Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 22:14
Static task
static1
Behavioral task
behavioral1
Sample
438c051d5b0016c0b67316b054c372b2_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
438c051d5b0016c0b67316b054c372b2_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
438c051d5b0016c0b67316b054c372b2_JaffaCakes118.html
-
Size
6KB
-
MD5
438c051d5b0016c0b67316b054c372b2
-
SHA1
42b0ddbba6253e9ef5952177aaced5eb6aa8c828
-
SHA256
46e0fd9c8c461f30723f671c4beb9ec8ab271828207ab626d7dea198890aab0d
-
SHA512
8c10adc5b3bae8095b3ac50fcdb1e2b99359aa8f3b04e84fcd6b9eaf090dc537006c5191768192004dc78f539e00c8037d5782bb339a9040d48fbfc5620865cf
-
SSDEEP
96:uzVs+ux7+rXLLY1k9o84d12ef7CSTUsZcEZ7ru7f:csz7+DAYS/Db76f
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6053212572d5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{50234DC1-4165-11EF-BD41-DEC97E11E4FF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000004489d6844f168c5151d13c1bc392d2afb533932ef5cd1ebb42811f39530f5d75000000000e8000000002000020000000e0bf9076e3a08742a000e4bb1037b7c2a27b7d979df777ec9b4ae75f1ecfb3f920000000c515eb81010f2661a0a6080c6cf8515da7cf53c298c72098a268d008bd8b324140000000c3026e874b696626b90e73be3a2edfbbe3a64ac6e6fc7b061c869aae32736a40d78469a6b0fe8686db2c253cb910b12614b5d581d30e44f90d5571519bc574b5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000004bb46c27374824bffdd3e544aa7552b8f81b5508a436dc6bba63ae44e8d17f60000000000e8000000002000020000000078efc4a5a03c0fb8741f9cf81715a6c27742f8f13948d5e8a3d30dcfdb8367d900000003b443c587c097c710e1ff5d95f62809570d92ea794ee11a14646fc1bb20a9b052337f40ca3fbc471c45472f0ed50e4199952797c3f9b6522b2ec160534c65f736be4942038b7c09cbf68273f92ce8ee57d00ca953600fe5eb28d960fb451d154732e2e57cc03f8c286234f11b49958c409c8e30a8c4dfbee32f79f4aaacd5fab334edf904f71441a8d9a719702eb843540000000e74d36a195cb16457ba6646f6954d16f0f97a9d64b05b4366df0b8e1590fd631813f327f01ea052d17f864c7aec5fb38c0d68cca38871ba9ac9cd699a8cbc920 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427070754" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2776 2252 iexplore.exe 30 PID 2252 wrote to memory of 2776 2252 iexplore.exe 30 PID 2252 wrote to memory of 2776 2252 iexplore.exe 30 PID 2252 wrote to memory of 2776 2252 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\438c051d5b0016c0b67316b054c372b2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb8f95226c3e3c00a8b4fcb6e01c567b
SHA1f2e3015f9826610eb4c45cbda2f407e58aa5fd2a
SHA256ff7d66b3614c1e31f581718174f3fcad93519d6a15fe1c47c2cf4fdeaf8365e2
SHA512a7d1669c5cb7fae5fb69580232bad8dc4664ae6078fb0298f4eed828c4212472b2655d156d1025911af5f5591791e297040431745a711607fa3289538ce40049
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c136185c20ced29906d2be9a22ea14a0
SHA189b7f084e7bf48ee09695b7369798f1a05dc7f65
SHA25649fe39c3a8bd6577e35fdda03e93e91e2d3a163d8c99d2f7405c2687a506ef68
