Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29-01-2025 02:00
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5180b429552f5410eb79864ceb8a17a7.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5180b429552f5410eb79864ceb8a17a7.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_5180b429552f5410eb79864ceb8a17a7.html
-
Size
119KB
-
MD5
5180b429552f5410eb79864ceb8a17a7
-
SHA1
e22ce32a613e805a28b08a9bcbcaa33df4279ca7
-
SHA256
13364d7e48111142f9f16fc54204dbabe46fbdef0c1ecfe65a6ce519ca67b1fc
-
SHA512
0ace963783db2ed63d2dec1be476364d5c8c3401c592d71f767e86c353d5b61a721756410c98a618091e01576e9eff8940f24f0b529f3ed517e6ac11fe4e1f65
-
SSDEEP
1536:4kJEEJXFvRkCDrnDD9BVZfkj/f5w4w+iT:4mJX1RkCDrnfVZfT
Malware Config
Signatures
-
SocGholish
SocGholish is a JavaScript payload that downloads other malware.
-
Socgholish family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E142EBA1-DDE4-11EF-AC2A-E6BAD4272658} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "444277926" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE 1748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 1748 2192 iexplore.exe 30 PID 2192 wrote to memory of 1748 2192 iexplore.exe 30 PID 2192 wrote to memory of 1748 2192 iexplore.exe 30 PID 2192 wrote to memory of 1748 2192 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5180b429552f5410eb79864ceb8a17a7.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5c9be626e9715952e9b70f92f912b9787
SHA1aa2e946d9ad9027172d0d321917942b7562d6abe
SHA256c13e8d22800c200915f87f71c31185053e4e60ca25de2e41e160e09cd2d815d4
SHA5127581b7c593785380e9db3ae760af85c1a889f607a3cd2aa5a2695a0e5a0fe8ee751578e88f7d8c997faeda804e2fc2655d859bee2832eace526ed4379edaa3f5
-
Filesize
436B
MD5971c514f84bba0785f80aa1c23edfd79
SHA1732acea710a87530c6b08ecdf32a110d254a54c8
SHA256f157ed17fcaf8837fa82f8b69973848c9b10a02636848f995698212a08f31895
SHA51243dc1425d80e170c645a3e3bb56da8c3acd31bd637329e9e37094ac346ac85434df4edcdbefc05ae00aea33a80a88e2af695997a495611217fe6706075a63c58
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5d68d7bbfe963397ec57450e0ed03c705
SHA1e3aef1079a73b0d5ebe52aed956e0c84cc4f61db
SHA2562a72f5d3af589d2cb691ca80d7f181695945885bda822e9b32fcd956be515432
SHA512058e18332d1ee068b80330a9e5a49efdace14920b59bff9f5a660beaeb6884f5d2ca2d470a9c352ab2319ad213a1dd38b1c5de49b2149546c0f6a29be296e9cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12
Filesize174B
MD5b3ddec3ce0a21d9176e7fc9cfae64973
SHA104aa88e270b0c509c52a47bf4e1ce0d2cdef2d03
SHA256bac4e9ce363290e7a4fd054eb0aca92e99f9986d6f2ddf3f946d835a42d5f127
SHA512c623daa6793c50cd4aaef2934baca1ca401ee5ca89ab8fbb6ce95e37a2ca0d7e2df0daec72fe96e2524c65c439e5f1483a0e43da5c7af5248fd21ef02441e6b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fabd0859dadcff1739a62f1f62042ec
SHA1f6abd01c9d41e262df9a52e737c179a8e390a353
SHA25683103c84159c08e6b6e5a4f1d57fd0dedc85311dcf5c9fb36a8414978165d5f9
SHA512ff0d62363f09a22c122e905c25056fc75ab38531f4dea32cfc6a2d680bd2444c3a133ea08a0a1311a305cf5080f07f72e0643f81cf44676403227891f38d5cca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a4edd9aa4e25f768392b4f462f12d22
