Analysis
-
max time kernel
119s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 19:00
Static task
static1
Behavioral task
behavioral1
Sample
d6eabf759b343b1900b959af932e221a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6eabf759b343b1900b959af932e221a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6eabf759b343b1900b959af932e221a_JaffaCakes118.html
-
Size
31KB
-
MD5
d6eabf759b343b1900b959af932e221a
-
SHA1
842af3ceed28ccdab1d9924802a6744e211fb929
-
SHA256
71470b8d04522e7cac2bd68e44df916b6c25438002fd4f467c700fe3ccd3fd99
-
SHA512
13106d98cdd03f555cc08fda589b1163a94596643befcd692b378a883219d403024cc7298e95220f5319ce3c745f84f39f0eecaaf00344e103fa016c92beed30
-
SSDEEP
192:uwndRb5nZnQjxn5Q/SnQieRNn7nQOkEntaAnQTbnJnQmSixRS4i8eFF1twBYk5nL:4Q/U1xLeF62za/D
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432070315" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D175D191-6EDD-11EF-B4D5-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000354f1f5d9bc2781328682e7afd85b9987e41b4ded372e715e6270c44dc462e2e000000000e80000000020000200000002e4da2abba7dd34c1b0700bb596e4d32d9af859ae2402f189c2e8e218ea1e4b32000000015863f64b1ba37e5380447765626d9a252c40d4537e1c8504bda1896802644f540000000a43f739f9d81103176607d1f599ff63dabd23976a23f3b1d8f896d6cbb6ead7792fdd5fe7b4b1073433b4a92d27d177db99f173a472949f797b67b1ca09ba57c iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0a21fa8ea02db01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2332 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2332 iexplore.exe 2332 iexplore.exe 1440 IEXPLORE.EXE 1440 IEXPLORE.EXE 1440 IEXPLORE.EXE 1440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2332 wrote to memory of 1440 2332 iexplore.exe 31 PID 2332 wrote to memory of 1440 2332 iexplore.exe 31 PID 2332 wrote to memory of 1440 2332 iexplore.exe 31 PID 2332 wrote to memory of 1440 2332 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d6eabf759b343b1900b959af932e221a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2332 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4e22395c1429bdc100626cb15282c4e
SHA127389ee52641f502931e5128ab1eee8a2fa59f25
SHA256271bb21bfa2459274ebe0305afd982bfdf7c1b3bd60cbbb2432b08e4f236f929
SHA51201e40a6eb3cf9a9f4d289fe4304bacc8f06366fd9a2d8a95bd39ff8617d874e4952582ab667613b7551aad9b11a35385b3c21b2f25b1f02726a62af9bc6c9306
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c300e2cb6131b9188ed22da0d801746
SHA1cdd0f01a573748c7fc0b79a6695faa9ef6c534c7
SHA25631e8db39ac17cc9f165558e475a94af701cb4d067e31fdf15986c900044b3652
SHA512618fd54e97f232a565e05802a7a13a4279cf834f98aa888f510de01b68bddca8a02ae1871925e6a6e8f27220abf4b1a6e2636e1712153cff91a77727f428596c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bd2e9ed76ed95e3d2e4f5550ec8a818
SHA18d33b2d07772758ee45cbb3f030f1928647c4647
SHA2565c2eaf087c9d1bdd5c0cbd8a10200541dbfec8fff60af417145501b141e81bc1
SHA5121aa034d37b0181c3e834f58d8423afd99966737984ac8ca802260e3d77762c51be5f7fd197202a348ded7225316bd78fb41b1c914e5fa9dd91972ce2cacf6b28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e77ea6e24cb43269e1cb50e9cb1783e
SHA191a547438e8503d59b080c22351f1ddf3f1e4908
SHA25639f1749d96dcb8c5fae5e77f36d6c2e33516fce68e5aa0c3fc6ed2bc7f5eb3c4
SHA512eb79ce8f285808e2fe4a4884052a467cd79c7eb086172f671f693ba6dbaeec37c56dd22697314c7fe0fa4bafd97b4fbf827e1fdb102e5cbc5ff2f803cadc2805
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556f5777630ca05199100affd33f46f40
SHA1b3994a69439293c210f441665e0a65dbc4b849f9
SHA256c80912e345b884311dc83397cc8a94a28c61b1c7535599c5a37dbe605d77e728
SHA512c0041db3fc67ab8e58cba1470abfd56ee92b0de158f3054d9f13528a0ba6ee41fc5ad63c4c84f36792d07526145ebaceeb3b819533fb30a4cc5640cb4fd7a532
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5976adb6e6f25b2cfc292d0febb353d94
SHA11239a0234ae16b0b7bd9e18ceb18a7d0cbc614ba
SHA25615838ce076f0f564dc1322031e1b41f4835300b65c7ee4e6328d2990f1ab7831
SHA512428cfdd41f66275a78691b88148a084afd501da44db76f3dec95a669cb073c6b9732bf7d898fe78deef17cf3712c9dd3ff8ffc736ab781addaeadc781283423a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508222720acb34107a5000254c300b14a
SHA1f3355de681140b50296e19ef56195fb0fa7efa82
SHA256e4415b06757dc9a081587c8e7cc89ef5c10de8e115dbba09f71548cf956a0ceb
