Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 15:36
Static task
static1
Behavioral task
behavioral1
Sample
96afb34ab0bebff13336c9302cb2ef6c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
96afb34ab0bebff13336c9302cb2ef6c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
96afb34ab0bebff13336c9302cb2ef6c_JaffaCakes118.html
-
Size
19KB
-
MD5
96afb34ab0bebff13336c9302cb2ef6c
-
SHA1
29b4ff66f9aea2de3f15d097d083654b6fbdf190
-
SHA256
d29c63a4e83b6fe69369e6d6ef941e81c2eea897609242c5137e088792d8ab92
-
SHA512
1ff62b3cf7c2fd21468ec00c4365d870986ee2d9ffb5332160399e7009eedc06dc5fc610717dccc6a5dd8be1d915a64caaee4668869bcea894edceca51180fc1
-
SSDEEP
384:4+QfPFd9QZBC7mOdM4qtKfpC5IgSnbmFe7AcOX6V2LAPd:Zcd9QZBC7mOdM4/pC5I9nC4VPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c01b88e45feeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000005e127b0ba07bce3ee949c6c898161b8acecb8febc5bb9e6865085d6e098dd99b000000000e80000000020000200000008be17f8e00637325090e3d57e15a036dfda87afd5709d4c2c6298d624d30c6c02000000024cc0c3158343194fd774246649f4f1cd1d112201305e797060b5bfba762d1124000000034bf7b9de89801a218cd1a1d2e60107c1df569b7d1a037adc4b09e55fd76719337545890ce905532b8ae933abaada166ef283d0f1ed1d5da1fc59a9286ea0040 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0DD096B1-5A53-11EF-B062-D6EBA8958965} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429811693" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000f346eafc35e2d76fce37f90c33687375f73b7d5795278839d7f8b0acdb5286d7000000000e800000000200002000000072c45c781492519cc9dca83621ac47bec9a87f8eb9dc0f085c3d0f5994514fe690000000ae83b60d0ba0c07e97b56dfefb28703aa935db4efadc0303714737f30a7dd3ea0496180374af4c1eb13ae20d3b2ee3beaad97d73297929b89477f8fab1fecd3269791fb76430bf51bb6a5daaa0097186c7c14794708ca139e656be053572b1b97c1c2dddf11e3e7535a918f9086bd33f22d08440a0e56e8a5773d23ef57a626626ccf9a277cbcd8ff6ce5bbe712c2e254000000050c1c027fe11b513a48e7e4c668d0e7c0ac85d9c2fa1c137b7f6041a6e9fdb6f72d086909607d1d397be3ad5325faf8b2fbe1cd837e5bbd96c918af712d8fa1f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 624 iexplore.exe 624 iexplore.exe 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE 2168 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 624 wrote to memory of 2168 624 iexplore.exe 30 PID 624 wrote to memory of 2168 624 iexplore.exe 30 PID 624 wrote to memory of 2168 624 iexplore.exe 30 PID 624 wrote to memory of 2168 624 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\96afb34ab0bebff13336c9302cb2ef6c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:624 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2168
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce17956293f860b280cdc8b282c369e2
SHA1d91e4d8af92f6967a04e358d6b0f6f80c6629999
SHA256cf1bd719ef54a6441b47bdc5a4bc28a65f69e228a6acf14ebcb09cc8fb9c1360
SHA5126dd38576b8250861345f321699291001228ad237c47087474d4340b0151294a9b2145e24d87e4484b0d606d1f1b795a858214bebe2e69c216c185b10de8fa7aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513321b8f7ad6dedeed5284d395089084
