Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2025 10:55
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e271e0a2ef4b540c9f5f7edd41c780f6.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e271e0a2ef4b540c9f5f7edd41c780f6.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e271e0a2ef4b540c9f5f7edd41c780f6.html
-
Size
58KB
-
MD5
e271e0a2ef4b540c9f5f7edd41c780f6
-
SHA1
ad6fbc4a0df7da0bc34a50dfe9e38eeb6a5b98d5
-
SHA256
e9001187c305c033eafb84e702c052b78950db29f3dca457f36c652f18b76605
-
SHA512
b086f46f0f4c964c314c566989ae9ea90475078080f9489e63bf7b3b1b8abd814592eaecb6ecc7a543a2bf020741c1a2b701cd4b7a50527abd3c083943415f97
-
SSDEEP
1536:/BnOXKw4KpB3fgSJY4B2J4e1IeBIiY2U2D2O2v24F2M2e2SX232s2Qt2sFo2Bs9a:5nm4KpB3fFscGUy/wQKJBS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2112 msedge.exe 2112 msedge.exe 2844 msedge.exe 2844 msedge.exe 4948 identity_helper.exe 4948 identity_helper.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe 2060 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe 2844 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2396 2844 msedge.exe 82 PID 2844 wrote to memory of 2396 2844 msedge.exe 82 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 3100 2844 msedge.exe 83 PID 2844 wrote to memory of 2112 2844 msedge.exe 84 PID 2844 wrote to memory of 2112 2844 msedge.exe 84 PID 2844 wrote to memory of 1584 2844 msedge.exe 85 PID 2844 wrote to memory of 1584 2844 msedge.exe 85 PID 2844 wrote to memory of 1584 2844 msedge.exe 85 PID 2844 wrote to memory of 1584 2844 msedge.exe 85 PID 2844 wrote to memory of 1584 2844 msedge.exe 85 PID 2844 wrote to memory of 1584 2844 msedge.exe 85 PID 2844 wrote to memory of 1584 2844 msedge.exe 85 PID 2844 wrote to memory of 1584 2844 msedge.exe 85 PID 2844 wrote to memory of 1584 2844 msedge.exe 85 PID 2844 wrote to memory of 1584 2844 msedge.exe 85 PID 2844 wrote to memory of 1584 2844 msedge.exe 85 PID 2844 wrote to memory of 1584 2844 msedge.exe 85 PID 2844 wrote to memory of 1584 2844 msedge.exe 85 PID 2844 wrote to memory of 1584 2844 msedge.exe 85 PID 2844 wrote to memory of 1584 2844 msedge.exe 85 PID 2844 wrote to memory of 1584 2844 msedge.exe 85 PID 2844 wrote to memory of 1584 2844 msedge.exe 85 PID 2844 wrote to memory of 1584 2844 msedge.exe 85 PID 2844 wrote to memory of 1584 2844 msedge.exe 85 PID 2844 wrote to memory of 1584 2844 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e271e0a2ef4b540c9f5f7edd41c780f6.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe4ce346f8,0x7ffe4ce34708,0x7ffe4ce347182⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,2359626340284411540,2788606544311554321,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,2359626340284411540,2788606544311554321,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,2359626340284411540,2788606544311554321,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2359626340284411540,2788606544311554321,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2359626340284411540,2788606544311554321,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2359626340284411540,2788606544311554321,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2359626340284411540,2788606544311554321,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2359626340284411540,2788606544311554321,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2359626340284411540,2788606544311554321,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6904 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2359626340284411540,2788606544311554321,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6888 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,2359626340284411540,2788606544311554321,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6460 /prefetch:82⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,2359626340284411540,2788606544311554321,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2359626340284411540,2788606544311554321,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,2359626340284411540,2788606544311554321,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,2359626340284411540,2788606544311554321,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6716 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1156
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\95c09b1b-fc45-462f-b827-a2620dde82cf.tmp
Filesize5KB
MD5b8a006ab36e9268b451af6f9b7899a52
SHA1d94d519a354edd752994fec34df1d271e2de7a10
SHA256041c99d1ac0e6442cd6124a427452048e4b0599346431aecba8f042e97da418f
SHA5126fbc5117db87e1ede667c626715ab48b24520fea82ad8d603cc35906bf67fb840ea652fce4c9aea0f4e5a94872764d6a9f08f44dcc40603db9f2a187e985fc60
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize336B
MD52474c9937251350241b91dae5e2efdc8
SHA137003cdd1dda4d051ef1cec2fbd03ab6e94df844
SHA256a6a9db555d3f2ff89bb779c75185eae5658a9f9da9ce2614c16e85c4afbbfa30
SHA512ddc81effabdb8b46eeb8abdb09044f3b79d2877f9a12b1fb26a2762e7b1dd94bbcee4c51c3f966228bf038b3f0f28634986e27011cfbfda3466ecbba918219c6
-
Filesize
2KB
MD5c3ad47e217149d78fbaa391c2c7a2d05
SHA1e8c8f068e1bd063bbebecb5d6948392adb04905a
SHA256432ec73203fd760f4b155134fafe9b80bcb3f1f8e532df1269eb7b62580551c0
SHA5124ba6d760194312aa205213e0b7f17328e537f4163fc3cc625b7f32875368b6c204a5e5ff985f2ad73b48247215e9a7285223bc9478e06c66abdbdae60892876a
-
Filesize
6KB
MD51695e9bbc68359216337f1197bf11c26
SHA1e3ace82275486a2d6d922016b8aeb2a662f157b0
SHA2565b371166e2cd857962a3209f92d034206aa718070ce1de3ee311eded616b8f5c
SHA512f757126eef964fe6b5d5ab725917ed791afbce61d963de8b63cf773908443589eb2458bb8fd577a1958c727d0a2f9e628f38e1e5c8c5bf151d0364665eb3aca9
-
Filesize
6KB
MD5b1a0d07f770cd1f019a7e14d9da05374
SHA10cc9a8ded58c66c2d744bf063b80515959598a4a
SHA256ae9df70bcce86a87c2c4c0eece25bdf37263b29f6e245c010e183fd9377183e4
SHA512da31c1879c391561bf30fe08a9306dfe5050acb2cd3ef333979544d8d01478d8d50666fdc0c2fb0e5c7a0d4bc329a8df56c72224629c3ef6c24c223fceada658
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56b2c44c2fcd34288dc182229bac997df
SHA13b202b1b5cbbf9a2f007faf40e4e782b51f2823d
SHA256f8d4350b78c83898fa7576b6e4b813c0f8426adbf775a4a9a134783bea21f05b
SHA51245f6724e900f55502dd6a6f1f31a93ce845ce627b378a8a80b34e42c462a55cbbd621744662dcd7442223657121f61d9c174f9b0ad149867f2367a5fc05df7f0