Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 03:24
Static task
static1
Behavioral task
behavioral1
Sample
dbb96fc4330071110466b685ae72b8a3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbb96fc4330071110466b685ae72b8a3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dbb96fc4330071110466b685ae72b8a3_JaffaCakes118.html
-
Size
460KB
-
MD5
dbb96fc4330071110466b685ae72b8a3
-
SHA1
ef1eb53bc57c9079ae026a482b853d3a904be68c
-
SHA256
63f41a5728c683ce117dc423123b0d627c0a2e6db278957ba0ff8633676ab073
-
SHA512
54242b72af63c2214c0f6bb50a934b9b24d4b896606ec6fbfa7a95e0ee474d7272c511863fd3403c3170a2e3901e64f7cbacb9a10d22b5b6b3a15038f4f55baa
-
SSDEEP
6144:SbsMYod+X3oI+YwsMYod+X3oI+YJsMYod+X3oI+YLsMYod+X3oI+YQ:i5d+X3U5d+X3X5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000003a3083095854583307c977834a5b8925c241cdf29c0b6d5c295d81fcfe5826d7000000000e80000000020000200000002b98350bc52ab610087ede909c48185bae42c6efc37291336fc86b8e403bbfae900000006062742837bd36010b10db822678e01b928d54322849f25aec1cd54bb1f3e8725c98678d7297c31b87928b6eb649d946ec6abebab15f9ff3c8a8c85d6dc66e84e0c781cc2e081f2948ae0aefe3023db9b82d1a19d1c2d34c918a52e40ede9cef836bf4a906681c36430410b171de10edd045b1939d8d526b924cbbebb8de3b380b57921bf108d9a9f1931c3cb2f8d813400000000ecb52be58826071e346317a798826c124c74d6481bea42ea36e3ca35934de6f815d8e9467830ecc473479a1b146a7918cfd122a7afade605bc80fa991f75008 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432273315" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{78AD8051-70B6-11EF-B8EC-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0f33d51c304db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000007a5dce0a1b2c31423cff7a9542540538205913d2f2bdb5715205b13e54ba2103000000000e8000000002000020000000dcf0528a68172177ea487a1bd7374e2692f20b00ac719d831d1a7f8cf7bc151020000000269aaca94f337700ac12c45787afef93b47a0af12487c0c22a8dfce3295ec01f400000009bdea92bbbf1125683e23cf472203dc3dcd0854ff1765c6f92c335544252d7dd4e28925d5d05885a76dcc65b613348ff1f05711430a9b8e8d3806b3c70986ca9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2216 iexplore.exe 2216 iexplore.exe 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2652 2216 iexplore.exe 30 PID 2216 wrote to memory of 2652 2216 iexplore.exe 30 PID 2216 wrote to memory of 2652 2216 iexplore.exe 30 PID 2216 wrote to memory of 2652 2216 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dbb96fc4330071110466b685ae72b8a3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2216 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517616de1960d4da51f0728f1eaf08337
SHA1411aa68f481c98fc95272e0744423bd0744ac472
SHA2565c04d9cba3a3b945c14fcb2c559b82fed7fe9c2b4b51e36ae4211acffdff04bb
SHA512280a7c52d7c31a311fd0504bdfe67b641e9b0ad9b8edc44678c52382b537a56760913cd05a0b28942dd3d9c57b82c63413a94af54c00cfa9355fdb2b0f0e13ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ced3c126df7e755750e40c57fdc2ec5
SHA1990ea60d59b12eb65f6a80bb12e50afd8184cb25
