Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 03:34
Static task
static1
Behavioral task
behavioral1
Sample
1600b3ff497390327af8b6f94a39983b_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1600b3ff497390327af8b6f94a39983b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
1600b3ff497390327af8b6f94a39983b_JaffaCakes118.html
-
Size
68KB
-
MD5
1600b3ff497390327af8b6f94a39983b
-
SHA1
00f77fbb950306f40b97fe07bbac1d9e8db26d66
-
SHA256
542f5db77d81ee124e207d548d6ffbf1c174cfd870dfe803ef91e90b97f47578
-
SHA512
086862b47531268847b9364ea3a42799dfa40bffe0195654686da287c2d320f2b386c0d162d2b1eab3dfe195924abdccfc4a41e4289f8fda51247cdf109f3226
-
SSDEEP
384:ed413zS2UlfYWFwSElBMapBM6Vsmhb1AHAYTz5mB/eEZT775jxH/eAingr/eWTPh:8YQElCapC6Vlhb1Ab4nHa2Cu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434261165" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000007f85a617696b64461dcef510539559104a4b8aca78fb605c76d6b575c50179fe000000000e8000000002000020000000bc03f358619b3b41830bacf5e20be842628e480c239eb48ec5304342bb4a0d8420000000063411bc9fdd692423e664d458b8d4f76f51b76cbbb9b4b847871785cf5ade6040000000345efae965b0d95adebc25e18fa35e08b3a8a9567665bfa5306ac44288f6e53653309b5908a95ef59ba06e50d414df5a43f179675d4f1c7ab2c43465eb325f83 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30cc42bed716db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CB9C6621-82CA-11EF-AD31-F6257521C448} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2412 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2412 iexplore.exe 2412 iexplore.exe 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE 2876 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2876 2412 iexplore.exe 30 PID 2412 wrote to memory of 2876 2412 iexplore.exe 30 PID 2412 wrote to memory of 2876 2412 iexplore.exe 30 PID 2412 wrote to memory of 2876 2412 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1600b3ff497390327af8b6f94a39983b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2412 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578fd4d28ba689f8705e28b51e2464a4c
SHA1aa971fe93c769cd382eac5463d627734a2112d63
SHA25668aa776ebd24af027988845ce84a63ad801154016e3a47522138a0932be8ce8c
SHA5125a9c0445919e35ba12858621b4629af1d0acd7876f06b51096d610df497d2d79c6c78598cfa03326185f5257cc8d5c2c021b7f1c0f204a9b16cf1fc1dacb2207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556595a9915e9573f2a460d8d226cf93f
SHA131c8deb91b2c0b3a6bb534e3012ac754e1a7c12d
SHA2564821c43709d0ff3d0b5b2b5d540ad256e685d1a1d90cf44c29f2d5b7cfedaa6a
SHA5122af95c9d4bd7124ef043b2059f73b9b7e1d0bbb1cd4ff87558ed4d9150d91f129a9aa96c9c2b6281fd562e13bc079ceba4d882ed4ec008bdebcd4b6bf5baa957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b51ef4680996ab005b6398a20493cf21
SHA1e161b64b5b9137d51ab0d7b1740245ce71ce6b62
SHA25667de75c073823c30f1e9f0bcaa4fd4a7338f1a1d39bd63a490478b320e652507
