Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01/07/2024, 12:31
Static task
static1
Behavioral task
behavioral1
Sample
1b4fa754db72db1632c29f63aee2807d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1b4fa754db72db1632c29f63aee2807d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
1b4fa754db72db1632c29f63aee2807d_JaffaCakes118.html
-
Size
17KB
-
MD5
1b4fa754db72db1632c29f63aee2807d
-
SHA1
64cd07f1370d03e04bde923eca8f54a16c54c1ae
-
SHA256
482599d8a3bdc809e2e71b867b3cbab317c05a464e7fa7054f1e4c54a5fa419e
-
SHA512
f5c78bf3fbf40a84a76e90f7a22425653f6a2c0d09b8266358644bd7867d3a639647ad0ca420b06acd418baeb6b3859b0486e17c82227388bdcb5abdcc6731d4
-
SSDEEP
192:DkTUExVEMitnzDHF9Q7tUtNsawipArIF92oNTZicvP3:oT2zD85Oaa8I95R
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425999080" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000e53b6ad63864105616f600d0384645c14b64d3faf869097a63b7e1800265351a000000000e8000000002000020000000ea0ab78b9c9a35ee29ff96c558a9ce6a70e17c6db81e822b5acdaf8b92db23c3900000003e47a89df3fe7937138f5eec56100db10bc78858be9ec4d9ef92c8c4885856cab8d4c9c8f0ac972bd707eceeca7b3b806a8c5a91716589a1352a1a7abd33fdc3e64e3fd201bace8e3e6e682ead1737350f71ea1709e86e93d0f26d51a7180ede63e65eb82e1b0ce5a051ca94c22a1fe8544ba059f77199ff889d891986fcdadcc37a4c5489087d05326baf59281c39474000000015aaaed3c5e7ae20c5c79f259181cedbad4d007482636dc695531dcf694189b053239d1f3a531800d2114f98b3145351b57b4c98777dcbeae20a6d77a31efcd6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000d70ef442a70241cc3c41582fd20aa75abd9ebba812a20aa2908c5e55431ee42f000000000e80000000020000200000009038e51e95138f7a71d9a3b3768b6ebd4fd7a4e3e85d8b0fb22348e39812064e200000004aaae5e005c8578eb193e30997439f1459c6f096281fb7659666fa11a31b07a8400000008dd1d72094eac377a7dab8318f819e17b80960a31257b0e22ca5ee5b60898449efdadda18de127b6a4730b6e56d1a1068a18c8b2c8b70391acc0daa3dac88fb2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0b8abf5b2cbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2139B6C1-37A6-11EF-BB21-6AD47596CE83} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2424 iexplore.exe 2424 iexplore.exe 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE 2028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2028 2424 iexplore.exe 28 PID 2424 wrote to memory of 2028 2424 iexplore.exe 28 PID 2424 wrote to memory of 2028 2424 iexplore.exe 28 PID 2424 wrote to memory of 2028 2424 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1b4fa754db72db1632c29f63aee2807d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2424 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b87cdade6b52784589b6e2a7b86a1787
SHA1aff3ad84a52b67baa5b60adf6bdb9bcd2e01c713
SHA256f63f682de5ccd25ae9948d4f7759fabdd96da9a67b3b63590db4c7951694bb39
SHA5122c34a04e6b3d84d87009459a3d48fb76564810a56cf4274adfcb86397e038c8611dff78ce137b5aede90570126669f984658343f12d0f0a81728802cfd64dc8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6d04df23ee24524ec88c34a5e9c26a4
SHA1d9ead384907758d716ba15e429f27f1ef0c7b060
