Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 01:52
Static task
static1
Behavioral task
behavioral1
Sample
df471dab190d14f478855d42881bc37c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df471dab190d14f478855d42881bc37c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df471dab190d14f478855d42881bc37c_JaffaCakes118.html
-
Size
66KB
-
MD5
df471dab190d14f478855d42881bc37c
-
SHA1
4cfd7c6f812d142c54dec27e0d4b5adcbaaf8de0
-
SHA256
41663e73b748c11023771bbd34b8afb8237a2f8d0bf737978504fbbfa6ed4668
-
SHA512
2172e7db64004d9cee47adc066a67d65f054b7d7d630bc77754271f96396b348b4e868ae921ac66ce0ae92ecafda3f38a55017324be6f2d85329de0802d0d6d1
-
SSDEEP
1536:SuSkkzPRPo1vb/kVkSK60lbdPoZzZ2wQzRekpFbN711cX:SuSNRPo1vb/kVkSK60lbdPomTzRDFbNs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000002be60f6d35ec82218c3dd0f8c8d85856bd85aee5f91c850ac52389fc4f16d2c7000000000e800000000200002000000075913d185b11c65fb7227be2774e8ccde8c759eb387cf7f641319d82f02f1aed9000000065d2211c37f7343001fdcf928fd05669e39f3e53cced729a71d339ee64c43b37bad68a83aae2aa1d4e57cb1a1c13127bad65dbf055021e865150d959882ac4b38ddbdc0b8acc4fafaedb3fdc481ffcca4c567f651b5a5b1cef6cc2ce4e05de106128bbafec3643c6dab2059a05db3c14812fa7217d5661e28743b585d4032ed01a589b3d48ffbdb9720cc338856a341b40000000f5270ee63266556f4ade9071b59a57c65e543c1df262be4389224f3840805fe6010fe75c84eddab697bece4e1f62d4defc526fc98cbeff33d73434783a70dcdd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FA785DE1-723B-11EF-B909-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432440607" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a049abd04806db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000002d0327016643b3477f88a28c1979d5f1dc137f293f4e4424e1b658f282677727000000000e8000000002000020000000928f01e180b19dd330a5af0e9c48148eec0bb2ec430459da36ba4fd5fdc7cab720000000ce3f41bacf2443c6547e57b5a34603e127a3c7eef8a0ad5eaa895020ab8686ad40000000046a24c006d264fda8b319b4ad107414e9460fac5b319562d58d202e4875d89201dd8b318fb3a6cd77f75e0a4d65241527078713bbd362595e630f5e52f2be5a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE 2084 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2084 2072 iexplore.exe 30 PID 2072 wrote to memory of 2084 2072 iexplore.exe 30 PID 2072 wrote to memory of 2084 2072 iexplore.exe 30 PID 2072 wrote to memory of 2084 2072 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df471dab190d14f478855d42881bc37c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f37d51cbcfa6cdaeb63261a5995c900c
SHA10e58adb0199ae6a877a5d349301c06eedb28a325
SHA2560277cbf7b8b34eab7cbb608d9a6d44944d40d98e510034b3238d94aa71482846
SHA51252c161bab19c30b8c5a6253acfc57e321e9bd319034f40e389c4412dce878fa0a627cddfa9ded97f8fa362eb338480ba3d00385c282f56917395f0d1f8883ed1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53401621ab13f6e8b3548956a7b95d333
SHA1951cb4d96a5b5184eac966c4fcc9c989908cc9a2
SHA256cc217a96313e0bdf33aab7f77b16d51379eb86fbf43cc98a89548ee75955791c
SHA5127c92362442db7836790ac4a02860dacc05e81487af4eda3dbd872e95f598a36bca8e902e021ec6fbc3686b4e245ed7abc093449684c32c226b502620337dccd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557ee0bf550e09297de12166af3e878b4
SHA1f29f56571bfb147317c53c06b8786aded75fade6
SHA2564bf02dad431fcbee6914eb358e848d2e47432610e0a5916464fd56f173e799cb
