Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 21:07
Static task
static1
Behavioral task
behavioral1
Sample
3ee2342dad4f5d4b7c13a507bd80376c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3ee2342dad4f5d4b7c13a507bd80376c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3ee2342dad4f5d4b7c13a507bd80376c_JaffaCakes118.html
-
Size
44KB
-
MD5
3ee2342dad4f5d4b7c13a507bd80376c
-
SHA1
49c916445dc2636eaf29ca6b187ffab681ed9b65
-
SHA256
28d61ac997585d54305e9439c12745e70426ec410584b09a0758dbac1a7d986e
-
SHA512
1c4af658fdd374410915fa77abfa06962e3d4fc830e54c0d614cde2a81c85a21efc66357f9208465664811b8c49f18b74e90dc4a1aae1701ce769eddb29ca3bc
-
SSDEEP
768:UWL65gHjRp44QaOXqjjSYtQZGDv9Yp7PzaHnuXCii0Q/OCz1FW8RqbNqFmu+XykM:UWLegHjRp44QaTjSYtRDv9EX4n0Cii3B
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000301b00c23a770bff9cad5cb09529cd5b340fcd6882cab025e2db944fde3ae8c8000000000e8000000002000020000000ae9d2b5007ce6e94c0681b06d90e9c96147e06e5a4714cf3afc261adfd95e64620000000cc58a0a2f1bbfcb04b54a7bad3973c4ffb9678b8b6e14335d73cc149dc735e4f400000008a9b5d3f86b967d2ea08d184fe3d72b493a9a67e500e6c210ef5f9ef6c844d0c95583910d0293e3f70bf20c2fff39a74c1b46f121a9da745b93baf508bdc0a7c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426980316" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000c7138e692a2ad535533fe9e8aafe02daf7039e763df31a4e662f1d6a6d1c55a2000000000e80000000020000200000004163cb491de4866d06366012c2fffcdad41f83059cd2bd750ca1f94f4311c009900000001074dccf69d817c609b5bd7bfff32cfcaa2b7ca7beb01e4940a12469691bd4f0b43e47fba005da7147cbf699281563e1d3707643090d85dbf545deb069a94fe7e070ae78583f2f6780933b22e4fb87807b59dcc6a6db92795f419a82fbda18c2a3edca2c99ba874a26083e2fec470731c6bdf9d6de434bb02e373ecce515be99e05d09a0c0a9293991d1c3c4ef08a611400000002698e9f97ec2b5952b271b6843392556134c5851e0df9733dbc1a25fa868584cc7d8b1e9865060411e3efd35dd02aa1e21cac94b83ec657160031350ff7fc61e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BF6EA0E1-4092-11EF-9BC7-EEF6AC92610E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30a1f9939fd4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1312 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1312 iexplore.exe 1312 iexplore.exe 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1312 wrote to memory of 2132 1312 iexplore.exe 30 PID 1312 wrote to memory of 2132 1312 iexplore.exe 30 PID 1312 wrote to memory of 2132 1312 iexplore.exe 30 PID 1312 wrote to memory of 2132 1312 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3ee2342dad4f5d4b7c13a507bd80376c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1312 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5654ac164971d96fe5028113fd03b11a3
SHA13fb104d77e3b4ba801901cf0e7e43f79e52080da
SHA256e5cf01e1b787911f8684a9c4cf0faf061c734b3fb2ecc98080072d02c6c9171d
SHA512192fea31532b99417e76415d8796f35ee87cbb9ef0c15a080bf14160a943c09c6b3686f1340ec43aaa54278db110a4454d0c1bc53691624744da0db4c8193589
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50007f1bd0220cd8dae48ce3f63bf58ab