SHA512c6d74c64612b14bed956cbb92e56be5e4d5625aaa1af7c439763860cda54fa32bfab479aab2c6c1ebb69dac8476d87402fbd1bf49ce6af79d9427bfc0b789e6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5886b778a0c020d580ba0992bd485cbe4
SHA1a3a34434432afb267d2baa3e312286c98461ad30
SHA2567150a64fbfcc02a6213412ab75481aa8ccd4ecb9121f63941607b18ee70a9565
SHA5123e58ab81fd94878dbc6e34e81db52abd66332e9325f475ab89b484fe40d72ba94dd90c38bfd48bc2fc3454a4cdb416fb068ec6fa81d8ff52623bb868167d1fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5951c05cda36ad09341d512b318eb7d5e
SHA168aa43d36cbf1a67ada11081377e7ae1b0d0d067
SHA25679b168323d8b0aaa29278a4530f97c9145051d460a199a1a8792da61f8afe618
SHA5127f2a9bfec5667a4882a9b06d64d86d16b1aad27c2ecafe9955d7162456dff45b413f2f505f1fe906dd4bb1bf00272880cf2954b4e37355da1fb72287cd2dfcbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545ff357d46b0612e2ee601c2d355ff2a
SHA1c557dda7e98cc044c2ac9e6ebdc1d59b6ea5fcd7
SHA256261ed1f071c9a71d8ee2a0a34ee387f0218d8cd0c7a64ce9362ba8c8695fd175
SHA512bf332148c59f7d0058d35ab0f8479e890481ca251ac9058f95ea77d6aba0577def51b2f09de7e388572da1ad9ddbf35655173e4eaca34358cab44cce077f6ab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4a659888708f19d7cb5260df30c5fc9
SHA1da099918c5a4c59cbc0150a5c19398139d582076
SHA256f88be00d6ea64926ddccce64b295a0c9d02ceb503b4e050cc9f4cfc419524404
SHA5124e04eb340aeb4640f5dd4e5406d9f901fe3a1a356b0267a8fa0fd6d9fa481026f71804d5eb891c43ac5aaede2823da419108220226a466fcd8ea4a0eb76ca277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db834112d3d7bc3f13f9dc7e26dc5f58
SHA1a8b1d0ee292b20593c479006a164667fd6ea2baf
SHA25629637615b29fb22fcaeabaeeef444968c7c1f7fc3cbd40fe2bfb1d1b9a5f86ce
SHA5121e62e85ac0343b797a508d5d7d01447d0bfa61d96f2e0b9dcfb6ff3dec45fd08ffab2e48284a5e85829630eb27b36627581c8024b5fce6fb5cfcf41db3a451bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deebcea35f90c8116d363b6d8b26fb3d
SHA102051708a278bdf30dce1a0a38f9d1378925a074
SHA25633dd3e940d4038d4fd126f16363fc0bf5c65981387fc305251fd2b212a7d0cc2
SHA51251689ba3f87804228ad15d76d5c9d309b1e385224c4acfd8949fbc792519919c6610661a84eb2058f2ea0578eab5e96d70060db90e3b7fd0b0509f6e92e6241d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54de1c7820d24bae6bd671de54b6cf2ba
SHA12673d7b6b5700f5862e6818cf8985aea589ca363
SHA256952d70e6ae4d5bc245438e9cc04a7320eed9b3e674f60046a75499d1fe45ffe8
SHA51288376454d3980a1e28746a595ddba99457a5d7ef21ba67cc57df64a31fcc4a0a5ffbd460ecd03c08c144813eacd3342c53809c99c0da950c460eda667905ef3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6cf90cc9322c7d40be6c7ee43d45d89
SHA1b60d3bef0c7cb4a63eb1f127fcde9546318990f9
SHA25661de3d2a5c19f5aa0d27de42763cefa66beefae367cc31995e90f3d05306c611
SHA512e8e49d2ec5c8a1ae67986c88046559a6d9c6bf5c14e50323a746564c28d9ee74420fe816e2f13ab48708fa10a2981a1f4b12a6ce7243e2b9a047420a99d59cac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b439e5cd7dd0651f9a3d38204863c5a0
SHA13ca01ac222a1f20fa58cc7961cbbab48c7dd8f4b
