Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 15:15
Static task
static1
Behavioral task
behavioral1
Sample
5fc4a9121b3a4427c3599e7c69ffe8bd_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5fc4a9121b3a4427c3599e7c69ffe8bd_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5fc4a9121b3a4427c3599e7c69ffe8bd_JaffaCakes118.html
-
Size
6KB
-
MD5
5fc4a9121b3a4427c3599e7c69ffe8bd
-
SHA1
b6de5d5f3fcac7b03f8ab5c3104d74a73616c5c1
-
SHA256
bb6930cbebf0aa154e1e91d1ebcc708531e9771cf13d8ff599190c4a14a75f9a
-
SHA512
e2ca57961c290d98592d8356e9a28dab822187af808e701f892aa0cd967b869ab9c8f49e92775c782b272ef81303eec509140c349aa54ac885e6b9c7627a8a19
-
SSDEEP
96:QCIKpYwFxvb5vbV8y5q0PuZNjLTZwqF8NHYng4uEXhqJnn3qa8rWhdhra8kjv:yWYwf9VCNHT16Nq0Jnn3qaHdhraPv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422379983" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000006df487910a08fb7a618dcc9ee1e3834f430802f883c64065a3aa7f7833f44a55000000000e8000000002000020000000b103ff3b7ea84eab59db2c02fc6301f7b376d328326b036fe455a18ca0295a102000000013e11dc3b060842417482f02c0ecb7bc1614db3c031cb81b1959a108c2ecf9a140000000b157b88d86872eea91e10c0c1ff647c7c2a02cec3ce6de94aeec526165e274415f660772a1973d45d91cf3414200e51760f4b3aa4f3ad767f225e64bc828d2be iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000e02e9380b0f3729df70fd3b64be3e6cee4f064d737d6492e9f95f6f132a3ab76000000000e80000000020000200000002742d5e73b65360e197afc78469a4fcb8adf1ece5195ace996d017349b151a87900000006449162ba3918cd28c57fc74103d434b85aea318e5b508f82d47ad100ced64e70011e2d7274ae2e953959d64457b672bb528881251d081305801dc16bbc976803837b4e5847018fb899da06c520df96a1a0b98fb203008270019c85400f9e503ad8feccc849a544ae4d53e0c41e3adaa5537ea2d57c74a89f8f1efabcbedc41cc23ccba3c38f840abb824fe9e21641f8400000003e7d7615872da8470f639a18810763a8579af2244cecb2db5066d219d9bf7027136e9e2bba7000e6e48a2ec53d94c27b881c3fc1897ebd72468713a8f2eeb5f1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a092f497c8aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C34E3A51-16BB-11EF-ADEA-C2931B856BB4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1304 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1304 iexplore.exe 1304 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1304 wrote to memory of 2092 1304 iexplore.exe 28 PID 1304 wrote to memory of 2092 1304 iexplore.exe 28 PID 1304 wrote to memory of 2092 1304 iexplore.exe 28 PID 1304 wrote to memory of 2092 1304 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5fc4a9121b3a4427c3599e7c69ffe8bd_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1304 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d0ad0dbb9be63cced6a1e0da085a560
SHA18da51b336f1f3b19625fcf873ad106acc1a271b2
SHA2567567eb4fba5bb8f34637c94fe1ce44677c135fd7675de385bf34e596b6afa8c8
SHA512579d92cd3888dd1a62cb78667883c887e32f63bfdd0ae4a8a62ede8933b8ded57d5f5445821af5c9eeb70393d83275c042fb409e4d4cb80c31b4568b01a0d893
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51757e5bc52d81f986434b3740b9bf90a
