Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 08:11
Static task
static1
Behavioral task
behavioral1
Sample
e20c4db1b25ba6a5923dd559827355e9_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e20c4db1b25ba6a5923dd559827355e9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e20c4db1b25ba6a5923dd559827355e9_JaffaCakes118.html
-
Size
175KB
-
MD5
e20c4db1b25ba6a5923dd559827355e9
-
SHA1
15c8d2d6e1906dcfd7d2f5c2a63fda5436ff5ea4
-
SHA256
6d7fb9ba94539264a0d52e924644f8591b58d0419f765d8b80237535dc805bda
-
SHA512
a6daf184c27f50efbd9af37917ab58255679e256f124e7e9660071a8070b244c43c139a877717b46df86524b08d1b466c9212cbdd297f40e2fdee5ef4dbf2ac4
-
SSDEEP
1536:Sqtw8hd8Wu8pI8Cd8hd8dQg0H//3oS3NGNkF0YfBCJisj+aeTH+WK/Lf1/hmnVSV:S9oT3N/FhBCJiXm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1424 msedge.exe 1424 msedge.exe 4604 msedge.exe 4604 msedge.exe 1520 identity_helper.exe 1520 identity_helper.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe 2484 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe 4604 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4604 wrote to memory of 4076 4604 msedge.exe 83 PID 4604 wrote to memory of 4076 4604 msedge.exe 83 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1956 4604 msedge.exe 84 PID 4604 wrote to memory of 1424 4604 msedge.exe 85 PID 4604 wrote to memory of 1424 4604 msedge.exe 85 PID 4604 wrote to memory of 5084 4604 msedge.exe 86 PID 4604 wrote to memory of 5084 4604 msedge.exe 86 PID 4604 wrote to memory of 5084 4604 msedge.exe 86 PID 4604 wrote to memory of 5084 4604 msedge.exe 86 PID 4604 wrote to memory of 5084 4604 msedge.exe 86 PID 4604 wrote to memory of 5084 4604 msedge.exe 86 PID 4604 wrote to memory of 5084 4604 msedge.exe 86 PID 4604 wrote to memory of 5084 4604 msedge.exe 86 PID 4604 wrote to memory of 5084 4604 msedge.exe 86 PID 4604 wrote to memory of 5084 4604 msedge.exe 86 PID 4604 wrote to memory of 5084 4604 msedge.exe 86 PID 4604 wrote to memory of 5084 4604 msedge.exe 86 PID 4604 wrote to memory of 5084 4604 msedge.exe 86 PID 4604 wrote to memory of 5084 4604 msedge.exe 86 PID 4604 wrote to memory of 5084 4604 msedge.exe 86 PID 4604 wrote to memory of 5084 4604 msedge.exe 86 PID 4604 wrote to memory of 5084 4604 msedge.exe 86 PID 4604 wrote to memory of 5084 4604 msedge.exe 86 PID 4604 wrote to memory of 5084 4604 msedge.exe 86 PID 4604 wrote to memory of 5084 4604 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\e20c4db1b25ba6a5923dd559827355e9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff526546f8,0x7fff52654708,0x7fff526547182⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,9037138005636720660,10486695941996352045,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,9037138005636720660,10486695941996352045,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,9037138005636720660,10486695941996352045,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9037138005636720660,10486695941996352045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9037138005636720660,10486695941996352045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9037138005636720660,10486695941996352045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9037138005636720660,10486695941996352045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9037138005636720660,10486695941996352045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9037138005636720660,10486695941996352045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2812 /prefetch:12⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,9037138005636720660,10486695941996352045,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,9037138005636720660,10486695941996352045,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9037138005636720660,10486695941996352045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9037138005636720660,10486695941996352045,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9037138005636720660,10486695941996352045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9037138005636720660,10486695941996352045,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,9037138005636720660,10486695941996352045,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3656
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5496ea62a19eaa37c8b9ca92f71d40de8
SHA1ff56cecd8755b8dce82c9de55559b4d71a06de0a
SHA256743bc2ef3ad9baa47f4b8e91b2aaf99a77efc79481ea2b65a544b8c9a53e2b67
SHA51210121ecd51c197762cd93ce849bfe47c791c437ea473f45176239195ee36c67490bd3ce23984c75a5ce2c6a2d03b6faf9d1a18e66e2231ad30a2e34b67e10dd5
-
Filesize
2KB
MD5dd506004618c8690108d0656b47d4845
SHA1681a18abd3de2135b376d8613f31a72e50963724
SHA256b8eb795cb31e2628d35548ca72329b6c20d25b8c2b1ddc01c85e2723cbb385de
SHA512c2bd807533e9613a7931f9f6dd6491541f056c8b0498e0de7760cef4ded2682cffbe1b53455c8f816a2dddf2bb9db949c4bae1d358fd4744ec84d884f2fbdccb
-
Filesize
2KB
MD5018a5ead0cad2e239293bdf8cc5328c2
SHA18d0982b20de6f79477ceea232d8959946b2cf733
SHA2564663fae001b9115b26019c778eb72af843be8a09f7c7a1e7c0e6ac0756ff5fbe
SHA512b3313a3a1808d86c9b4f8365b167b4bd6718b4ae32d1ef7bae9059f86839a8a155b8f5fc761db6023186b65c7e00502be25b4c47683c14b6ae053b2cc722da93
-
Filesize
5KB
MD5896de7068b22918dd2808cd36d9ad3ce
SHA169a99c16e7fb5625672ec3312f64f761fb2ef915
SHA2562b21f25f6c4cf3e7bf63486793074b03c090b84b3187c4926df4b65de837f986
SHA5123568c6f7ebacc4dc7bd047c244c5d8308fb1e5f58842cf5e6ee496d727c748ec3000966aff01fe5ab718377e73da5164e9784c9b6dc26346c1d25725bccb3446
-
Filesize
7KB
MD5e3888e78f2a5deae40635d03f1d9d608
SHA19dadc6b7962fcdd9be55e88a6b95ce7a7c93d8ae
SHA25652698c3ee020f9ffe614d762b715f0520dd10d3561abc0924a0cf6f7d49032a6
SHA5126306e205796d10c2c9dde1d5d75c45268626c0e69a91d589c11080b0284a9b19b227eae5db14eeb907f64ad74e979b398b5138e31e2010363954d02ac8c4986b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c7dd700256bba5ed70c54332a042e5f0
SHA1a97977e271aa816d2e9aa11e8232b444294dfca9
SHA25632757d93774bc3a9362a15e11250e8ad0934b56b65f16659422c409e933c18db
SHA512d01ca5f98414bfc929229c7f23fd0563daac2c3a049c3697064f1421b92ddd7a21d507eb28412af99ee1b68cb08495d83ba51a348ca993fde82e7fe5da44c223