Analysis
-
max time kernel
135s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 10:11
Static task
static1
Behavioral task
behavioral1
Sample
a505b32688b66c9f52b2e3e28c28b4a3_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a505b32688b66c9f52b2e3e28c28b4a3_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a505b32688b66c9f52b2e3e28c28b4a3_JaffaCakes118.html
-
Size
30KB
-
MD5
a505b32688b66c9f52b2e3e28c28b4a3
-
SHA1
ab82e94d91f5104a4b5f87d7d943e5a608a7abb6
-
SHA256
aa6f3520d36429e2760360decc4bf1a8925f25f5d066712fb2a2fc6a69389df4
-
SHA512
4024c602666591c15a3386519b09b243ecef43631857c0e3f1701b065fc2713c9608d8704cfd9d12779265e1bf3bc03cfe10e719be45b80c16facf285b94c5b0
-
SSDEEP
384:SbHAoGzygTeyUtTmF3i2hV+5cZVGUvMt/FHnL6xKZyRtcfx3yn:SbizyIeyUUO5kZE6x4yn
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 5 sites.google.com 9 sites.google.com 11 sites.google.com -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424435374" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a80760000000002000000000010660000000100002000000010fd98d8c9b762ab1d66beef2fda617c21cbefa22e755c18a8664e8b06342001000000000e800000000200002000000066941a88af5ae754731327a161270437da9790ad3c9fcef17012af271e7adffd200000003546543db1b5c59a03fcdcb60d95a9c77483dae8ab43cdd3292a418f22748f68400000008b60b551b3982f2c6c569d7e219b631c416fec50f674a85b683bb036524bb91e3a6029eec616a56cc4a8e9fbe4b85f9985366744b79b652bd7e4c472daf9ee85 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5688CA11-296D-11EF-8156-CE03E2754020} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e08a162e7abdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2596 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2596 iexplore.exe 2596 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2052 2596 iexplore.exe 28 PID 2596 wrote to memory of 2052 2596 iexplore.exe 28 PID 2596 wrote to memory of 2052 2596 iexplore.exe 28 PID 2596 wrote to memory of 2052 2596 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a505b32688b66c9f52b2e3e28c28b4a3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2596 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5313baaedd8df959749c00ef07243fbdf
SHA1ce3fb151323d7950bc20361dc341cc5cd62c32c4
SHA256e5c0cc666090f89b33f419f690bdc6c21c884fb68cff50f0c444b495d4fc97ca
SHA51201b31fbf777621804f4b9cf837ed596539a2b5b62a49dcebc2fa177326a6094675f656cbaeb1e3273ac064c725cb1e37ec5bb27c8eb3fd78e65a04f0ce1f4892
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8ac1d0b05db025943628263f2b24d62
SHA18fca469f491f2e3d8c9570970700046ea3476993
SHA2563753e82051af79155a90301719b90bc713f7653440d08d07dc463a2fe6a48f90
SHA512c4afbe8278bff22fbe76a5eb7ec2e1ca0e97c24eadac627bfcd779d718b6dc22f7a041f26dbeac04d7d69d9a76aa3459397d2e7bd42bed382185a6cfb908437e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ada3f4af810cd182620084c66c25117
SHA1930d9c5acde35cd5365f8c8c189ac0b5f9423f4b
SHA2560b33a685e9f7f8b331d283cbe7521a92af760ff2d799f712fcfa352932a3207a
SHA5120450f896f4734cb66d3ddebbaf74cbf93a99256c4193a1dbfcf7b1fa84b2c81e177fb7d8c9fc6bca24e143879ed815efd62d7ca0d479e80780f7453e53a272f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524585ae086467db9015e244dcf9d547d
