Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 07:21
Static task
static1
Behavioral task
behavioral1
Sample
27b5196adb4c66c1e5ec8967aea928e4_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
27b5196adb4c66c1e5ec8967aea928e4_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
27b5196adb4c66c1e5ec8967aea928e4_JaffaCakes118.html
-
Size
1KB
-
MD5
27b5196adb4c66c1e5ec8967aea928e4
-
SHA1
e21ab56a1491eb558bfcad6b73e987c4f0ebf8dd
-
SHA256
2dcb6efe0602d21fbdbc0faf13c27dbcaba299dab1240927e8ada418807c0542
-
SHA512
668c1dfc9943550ba716b4e786418245c8bbb549bc0f632aa19cedf4b2a2760e59d17a99a046d4f413f228fd7c04d16b1fb5b2b74735ee37484400497483e5c0
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2099103375cfda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4D6C9D01-3B68-11EF-93D0-F6C828CC4EA3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426412330" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000652987a1353c0ef28821161eb1744fb112f7b026f70b3c0dfe15406d61c7aa86000000000e8000000002000020000000ce8d18d1a562ef01273ad5e876cd492edfcf50bff5a80773ebe895d1763b8cd5200000003e802a87136237fe3eef33b6a2796d4c1acd999704f632c27e959e948290d7f840000000d4f19db819057b917b0872aa594e4ba6055bc3c32898fcfea6deb6fe79df31139b88c0cb5fa06887e50a447f52e2a576ea2809378856ea33d3a9a8ee0cda4468 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2516 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2516 iexplore.exe 2516 iexplore.exe 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE 2920 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2920 2516 iexplore.exe 30 PID 2516 wrote to memory of 2920 2516 iexplore.exe 30 PID 2516 wrote to memory of 2920 2516 iexplore.exe 30 PID 2516 wrote to memory of 2920 2516 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\27b5196adb4c66c1e5ec8967aea928e4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2516 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c10530f0bda26c9d8710af43b875698
SHA12efb4cdea853323f731d2439f39c74bb9cbd8ee0
SHA25639e20a5238d8f4778d0bad391ab74a9ac275a26c02ca7b6315cdbcaf69239ea7
SHA5120d1687d677a8ac30c8b32650f403a5a0f6f540ae9a5723b52f75dd5338c23c9b71ec68f13a7ebe6ae68b6420f304dfa0d8e899ccd3d84820e19f1c43da1699e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5330968fe68476607c95c67712dd613a4
SHA1f5c0a3dfd40094028930df8bc2d8d0b2f616a5c3
SHA256ffd04ab33db04c66b1711c89f233ec0ec745fefe602f35bb1b8c1142a044d122
SHA5123a515507fffb14494f3ac16c2b9ff138bdedd96c1993d498eab845f2c458ff4b3a265109bf2b5f41bde8f7be7f5d558fef6e8dcf45bde2369ae5baee3c0dc9e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7595b2059737c9ee3faafa0c691c45e
SHA1a15e96f49894b6caad015564fc1dfe5ea4c9e87d
SHA2569a6287a795516e1414dfd05978d582faa77bd4d84f56fb9a6c8726b1e3a30f09
SHA51232f49a2c4478112d93aded613c072eae90fea29cd283a8d61e9e23aa5f2a0bbcf0fa6a76015bf82949a3275d0295c875218269b13588df7d50b0a18c6da1a413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5660c83d098ce65ac9cf6e9910191e76a
SHA1b6646600d42bc1e43c1460caec164cf7ce9e794e