SHA1b808dc250efb95ec9f43358397a32ec87b3c326e
SHA256bb29255cda8531ad7737b7f9aef11add05e77524d07fe61d712b1cb5840ac443
SHA512ff4fa038bb8397e3baf43a5c47ebe09b7d989460ade93ed7290cbfa617bf4481c4dd7ac3e0df7077b014a890a07f81f4cd312b6c8d7c028fa28f3bf4d966a837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5521c8c048fc708ef41b4c8c2af0a4e1f
SHA1bc8917bbe057a380a78a3fff887b67ae63725739
SHA256bba0faebf4bcd2274f9d7d1e300dc3db19aafd6edc1e85364101cad7a7371595
SHA5120f1d856b982eebf2e665ea0bf75cb4eb5ebceaf9f4ebc50fab1f39eb5e6bb1e63a0d8d66fdec7d3b7065968dfca03477747dbcc7e58f7d426d678c92d5fe942f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f079a1d52bde73474ce7b06411946ba0
SHA1e8ba49efe3c9728aab8d3978232d8a61881679a0
SHA2563876fa4238018b5b31b6b22250a5fd23cccb1e2b812461def7394de3cee03f7e
SHA5124b99989a009c622bf44c97b99b255834d7adac25408ca43b55f9b74aa3208646ade0e43a996464c994f81f802df279d6d014ce85033ecc7c4838b71040a8a2d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dfba72b9aa8deaa8ac908035af0b83a
SHA165fd9c74998a8b4190ffd851ed096cc36cb3d503
SHA2561118bbc6264f6613a43e76c8a110f39cd0054045a4c9dd201eec233a5cd84e60
SHA512dd1128bba956184111719d3e7bc7de75da1a427890ca4a39e89924d5338002ceb5a62e2b4a4542eba0f19b673d7eda14ba5ecea5f8fd9cafbe8313f66e6df830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8a6c9b31c21bf0bf05eb35f2e29cc75
SHA1ddda409b0ca6ceb7d8c79cc39fa0bd76267be539
SHA25613ad6909b9705454259c362c6deba007c09af6880cde079a345a261826f6ee88
SHA512e55142bfbba2c9963d6271ede2629b01bc50c7c1e067d5d7dcba77e555429f14df63af9e02030e42c9448de26609296337152d19d08b7ef6ec732805d7797e72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5979dd92c8cca7afb63450a69357da862
SHA13af2184f0e45fdbcc5f9c0bc37a2e4318d117c14
SHA25633a0035421ade74c61e16209606c64ae9a6c5bca31a30f396b54c6f0ee599ceb
SHA51250e283327113225b39f53ff6d1b3c0ef91af16390b422e08175c2d1492564138e9040d00a1e496e392f92404c9d5cf7811d9c9e80b14b7afe8af334731999b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a14917f73d14f061cff2660df4a07bd1
SHA10425b419c72b7df6f2ef78773a23fe8dc9730c67
SHA256bc037e14fd24655688fa39dddd2b4c2b58ed8cb58725e1ccdddc48b1571999e1
SHA51226b9d149011d6fd952f9a68e44395c8e8918ed9d31a26fc208a010db8ba2743923fedbfc53346091d4090be138309814e9b21058071641512e7695e1912d0a70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5061c1a2cd968f26cb9fe1a5ac563370d
SHA1d64f758266bbae83ee0902360b4460b2ad8dea1f
SHA256f36fcdfca7df00121777540262b9b5e2162d4b98faa6c937b3000ec52edad2be
SHA5127a36d0d8e84ede5f344b5e3a6da18f0bf6ffed99422c12fd061531e1e9c725fdd68838380f563627841947057650ed8f5f615cabfdf7b1b46a7e0e40b95f0a56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8ad225e516340855dc3e99404646db8
SHA19ccb2d5437cd6c15be7c5fdd546981e194861f07
SHA256d815307d7c9be355d4c3d3d0bd87cf335df19eb60c9eef0d498e5cf2ddebf2b1
SHA512e708c7222584a34543db7aafd55f9c10360813b7908676a0306ec910e6b13a8cef48c7a5cac9de4907dcb6f7130120361ec52db35e490a5591cdd720f540438e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dcbf660a83b8b97dfc9d4880f58bf66
