Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 10:12
Static task
static1
Behavioral task
behavioral1
Sample
719c50e4f9dbbc1924155a9b856bd665_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
719c50e4f9dbbc1924155a9b856bd665_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
719c50e4f9dbbc1924155a9b856bd665_JaffaCakes118.html
-
Size
28KB
-
MD5
719c50e4f9dbbc1924155a9b856bd665
-
SHA1
8701827538dec51ed9a3e6b5652a44a472fce022
-
SHA256
24033301eb87b010a3d2a0fba8f46ec9a966307a193c788606344f7c5aa4891f
-
SHA512
0920da4e60a7e6b8d974de7e09b36c4b335f7bf5c8fe733226e5460a2e9bb40d881e287c7f97fec185feec23c0d5bee1aecbc2d07bfd8fdd820c73c4b7cb0418
-
SSDEEP
768:XbiwT8RDSOScrO8tokoOEg407O12SAtF9S/k/PVqr5yqr51b:XbjT8RDSOScrO8NoOT7O12SeF9Ss/Nq5
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 602a19228caeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000d2458bfe85e7628134efef8aec0f0cba478412961d074d0a90f9acf9bada983b000000000e8000000002000020000000bafa461ad2d87dace7b682a24de50af9619dc0e8c165f4614f9dfc6a82f1dd9c2000000037df0dad8147d1e1f934984effa5bbfcef0c0955f0abc216760150cc1c16747840000000031276dfc5f7e03dff7cb9b176ac98780ec2e4e03adef00a6dc3a6f0725b4a6ef8512ce28a89fbb3372870df8f7aa86263dc869b9eb5125a93526c42b39e3ab0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000221be66de3d878ecb5b6a2aec6fdd9d23e1c94be13e3657c2d2bcce84b75b1aa000000000e80000000020000200000004ebf3c6873375846be00f8fd6e952ceb8bcd3e42058dcca88d83fb36348fb1d5900000002e0aa4ce70a7b0e54b84e535e6c793ebb2fed20966ec84783282437d1e35f51b37db084fe049d4ace42afd0e4e3f3c248c161ebdaf342e5fe7cf18eeef0bacd675e5b3a67a9356761201229be1ad1be7aa0235169257e67881bb24784cd9fe8495811a1ed9e1e12fca14b1971b6d6e1dd618a91be852bf3b398346cac9f9b6cd2519c222485edd54451525cfe1fbd9b4400000003ec324f3a34447ff9c6f0c6fb56a28260047f8ad05b7ad17ec6775739e126219da182fbb8ddf914c0c767efcb98c7fffb4f69c420a01e1f341c2639b7ce19a15 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B9E8F11-1A7F-11EF-BB1B-4658C477BD5D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422793817" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2704 1728 iexplore.exe 28 PID 1728 wrote to memory of 2704 1728 iexplore.exe 28 PID 1728 wrote to memory of 2704 1728 iexplore.exe 28 PID 1728 wrote to memory of 2704 1728 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\719c50e4f9dbbc1924155a9b856bd665_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8eb7e7fc4ba10a24331984ed572fb58
SHA10f8f62473b72ca61d72dc4eb035728feda8ba801
SHA2564c1aa355d8ae802ba94c7f3d307d059de5e30ba5fe8820b37b825cffd4a34db9
SHA512de2e1c5ff6da4b6319e170515a983de5f517cdb9c90a961f21d28db8c534575035e0bc5cf5b74e3ac8210fc9c078b050460de04338ba27fe419dafe01cbc4861
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd9b126fe1a61b47c92f982230044ae8
SHA10304be9bb17e3128db6fbdc97fc1e6c0deafa348
SHA256338158ccea9efcc381427c3de5a6ae7c9bbf75edb9e4232804876932087fed6a