SHA1b5550bd20f2a3937fc5ac5c74a71338eeb332b68
SHA256a8495e2b8b10bf003020a77b9b9912124c10fa2c23511ceaa0d435654ac245bc
SHA512968756140c1ba007f3b67c8ea09e520df51ac3c3f6fe76e066966ef6d2bc522959a15e3a58838b7c351e0d2b7029846ebc18038f6c727cc28302d97e8857e9c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca4c86bb5c4334c15b3cc281dd1ebf19
SHA1f50066f4d9c061c5616715b5e657fb08def7453c
SHA256e685e067e972c87775935692175d55f9145254617e294ba95b8c146af9b09734
SHA512ecaefe9884db1d9d9474f0575c8fe6b2534b698540aeddce416a78f3f1a74118101ff55c293443182cbf6c557a522fd689c744ba3e9d888bd6b4ad141046e779
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec497affee5e7e50e7deb14585c42582
SHA16455e486e7c38a044c3f4486b7134b1de6b30415
SHA256e4c7ccec3e46fde2b3b0a7d39c6ecae8477d785dca07591bf2247aaec5ba3b9c
SHA5120607a2f6127e7c3422a1749df14ed47fb92d99d235266806f23e3d03c062f97a2a503218068837f00473097c40adcde4a44b77e864a7ecfa6b80860b54839efd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c9d5ab8ef25d0b9327232c946634ce7
SHA1ba4f5f8b69646ae0154e97dc02d52fb6671dc212
SHA25607266790337cce857e139fcbfae3f0b9eaa3be4a1489c7deff7eb64473419b3d
SHA5120a112221b99e691f84b676d9d8e1dd94ff3f2b244aecaed6d9e49e7ea45097cc0a2b7f02e1a746c11e1982b74c5d086f9eb46d97a3f01d8b44a7228d302f85da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592c87f7cf9d03e15599d1e184606e68e
SHA189385b7d2934f3ec3055f6d4febb5f8fdc83c746
SHA256930cc571afece88394898b276f3bb5f5830e06e9e996c798fc8a4c5d92bc9894
SHA512cbebea82fc059013cca990ccb8942e5bf2443a8d02ca1d39ab93b210d39800fc737bca82e3a1597029c883660d05b83fc94d637bf1c09b262af122c9a24cc251
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cf6b272997aa2264284055619651f22
SHA11d721a7bdfa273ba29e0ce62edb5c6940f277137
SHA256ca187368d02b3d1e68649623f77372576e8d8503a03a8f60c4e850be10c34207
SHA5123effc8a464d616f8cc287e73f24bbde8af200db5612f7eb9e1566daec2b885f09731445919c87b36d35cc48cf7bd4dc32436181bdcf1228fe4e31cd972594959
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a02305d3761318f97121831edc17ad99
SHA116c578f09d386b735cc06f0af5fbf0a346f2dc1e
SHA256c386ba0132579e08598d7c7c8beb9eb7c4793db76e00ff162d9ea182ce10a6cf
SHA5126846e5b4edec6b7e39136db86b68c21013aff4e3c165efb836413e0ecc739ba275cc540268c5a7b422929edb0b6184a8f9a0c81994c7b167ce07a7d4e2dbc316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de77d29591a17113c9feb88603e26a86
SHA1a3fe7c5e9da40e42a93e4fe94922c989ddcce948
SHA256e3672bc19f1d1e5ea3e92876ce76b9d1a4e1398118e2eef5296506c47bcaee5b
SHA512e9e26757552a3329dbec18c5b23dadc873ee028a293f3983a113b60d0acb84313f6defe46ffbbef4edaca8ec16cbf152339d2bd922af1cf44bd4d0690121bc75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b02bfb4202fe9008f58bbd1c87dc624c
SHA1e85fb284053fa48617f319a22d8d3039707951fe
SHA25676902bd1d2fd51b6afffb53bb982d212a60119c04d3c630084b1fa375596ed8e
SHA512a1412f06be92ffc1af15c93363c1c86e7823e927388d33dea97b4e4847905363f9852e9815d11899b1be4a3fd479f45f67549120c4e42e3d1b018e61de65e819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5734565be87d7ba50dc247f7732c245c5