SHA2568af3107c7060babbe6f80d93a83d540b86d4f529a3f237822c1db2c831a675d4
SHA512b946f5f99c14c2be4131ff33ec405736dcd2a09110e10cc8e8e8bb0c206a9652526171c556689085de8c782f689bd43275a6bfe51ed9be92e83f10bdf07ea338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1bb814a5599c3b3dca6aef01089f0f0
SHA1a56225f373c3d74c90c1bbbb185b30d835dc5829
SHA2563fbd5e6bc5c157a561a2780f549ab302d5ef8b3678beeeba2f54d16679a9a8fe
SHA5129ece5b5c7ee0c91bd59781696a4c4ba8abcff7122fd4551adde43a223e6b7594041760734ce5b6b59df1364f9cf69420ae11f85972e023b0445ccf8e7fbfee25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e884b627940ae60c17c1f4a9a8734967
SHA1e3c7185309f15ca52c4d1977ca77f157e1b1ef58
SHA256c8deed880a731a969295f2588a0967b2013c7a21519e882f2be618d1836b53a1
SHA5127efc24d4ceb90b257bf62ce965794ecdd5e1ab25dc4fe6abe3a77fe57492fd777000ce8b6298d3fdf2d1ef1497df3882f4178f328b33023642bf1aa3e91cf69e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532c7d18c20ebe5c6bfaab38f6ec7f2b2
SHA1227fa351d96c081a25098f1b63eef1999f1a5490
SHA256144875b7f257accd5bb2fb1a0c9dfd1540553adef0669738fc3614e35c88a3f6
SHA512dc6b61dc1393fec3009f9fd52dc45c08b051a7ef2fc6b7d7cf8b22415e35d15809b4abbaa8c1873a2d45ed53b04ed94a314ce61fbe3bb181ae1c453cda2220be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffae2e72812b6964f6062388894cf4f0
SHA1a4f13982d99228704609ae49d35948cd4cc1270e
SHA2568b85299dd34520144a99bdbf3250b42e0bcb0a6112d1af22399f3f248a93f0df
SHA512f4c34b57b1fc53cfeac713e43fb64a807b8472b02476d1e07aaf08ea92bd0cb74273b6f5753cda10875a5e0e3da32850a075373415204f2580670586ce4afbd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580038c1271648d43da978b220be8f15f
SHA1b44d17890839be934eeaee9a52356299631799b8
SHA256e746756499f28c761161f694693428bb89973533955f66020b1d790b40ab1a0c
SHA512fd5ce5dad9776ec0de03ee6d08a5a6a2edb36482d9115eb9e0821352af868c0fb7edbbad3f8a8a044a3eebfaaa90507033c9bd5daaf539189a08b8b6ab7c97d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5064fde6c67fc5491a0901e0ae4ee75ab
SHA14a87db78dbe625a87341998115f28ffd0eca18e2
SHA256cdb13c58224449163a65655b9ccaebbe2617e137d2384162b01de40851185532
SHA51219725e06562e9450adfb7e185c3d00d3c4c5afd025d3a2d697922c6ac221fd19c305c092136280949734b6ed7e8b2becdceab860f2851f0f2c2ffe9212603451
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52defab39c1f0339c1574fc233ea23966
SHA14fb87b8026a8e72cea96f89df24a3f456a63c579
SHA25673e5a88cc9f09e58e91beda421ce2be02d49e7888f2b9951ef0bfdb0c75ba509
SHA5122822d307b1900fdcb488b7392bfb62c830f588c065c2a21208e6b0b167ccf6947e892a2eface0b2030c3fc1052d874e837349d53f69b243d5e4d84d9ffdc1e35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584f27cb627517d591325b1484a1088e1
SHA116320c923d8a8324b57eff83589a486e15048694
SHA256998b33853c68d6297579ccc16cd9003e614d05d089f449d4b556e0cf95f5e80a
SHA512919a779e70538feadf6f93e4d39daebf2ef2f68fac3e8ed595e11b92ce090018067902c4e3a2fd19169d8796b99d612c7ebfa66cd3289c8d79b4a3ecb204a376
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b