SHA5121f79ec6f5ed76f47fe5b8c3bae82f1b590ef9df832d759bdbfdce0d30d02666ca84675a17da7076882d4c56cf56bc8526dfea76dc26e4ca88859f6b8beb1cd63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50320b256dc6cb05883ff58ae884fc78d
SHA12965d2f4dd09d82e8e63fe3d9e612072f892cf39
SHA256ec9f0e56d8b46ab107d2784ba67b26fec4c1e6bd11f8518ef892de9b1cdf2c1d
SHA512d3965954a8a40d85764f73e214225463dd016e881657f8ef85709712c327c7f8193c18118e879b1eb79d1465611efc49f379672c2e4567f2d91ae1e56763080d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5020a50e3d8ffc86ac819a644df453188
SHA1035a26a73dfac44758112f6eff58c2f8744260de
SHA256c7bc8d0ebe202f3c896bca22661383b4559f91d7eb7de42e800728717698be48
SHA5125708cce2d340b7dd98294a0a029bbaf58fc97732e8889de6d503572eebf49f16ff51400d0351b419f50cbd4d32decc6c74b58a6e36a9d3c723e9ded7b832226c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5906a165cac2a5d7da9abb485326df2b0
SHA115481fbc9adfc2ed4d33ec500c07410a0d1e36f9
SHA256aa3036db31c6fd121e085e35d9dc2255e1f73dc972df63b9843342385447a38c
SHA512d1384979c1bc77ebc2ea967715a2ed2d315b14bf16d9ab19e7cdb876217812d928b5efa1678034b3f9b3366012571f270ecde430a1d650f023d98a5eaa493906
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50ef8877aece7340db75f390dfecff454
SHA1e9b3eda7053adddbad048948b7afffd385d4fe66
SHA256ff944cde8240924382e5c5974992aecd593e412714066258be5d998275f7787b
SHA51247cd27ed5e2c2173106606f296ca0568828a11c3a9df5f59ad247486b7c79ea2f79144d18d9f118a8299186cef520bd75cd8de1cd676ec2769584081212b1b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57809e182966892f5a9a19a5a6d4d079a
SHA14a69d8463331537506ce182ca0541b6c71760653
SHA2569c322969764271be58efe03fa7fbf4fab29624559ff643609a3cf9121108c1b4
SHA512f3b0a0d498dcb4c142b7ab082274876a1abba16116d64344c7499b1c92d2091c7c8fd3ea6f9ff22ec221e9b9758b1e0fa2958b03051b6e161ed7dc485094cb32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8bd11857000a1a9ada5d640421debd2
SHA1a6ff9aee69a04e823e859ffa3f8812ca3e72ec1a
SHA256b38618bee7d80f292426d01a2f9781a03a1f0a16760302c449908447fe9c07fc
SHA512551407d99e5a2bc6474af3416a43a0501133d5f9384ea5295f5f67b49405f2b7fa10a1730f43b5b1db159d71dcf872a49def0f0e787552f594186d721f65131d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528e2246ed575dcda19988dd03d0d818b
SHA1ac4aef9dfd652a61a8c9c986727b5a4f137dbeee
SHA2569629a4dd92a1a2e03ea8d623b6a70ecd95c7d29cd4a1280e7ab43859dae5d424
SHA512163dc8c990efffed1cef013c575093b0f56c0beedc2ad69c898985b2877b946b1c1f23e8f4e98a027394384f1fb8c016f48eb74671c78da97307b9a675f48984
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51db9381990f37dbc038f5a365eff1755
SHA1f414652014e511204a464236e1bc7757b194a852
SHA25645d62f4cc35afae4b6ca4cdde14dd1e7564332166211eb45434fd6e32d511a74
SHA512f6a7b80a156ac0c038df31cfd367226c5255b08ceca4c78980c8851cfdec3c6da80c00efa18d69272067e06b11f739a3b8562759cf9949fe49977fd9f4eeb3a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5187ceba4ade339e000191f7ae30bb49e
SHA1bc5eb080c7c3472783dc910dc6b4893d89af56cf