SHA110fbf386c755e0064610154fd7f26263f6297ece
SHA2564a9739ad1b19dd3ed2afe722c08782455c422a0ce281208cff70c848b6dbefed
SHA5129e906f963cae32a714607201bca3de5505bd913fb8828e7f7ed4e77475295c520e7c455c9caa2bf0557007ca32b447883a50549dd46d271c640e0d34abb64444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5358e5a1f932010ccf46659e4736b9c9b
SHA12f46f6d66540e0d87fcb25c1e32cb60ea893deaa
SHA25614da8c290cedae5334130e2d2a1d4585c1fa31cd801140c2d5b7e27677bd2cad
SHA512fdf1aefbf9c4186c71c0a7fcb9ff95683481a1f5301f45604f0ef0b3c51c9778d82c98336ad634a630b595ad75ea0406a2db2755dacb2973fc71a1d229f46bb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e11cee912f3e6374e5285116e75370f
SHA1334b8036a98e483147509f1afea4619edf84376c
SHA25671fc84d84a4089529a69cfa8120de6b2ddcf32e2ef84db940443fc68fe78384e
SHA5127a75541662c0f8ada909c0c7c8693b60ed448490beea822edbbc7b35c9f117ca6b242a35cd3756437b1afe2a312d94ecc686b79a6cb9be338c4c5777e120ee3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ae4ed878c8ede3d0d679daa57ef8ee2
SHA1a518585aa9ff2c90684010e10ecb24d206e3f7f6
SHA256fdb65a6a518adf2195cfbe9c7c768030693f66020c415b75aad6ecaebd3d7cf3
SHA512e34ac26ea5b1b72c91c4876e49925ef8cbd3686e21c328330bc3de7f03a7fbcb44c987b4701e3484a778d544d93e04fd744b63434634a5d7be35fcaaec291a87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5793ed3125e5ac113bd6c749a8350aab3
SHA10ff8e0e2667c614600fba4005d719736c47a8a85
SHA256c810fa7329448a2368e8a76f02ea48ad088642726c5309da7719c3cdc4a3f605
SHA5127f8c77b84de9f1ce7cfd00903ea306f973cb134a7c057c9f1df63bed8e1dec7737cd3f8d104fff6f482d45d8a32db5867b5533ab95eda0684eafe351bedeac14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552457b535c865e0503d764a5052b9128
SHA1b7f725a0d3296e0f270234a7df1811d7ea207ef8
SHA25645297d229aaeb6af2dfafa73973152708e9ed594103ffc21bf0c2e981ee9d94b
SHA5123ddeb23e73aeb1625aa22c22b2c705d2c881c9b5c4b49c6417bd474fb51b247927fd9bbd18160e166ebb87afbb74137ae1fe3227fd0a98e50def196c95043d26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52431c796703e14c7db6e906889e28873
SHA16e372a601b0855f531ca8a80c517aa1c58525152
SHA256fe2601bb40757826d0f876c82afbcdc12c663d54219da0aef3e1da5365c7c64e
SHA5127e62808c0d3d6fe00a65f296258148923b839dfe5400db32f2c41824f11f9e8032bf3ee2fea6801012df8c21b168cfbad2e540a68041d42ece6a9ddda99c8739
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bc05e3eb385f221978d79bfec7fa79d
SHA15cc91e8a9e3b0c268205d906fa0704c8ef1515e2
SHA2569d85819e74873566ecb286515232247194837c689c3c913bb2a08a6a299d0cbb
SHA512cc3300eac7d8a62daf5072def6f66396e5a385a91d5060e0e344f1f6abe8d74547aa237114861fb009d6fb4730ae2413c2ff1d76ff770ddcaca6d4452bdf9991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1d52788433e37fff409079dddbbf0d3
SHA1934fa4882d676a08c36c27f5057e65f2478f13dc
SHA256039d0a5304c7d3e19d702f24d10d132254d4d87f105f66e44aa985375a1bbf4c
SHA5127550fa656556fdf73f90d84c807f1e8535c6ffd6b014c7c5f1b3b2bdf4348f09b08e567a919d35049264826ef8d3e4b32d15f19fa663ce4d9d6b111ba41d4ee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5a17a4aae53cd9b53be02db45e43656