SHA256ce2c41779ae61d6b65aaf2144a0ccc05272a4fc98d8365a44d1ca6931b203ffe
SHA5120e2fd7f25cf3111009cde5b162defde897273752e12f2ef9c6e17ae6816c5dc05edef0d9b53707acfdbe404e867716c2458b3dacf74593e99b6937509cb9f020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae289f365fd5867b300e6f9cfb6f133f
SHA14cfb351513529bb7f9a16b8010a277a221f81ea3
SHA2567c08fe81c948876b7b86d6f1c9f03af1e100ae8b79191449d5d83747e7f03a32
SHA512e8416ef597efc0fd69330f8db75ee16228073581852d6a49e44f3cae864de747406f1cd557235188929736869cdc6a9f05083321277673e7d240ec24f7f7f6bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505292f110364c80f85a6cf9f066b7765
SHA1add34fbd265e504177f4264abff1913f43788c32
SHA256ac3b6655f06b5d7a30d8acaa2d671bb7878cf16d6763d28571e7d6b5be8addf1
SHA51247fd5198c74f94d4951d9761e8870c5b18a44bbe69272e5e4b6fdeadd50a86b855bd0aa25b1c94e2ebe0cf9f6741420e6db54802f0d83b200a0a76655bc0aca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1ef9a944cb55e42d81ef1560f0e22f5
SHA192e6ac02b3ec977cd3d08d205b952871079129a9
SHA2562e13be4918a958f514d54b16c9ff88ff791d3e084798a4c460d3a4afb678113d
SHA512ea48d7895fe25af5c235946146dd837bdcc039cf1fef0d962d2666130bf3504dffba29c604a5a80724aedc7e1a8375b1c404ed811d6a12a1de5423a8ebe9095f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd137e12f20e2186d063a2a1b09ea027
SHA128f0ad6f0589c52fa9bd119f7530463bef680941
SHA256acebe901cae98395febe05827a5d0d400f8ec70fc95370cc14e07731b2128c0d
SHA5123c4921b5f0cba101a1b9a1bbfdff7ca6c4fe983d087cb74d399dfbd0832d6116fda65c202c1f4ce7f530350f2ee72470a0f56de721f0b7096173e204c8f02ca6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522ed0bc8deed8e71f08bc31f48a3e726
SHA169b4acdd748620a7d3ce3ee2c8671bd3e91327b0
SHA256a38950d6d3bb5cfbaa4fae7b9fb564f280e50d7e43d5257bf54113ed846b7584
SHA512e7490d20cc4019e323eb37eaffc8dd2a89386c4b890d0616b747ee1836af7ee9245b37f57a40d6443f59549fa612160717548d4037f8097bf095f9f66575f9bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4a617488b2f6c72d2877ce32d1def15
SHA154b2807ef526779d3bf186bded58ce5fb7ca8dbf
SHA2565e65c66324f72c9eb91eb846e7a07ae886349326af26a15ba055adc2af3dbaac
SHA512b54e839d8dea75cae89b7aa07972a7981fdba58af883284c90c951cb850a1682f3ae8b7e115b5abfffad526795aa436820e0f8f43ec1c74b15a24b502534f4f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52064d9111e8134beef561ca3993793b2
SHA1fd7d411cb0484d0ff854de53187114175182e471
SHA256b746f7f02f2dc5577ea4f83ab0f1046472a1dac182ba35a56309fb8ec5efb102
SHA5126e6c4b6804b0a9160add0cc00c3742a09dba4df805b375e8e6c7aacbf4abc338d8df0bbdba29918887d20a21c0a5f581acf03db235e2dc7d42d4e710fd18577f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589920a3223633f6ba27c039c606a4a15
SHA13b9d8fa3436410d963ec6ab9808b0ce7b1fd2935
SHA256c575a7fee84af7721b5fff9f36fb9ec174f97b86617f1acbc18a420f9202e232
SHA512e70ebc2774f9bb9fcc1bf8f64f866203d4291ca3dc09924906d7f091d0640f3e853307d7527f33b678bcf87cb3fc5de2f23a861770b12c2b8a7463df167157b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54290ef0c62cdf0dde29334685ae746eb