SHA256b8ae1461d7e119a588f931ddf9a787a962eeb920be9360efa7f5b6336888e9a7
SHA512fe017ba466a50da5e0e8daf2fa88b9a52d1544c1cf1f40a5faf7af2551720bb3bd3a8249309a634f9e1c8244a61dcc1ca1f16cb2538cb29c3c920078e212cb11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bb44bf35536d8802f407d7988377497
SHA1cb397199e1c7dd7369b2646559f1f035ab843289
SHA25677e9ba29030e8b3a9ed43b3441c3593d2c560997cfc18d7db46e0d9ee55f2f1b
SHA512872f578fd252aca4d7373d17c8320fce95b5c7f726e5603245fc66e1de5e982f9e2261b4e83bd7ce9fc940cef42d2a04b9bf8f3cc134d13a838f90b5b52b25fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54eec62e70a0e66c181de8ca3c0bf3030
SHA1b6d521e904efd46b36bfff80723e823ac59abd3a
SHA25647b5dff065a453718e5472d743d5dcdf5665acf05ae4690b8c2145b309677423
SHA512b407090cdcb8b56c86e5475c82147baf2e829244a76623cb2ab34969441c76a8fd2073270aac0fc269629dc13f5c36c753e7c172165e089eacb8a99cd1b91357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59df64b9d3751f58780e089fa063ff403
SHA1a9c5ddde56131787d0c369d5d3fdda1ed44b89e9
SHA2563016cb334994390d2b1762067e2ab019f331150a27307048f17a4406e3a9d189
SHA51221bfc59827b438b8a6b7350544adb3f10b68fa087624f3db7ab8d8ef2594369fc5c5cc460213343fd9dcc15be4a71a9bfcf5d87a3a4efa56616a78d6944840a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d8ac94e76b64bf846195d9f9b8c35b1
SHA1aa7bf607deee1a39ca1aba940150d0512a29a8d7
SHA2566ff5c9e47262e3558a4616b62649df049dd7fa6f5c99f91fe4da7c0128e1d720
SHA512ed4e08a23a1116c79c01b92f98b2a40af5b97e3b3d59d4a521c5e8cdecbcf89ede7ae84a34c27528f8da2afb89179565cec904ff5ebfb24a440e9c741a560845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec3ed4852a1990ae6f1e835b4a9c2053
SHA1e5be623292c896fd2ac13f2b5b898d0df3704aa4
SHA2560f76e940b5ab7ae598e3ab2be072adaacf68f2901289746e83eaab130d592478
SHA512511ecc0ea79f937742fe94293fa5a7a75511504f34bcf0171ace01c0e6ff6775bc49dd147ce0a3db38cf0ead5428b50082795fb52f8695f69210643799f6a4dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9d55e3dc6461c5ce21b41c72dae856e
SHA1d4d0565f3f6810d7080209d5063e87abf5e32afd
SHA2569d27ced7e9101efcbcb5015191313507af3f427fde8d60cb107c37f1e896a24a
SHA512b48f475f203fee3640bfdc76faa4bd68b9a7d2194cccbdc0f10380676be178cc73af4a9e9e5eba35cb95ba7f38ee66bda47d021642cfae9fd4db3d2d3c260da6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5404557d302fcd0f277e6bda033c688a0
SHA15bd6b2aaf70d60603b3bf9cf5aa7b246b30028a9
SHA2563304f9372d14e1d52a795c8f6dffebbdc3eca388233d19599213d873283170ba
SHA512b27a4a4744f1d5ce865dfed5b0095c1a43cdfc1bc3bfbc88f2a739006f782013c1bc88fd8bd7b8c47ce9a8fffefb3b58ee995165fa5f22961d5ff0563573fede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a19a6b22f16f3322f1e69e018a87df6
SHA12b0b3e6cf258c1eb08e8eee47837d350e80a4cd2
SHA2569eeb6dc94fdb236096ad50f51f2a5be8abb267b22d7fdffd15d14b5d54765253
SHA512004f5682070e496675573122e33101dd2bf31054072345616896476b33ca91cdbf33ff22c7e1c8eafccef057be8dc5b18b5dc373a2eec6fca7553ef183e43756
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a