Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
8baa9f3cd8ba08d48921740648e6033d_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8baa9f3cd8ba08d48921740648e6033d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
8baa9f3cd8ba08d48921740648e6033d_JaffaCakes118.html
-
Size
2KB
-
MD5
8baa9f3cd8ba08d48921740648e6033d
-
SHA1
08d14ad84794f7104a720f81f96e33f9233191a1
-
SHA256
4bb6ccef41a78ae54dc362f12a701ed0bee0c952c00cdeb2d434bc341e98715a
-
SHA512
4621e1da660973805d18bfdd2a79af741c397b0b1dcc4bb078fc4a3911399fd4d8b444703a3597b90448163b8e31567093a6d04bf7017d760b91129c07e25910
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf710000000002000000000010660000000100002000000093b78d8572f189976c83c5d12a28d74e94aa38141d1b55ee23e7448c1b8a93b7000000000e80000000020000200000007065a68b563716008501c9db02d22f16dac1a2d3ea7cb7c0563400b17c0f0f4d20000000a61c3b38e520c6556358c3baaaec0e8d5c3f3f18d37865468e007f4e0888a198400000008ae29f1fb3717c331c2259518f7591ef08eb4b137616b75b5de091dec46b281bb708f48c358ce0ddfbc412d0ee2c3f53dcbc39259df41e24c253a319838d8be2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429566467" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{185BE631-5818-11EF-9CC2-6ED41388558A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90d1d8f024ecda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf710000000002000000000010660000000100002000000038dac2e31e33d51af659414dbbcdcdc6b0b2bacd46c846cc75316261d9a0115d000000000e8000000002000020000000fb3bbb077b6d2b45caf9b400b7ea1b6d434e2bf6220b86ea582224517e320e39900000001d8c4061c00729193e8ebe0dab445a3e1cf5b0dca72d6f3aeb275fc763537e500d13c582bca530b1db2fd8682646d2b1663d9765a2a84d9bde3b1b6eb19c2bb54354c89c3ba07ff55e42287731e92cdfe6f4d5c3db5853139e33fc05f34d14743c07ef305da99ecdd9c3a46dc3bafa9794f05043df79defc60a2857da18963ae1c6e5ac90d9a2a6427346039939a5bd74000000043ec4ebe63b0db8421a6e2329d3b8c198fb5f6921ec9279828ef95d94667ca9057cfdfa5b39eaa5502d51d7aaea5f0ea07243ae194a17208db83dc73a5ad78ac iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2408 iexplore.exe 2408 iexplore.exe 1868 IEXPLORE.EXE 1868 IEXPLORE.EXE 1868 IEXPLORE.EXE 1868 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1868 2408 iexplore.exe 30 PID 2408 wrote to memory of 1868 2408 iexplore.exe 30 PID 2408 wrote to memory of 1868 2408 iexplore.exe 30 PID 2408 wrote to memory of 1868 2408 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8baa9f3cd8ba08d48921740648e6033d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2408 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5c891765a1dde6a3a68b3008f9b6771d2
SHA185d71ace541750f2773ebeb957d72c72b8581e41
SHA2566b91d0beb5d5cf1c0bebd006f2a97b3d3ef018890d64507a86d8ca887561951f
SHA51255cf7c3cb79b46faa517aec31b9099a5a9aab86a350212dbc3224007d525f44d5fd2fab802afa2931774ccff8bd9199d68c1f2a40260161abc263016a634b234
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5477ca6c432e4b14b92bed7eea251be40
SHA1738749b486ac1491301c3bc592ded535e742cc7e
SHA25683fedcb056bb8950c38bf13b6ff68d9f28cddf6ecb102cf841f98cc3cedf8a34
SHA512bf4cd9df16e255c7d8ea379c96a69b39fe06ff55dd38c8378605018ec9f21f5a9d50211daf08ba08f17cb3ae69b0b87672d98264f231f789fcf5b92d2b02dfe1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e10b2c9ca6cf7d7eeed59e7540a4bd36
SHA139db81854187d607ea3703bd512778ad218189c7
SHA2561ee24d6cb135b9f11369f43d7b5d953907de50a0cb721edb5c29d563df30144b
SHA512726168c36588ffd1710c6091cf84695f5efb2277502a928e7bc8eee0d9b6b91316c680113a5cfc106c62dcd4e09e931c037b5e17abe601310d97689a0d6383b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9bae2e7980cbc1451ee626541febac3
SHA1ccc59a22cb46b5a5432e6e26ee8cd6f88c469b77
SHA256e5d04e015ace906abf049d7dac580bd12a4c91a1ac8639af6517028c78f25dd0
SHA512249839c387a80ccadc2ee4fedca4d0c3c79b53b2446114227bf12d6a1bcd5e10881b9dc34156af96c442581afacfe65e46f2cc1ae73c1e22505f6ed74c10147d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5706549c84834d5e51b031a24f90ff2e5
SHA1695f9b10e6e666090a7cd0beeca2c052ee772966
SHA256eb13db8f45282cd3d8f8c82f5852e498c071ca3c85cf740e21d2ab949a7185e0
SHA512a5876bed3b8fc41cfbe50111d787f9a5ba708bf55a3f5c6fa88b5665c885ecf5c55593fd002fef53a4a74fc32a2093a0f6ec34fbfd828fb42e28f34f506c28a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528549a0ad29fc5bab5bb8189ade9f255
SHA1cf5a32ef968a939835b210bed5eba50f5818e7eb
