b1be382b5319d854a833ba512bd3b3766 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f00a4268b216db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9213C2B1-82A5-11EF-B56E-465533733A50} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434245178" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3052 iexplore.exe 3052 iexplore.exe 316 IEXPLORE.EXE 316 IEXPLORE.EXE 316 IEXPLORE.EXE 316 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3052 wrote to memory of 316 3052 iexplore.exe 30 PID 3052 wrote to memory of 316 3052 iexplore.exe 30 PID 3052 wrote to memory of 316 3052 iexplore.exe 30 PID 3052 wrote to memory of 316 3052 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1541040490964b85392dcf6518451d45_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557d84b200d977ef1f646f5c3c2cb87bc
SHA168ac6f2ff39c71bdce3d709be352c05d37df518c
SHA2568eac76e89027c67f5cdd8134c4a96844ebe5786bd634e352cd0cb865d01f38a9
SHA512d67049b610b0854f6fdfd1ab365773bc78b814f92aaca5dbfd3dad16ca8f33cb7efc3d78f7ab089b577b92e042d4eb319150109abbac6c1a7a832874c2e27c4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f258151c08f30227f3923b1e1e40675c
SHA1413c2ab96ce81b9c71479e6cd334c6b98043470b
SHA256dcb800fc13fa61b9dfaf0fc373a046f8f798d03fc7705a5409519ba4fa7969f1
SHA512915995719043bfa21ed519835b7d5bc81ae0f59b6824c7a5f0ac66381243bce6ad7471aadf24f8de07d26f871d3291bdd9c7dd034a5f408511568ac7f9e17e79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6639513cd521819de509e0961ddde38
SHA16ffe3eff65b8bd30c9605e5a57d384bf44f1f49d
SHA256b8ee70832567e3e3d2c82549031e1acb6c1bb74e8cfa6c9220d7cc50590c0ad8
SHA5126ed6101dd430bae974516733d8c1b5833961883f4700d0b1f1636672576451efa6abd30b922eaaa61e616375dc56da8c05e2e9225a758f04f094053996de3eff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f9868aba7390306b3816ae18dc4334b
SHA1bcf6829c71abbe0f2bf1cbf9bbaa806e37fbac25
SHA25629c590a7d6abaf2759024c03447214c21d49dcfc3908bc9db8ff83a22d4050e1
SHA512aeeaf7de4a22e2f70cb48d05143c2272431e7b652b2f4dc1fc7fc572f56ea9ea0fdb0689db7c499131ad5281b49a418ef495ab4827f9ef9a56e6e1ca5f5518dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fef7ae8d2f5882931e16e5e1bbb8599
SHA10b80dea863cde197f2b1e61f5f85df13eff23081
SHA256008efef5ee6ffd10574734c81ab096d6ccbcb1c2e1e758cf8d0c542787c8fba9
SHA512edbee2f6c8ea1219562d7a250e9b7df91fe03ca33ce1ac344411ce55c83bab5fd247ada2e3b13ed6198093b6c345531ca09f89e12171fae8bf7a102e8892c2ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5311887ef7f59c2fd92606ee296fb730f
SHA1d4cdd1473b43980d4a7596fa26818546129fd6cf
SHA256820a0dd32e75a2f6dec5a9cc7919ea6b0adff743f06a12f5c2bd9840c818e5e0
SHA512af787111942c3736dc51d4a5cd623010c9bbd969e9bc113a9d89999dba5a56c1876fa9c4d3ca20c41f2ab70e86213ff1966b579c68fa04bf8a950f854c2bda29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b3f8ad5a70f64bc517d82f3d30eefc4
SHA1fb0888c73ed02c0c71dd006df526ca88a6421614
SHA2565a34dac2ee583ccff2b9d8153e4f61ea1330752a7e4adc0ddaf35b42268dbead
SHA5127403ff862359ae8087969ed406a817735a8906133b8ed6d758b33ae02b534577272575d9ca74f60687913f3c0e3a2d920481043711a2309b903a683fd6744d29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba89421eddf074ceb5901f65a9662e59
SHA198928cb5f13953ed72bb6cd444008aac6d58544b
SHA2563626c9915dd69c468885d40c1e77f518299eb97d982c9ffbc2dd776d4c05cfa4
SHA512525b5869d6752abf6a8fd5c9300f771eccfbf384a55e1812dbf54b9be15ae7a0a52a9dceb1ae5cb3ea01dce33a967489b87392bb414550df672f960977b059cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ff50313f9304fe6d200ded81516ba21
SHA173e0dcc29cf94a5ba8fb4fab53cd1a128d4cd036
SHA256ddb7b57cacb0fd284ac7deb06700088f9a85e4baf7ca4f3ec9dfc2c100209b5b
SHA51234288661e1f07c22af83b341adb82da8187a53a7ce3ab33926fdda6847d33670e91e7317d56a9cd91e66e80c7056745ee3117efd17eb609516ad8eb30812aaaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dac626fc35f5b9e8d632ce242dab43e
