Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 11:47
Static task
static1
Behavioral task
behavioral1
Sample
17f4a4874518bc01ea0e7a13d9f8c1db_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17f4a4874518bc01ea0e7a13d9f8c1db_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
17f4a4874518bc01ea0e7a13d9f8c1db_JaffaCakes118.html
-
Size
19KB
-
MD5
17f4a4874518bc01ea0e7a13d9f8c1db
-
SHA1
b9f6a5c26bfb05521ba7048f863b4a0956c97324
-
SHA256
c6cc35ecdd6237b5f9dc2666980ac1eb7a6df52329d9ee32418f1602ba919d45
-
SHA512
fc137cfd5fa007c1ba2696f4c2ab974565f0897c5664a34d6feca0425eb0b3fd05c7f193dfae107a4ec8210090f85e559db396ef71fe096aeab705f3fc64e443
-
SSDEEP
192:Zygqi0g8g1LfkzJXnkl5He43AyBv4wqavDcjqE2Osdk4ttoMVZQtjPMCY80pzLW0:Zygp3/1sXMxt7CtjPaTi3g
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000286c4e56dfc16c70401b23a3acee294c8cd5585e96db96250ce48913656352de000000000e80000000020000200000000bc7d848c015c3b859b50d57bc28a51d93b74b9ce8401b1f82ed14707618451d2000000072949016d95e797c3ce87ed508a39806e574029439d82068c382da33235a4a0e40000000194fe30bbde46bb898bc04c2da93dedb85c1d59536399b715add8c15d2281d2c4db4e91f1df22c5edd7f6a2e327117f66fc4c823358f3f1a23ae25bd8cff52c1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434377145" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0febeb3e517db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D511B201-83D8-11EF-BDBD-E62D5E492327} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2332 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2332 iexplore.exe 2332 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2304 2332 iexplore.exe 30 PID 2332 wrote to memory of 2304 2332 iexplore.exe 30 PID 2332 wrote to memory of 2304 2332 iexplore.exe 30 PID 2332 wrote to memory of 2304 2332 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\17f4a4874518bc01ea0e7a13d9f8c1db_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2332 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ee5ca3491945fbdfaa696915816349c
SHA1e452977131d050b70329f54bfbda66c50aefe3b3
SHA2560243536da0045776eafb7c8e2d4c0aafb33c827c75a92bcc9628d78631396393
SHA512e5d3794cd072ba51d8b69d173a072a691f9ce6e6dfc5f36327fdc36b126de45b0971fd920872da33f15b1b244463f964e30d3cf1864bca647e743ac4ecbdb6eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51087c7ef819330e57ac9c7472da17d0b
SHA1515ae9065e409f90ca812727df59b79dffcb1f7d
SHA256b0b93fd96edff2428ccbaab57917ebb8aaf1df51f45da367c77286cff7d7473a
SHA512aa44e89ac7839a9b1160b0a14ea00d0386ae2588b10ea03f7a7e2afddb34e88ccb09b39e68fa44e42b798c3562d6c7e292687d41b6f15966ebcb3e5aa26c8f8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c2a4714bd05490e4cb21c9686d8ea40
SHA136e012f46b45c8dee9e9ce76ef2694e89f3ed2ea
SHA256cae0b0ec4cfa607ad12a544b0ad628910a71b99b37ccc07ae7b711148db80843
SHA512cedc142e6ae83ef6bbbbf0d73600c233931cba698b880026664a921d23aa31f2ce5285e53e2976fe9f58d4f992fcee5f352afeb7e06ab99bec631e747342bb69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9e522958f14682e0b1b2f59a16be506
