Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 14:45
Static task
static1
Behavioral task
behavioral1
Sample
febf912fdad9b933359fa29efa939661_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
febf912fdad9b933359fa29efa939661_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
febf912fdad9b933359fa29efa939661_JaffaCakes118.html
-
Size
175KB
-
MD5
febf912fdad9b933359fa29efa939661
-
SHA1
7dbe5f8079662394dffac701f7f82af9e0e2e2f4
-
SHA256
06ee13f0d723545aae8055ab8e4b1ab6f76389ed31298515308756da51c2e98d
-
SHA512
f8c0125a1eb7b4f874e5d6025ebd8068962c33e8bd56ea8fa1fbe673c5b3d038ccf5dbd41f9f2a02865c46caf82efe196738f3f2eefdab831eea1799e8a5c61c
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3qGNkFmYfBCJiZOJ+aeTH+WK/Lf1/hpnV+:S9CT3q/FvBCJi5B
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3296 msedge.exe 3296 msedge.exe 1320 msedge.exe 1320 msedge.exe 924 identity_helper.exe 924 identity_helper.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe 920 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe 1320 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1320 wrote to memory of 1740 1320 msedge.exe 84 PID 1320 wrote to memory of 1740 1320 msedge.exe 84 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 1564 1320 msedge.exe 85 PID 1320 wrote to memory of 3296 1320 msedge.exe 86 PID 1320 wrote to memory of 3296 1320 msedge.exe 86 PID 1320 wrote to memory of 3912 1320 msedge.exe 87 PID 1320 wrote to memory of 3912 1320 msedge.exe 87 PID 1320 wrote to memory of 3912 1320 msedge.exe 87 PID 1320 wrote to memory of 3912 1320 msedge.exe 87 PID 1320 wrote to memory of 3912 1320 msedge.exe 87 PID 1320 wrote to memory of 3912 1320 msedge.exe 87 PID 1320 wrote to memory of 3912 1320 msedge.exe 87 PID 1320 wrote to memory of 3912 1320 msedge.exe 87 PID 1320 wrote to memory of 3912 1320 msedge.exe 87 PID 1320 wrote to memory of 3912 1320 msedge.exe 87 PID 1320 wrote to memory of 3912 1320 msedge.exe 87 PID 1320 wrote to memory of 3912 1320 msedge.exe 87 PID 1320 wrote to memory of 3912 1320 msedge.exe 87 PID 1320 wrote to memory of 3912 1320 msedge.exe 87 PID 1320 wrote to memory of 3912 1320 msedge.exe 87 PID 1320 wrote to memory of 3912 1320 msedge.exe 87 PID 1320 wrote to memory of 3912 1320 msedge.exe 87 PID 1320 wrote to memory of 3912 1320 msedge.exe 87 PID 1320 wrote to memory of 3912 1320 msedge.exe 87 PID 1320 wrote to memory of 3912 1320 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\febf912fdad9b933359fa29efa939661_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd582646f8,0x7ffd58264708,0x7ffd582647182⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1792,16461560321081367105,1034451574456656445,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1792,16461560321081367105,1034451574456656445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1792,16461560321081367105,1034451574456656445,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1792,16461560321081367105,1034451574456656445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1792,16461560321081367105,1034451574456656445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1792,16461560321081367105,1034451574456656445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1792,16461560321081367105,1034451574456656445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:12⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1792,16461560321081367105,1034451574456656445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1792,16461560321081367105,1034451574456656445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1792,16461560321081367105,1034451574456656445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5636 /prefetch:82⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1792,16461560321081367105,1034451574456656445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5636 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1792,16461560321081367105,1034451574456656445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1792,16461560321081367105,1034451574456656445,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1792,16461560321081367105,1034451574456656445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1792,16461560321081367105,1034451574456656445,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1792,16461560321081367105,1034451574456656445,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6104 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:920
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4888
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD57f177bfacd75c6e484a87798cc3c1d72
SHA156ac728f6c7a4e2178bcecb651aff55995ac7114
SHA2565b6dca3363bc5ef129dd58ce19fde29b000a31e67939128e686a1bcb71ebe583
SHA51286f330f1ff11ba3b8d5df43a0ae199f694f1efa018b7553cefdbcba647d34c015d1107d356c0bf0644e213b13153f076dda6a5b345161e65d5fd297115e3be44
-
Filesize
2KB
MD56ade88e3bbd8764df524e8734beb2f6d
SHA1ce75b93760ee6e4a5b1afcf80d0b3d428354c274
SHA256d04443aa9d35fbd9133f367e0d6c451d376406503e807aef9c1d98227163fcee
SHA5127290b3da5b221d6f79b2bd10133de192d35a76e1e965c05290691621e13d64df05ee4d5b42bd025eccfc00956a42176b7e1b311a96cf7320062c788341fd104b
-
Filesize
2KB
MD5d67582c3db52b173a3105b2a2bc17036
SHA1677eb76f91130946122c8316e9831f00218f9bcf
SHA256f03c9b5909dbefa19c7356f2e98a6c9c64028131a56830127b2b01c98e280b42
SHA51244e75ceb8ba7cfa50b5a6fe160bd17c9d60f3436110799b639fcdd3ce33ae70a0ce71ce3f8993a826d94423b40f2e2320934b67b635327054c62da2b9194f1a8
-
Filesize
5KB
MD55b41c3f2307ffcd94f4ddc92d5cd0bca
SHA1aeb168624e222661bd8cbcaf581614576765adb0
SHA256bad251ddde50eeac2bedae3c24c18779dee8a154f954f9762b30d3cf3abd3c36
SHA512d8fa4cd7b3e41c65ebcd93320af2a82c36107879d6e3b4ddba21fd8cd6d529a98a94eb20d1fe8bc975c33a65bdf48a23332b72a81b28f0337f6ca86aff4fee84
-
Filesize
7KB
MD5c984adc7e53f4da3cc7c5310ce5e9464
SHA1d45be050811895a79804121297261890879582a1
SHA256049f349c38088a391b2e2533092394f44d9842a4759063b7c612eef7c332d2ba
SHA51227b671f0fd3f26065a782f8caa20d2c768396cc1fd4b1db974cf6d55f3a949df4a50844805af26f603fbfbf1976d1f99fad7e85cc07ab3e6db3556d7cc27853e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51a3560b11fca444f520152d80ddeedc1
SHA1129c34be211e5191ea10baf8017de77798a99997
SHA2562ffab2afe58c19f4c4edac11a7f6413f05b27ab95a023accd9f34afd4320d1cf
SHA512aebc8e3ca48fd545a93268f851fb3280a86da0a41c5db3bfc73f0dc0f8407e5fbe4914f0c2381140564eadd1c350a0a4e21e573748c0ff27f557332f86495f23