SHA1f947b82234d8eaba1754ee95299f83e3c3f3423b
SHA25692244f85190caa7f87c131bab579d9b5f31f650b6ee9ec33e54076cd90636617
SHA51251214aad9bf72fdf7d8449525cb21c05873ba4242019f81ac8322baf7bfc0c260aa16696defef7301177de027a982871d3ef9ef120713620c91b9a34c88fc859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efa9abd3e35dca0a346c82e3f17ed40d
SHA1c2d4986c3f164252fed232a0becda3f6a2efa9a7
SHA256f98b91507941057fe0152f1542d0e32e25b6802ab34e29ae139f58f79e93013a
SHA512cdf09a88bffc6e0543d9b434d27b1b7c5db7eecb37b524d8654a632e3fc83c65a1248b19d5be37802dae7de18e6b5612cf9941c0f15a6a30092ee9caf97d3cad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5323bbacb12647c22bc049cb6846bc6b9
SHA127b20c1244abd65cf1c07d908e62f3066e256985
SHA25602109f4ef05a3ca6e1ce98c835dd7e4ffaf36c1e83a32759a5b8b53b60349bed
SHA512443f8b3c4be063db40ee5c7b7935ad8622aa116e37b95b5db898e309f920a355e40664058c035cb7832b6f2df9b5772505f3d56f14149f8b530b0e210683d2b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c72415e4f65cca12e3e66261b971a896
SHA10ec88c68293872fe412ecec656cdefaaa1f5d860
SHA256694662990d072943326c1398f910797ddd8a2a31ff9fcd6861b9a0487c571e85
SHA5129fd85b9267f6b8174ab9cec8c535402ce1eeb52c85ba0d4bf99ce784120653526a91cc867b20c9ee1917abc179c16eb1e10be3364f545e63a6812b1eaa1f9afd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55204db0a4b75e66f70d07f91b00fb9b1
SHA1d09fca7258c9783702666d411f6fb72abb6c84c5
SHA256f4dec89d3d582f81e6066857b79d7d2976dc3a49a425d2998f094731e03a9be4
SHA51266ad05460d224fa090f8cc2d5d0c1a54af63da9872adf43ad02933fce15bba68dc886ffb15fc0dcd43df2dc63b206c518a19d5dd9cf882b6618fd78aaf82cce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f21a47fccbf8577c40b76d55a190ed64
SHA1999c87bbeb12e681db5759c056c6d5cc63b941df
SHA25689cc126593114e8dbc25e384d7ec2b1c940b56b61e6cd26e3306618891ef9bed
SHA512e9486a5e61d122561793d6e6da882c02f0995f358015bc412108d0e3755839d626b41d12e4d12b31b81cf2be5b092ba46584dadf1f50280126498e0a3a02ff48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e37d63cddc68c7c91563eea373b70a9f
SHA1723106b0c0fc5479f7b8e9c8ea0989941078d36a
SHA256a285179101713d4932280b79d3f30a5efea36c1c691fdfee3b8916aaf79a4074
SHA51237bd7d7de227d9e616485857f451d0df85c09fff4ed336189e631cb75321c28b0abf782773f98b24a21e02081d6fbbaee520b5619ea857f595a0248f6832db30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ed715e646c0ee0aa2e40848d9f0c3c3
SHA1481e537c96b040d5d9c099a232ffd07d9bdbd285
SHA2564e675d5274e39c39a0f10d6471387d539befd8f01041760bd3e59c32d8a3e500
SHA5124f538c2602cda300c645f519416aaae4a0eeb1d950f3b3e280a35fd3d75100fba3ba5b9ce46f6e3c3f5a6b969fed0f2874fb27645cedb71e58b8084c7376b961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550f85977e09f0a19590d906e23f533ed
SHA10794bc82e5dda03b0b33e883f6f547c9521be94d
SHA256b3020324fac292171ced003237277ae8d01951cbf35253844bdb1d2cc8cadaf0
SHA51286d351fa94c74dbe71b48ebac1f5858ac1bd7beeb78fca6fe1bbc6d0629bbff46f0a265d0faddfa1488446fb28570bc35b2a4113cd32797835d0083f39a950a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c5542c8faf271ba7c25e967a6a2f233