SHA256c03efdb865e806c695c91da8203b59f2a5196e8eb44bd1c537b5f0b33d591d87
SHA512598121645711550df4afb2e52c9c2db7f4d140e2d41e5370ca9d751f93cbd0c65f1181448b5591cc30fa8763dcd5886db138a9acdfcd4a4caa329152c9c14e2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1fccc1f820c6aa2969807c4053d80fe
SHA138e49b7a1345751caf19d6f1bcbd66e9e3be5ce4
SHA256a0a0fe9f799bdddfbb2618c93b3a4b9a079fdda6e47dea8ab264b7259756ba09
SHA5121e8a188a585593d823cbe896d3d41b9fc752ab3eaaaa2cd5b078b62f37cef7e294a04def502ae558fbb3ad0d39fe75fcdb79ad03a7a105b0c955cb84f34ec297
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5480c6690c9cee0ee5beeca01dc0bf637
SHA1692cd83bdecc00cb97203ce621792c18a4737a8e
SHA25648b89214dcd030be68956e72b479eca522ded2f0885836b3d0587ba5f289ea85
SHA512506ba883803017eabe4a2ef2fc062c9ad8c252450276dc361cee2311671fa2f1b1ccf163878a5abfcbd3efb668bd921d658cc6565db24c2eb479e5a8da42ad87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee5b848cbbdd973ae1f66fbccef4edc9
SHA1300b1a748857a5a2a471a3e7fab56a9f6fd91322
SHA256a396260a11a097436451c6aeb4922236ef5cd93e7afd395598862b0198e71f96
SHA512e552506ec6819f547a0b38366bd0c4fa788bc62d59ba329db05f5d0e4e523c94b3bfddedcc2ee0f2b7b5f59f6acdd07c13322e46a5196a72c59278e68cf89242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50014840d9ed3e2fdc896cb7804ff43b8
SHA1f1aed6eb815933afe3edbca2d9b86b90d1e2b11d
SHA25653988ff43a74783b47464cad0c0094b73dab6911b86565d32d883f21b9289065
SHA5125ea11dcae388b20d544aedf5bd064678d07871551278a9ff0eb5db2dd2fa962e5a9807c4b18c7ab20439740f43b727b8b76d05702e259e75132a95ccc1cc04a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b93b93f46eb86c1c733bba0d69df381a
SHA1ea9368e9f44c53ba0a858ebfc39fd041a8a09305
SHA256811b90371b8b126603781501f82ae4ce957c97c8272ffa6ffa8cd14f33732e3c
SHA512df8add5d67f28b28d3bf293229881f43238f7744e1a749086f189f0989ddfaa05e12784f3f1e381134d19761d6fe9edface1efbe69ff5ddbbec8a41b1c17a480
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbf6f868c736eee734112d2abc14534e
SHA1d3b7b284631a598f10118a475838229e61fc25ed
SHA256848470f05ca3d39f45a071f06aae59ba024725279efa0b5b1b93df8c0bc8737a
SHA5120e1092276edf38936699fe6fa84dfe705f6713e00b2e675fc6b0b1540393619000b2e200a56564886ffff29902c268978a93cb70e21fb8ae228bec5689447da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7bc839076ac61e97dc9e03001b9a869
SHA17e1f50029429b76a7996d50639eb7b92b89478b2
SHA2569366cf58961e9bf13af6e55537cfce6ff45b4b8a6a86692ba73077b91e6ca000
SHA51226f8161313a66951223ac68c970534e949f304bdaf9a9d3b4a7df161226ec4fadfc94396944b83b3c583a3008e9c9124f17fcd5ffe727edfef59011dab8e974d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a3fa37a8382521b7b9a97369b0a22b6
SHA10f0db144723f2e71ad63dc3f22c599a7c4413155
SHA2566e18e9785a31c5eb1515fe613ec2b57aee2003187f7e46dedc392937de5c3bb7
SHA5123558680b2bf277309cb7d228870f996fc7c1f474a9d89f749619c9788e2386f681f5591068bc17c65572a5f952b550f00dafaeb58b13a9f98c4c3ae2058e02fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53475cd62df0084c7437cb1c741afdc54
SHA1af21f91a71c858a15b9cac39487e80f8164327cc
SHA2562fc1308a41c459891b3c9256977c053df7ec70141cd36bff105cc62460ad7c54
SHA51236bd30d18f433d363608b907bc43cf2844958730eae45d430d4875473670d3ec1b62f77b9f140be67227ec7644308d72b00b170255322070ae46e382acb5ea0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb7c40323f940792715aa28cfd5e9461
SHA13ecc0c595efad4d9dbbd93ac765da813bcaa6d67
SHA256e1a067b0ee0b8d5618ac6a79229daaf416b4821fada76f4b93be507319709d8e
SHA51294d041f9b142983c92a76dd59f9cfa9a90dc2c0c4dedfe2c009c8713780279fddafd8423057cfa32f1f523edde3cc3b34724ceda5add30325fd04242e975d802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3b9d4d387ad21cf282351bb79e28c40
SHA1884a803fe80e40d2f8d7be5ac90d8c23962e69d6
SHA256e84e881dac239f2eb80275de46705327c47cdb18d5c9e20c3c11c54a2fdddfcf
SHA512c30cb112d773c26ae7f462124b5c7fad4fca95890adabf2602d1cfe02fe8fd0be07e2281c3f35272c250a091dc75acc3eb1b427b41199d3b817121c67cf36537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD593f0ea1f5f6802558777ca0a8f72aac9
SHA12a434648ba32b3ce8fae45296961bf75b6790f28
SHA256e77555c1ab9ffe5298b07e2c22fe52ab9e97cc50ae758f80edbb1edc15415d50
SHA5125a06b561cc9e13d9242d0a72d5089548b4555c37f0105333d03ef2ee463e860d60211f98a7b93657721a79dfc1efbef438ba07301f5b52da6fbfff9f3beb1a29
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b