SHA256ea4bd9ab15cc5dfb3f5e03224536bde2677f234e78bece95892153c74643fca0
SHA512d56d6aa8b1c84f71e2d448ab5cc0764eed08beddf7a9ebaa2b975f4eb610387147c1ebed67d0ed38519f7612818a65d81fa549c430d29bac04f843ca9e9a46ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542eb7b8a94a9437c6367b044a4d0faa7
SHA197fd64038b683b3a8277f6311097e387a030ddb7
SHA256d0adaa46fa9b91dfcdbf9bdf1f626a49a35b150eb7b35820f0907871931211f3
SHA5124ee2e646b949a35b5cc2ef964ca61f4ca715270fcb1a6cabf89316aaaa5e6316e6ddfba31d37a7f4f9c096aac49214c1f749157956c9079eb0b565c0687c8f55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cd80265a0931067e894387c38818cca
SHA1da55090d52d7a063f0b472977ae224db3e6fc308
SHA25621a3fb708ee9d39de9e901d2ef35199daee65cde0343a35153ae921567975e33
SHA5126190101bbb45c4ab10f1bdd7b1d12d7c9cd483bec0eb3705c467a36f9296085685eab37690d7e1197b2e9946fadd5697e81cab49cc31365b5464d472b80091ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5205bd71a5edca657641cf62571b042
SHA1ef7638ee9e9a93f865e34f4d351cf13e1f4b79fc
SHA256f51cf43d91df52bf99f371c8680e007bc62bc7da09292c039638a4c131f61479
SHA512e17f63cc4e3a49c32a31b5c54c6b91c186555d43f01c7148e7bbe9841bc557031a7ca5f1fa31aeb8ae9645439d8985d3fb91ca755798d6e771705a366a9ee01c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c61c506dc2ce72977c706c49ccd21a89
SHA107d4cb381274ffc67d919ebd78cbef8d28421f51
SHA2566c33c0a7f29e2af96f39210535ce4aae2baecf926856431616059f3032c7c511
SHA5126b63a15127d6cb51823fcaef83294d82cfefa5868030450f86302f176c736b19c6644999e66c27db11b57e2c3b4872b83fbab879c5c752798c34a25f5fbb130b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bc39421e154467942863a75434117a3
SHA102f29f8042b7f57c97312ea887019400dd0e7f83
SHA25697baf110583405bcd44355dd28a0b40a5983585b2160d78a776b5a512778e7a1
SHA51225158f1ebe0cbc036325da0f12418d276db22bfc5a5dce3f70fb2d97e875c8645c8cc83b0e373d8a5b4daab39f2baa8ad2b65516d5b12df276e11bd918ba3c75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c30e6dff1b38ef5ab0cc6b5e5d5e75d
SHA1a24a0d8adcad47953e9871860c9c97f9930326b8
SHA256a5e409e82aeb9976f5b6a99dc76a8566ff7e09800d18a547f19748300315a6f6
SHA512a3708d55903078a246d6cfc988a2b8bf70394b72e0db901a2d7c59b8e2a9f21030f3200e5d4a8e9e7899caf093b2bee1ecd4784c670453595a3e932353ca5036
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be3612040b39b80873c31a9819f12249
SHA16a2776923e94be2828a36bd56c53fcf3624796aa
SHA256c892d63b21f44aa98706786be10461b8df3b4d8706f90ca8d2203e6afccec9e5
SHA512ad500e6d0223b78e6c2cb72ab16a4ee7bd286f7ea89f81559b66af0cc41b0241ab5be231a7f826d2eee57a04acf33e91ef5e0eaaca1a22a50098e4705cceaf7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f281e461511c1c99f7c8ac2a0e9877e2
SHA1abc4d8efff795cce99aee0a11740f468239816e6
SHA25606f0fd2e96fd3aa266cfdc88c77e8264dc0a25e3f887285eb711be18ffb61c50
SHA5125ce1d92ed7b680021c199c585c3aa450cd7755c001e879b7adb806b3c7cf5530773f65807ef3743b241ba41b65f73d8e9a10b57be859546fe65572997416d17b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf02d27a4d6295a78c29f8037c537e1f