SHA14f7d3f124332719e5850b3b85df422116b09d88d
SHA256be371d8b4a4c5976e78ae520d5b764049f5b963af34d3e8bd1700a5954e8b7c0
SHA512d3edc275f2ac469b0e095b2ae11347f22aba1b0bd470d571ca08d7ea65a032bb164f770578105bd918af5f167e4bce1a8fa59b9fa2e94ad8ae8e13e645fa0b37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5467681c31bc157a9fa1b8be4c3be9b1e
SHA17bbd0a3987565fe42f1db0d9060c4bcfa0282930
SHA2560f31c9749106d13b30e79ec4c5af17be996d775399aaf2dffa1ab8678b6e7ec4
SHA512b1e6a8ff13ca48e93fb0a4de1cd34bc64ccdbce02f55bcaa39fe3ed2c7ee929f537dd7e422918d6c95c958eaa69af8607cad9f475894bd5abb6cb78b808b3271
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5679f0cf770300e333d63b8e17fdf4642
SHA14172d4ca7cc13d7c0d8dff8d97bbd5b1af9fa31b
SHA2564acbd199257f0a035ad40bb193009790efbe498b0b8aa22513ebdeb450d425bb
SHA512b02ec441f6589f19c1ab4a49abc4e19045942fdfbe65bfa64dd4e6c71dc3322a868ab187d94d9dafa403e925d46cf77e2c56b4d573b497693370e9bf2149e8fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6d5e6e8d1429050fe5a3936ad6b3307
SHA148003c9ecde3754c6f63ff65a5a2e09a49dedf2c
SHA256112068abddec7746852ca18788a1917211005a0f212042eaa8aa01ca60879da6
SHA512d9dad421578fc1aa6ecd15fdf2b5dcf18382c310ec7c211bff31c5b8e9bb876ae923704b1518cf331c6a02135f7ca1315ffc12115bfe49268f0080d4d37e500c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5295d2ce2b41e1324a7ddf07557dc775a
SHA1afa7bbdc19361b07fc27c86fc2e8bf278084e44c
SHA2564a49f89e5c7c27c275eb4d4bcf768feccd2fe7233d077c66cbbbe2f25bca45b1
SHA512e447c87bbc6798a0b9b664a446b3bd7ae5d6b24b802ba553ec6eeeb0e8bb7e7f0bb8cf9ef04cb115580b23aac6b0743555805d0c945590a04936f49ea7f32a55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef31b9b7516da6bdbc5eecd5cc91eda9
SHA15858668ec92342bb8ec80df69cb6cff0c9d15991
SHA25668febcd7274b81523b4502bc946f17ca90ed1a822ee82d468e289083ae394690
SHA512f2eb02509c1e10295689805823bdc35f193ce892cfa3bc2a8add4e459e403a7dd9234896c94e9de9eaad883a3cbdeb7b4726debbacb4c458236c3c2cd0600c59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef672570391ebd2c5abec3e2ea57c23a
SHA102702d3134801dacf5a5aa7ef1323994da6663ad
SHA256d12c6726f53c4b492e4cc10f7921637b791227e67a6ec5b1c47f5225bbcacb40
SHA512f761e21998cf43bc5565f21ff21c5a05cc9457c229cdac4b0b22ccf361835169cf11d94286da09a60f147cbc8709b5cbbe15b52f41bf80c380191f8616ba121f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d24fc675a98e1ed988ce8ddd6adb9ec1
SHA1479a21ff2ace72ea7faf09da43237ba7752acf36
SHA2567afc473e0dd78e86dec50f12199743d0e9bddce3b34c81adf46135538f5b95db
SHA512d5bf02c5b771d1ab5b844bab7cb5ebc8fcbfa8b2c252fd454cd3df236fb15c3b498981b769f2c464830fd064149c72cfb0f6ea2f61d5a135308320c0f261a8cb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\G17BROQF\ga[1].js
Filesize45KB
MD5e9372f0ebbcf71f851e3d321ef2a8e5a
SHA12c7d19d1af7d97085c977d1b69dcb8b84483d87c
SHA2561259ea99bd76596239bfd3102c679eb0a5052578dc526b0452f4d42f8bcdd45f
SHA512c3a1c74ac968fc2fa366d9c25442162773db9af1289adfb165fc71e7750a7e62bd22f424f241730f3c2427afff8a540c214b3b97219a360a231d4875e6ddee6f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a