SHA1576aef54fcfc44ab9f383dca71b5cd8f8bc24020
SHA256301b6a5718ef8cea0346519d8367f25af511c3654f9049bfd06023f9096c477a
SHA5126c34211d3a147ca7bf65b01555b2f5af31858639c6f85c1d9dfb5f2aebfa0a48115f72a6b2c7574a992a186993c13eefc2a3d15968264369dc062bc80827c097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b802183336e3c96cf5c3f84c96f7fe74
SHA107c7f5950c7f8e1d29db942fb4242e90e1a81b5b
SHA256cf80777ca813fd73f18a27d7e3a411bda274273dc0636ced36a0118d255064f2
SHA512d7728661e7bf640b5505be42671772011a41a09a382324ff15091aa708796fe7cb47266c88eab375b58f83e60de4f61e54de4bcf7a81f2e3718571d0e6689dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8e33f764e2d7f26616076bd6eca0b58
SHA1c41be632b85d98b37650112b54dfdc66208b89fc
SHA256d837d4ea7f2bdb0ae469460c989728f7093b1ed470a163ade503b1a4dcf560d8
SHA512de97167aa397f0db0879d25ab0c44a1c4a3fa9175443fdb79dabdf2c24689a7884aee838d2ef1f1b64cd4bb6aff8dada88a7725133a2eb4b97526e3029276c78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe69593231fcab62e4f5b8311b850cd9
SHA12cd60a08f304994fbc3963fa7111337dead6798b
SHA256c62d4d290860be2e7ef547d78d1d1656d4c9d2915e8263e04924feb2497e25dc
SHA512a7ca831ead3ca98fd254ebe969b5673791873ac297a48044e5c3bb021a83cf568a567ff07c7a7bee4eeff2967c5d21450a9726278f586ec011e112ad60e7dc9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dba64d46969c7167b837d4b44d79eec6
SHA19517b3a2d38e9d3a72dda23f67bc6006274bcc23
SHA2561ac380d386ff5828abe00797d0e771850c362a95532727a6693048c540106a69
SHA512f4bc1b284ccf789079cfcf87ae8f770cab26775f341445a476bd23224ddd3c99c2f20aa3b1423397551653862fe88cdda2c5de61871710f8d124a139b313929c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530cb536038c05d461c48202fb9f66bd0
SHA150e1efaeb7c7cbefdc27d6e273a9900f1a3c4b12
SHA256144bbc03aba841678815853c2e19abec906eaa3899018710c05d1bd09ade9448
SHA5127a4eecd2cb2a4561a8a3100ec4fa67e44a810b338a32a85dd2c8337ef30827dbcbb08c3571d9f5a9296c6cf55780b2b1f52d803d90025ff9ca787956c8dc2d36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fade279d8ce3d83348e12fdc80e2bc9
SHA1e177654bfd1e77e909bb1ee1b672855c722d069b
SHA2563e3693a03788e53e873408a489c4577a49abf2cdb977b8515fab8595f8fec4bd
SHA5126f03b12b1002379a6cfc8bb80b558e3b1f50e6d79c677ef5e616b2a30ad96e7b6d8130676a0c065fe60e227531f3d7b649dbda4993e60393ec3a42bec86cd4a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521e20bd63cc94c21b82efa9d9c6fd768
SHA136c89d0b7d98ad16fb553f0aa1e2b5b58cbe1b1d
SHA256cb44c60484d423ecbb70f262fe23ca18d17014139804911f085de78ea080df97
SHA51268e9cd08affe19d15c856f5c3b0de85e0f1e724da1419f95d41b5873c93f198c7604eb5f78f39a3d9d309ccc35968711ff1bb71e234b2be2c8aa246cf285b33a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cad5c60c5d9c67cf5c4962706406e982
SHA11c67327aaed235af73d15ad8be8e1b1846f47b50
SHA256bdb36f239b8fe25860e1c0b8be930a60c0f53976b9b988d1d172fabfab1241ed
SHA512db76f4ade802e3ed20440ff5c99cb5734a4507ea1c6c9f57e44d4f3f9d6f17c8b0aa6f121d6efa73f4b4249b2994543119720c01d80687bd1dc5fbb71e214fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de3fa8f9ce4bbbcaddaa5cc268f31f17