SHA25634418c9e6eaf21a4df8fd6f2cfee213a0da41e2481ffa1b3fcd8bd5389f89a08
SHA512c965432bbcc4d89eea8bb808d99d53c42b77b768f02e715972658b57b11fff674a0be6f494d3249eb5f29abbaf3be1dee0e54cdca3407a5777a422306797dbb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508cae11babd5e8460d16cbde092596c9
SHA1f8e2240ecc84d4f5cf8bb5bcfbf240ada01316dc
SHA256afaf1c776281919988a9d96a4da0fd2cceb685e0fd985b9a609d3f5db196d571
SHA512097f52a0cc0bbbe461722aaef6de25dc7ca531aa0a34513cb8f293daf90af9e73686ff774b329ab7147baeb52d238e7b05425dd52a6797cb4383fe5c281a27db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7e0e34f2b21f3172e4879f0ac2c450e
SHA1f1b91b2e5070416026ad911cc1dd9bcf49e5c7d8
SHA256f3c43128d09532df40ba14b4506d7d42b86c0ebb9320aa53dccc6cb6c2f0cc30
SHA512add5472b3e3cf2eb7f7274a968c4151bd914d373a8d63ff57de4e97b17583346bfd108bf8a4cf8537822454eb0ed8a85461df705734fb8c9cc3e21ef23ec0448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557f7a18f4836626ebfca60887bf6e297
SHA1877bbfa7bd1a734cfd834bf8a57ec48a668d9161
SHA2569241d0170f7bb721a84132b1c3b81c289c734efe87721e490ac5bd5ba0c66173
SHA512a2315d070268cd7fc1c4c3118e766eecae1379fa39d986c7e728b76fb8968d6ba46d9eaa517a418256fda7e04036c9189825cd644e10bc4540fe1b46cec45504
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4510c9a880230033c5a1629bf9eb3d9
SHA1c124a2b3d931772cc6db74769f5ab59c77329470
SHA25654fb02ac3f202b6acaf772be3dce353836956c0fe9349afe1e9d470f41336ac5
SHA512252159ef08de0ee93b313cd2aa79f0e3201675d5441fbdc2f32b33727eb49390a701d691fc6c66527d0bc735eb74635fdba4c71838ffdf58b79fda08522827f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b97814e78650bbef527bf033678b3324
SHA113ef33f94418dd6c95a74cb5aefa75ddbdc05c00
SHA256661b5f9c9ac095622084417da551f2f84b551bd77c6988db85fe7bf4f6a7e3da
SHA512dfff9afedffc07ebe65a0cf0d2f0fccb9d40c722ad0e492440ea65657c18168ee50b6b23fb7e36666c36ab761f910f4ab3fc56aad15362eb2d0ef0609f8b3c18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f1842fb67f57be8b004a1a01b043435
SHA1e688068c00895db6bf731fbee1b80231f710a1ce
SHA256a7068ba92db9150eefa9e4745bd15431719d8e1ab3dd2ca29e84f10803a7fd78
SHA512490823220aed986938c199f99c78717c39d3d6663d46fda5a0bfd8fa48c185b3c04c200c19669f5623359640ac5aed47e654da3aa1fcb0a138c5aba96e97be3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c32de6a9a50a1cd1a884bfa1578d552
SHA1a0f5b947189e77e86af85c7868483bd1fc7740f8
SHA2564dfbbc1d619bee50f319f39f6145c7062dfdb3cb827298a73f6996725c973e17
SHA5122f20c0f4f8f8de843a3593b144eddf37e6dbc2c5a6c5f1a946c6d600adc890e734026f4341be1345a59b0310aadb3949fd4953d221c53f034b7a6578efa304fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f169cf08d4809b186a36f4fcf8613a7c
SHA1886fb8d12bb21f96443f2ea2013c2e72208df70b
SHA256ddb8372625045f21570d808992b1b41cb17c7e00056e76e60b4b54c34b8eb3ff
SHA51252c16f3118a786ce5427af5609c16e586ecd7d30da8825abd5886946c1491309d820b56bf378b4156606507f6a2480668f32a2299948fea3b5fead791939cc88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b99d71c17e2f41cbd7ea4111732bba41