SHA1206ce438cd73ded3926c8689dc5a47b000e9d117
SHA256633eabad5d4d327839f779da0a812bca921333414fbea42dde246624154250bd
SHA51215859890d7afae7d3d5038a4917b92959d42b911a051789b834e6e4bc32d4641b3419b161e82785d6c5c9b9a2e5538b64bfe600a0a8b2a2d676402d58ab6ea8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aa882e12623a0815ac71a2d5ee3e94a
SHA1053b5f39bfaedf59d4633d1dd807678faffe6eba
SHA2564cb28628f9b46af999120640a8fb9840f7a06d0a6a0642c0786a8404344e9b02
SHA5127c43f4812bcb81fc3e78eed64ad6343eefc28917923c479a3068b01e8e52371fc45a3fef6ab1ae7280a32d54b8ec58bffe41a9eacb60d55266a8155e52b18a1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589afc40daf9a4aa64ee65723aaf7010f
SHA18cf67142f43febc34226e29b5ace0a6d7aae3d4f
SHA25625bae5f12a5a2dc89a739069114ee1d44aeaeddd75f1c401a5a1e99b2ae49bf9
SHA512819dd108b8d8d555c41130607a41fe540eb470605975a3122bf3745575d2d3df000a7d4cd9ae450f9fae941649d78425b9ef74e80a6fb996e3ee59fc9bc2afe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f4a6b06c2cd0e2bf67561b416c6c517
SHA18a953b51e6bd63fb4fbeaf765ce40aff58bfc3d9
SHA256114fc2d9128a210549f9d611e2822a6d4b842edeee6de8aa9798b6b2b54c55ea
SHA512111ca0a9dd55a275d92220871225d9e73a84358def53eb668311e49aae3df8de119090938fe61183e758e859db7ff7de6f4b70ed08a62786d4404acf309e83f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc3e6d9178cc26c33a4401fcdca9ba9e
SHA1fab22168eb7278738e7b03f72dbf945cfdc4abe2
SHA256cfaa177f85a16a41ecfe162b3cf3ff0d438087f2e0df86d5f0ffad45c9bfa508
SHA512d19a32b863b6c80f22c6b5f38e104b93be4857686f56c63e20a3c60fb758b37078da912bb5abe538f816a15120b2dadfc9df62d925405c5916a192c2d1dc69ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53210b4d849fcd141c846f651f903725c
SHA191164f4f7e9c5b44441cd68148e7fd22d18e6c4a
SHA2569444d885ae9448ed685a6ffe4e240f95be5b3d6cb3181a2ad4f7c33886631e5a
SHA512777256fc33f69bf5525c2faaeb3f6a1b5d83b5a69546944b1c9776a465ffb6bdcca860506b81217f4eba974a323002949280bd59c2d7443bf21156aae2866927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c7a6a12b662d1518e3123793d769ad3
SHA10433668411316106f8d84dd08edc2ad11486b7c4
SHA25694741c63bc34a0bbb401ec0ebd821443da7938d8b0d3950931b4ee66cc91ba6c
SHA5124b16eee3169b6d0f1b1e913462eda5d4b2f4ea3b7c820960458a5fcba4a5d05f7bb941d5f18c2b617e29b19b4905921209052c6a55e781ffa856248fc62d67dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597754730bea8620495a1947b8be13e52
SHA169ba11f72e8cbe456d1687e4c2168eba417cba8a
SHA2564d122f14dec9c788845c24982ae3c0f4d7d46af9de834208491f2a21cdbe60a0
SHA512ccf306060b7d9fb79da99a510ad67b4863ce685059f5823fc09c8800a7427e591f5d59dfefad1b8a44bb821b98a5a3cf9b797317a29473f0e42dd07390bc12f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d970743c07d66b12b463d142df3dc572
SHA1ddc3c59243d231446b08281bd3e85806589664cf
SHA2564469a31a47dcd7a1e36156d3ad946c34853ba573994378752eaa1e00c3c6861d
SHA512757a2dde783a2fe9845202ba87f1bf8878ee1e802ef4d2d7958eb3533e6e91f3a44b7d726db144edcd863f3c4795e1709809a8cde428fe7016528927e81c18db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585756465c8df9457ff0a8cdc74f974cc
SHA1022c8a77b3487bbf05e86bcbaed7f0eb0ab79e7d
SHA256b1de81aa71d7272a09b324dfe82edd72d04f1b7614a5869b2ec0ada6b1ad318d
SHA512f5b0dfa5f5d1adf1730eaae0927479a3db0160a5ece73093af3f0a39739d3c5f8ca0f9f34f58536772c6b0f02f0a72232d2281c202840471a6f4b5cea9ee4e2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aca2098c7adcd68bd280ef36def5f442
SHA1b84b757871ea12226cabe461cc98fd4339982d91
SHA25666d925ca96626d252d8a5d3c72060aa48e59b48394d28ba4b1e9063f95db8571
SHA51217dfe1632defdd672eb539a2acf84d60855c87a079d46709f1c772889e107bb6645625596f03cef0cba6429e4c6d05e4fa1350cf4d241eed7085346a22f7ec25
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b