SHA1e8d99c733a68c8c6fdbbf66ee02b358873a98438
SHA256dfe5c7e5b1f070c7c769080e8e913f10b4aa3b6c0b440abb4062174b1b8f2f35
SHA5125816062d0cd8312eec28ba2e76a259352341f4d26884d8b40d357bc9ce2c8f0713483e01ea43b1d52ef078de61113c96adbc5ad600465c370763b18032dcd8bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f885888ed1df60c2ad17cb9e4ef2b5cc
SHA12342384ca0ead88d5d0f7b875605edd827b49f34
SHA256568d00e565dc547002f8855e80575ffc6721c6acb7ffdbf6421b8bbf7a65cceb
SHA512048ca39edf854c8cac959d4f4f1a5227a2078ca3046baad18222377c8dff894554ff193439e9d1ceaff55f6c67ad60914c3d7f450a10d7a3e175e4d176ac29cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5969f9a4bc1fe16d69bce169c7212d3c6
SHA1c39cfd2151db6d5b14123c0b10eb4c32fc567397
SHA256a5a7117bae59570b8ef872c07d38d40d2ba7f71baaaadfc7de6f5529dfcbcf90
SHA51280cfef904319d1d16d9eb80c322b454a6dcc7f277011b33118abad2319656a2c5900ac4319939fd7e65a2ff1cd19fabc756c7f68037d6bcdd9223347fda6f178
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56749e0b8ef035638b308d2ab548ae647
SHA19c755127b8ab6b2c11489f1500404b7ee44bd99b
SHA2569ac4598e9b41a40b0f62ec4cd33c0924a113e3e02d01430d7f7a49bc92b564c4
SHA5121082197d8a18834161ad7895e4a67ff5356b2ab2e77e016ae91938b72e6efff950bffba80480c8bb264106b2ca07efbac4535b000ad575c907a65d520cbf5eb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff5f8dd8cb44f63246ab13b6c45a7bcc
SHA18ca0e698dd44ae573bba391fe6458e43b0029aa7
SHA256b43c59cc979533db8abab94af373c5194b5e6be7fa26eb0b389ba9c40d5c1e80
SHA51242b11afed897d467a01a08556b4aed77d6e372fe290b2d9e35feaa1fda726c6e4747a328fcbdaa145e187df23a33e5bdf8f73d1036404a44471b3a64c7c8ab63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b1f41332e41346c78717e991cd498ee
SHA1fe75b0d91687c2ba7dfb8293bdcb9b06cf57546d
SHA256e58645bc29f59886e96a93faec45f94c1c298e10a3626713536b5cdd4cbb13b5
SHA5129dde928e26caad1b53f535b77c638ae2bb32a91d66b2b6a35ff49138982a14117faec220fb5335f5e3c2bec4058af440826d49b89cbba8bdaa073c1421c51d3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5AB
Filesize396B
MD51cf2a8dcb08997d0f76a58194ecd83c2
SHA11d8ae4b35f65ddc1ad84c28df2692b55ebd7f25d
SHA2564e31d253cc545855abe2987998003e9cd16864857f0904d0cda42158abf7b7ba
SHA5128ca8f297ac8011b4468a1b2c2fb3c931517e037e584b506887aa7769ec20a8238076cca8b05dec77c2fa8a689303dc312a7dfb37fa16e3a5b1855a56476f42ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5a6b57c03ed6beaa156c16f58ea249593
SHA1edf830c0b24e34cf4380bd95457f2812ec9544a6
SHA256a080069e25cea241018754387c3231c3d0a8679fc2e84ccb2d3e3121452eef7f
SHA512d6b5a1a445c0b6d503e60e80daaf08b85c2363ae393164f7e444591d6f1a8841457f4caaa25a8c7132faf3779361368de3870a0060059e46b7c05b3d8a7a0447
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\f[1].txt
Filesize43KB
MD5184754a73fb01438dafdecc91d719a58
SHA108a932b6d58dbed23216834ce0281f21a37a716a
SHA256921c2777305b117d677449b716a98215e7c59f11b45854661c7ec2faa3b46b06
SHA512258e5ef20149d6d9a094c1babcd71d16b83778538c9cc2d03bc47863583a6cb41676388db50f75fb59e7c3b8c7aaf78b56e18649c77b3f4e660b442f0d776cf3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b