SHA14a3c20a79316d7684e260b8735905c8af3b26455
SHA25658828581d45a242da93dd37b9847ad32932edd4e9fa4e8536e92e1406450420c
SHA512985d0f0862c90c0dc54883d8565799ebc14953f62b6ff2d9c878f7f63d6fda8162f2b115dfd569b4992389ee4d11812df26d78897fb9f2a834894b0d3f305c77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4cfae65a2bf7f8bdaa852b985bf8d86
SHA19a3b0e3f166293fd562fc442c57663b29b4ec5f3
SHA256c8fba5bb2eb87b8844e60de237cd819e4d571266eb85d6af4c571fb089b8da42
SHA5126cf0d302408d166feaa5d9835a826009856f985b953b75e3fc19a62305326aa8f570fd7bbbd7ae4bfb8f0b9aae95c923fe393ec4f0840cd0bc7402da941496ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d23b5b31cfceff910497dc421044af71
SHA10cd80eeb7be9b217040f20584f1522117735f60f
SHA256f07b85580d44bb5488ca244a2f3d074ba624e08f5a235340c195dd5885853510
SHA5128a6242e6f405cc6521d8dbd031405f016eb6df22ca99d37c3d225a8ebb4429fb208c07893680f360cee3d38eda6e9754024daef918f58159932134da43413023
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539e248d6f86272077c53456809a20bc8
SHA1a6043c025a2afd8988b25a96a750d28f82c39836
SHA2560d11072833110c1e49eb6bbeb4a4a413155cc5450874ee8c6beb293948b944e1
SHA512720ceaffd4afe36c2c9d4c0d3d15416e22fc50bf9e0b730d94a7edc6e5754c7ed7fcea7360c224432d6a01bf636534d6c93fb1df2f036e016a1f9255d92e9557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523985b938ef32b046033b80be952e4d3
SHA1e11f1d68c940a228ed4aa479d359243f4bdfbb4a
SHA2562b0cb67cf8a133ed410a7bfef9ff486e4867b1883517e4f18403b5394756bcb0
SHA51205ec28854b4b61af4ed2f5c6d23435aa9ff927bdb166c7e16a04a005d2c7f1b9296e9941b6592e940e0894395257bcf186de49bf6cff6711f64ed85141d58b57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dca23ed7b65b60083d18bf6b2f48f32e
SHA1a8d4feff86851297a41a771712e9b2096b59ce61
SHA256d30a677eb2f9cad3803ecac148893509c94f1ccdb0d4bc097a21d5dc90398cc5
SHA512e9f8d6006475cc3a645ce862803dff2a5a3275f4c963a93ff9dca3abc574e19ad691c2a84b78cbba1fb91b1871b7d5005db1e91ec930c5d60d0d0087335bacd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58681b7eb8b5c72ca8ff0fa8ff6cb6998
SHA1993876fed4afb47cb01c47cbce39869ce7a146fa
SHA2567ad0c8250d7c9c7d335b267a208f009b35b5d6467e6920dabbd27d6ce88e079f
SHA512035c45a22ad651cabb6d06dbfec36d123db44f04cb7337b2f6a28b3e05bf8e92d9fd18a15d1e03acbe2acc897b2a06c47174e974a3b4d3a5c2cc171d59437da4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5871385c2d1692919bc40d28fa0a580cb
SHA1ff6f6e4bf1ac79a302c25b65bed2e6365c27cfd8
SHA256fd13fc1f8bf14c686c37d6cfa15111fcd78a420901bf40b9800b029ebc6256d3
SHA51249bf0113b6424411693b427e351d149d0ff4f01117583580a0cbcffed8a63b6ff733d91d30d67b5aa7736135a54fc79f672e79b854291964b7e90f18573656b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6a37829ebc84adbc077c5b5d863d50a
SHA150a9a82b46e7e2cc6c7deb2fb989568e3c0f3b9e
SHA25630a6ab1af720e58802ce77d28125e729c2a80f73c623a7ba06dbd6d3c7eedade
SHA512fc32435a0f7a67cc6c143cf3c35fb4a64c8b936c133d4734f36834d8d61e63032f0bf1b7dbfdac4e10a472124e7959bea7b6f4f10a399a59dc8c07d0fd399dd4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b