SHA512bb1d05a9287f3e7be5c80cae1c3b44408fb2ddf149c90ebd3e467e4be6921a52368bfba259eaffea5c6f76e553620820690bfecc1610a3382c5ac515457ff0aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f35e8c8aa66ff633b99c92f55cbbed6
SHA18387bb7f8bcf70f609cd0e3133ea95e56767c066
SHA25610311b03b5b1ed29e5d0adaaa87f09dfec4cf29d1ce57b2628dfa732e60b3b39
SHA5122bf4891d21576b8535b52be80893a53120fc52496a7ba6182e08f8e8e8a285ce9a4cdac2ae746a5dc880492a18816c04ecef7d92b1ea0b4c9ff2f0f9c9cc0394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567ee449ad4f57a3bafb5b3cacf4a0e7e
SHA1533d793212d11a07a8061f410c1ef4fc03554aeb
SHA256be3504b700aced73944fffc881e2f6518a11a0750f6fd2e542a6fd69c9bc5959
SHA51299908b94d5228ea2625ddf95b60a4ebfb7e137dae76f88ad3dd3dce3935574f092eff8b9ba7aeba6768478cae47abbe720f00e997d5322f4e1724bf653d4a561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5419cc454bcfa1d99fdde08d65a0c53f1
SHA1816527fea3d959c6b233c54ca44ea426fc5712d9
SHA256eb1d35a5db9738be7da2d8a7940c6f8788ea4bbded5d26347f83e2f0b0e17085
SHA51221c343933fa4c2c7462d5ca2726c99690d4754e22787e7eb4330c44e2ac2e72454eae48c9e797cd57f7879f9e747f03cfacc7eaa8d3e4933e966d3e69e5b71c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593165507b3e9fd03569963dd49ca7e22
SHA187c06ba48ec0e8fd2296203208fb8846927d9f59
SHA2564076023151e6c56c0adfcbeeb44d0f34eb1bf569f5dc7073a913d94ad12bb1b6
SHA512bc98c5bd08ae97879fa0e9b6fce9b4608d5734f8bffa205917fbd86af0d6f8fa5bb42e20f3eb6eebcd748cb98d661cb4400ad87972df7a7ceaf0a6ce59fe08d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e14c46be293562638f95b20b5e27554
SHA1788e7cf2f8b8209bb7ca3e8b4e0b6518429c9010
SHA2565413ca55c95118762a0c622311ead34745c6c9bfad3e0648bc43cd45c85388f8
SHA51235c7bd6d88a38bea3eab0b0ba96db1db6550db18432d8d57c8e9daefeaa99657305297f2657e1fa8e57e25e23153ada564ef97316735eb1917782944ee270225
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcdb4d3f9303efc2720cc6719e1fbe95
SHA15bc2e23628f08f332f5a552976a1e01f6297d1f8
SHA256ed19a35a913bbd488a38f60e9c4cefe51a29028c5220d4608068a67faef12a40
SHA5127d111db1a4de61d9e22e1457ea850672e9436fba493afc6ef9f94f9bd7654be964ee42aa239fcc6586a40fa68e0fc1e5ba0e27db122930141fc6e7ca1a30d914
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d6b243e0350341dd136cd58336b31f8
SHA187b56afbc90d5577a8e63e871cbd06c32b75527a
SHA256e9904a320e47e9da591f44fef352eb86086f465b3f42a26b422257b9262c9fa9
SHA512ee7cd2004fe50fe3a02ec55d559bbf6f7152e1367e5cb5af257d60921494a6114f2de3e1db6894a44682161912e960ccd181708a640bfdc2e938e3ce229a6a09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546be4289968c893632bd35512ad74cbd
SHA1aed363ca7bab8f3c3b1f18377db4217e7d2caf96
SHA2568831d11fd773cdb0e6b5ad876486cbf2b438fd8f6cd714d3e8dc61111b90a756
SHA512a6137f5e029d6b9e03947eb4ee8f3b5dc2d0e3213aedf8008dee508671cc48f7f3a96714f0933ec6c42785aad81063f55820b2c17fcb399724dc878acc844d2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e907a80ca80fc0d5952b9f7907e1701b
SHA11fe0099c2bf8761540eacdda464b4e134fb9fe76