SHA12b2d8a6095e8074e66cef90e46a500313a7707b2
SHA256fef9aee5a98a951c2781adf3662145a544201ef4fb70d7a354e7f84afcc058ed
SHA512eb3ffb6fd9c2b04053558d791d104a5bae73cb28b1e5d11de2040f50eff7072755469bd47e24bcc3d7044534be4f0d70cb28138352c6748b5fe6c617b5e4a77b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f8e682168f1c8a3c59f958ad38afe78
SHA1f8571189653227369b9cc5ec3b27356e6ad1e175
SHA25651652c357143e050c71a9737ba3c2d97c3b7f98c779f79cdada0ea5a50dbb0ae
SHA5121a5e293ab11d9429c95e3ab79cb6777374b5bb182ca84c5cf74e88259ff7c50176d0e0e5f839fb38aba126104cdc37ed277434d10a703f18b9e8805ecfb76dba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ce6871434235f68fd07a7a6f69c4afe
SHA15971b0a58131575e2cf9803739da68f706f8045e
SHA25601cfebd3ee61d5b7f09276680b07361db0892b868445c26f991455f7f6b26cfe
SHA512c8ad03e185bd39c811ca02c1595c1e90680a0ab0baa61fb3a55c2b9f261eaac86f89c5d27c3e0085f1cf292c2df4845cd9bd8d498527cbd7ed252e15f109407f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51659c4f380b9f7e67761aeae2ed9d2e7
SHA1bf8d21f9dbd163b4edb1887c68f603b2f1bd49f4
SHA25616adb0fc4abfd55e43dffd94dea9a88db0ec552d5eb4132ecc257cb010c98cee
SHA5126a84c862a52cce09e51545346fee614517e9f74b0e3ee56f71ff921ef7362ab3c9449a54c1446838a88940dc3d0ad01f6e9a5956f41fbecbc75942da09fc804f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f2fbe9bd165980e8da566f575138b6c
SHA18e0565488af6712682908ad1750faa3aa702e2a3
SHA256bfac92ff47ee51d405fd72540fcf0c7b04a1271baf852635578658bf593969de
SHA51212350a9edf32ce9ca9d6d2047fc41f30c456bd29f0dd338eea5ba452d884140bb08394137ce397d4e6b2b64333542d4311d5d5c89afb9d193c1c519854b7f636
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5662e01c2eb37b60fa3be742e0063a9b0
SHA10a42a5c06163ef188c143b11f76e20b07fd034b6
SHA256b6e5bcc20cc8d1af5083403128173320e11bf7405a69dc83c4981993649e8601
SHA512be9506d889440b1f648f220e46112aa8dc47e594c868e57ade5c13a1a92ed9ab5cb1f6c5a328b0bfb54ee4af09382073b791e50b5ec2aad957b754b60dd45808
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5880c4f87dd62de6689dac548384586b9
SHA1af3cbe911a4214e4a2670ef75be2c61be3bd8d6f
SHA256099301bba6d41eaade999356e9d4b40e4c090dffc763fb5adce673869908eca4
SHA51265683b945566c2dfc90b3541c581a164a569ada9e14af26e835b39e1b98764eaf590d0619cb1a870fb38f89d9b92efdeba9281d78387653291cab25242535da5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571b5a8fe312bdae6c7e48a1feda2cf78
SHA15960143e49a0d7317ae0163a2bd134bda15fa416
SHA2569fc3a9874a7378005592a5ddfb022f8a5ce074ccad0d2c67e9a4fe124ceed96e
SHA51217f5d7d4823b25f782750b5dfa1370512ddb602b29ad5d37de212e06be20bd8115e31c52563af4c236e8c9cfd0fc3c50cfb03cbe19edf3671c9b15f11a4c7a9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5052d7360332f278d4440d9ff2e0242d8
SHA15e16536230dde5e46aca0da6043a3cea6806a4c2
SHA25634835f9d0b3801dba6604092866c211020bf16860b07b19d482a093edc3cb1a4