SHA12f29af0c8bd35e09a9636a813db186ef82feafad
SHA25608d5c9331066a7aa144a5fb07034064e4cce413bc3d4d75658cb405d21fd147f
SHA512f74b9b9095b90e8d8d6e3f7c0e2afcebdbd84c58a74714ca8e0a200f4de1fc41c076659b05a4802d89d9bcaee17f5ea72f10aab603ff9eb485650510da32dc45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d2661b1a49d6c3749455ca8992f08fc
SHA107dfb349c234ba6108b42d3ea9d3a0adbfb53e21
SHA256774c0c2369d17f09a79273f3e0a309c940a1b7fd0ba3b1e5c81ec11c68797274
SHA512efea0eedbab2efa30eea26830aef5928f9281a4267665d43a351d600dc379e650e481e7445af23e126a51d749dae8568eda00df77af0d90f95ef48f901273666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fd24f3bcfe83e3248c836112680ce3b
SHA1fc37a19385b4a7bed2fda213b7cea20181feb11d
SHA256754a1c26778c1d7dc3d440adecd89ced88d3f27300b23c95fb32fe8bfb703877
SHA5124f4f735b75b17536e698c35ea616683520ce3e359da3f8fe21be2060edee6687c79c24d56b7ee7cf3ccf977b0e0c6cc92c66ec0bb94e9a86199f7966dd1813a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae6dd068ed96d07ef2cacbb65dd86f08
SHA155df0f77d2e0c67ebae4825f92d717c840341b2e
SHA2568dbe42064487ccf7643b94cdd30763c3cf7f654309ccde9f669027a7c8456ed5
SHA5121a4a03b53f27dc7602398a16f37078418e60d93ad15199045ae64c888d36aac23369774ba0946300dbb76fc7a5d70e8cb8b4f3c54bd42a744c38a8b4c7b571e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53da2fbc2910fdab4794ab7c90b449d68
SHA17a7172ee8ff3438998055da90674c64d8be49d76
SHA256a529fbdeb3977cfc146a01148033f4e9a5e7f6b2761b782a8bd9cd7823bea9eb
SHA5123587b97ed85318fb4e50cfef3e25d120143f04ce9b243f3abd662236880f56e48c28dfec577098f41a3acbed8ee6fc76c31fcff2cf409c20272192eb6a4c218c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51260a188c7b50f646a1259eedb9ca8de
SHA10ac2d01ac8cf5f9e0c4adb458bca3126935e57bb
SHA25661eac41ca494f73e7d3efc0927e619061e4db3fe04fdeba065832ad6e0789060
SHA512d376e416d3dc50d6d3fa88519c3151e62fb5317cb9fcd7fcdb8e87e644113ed5867e38ac5aaa50c8f0d66b59769c46b692e984e97d0029d259f0239da176361e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1201ba2932c5e77d06df7128d32cbaa
SHA13c7e65fd6ee423850f778acc65c1f545c2cc0e0b
SHA25696074d90eef34425df90a08a6acaa5f92da3560321eb9cf4e8c3bceb294e3981
SHA51244578f58e6c6d9dea020ab0ac3287782c4b9b3478cd1a10871a4db9ceef4fbdbc3a79e8b318fb234def5dcb3e9d579ab4f8b42f045bb8b458488750dbbf7c4a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd5d6eb13c2d04ae6e0b6803f95be3f5
SHA10cedc7e002918efda5e1ea9ea310e5a5b61e2e11
SHA256c9557b395502bd57b18f3c83fb1310caaf52fd2d4868bc3ac2bb1749d93a2172
SHA512df7c96dada4aa3a872e399618c4814eca10ad8c1d607c460dc23b78c56710224008474fb7b3cded4b69e27978379fd1b51a6c293bf01c4cf0eacce92e082aed8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c369af45f3058bb586c58a4d40e7fa2
SHA18bff99907da4b8bfd36f645dfa5a4a470ebd7854
SHA256d2ae408125de7ff3db345ef496b01ffe356693533454b4e586f52ce97e7c4af6
SHA512ccf59aa52b25623a188e59c8cc869a3187787edc0f80ee40a1b9714d4adb3f538affa8b46dddc0c205f9ed0d7265f8014ef22267ee1dc17c5825ea38c2e77859
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b