SHA1b6ac5967166db7f217bc54416fe2d1cd7c3bab67
SHA256ee7bcd50cb0bcfa6f372c8851d0519fe87a7282bdc3aaada8b2efda282943398
SHA5127d08228c29485333d4936f3c5e04885fa24f7f459370fc0127b81d77380886a2bf4a366c7d83a3a833a548f606d1075268e99c28258d73a19dbffcfd3fb795a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d07bb17b097d1204a7109bcd19450e3b
SHA143c39ce2a4ae16d5c49101694b79379841da4e75
SHA256a609ad5957f17ab814a5cb487550c58949e9f837f3ba3dedd48f03170f7ba0f6
SHA51216679f52078585dffb9941ad9d6102f7a79315172cce05bf2d054cd3929b8b9eabdd552c99c68354e956196a446af67ddeede3329b786de7f1ac4735db970902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de5a50d9d22167ae9e40e50d24d33923
SHA1335411cb04260b2a3e68d7b57137eab8ade20a2c
SHA2562d688df5941cdae618845201d66c01d09012945e9850589468140483099d6c70
SHA512c4e7be8c599b43a6c1e549917beef720ee675c925564d479144bff041130b75bd53f4b0ead083f31415004886b6ffa5480d9ab22aa4f4c46f83f17a6118a413c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fb2803e4bf9f5cb9fa1a9747ad90e67
SHA17db91f76323ba1277faa508e37ca18c6b2e28764
SHA256ac04828e0b2db14c7e4f9979ee9c03937a95607ec4134f7d73c7659806a33e52
SHA512a6503772d3a38379517f023944826e2288afeda4f707b02c48e01d5ca0fb071713023a8150edec9eadb78d7e159608a357465dac216e9002782b6c47e6eb218f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5662778a31dbae207bfb5cde27ee47a08
SHA10e9dd0650809b57a49d9991460eda9f0058529fb
SHA2569ededa374969181fe15316237d00554ae6d5587d2b65956b7a82818b06e89c61
SHA5128dd82a3733abbd1a7600020f88e275a84e8e5cf23cdd00d5637c47c30cd8aa6773e4282273be0945fd31eaa54b8f29393785db1c246c8fb9188f4c4fbd41f608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5ea36c416fac9a6685a5c8393e4accb
SHA1be4bfca31e7052795d0deef06b9b74e75d64f7c8
SHA2567627df20f9aef0bc13d1bea11b47c2114fcac205d97143e6b8735dfb3a4d02a3
SHA512920e1e7d269d0a68fa54e6bb91afebc1428c62326e3f11802b005feb5bcc2adbd0cb4b143f4a62bc7f65a7236e37cffcef4ec611a823cbcbc0156f0bbc85f46e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584b197f019a442b6bf5ccfbfef1e2310
SHA1a243724c4933f9cb63f05a72696a2ad9fed9335e
SHA2564b7948082cde20c88356ff8cb0e3e8e241eccfaab1d50f9fa51a2489e9e9f339
SHA5129e342b98d07ea440c899116280020e611ab8edba30b162a09400c0b393dd488005403cf8860ac9f1f69b9ecd1f7a1eab0fed23515d9ffbd3ab198e64f5ecc171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f92df69f7817bba1d82e43dcefaf0102
SHA1984fcef12f037af25d87ef79acfaf66c955c784e
SHA2560f298eb881f4c14e66929fb56225e11b6278fef56b8262956a8c27ba87cf3480
SHA51277fbbdd2a287ed9275c6602999aeaeadccb29e6dad274513c10ad3be3fe03876261fe78ff7520890ddb5258e9109883f13ec377b7f0d0540dc512a41ce1e56ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5150e679e96daee4a9601696ed99f1014
SHA13a1e20cc8dde8f1c6ace5ab7b56a354587c349b9
SHA256b60f58728f11d4b6b902a223d092d3fee23c3303c063e8ecbe180de18908e8ac
SHA512701a9fd36ebf5cf3e66d8fe450bc821130a16a582cdf1cb6b1b946df368e51ee25576ed32221272c0680c25e401a2961c012c61a574b2d76f79aa818c31c13eb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b