SHA256420aebc9236fe29657a04edc167b581e9acdddb2799f6bff595d33f84ad51079
SHA512267487b094d7741263fd32ecb418048a31fae777d12646efb025e546b2bbce6877e7e680483a3fdacbaa53344c3611c4d79616d881ceb71852d69cebd0f4f88c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515751dc78bb6f5403ec44bf56cabcd42
SHA1fd5b85d8103f6164bf4e56ef08f953b86d3773f9
SHA256aeb1face38c16004edb535a0d1a6db754c6b23cecdb6e4fc12f60133a298e945
SHA512df0db1789103bd6eecd41975a8c120bb343c6fe23e0ad6630f5ba83e28b6214900767dd33455240a04bc057d3e288cc75bee53b4a72a3b659836df5c114f00bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587d80802c8c4c2cfe116a4815c0ada6e
SHA179e67ee1b9dd6b41358cdf92c637026bca9cce11
SHA256b560965811386dcaa2c344ed46d6e4b79bbbc1f1285c2f79dccf2bbad4a7a8c6
SHA5129599fedbaca3fe179bef592ebf972e7dac0cd10e70ac380b42982f310dd1bdab96ed751ed6d87a9a4439c7b8b5880a76020770a54949986a76ef8ba3b46a200a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516933b15092980f60605491cc82ed731
SHA1e38aeaed2813557eabdd7fa0f3aa454cfa76031f
SHA25602ae98cee1d68db5a3ff6fc4ae3d8c7cc9f1a45dd5bae41d3976f57350c59679
SHA512aa8ea093c337c2a4bc7ecef6ddae933e136df6d257cfb7447002e9981423f3ae80244c2bb331c15f582ae70e181466c060977f44e7d0fb86da3dcbe03ecf9153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54164b5117813690ed657e12c34cc7e69
SHA1a1a5539fb712207ee8720cc4621337df58a2ecb6
SHA256d5b9c023c2342d01d3f6a0ba70edc9edbaa78e92b90d9c1a9c96fff81c0cec09
SHA512abeb00e135c22b144a6ed49b3ca9e7a096462ed2b41fa04d02d4f6513e41c386f2c285ca1ed79f2c25e5946e9bbf300f438230e796440d3e001ee2bd6170b2e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5893781c58130a18687114fbaa7561276
SHA18bcc118ab2f946d69975162396227af076821d21
SHA256e60fafdc2895365f305343c5944f1a4f39eb95ccf488b526bfffd1c28e5fba1a
SHA512f6c9cf2c349bc0dfa243f22fc45eb25511ff35c022c5f52e025b83358db0ae70796f74f18265a3bfc32e98744f789a14856685e8332df41fcd89ad4f0c1963d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e592e234d952b6b5dea9fd982a838579
SHA1221ff605863d03bccb6ad2e3a75f5ac4bf235119
SHA256fa04a4416599874c8d2bbb2269c4e18657367b37260a9fadde573a95de45872f
SHA51282caef504798529dbf6e566cfc1052ea23ed7e08d2032af993186ce7e80dce343330848a515d314ce22ce5074ee213b262ab9c49bc6bf3b8f699b21b7d7001c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e07f8a5ccb866b1b7f501cac2d748a92
SHA1460b595e573c3d901c6603786996e7c991174c0c
SHA256a096366e96d13ed2aafc1c8676a11c811cdf09113e98f9cd736ab0c5b69528c8
SHA512febb0354879ff62108f5146ba406549ba045f6f3fe11a4d303cc5755522591fac5bb74b826409b4a6d2f4d1b926be33c93e7964607dad513227ae10cb0511db8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586f1b2b3a57cdd7ac4910366b7d8ef48
SHA1a1d71925f42496993023833881deb1bc8cce2de9
SHA256995d318d4e42751fc43497e87581cf59928a9ab5228df375242b62cea9fcdf5d
SHA512d82cd006d0d313eb8a3f53a1c54394c26cc3485d0421c5609af6cf6763ad8adf460983d60102d8c4f475fcc77601d167332106bb8287157a3ea1c86e2fd2608e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b