SHA13a9080979628670893e67beba9d50e750e6b8240
SHA2562f0686480b3ec882bc0b72dfc12203012d61a51215d9a5a74025bc950eb827fd
SHA5121bf7155472c6706983af7ca11eb51754de594e7d69782ac202370fbe32391df34513df6aa8543cfb339befbd68f10d565c9797393449cec5d0049ce1fb26cd7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1d1d3d4b1d8347708d279c7e8c9d9f7
SHA1c9f6052c32104eccc0d5d8df703dfe896e0c3f12
SHA256fe4dbac8c59739037762e3ee2bc8450dd37628ab5dfbd9bde511e64b721603bd
SHA5120816a9172181c9f414b5396e3c45a774eb9a5e7c0ed0ad655739b5b1db58bac46ed8c05583de15da8a5679486b372c680496bdfd2e6dd12775f0ebd975389979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1e2dfb92f5a939cd8b794bb1124afb5
SHA10916dd8f32da1db724a5611e8ef46927713fb320
SHA256357dc2ab63d1f624242be13d0dbff387eaaf0e9a97e115c44ca6c18a4242c57d
SHA5128fc7eba381b9c5bb17f7b5069bf0fa57e5de91a07119d6875dfb2cc9454d95ef31ec111987af28de479c4d7c33844c745b30e9611765faedc9057220ed94f57c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c786e51ce50a268585862685e4eb57f
SHA163f15603f75e809881ea9d98d69e2acb83a8c625
SHA256e5c5971bb3bc8a9843dd698c4cc34df0c3ab6e309a1fc1b0f98cae0c8032dc0a
SHA5129a75e842a639f647300276f04b579f0d11d4a72285b74ea7a80a1f14da2c243a37146696cd54dff0ca4294d5d55e848d72f2b7ed732b7255b9738fef0d7f7c5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541ddf87306937ac25622f3dfbbc870ec
SHA18abab9e3924e7fe0de28ec7b2e6fe4f6b829329e
SHA256b2f10c2e60ba7245c45b3c1e2e165be46eb3d2c4294b0a5f5f9e03035d298926
SHA512149c02259c6dc56b8c159c9cee2a63c4dc1982cbcd4300b0a31e304beb8298d605c4f3473f9d4b7fde6752fcc31e35fda96d2eaf7b0c9b94beb94205482bcefe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5125aa1014837ff65be41bc4cb777ed1b
SHA1f65307b7383c28814c15d88c9292fd6839054529
SHA256d363068d60cd2edbae567ea87efedc13d3070faf896d1e63e6c004ade1aa04d9
SHA5121cf550abac9b1b2999e973ba5508179a76929a10f90a28347ae172338d17763cae0f7d103ce26efb13fa37a380db98e4326ffd7976211c7f36725eb511ecd478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b88ddd03a808842ca94b35be925dfc9
SHA13616398427ba5bfd2af4311dff76326f11de0a40
SHA256c01201d77f7359bf55bde184ed3d34a09e69f8bc85927f54b1d0f5a9b2c09cd5
SHA512fee734a9f4d8cb7c3f39a7a8b95e937078d0be1b306e1ce675b3fcb826d72b55d78b6fb36ce14bfdc10083df99f24baf6811f42345132946b97f368bf26d6bc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cbfdc0670209cb6f55da2b04f4413bd
SHA1386b9a5f2f290a7de62e3632d4f35f9b792859f4
SHA256fc9ab24ce17fd8216d6f811750fa317719f53d61d7c0e9e14cf0aa92050feaeb
SHA512ef530c6a76fced32c3631a0649cb5d0479cd07d1aa31bfc58feecafd036780db9727cae374ba6fdfb80f4319e097bd1cdd2d791663dff0cc68954be2ed97bc40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5114e63c85cb9cd57fd2322bcbbe27065
SHA124bb66c22066d480dbe2656d544f951311d7a130
SHA2565a93ef041b7c612c232b4d3cbda6e06f44d3bcd860e9213de0d0fa13db3bc565
SHA51241dccfe5b5574f1d6cb7e0509ea4609cfecc386ca3a9e6bd273ad4b6e00f3ea022690fc1a24cd6714c2ec4daab64376ed65ca08cf573c84495ccc684f787b580
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b