SHA5123810f913d4d2b0fb6d5a745d68914da4ca1964950678d9e1f8a68a770c395972a607130c6d25b6501f52d64aff6d9436e1fad15ce02ed3f7a3c25e78ed273118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587e238561162ab2d344fadbf3ebf76bc
SHA1eb27408dad0a2fd49c10c48bb988b08e824c0755
SHA256bcc080ea2a94fc60944143ccff67fb65e1655b0d99b73a4ca25ea7ab17aa063d
SHA512b27bd843e2f279440aaa7a0f46d0dd8a7b3482a8423101fb76c34e43e4c0dc3bc7909911cd1e157705378c9355ee72e9a9e7c66f4b966122993e46094aa2d1e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbdffc6f548a747eb84167a6932d3353
SHA11d7a19abc64643453493fbf3d9d2482671375cc6
SHA2564f3aaea33053662b8bb3e1219de9a68cf8894d7eec72aadd8b51c766d7ad6ca2
SHA5123b98e7ca44e7db0e8365b27c748111cc6a0affa456ee6b946608027fbc5afba5436a7ebb0627e9c45016b1487660df9959f752a0a58c5ab1052d009bef54285a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fec17851d6848d3a605f5b663ffb06b
SHA1662e9653adbc65eb30010f4c87f741646ee10bfd
SHA256e434daa4ae659a035a8127514b6cc01f2ce27ee93f39ec55691bd8e30b0f9682
SHA5123cc4fde1815e3bf134ea4c507fcc464754d402bfc0418ffdc6837e99028ca895c05f409c33ebb0833b8f1088f081f67c09b45d3f7852bfc7aeb25d37bb3542ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbcba031355247fedb591ad5b17d74df
SHA1c3c495e38d4b5e4df88de79b129bf0bf97b2d9de
SHA25684562139f2ac4436552073e0c0d02c4023487842385f6a892313576c096d35e9
SHA512292d62457641f57d7c23d7ce433e063efc21c20337ae27dcaa9ae76655a2d770b279e7a3f2f28a1153ea17fcf18b221153270eaca4a343e6ffc5abcfb4876cc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559522acd6e94602ae68935496c20d0c8
SHA1e6370a6e150709db76e551ff85a0408e5b8c985f
SHA256cf77c092103187ec583457f9d8f93c416219836bb3f84a8da41241ec0a4acd28
SHA512d351eabb3cc5212823306a7c9dd63615af7a8be86d116dd593fe7aa7723b0562c90c0e2394b5db0059ff300abea0a037818c4488d073f9412bbf5725f5d43714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523a2bc77028736af197dd1d01af243a2
SHA152a4fda46ce2cd822b8cd385f2211e08bd3173e6
SHA25626dfdecd48b9ef37c9b8439de8d84aaba3730216fa28aca2a2e8dabe9f21ecfa
SHA512157e1de73bdf99dddceb59e5fb658a7c91609d1a0b1e4db66403dad3cf7ac14f040885c142f4f741aedee965c3ca03435ab3aa58e1ca22d6cd65313d7a82ff01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5230613b941c24bf662e674dddb5f4257
SHA18ce0fff54d730a03f93ba7d406fa6b31c00e6911
SHA256bd4fe4736a184628eb28f6606382f54889634be0cb34da63e76f774c396bcdf5
SHA512e8e23ab52457a1f54b2afcb3bdea9d424ea73695edf42550b52e3d0b9ee9c0e6c05834659bddb2f23287d82cd6d3247728bacb380630654bd5d4059f833ceb6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e857a2418adfa56f2765cb33f5e234f
SHA1ca9ad197d7abbac8ad3174d34acbd2bfdd48ea3b
SHA256be4abec2c335790b8bc6f19ddbf414805ac91ea06c5dd4412adbe714cdd83dbe
SHA51248b22b289bcd5a306c543501ac694e6e100b4ddeb503a250b426f3fe0548ae8964e941df40b27aa07a27d558dc2c2a4a012b6d3b082b0742fb2180263d851108
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571a897fcfa2cea48f2b59d335e43b9ee
SHA19f259616edeb2c80e9ecb0f69adaa0f6867a7ec0
SHA256032af9127f7bad77866b4d44a8495f11da4d7a24e2d3cba597921ed3a74d3954
SHA512d364e09922c513a25d9063f1da0d1ca7b4fe61e00353bd64ad408d0b8a87045d7f3c799c68724867adba05e96a76a36c84a01779c72ff094e0b184164a23b42e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5865b0515560375a9822dea44f3c120f4
SHA1264a33a85779948d874486457f32e4cdbaf98f3b
SHA256f83a00355acb43d6d697796dab56aef9b444441d0f0f207893a73dd4ef66cfff
SHA51265790d7ac1f04944c1db49c99ccd411bda74bd5e4d0f4bc8e06c6227c16bd9695c14461a43413ca66dc4b0d648a46c4f95900a521f6b4a08b3dd7c9c27b5a7b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569898d3223f724e49edf255e476a5133
SHA181689ec357cee73336ff2592389268a64cd8cb38
SHA2563d1ff0f6edf9b0ec35f679640d823fc3fe0a27ed356a3f82b417af81d5d43494
SHA512d4773b25c715828151657098b7e1084b9f965e875bb2b545e83292c78665c5441eb97a4aa0d884518c71b8e8212b6287976f593c877e054a7cdbc4cb7bdf08dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ade44f76f30b676f66696a75d71dadf3
SHA1e5044cbd62eeb73609dd6be94e309223b637b261
SHA256ff663942ba75f435da4375e58405de4bbaa18014a396594c25bfa2da687d173d
SHA512144317ce3ed149a5e87858efd1294ec3d7528f990c08f25f7df5938993f0f60b355c4cf7f9f17d407bac9112cc5bb665d3e152f445d4b730adf5f19d9b5c060a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b