SHA512bfe73fa895fc8aefaba1d8b6ed2ba709a7f317c1e78dc00bf2accdda1563c3c24403f126ed81b4ed21d09542486bffe9bf2090cbe63f5b15935c191793c33ec8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eb9eacd4bf08259bc1788630158478e
SHA1c090870798f3f55446878f6ddca3b0549f2c33ee
SHA2565fd9acf71545b0a977917645f3fb3354f7a353729f8ea2a587a5523fd52b2237
SHA512977c77b2b57e3577733ac09a5b757099cda4209a75b490692d540a593f714d13ee8e19e1c7a6908a26b12c03cac7ea1fe423898991451c52b0900082cd8004e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f0a14965e722228fafd68165ab843be
SHA1e6d1e9605aeaf3f6d8ef7df3ca58120e2484406e
SHA256676c63c754c4640acf1c40671975b5298df5b53f8e4d0412b3aba4256cd54c32
SHA512203a36ba51efd42898097f90c0dc7c8111ece3b14f7cf6d3f5f33906ea4cfa6f57c4f1aa05f04b37ee92fc9e9c0824dd4a59e8e7bb5f3b38256fc380fcc900f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e1fe5baf0048ddbf7397c1040c21e06
SHA16d75e203be7766605fa9ae2e4536185d1ef310f4
SHA2560145707821a01b04a71e716218e31c82ee584caed02186c9c5bbabb3c1e69c7e
SHA5120c0febb445de0fd4b11d16ee3aa4210f3f81cfc50c67e2b0fe557fb0a2b7a4e291c720107567e4c424ae70de93886d702a8f40c9fd794968baac28b21c99df05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5627f2a76c0532d2d909adc2d2eb9908f
SHA134a0c0aa3e9ed4f7f3a82f3ed663d723acbd5b56
SHA2563213537b29fe84f60c163f9db1f65e1cf1f0c8855a241f279a915706e9db5654
SHA51200ebe420ae0cf687165f2d10a354f87cdbfcd40e630eb047646e152c718451848ab576cd134b133c2c55c69937f9af79fe59bd56072fea5bb8010f6c74a3076c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505916548a5d7b956ab02a5fae3123f0b
SHA1135cef0b27f5a613c0e14eaebeb9286c45d95a90
SHA25658adcb067642200ff659bc25311d34ebf1ba5b4123284c2b7025d3b90d41c8fc
SHA5122e860f1bf48af5ce43b28f8de0d4583d7594878444a5115e8a74f7f9c37f3d8926c04977b258f0c1da5cb92e41b470c97a06791c3f9de6d9f855ca8942d03042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59599ff87c2ef625a498f55899af24b3d
SHA1f25822768bf0ebd9de4b298c45033322a42088e3
SHA2566432d59d126b6591feb4dd6007454a87ccd467f83a891049410f64f459094d24
SHA512296c32ab2af202e35ddaa43a2409bb7102bb7f1c6a99229c19682f5a719e6e98c756eaba69c585007f2a29a7c1ba8fdc723a0862a15f89d843bc1b10c7cbce74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdde91f7c6c732517cfbbda9d02fd951
SHA1894ac484cf89aa57959b6115aa09e81530ef3e96
SHA2565fcc3fdbbae8cf2db0df4ab471fef3484e415069855af5567cf3cab79f576a58
SHA512ec636eb08952974043739f94254f10739d64e4da7284cbd753913943dd42d19e6b7c0a5186ff4940a24b4bab4b69b81972891f1832f4a2bcfeb6877ff163f390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef2cc7628e7f8296830ed8584a52c305
SHA18f9a65c554a3d4f53bafe070f658421d21775988
SHA256c91b2187941bf96c1ab9cf4b037fc3d99aa002b5fa1740f9de7ce07aa10564ed
SHA512020c72b263ed857f1878b525fce6ca641b71718d91d7100e5cc21dbdaf7f0550d5bbd32785c37fe6b0cc08400d6754576fe62e38f6e17b6508b4d2a6cc3c1d53
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b