SHA1421f226a20e561c15349c65983f09fca39a39c22
SHA256e2429ef6199fffba41b63854e3a21888dd4f7064b6630b1351a577baf9b4dbfc
SHA51245d2579b287a85493c8d5d3f95e539df1eead072962e70773af565f34f9b537d4e07792a76407e28bfc91e6ac4ddcc21f42c1fdde99578e34d843b1584931fa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c1cd369436652cae3c2f6e4d2fc9a46
SHA1dc968cfa8e7a98dbbd5e77d48bd64ee6ee1640af
SHA256533a61a8bc6cb0209fce199b1cb1c3c9ff35f44d0da807f9a30eae3197a5e979
SHA5129035667aa514f5959414ddfc78f594e7ab42c1d79252277b092c3de5cdd47881bfc3c4053befb85176534264a646d84c3b6e86aa7a2292366049c16c151d0edb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5892b4d1166a06de93fffeae99ef7e0d3
SHA1f3e922193185519df66397048c760c0971f9b576
SHA25613593d6995f07a8039b3ac7cbf79bfc1c74be61af045362ae0d7378be61e8b4b
SHA5126138995cb02db150bbe8e4741fefbfdf9cc724c25db18d5681fdafaebfc7cd552655550d0e116f53944b2e5d954c4a4e9e64364edfd2150c9a50a98b6d8a8bbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52035297c68a28de053b4641c04a0c4ca
SHA147a7828eb529004d416989aefaff030810297176
SHA2561f75f3665c225aa6dcd2a373f10b611a3973224fb37e7ff8bb2e4305c86aed8e
SHA5121ccdcf00e20d852d9facd33d0ab46c64ab90b278fd09d850ecb616506b987175e5e520711c2e38c39de86da03d1c65e6164a4788720556e9febe7facb8b5424c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fefdd5224de58096023ad29f4896f4b3
SHA139c1aed687cdf73610521f6799bd2ffd11928d5b
SHA256ea871c0f48bc9187f874ae87efac6aee037815dca0b119bea45a9fcadd50b341
SHA5124b189d47187c3b285b6623f52a2a0f4c1cea715cc4d89cbeb03201578315e73000e7659853136e99809945510ca98f321e75e2ac8cffa3af7937acb7eaf2797b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce8d31f2aedfbe82d6294486398281b3
SHA1189ae1ce965cfdaee3eda720583ae13b5046cca0
SHA2564bc647d809ee6a4f20bfe39601081b202464f567a68f0722bec996c3ca77236c
SHA512f8097200b905a19ef1436fb2bc08a2a9ab47b233cdebe278fd48d9a1003ceebd6a68e20f5b8424f23da30c8c0d2cf8961ed413f036c5cfbb2c329211324e5362
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50175a0acaa7d963207137b3003ccdd9a
SHA10e835bc81e54c38032d585b16577cd4b870047c7
SHA256985ce599a51ec89bcb2cee1372fb2e0050ef1efafb07fdbd0600caf952266509
SHA512d3e1bd4fa82fca3c99c77369e06ca576e8725191d0cc622db6b123a57f5f2753f08939720ac66461f091dd7684c90ee9d9b40f2776105915fc41ea241eb596d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5867c42aac469c94d4163b4877a4852cc
SHA1b666a0b1118d29c5734b82be226899a28781bd6d
SHA2565ec9e4f828a9d80d940fc66488a9facc5f9e57d2b6d4eae067627a88d3f5131e
SHA51242780f603d510d2494dd2329aa6d6e576489b49195d578ad42730dbe418da623cc240ab380e27684f7147b2d0aa9b9564b87710333cfc1201f0cca13891f52b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57469bdae0b9d027850313f179e50d0bb
SHA1e5ed16055f60654f32dc9346df6b37c35be0055b
SHA25647224bf39aa2331a0c73c92914a43596b647b4b730cd25cb3bc10351d12f339e
SHA512bc8ca1d479e57518d9e532dc3c81b96f75001afc6b246b8ec0b937ba58217b40013f9be62cd1cbd01d2c26aacf83d99c0992d9c83c0ea8ed601aeffb53ad923c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b