SHA1d54f40fc87e8a6db1bf2f9e5a7525cb61dfae6a7
SHA256f5b44031dcfdf05712b7927613130b1a5cfda5f0f46962834ce33c0fc1906757
SHA5125b8f99746f11b4a713147a73530df99bcdb503d8ddd96dfd702d445ab2253db5129715a63bdc80f193a57756a1578152044cf0fa0f7d86f19404ec4e1c9e04ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af48a449226ff0f5c6477b3b69295403
SHA1a8021e4c2c5b875deec065677c085dfcd1eac9ee
SHA2560b513f64ad276d245eed19f0422fb446553b18b1d45c990c3be994d16b64f11c
SHA51246bbbb0a0e00997bf64e9aca547a3b359d6a912a13076abc54963455369cb1ed835b48dfbef6e0b68dd909a6590762723f24d22c1f636d8d3927a8d4cd2f74d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515330302a41ae76d2b6486c67b1d6693
SHA15781e82ab9b9f414ac2503af9c5185fe64586812
SHA256b7988c2c939fe43bbebe66d8d0f82abeeb8128bc56dd263aedc907fbfc8fdde9
SHA51291be7794a1f59f949039a900d2337eeec956233ac037deaa86a04bc7ec681c2552b2b26e6b3697f91e807219b609473fb02cc148afc53e12a3ae0d391c16f091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57813071b21c96e9be8ff506d8326d94c
SHA10994ee41be134b3e55d9fcea0be829dd200d21d2
SHA256aa09a3b9e178bfbee55b0d9d7e028ad0831fb56002dc30dd63d8bbc58a975ff0
SHA5126d1c938820289412980d459580fb1b59ab016d99a623fc04ba649fe68235aae16e8726ed6330f95fcd7fec3a5d0d6f741c5d02b7b5f6510fc5562ebd7be690b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e9b9b1cd8fac28a1254a3230693b9f1
SHA16390b3649c399c912eff997fde3c47fcc01d42e9
SHA2562e6370ffc2831f60e675203ef360dc839633341ae65d174f5cb490feeef3da4e
SHA512c1140f2727d4921fdab6dcc7717daa7ce7b684fe028d7b33eb7dec644a540b04c8c65a380a2b9e23589041d3c215ccf34d94ae0dd51bcd64b918eaebb94c2373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b34478c88538774121a99919ec91cfd0
SHA1c97bb0dc44684eb0db6e577c3dd57e2d11b28ce8
SHA25675eb6fad50a2496b571387c3e7706bbd33e60852482358a8946735c7488e1863
SHA51218221038e7d6190d4ddefc26aadb4dfe3edd7cb31222d15e891ca36a19523943bfdbefd614a427aceed9a466a16b6f46b762b9af3ca2839fbdc681effa48865b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572891450793ecb29f78e600bd8b061d3
SHA118c181391adc89ae3d84c979f563cde17630fba0
SHA25650cde996e4a3fa4c4bf441ea0068c44ec5947662fdec260f6d04e1672fc3a439
SHA51239f9a12a29e1aac4ce53ab8842673f75816b80e5ece54b05e7c68e4b205a3a227fef56ad7050f3bb064f1b45fb81f671f4dee2e25e034836db4b2bbf92083e69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a83681124db9f5ba53941f8c6fc9d912
SHA133be15a58b7cd6ef31a64b324041a0cad86b883f
SHA25691ef1d64c22818518dd30277879034bc9140d1d4803cbf9e6cda3bf742494e4f
SHA51294e8abb5e436e264e985198fe7e1b25fb775396b535430fbf4ea3b5fee0a66674da1e350658f7c0156df370e83dfa5f5d165b10dae95e8f635b739e6546b30d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc72372b6c3241908a67429303c98576
SHA1626f14f52d91765eabcce64bcf0916806655d067
SHA25695bf15f40ea9de881c76637a9cdd9ef576bc021cc250085b8ec86a719e70f304
SHA51228a94412a7cc115716f9365b263ca9036e4d1c0000e24c0858472605c489c6b5aee1c674b72ddf6d63ab36da984f6456fd487f02856a2c84e3514781c318558f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b