SHA512d98437bfd9a32c5c42c83ab8930c30a5eca9c248a837bc6678ec88df05a5f645f453c55d2fd763cae5b219d7137e25a063f7e70a915dcf8560e7f585830c8f5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f570bd128c778dda953dfd10dc9afea
SHA1f8e4321baa8dd064736b3d51c215ef82bfc9de23
SHA25648db4b25a0799e66a325fcb68954793a9b15fe9777e9c062469d723297db9413
SHA512c0665741cfa8bfe2e649b82ae29e81831f284c89c9eeb60741ef1566033c8a6841777e03f0bd737930a471b2f1437b93b2c85da9cad2d2e8c3086917b45a691d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f6a9670b8af10351522cef3a7148129
SHA197729f7589e4d959870d2066cdbdc3755295f338
SHA2560cc408f347b40b4d7f9abb39255136654bf04c85d803bfb6f6233d0dfb780bdc
SHA5127710ef837c9e07487c3f892b1ac2b88db2e0307e716a1b93c62fbb78b93a633b2e9471d75e9c938a981248de3c0a2dc2c04258a25cdfe50ae412a9b94300d438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59206741608112e3d261f0901468fa085
SHA13c3e64f4a919ada660148c8cd081020b4b786346
SHA256abd59dff0c64945d07a685cd8eef51becb1db1fd73383266c09286a5e18dd87c
SHA51246aeacd54ef81908f751507037c5f38c42d8d1588790a57e33052906ce433adc057badcf2a279b5b60218ed5456231c402a7bdb863beed9878f68eac1b16ac23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d82775d84cd2466b0b2d2ab810c5097
SHA18791e344661d1523edaed0d0afbb7fda18667a0e
SHA2567dc021658e51dfb8b260798d9fa62f2d1654cc1a8f6eab393a8230686495ceef
SHA512859dadbd2bf1d20fe2a4af8f949a511fed1f4d6689e18a8c916f6d548b51bf3bf6c4a632b2fc723d71b528a0cfafb4b1823cd782b12ec9d172e6433e53d5b910
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513fc2861a94148339bb71d27cfdfc26f
SHA1dc076d9f33c470bf46a9b6cda31d9ad3185e8d6f
SHA25607ae1dd6b6a3bc27b325b96e887d6d82a6e8111b8fce462bf7d1df413b0064d3
SHA512c4acd2406b84963221130d00709d464dcfd3774086d8665d2a6eb1c0ac8a773fab2321578b9a23060387435958fd6676c58a2ef9fc2f61afacc0e675667b14fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD520cf72eb1f9018359ecb8a06f3f32afa
SHA1d10f90d6e87608b076a0d34423c8bbabc160f3d4
SHA256d1bbb9853421f86cf433fbb0ca9ba68376a6487a3298a92e7b6fa2a2c88f0ed3
SHA5121c0e4745970f3f8be94dc60c3ea06a496cfe67f2e1b905d1d67e0dd5925e3ce20753123a74bea8e1714f537dbecb1e1350bdc1c1cea0d01f94141f713ba55adf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dc4309dcb40e2737f1ae14bf49e5a38
SHA147f8abc95a5e616d2d259cee3ca755fa6f77711b
SHA2563dce12628fea8d06abe8067fce65426c6dae9023cc85ec702658aaa4019c9c6b
SHA5122a90f5aeaad53d4ffc69f26ee32a9301e1d8daa4a96497a0402f544d357c3fb871caafff116c00a14496935cf391ed3717cc68e4d683be1ef2da05c1d36db9a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594463301f5dfaef0de7413ebac53a90c
SHA1b07f3b1678d81dfa5e5a030a6a0adaaf7fd566f1
SHA256201a2376f8936fe65f571cfb4a7baa1c38b2c628f093110022262ee4389fc2e0
SHA5128eca33873e76120b6fc25537966dad51745d55c8a20c7d3616448cfde60f65d1a9ff1aa061866b712b04fee267093908fad3cfc2c5a9021778f0d11b10459153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b9fbd7e4b2789f611babed39873c42f
SHA1c9103c35609e974c6a792b78417009b41f39e051
SHA25639fcb42843788a19396c8763f14bd9d759701dc23ec6632bc296a62afebd1f27
SHA51220e1edbfcd2a3ab8984d88eba3d271c95d12fac5899b930d130f8a54aeb574dac3ed0c37acf018c195cfab9e5429841450d63950d92d5f6fc3c8146cb3cbd8b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f553c9abe1df2cbe57d9cfa887642594
SHA1294708faa5597e4dfe05626f59709859c85b817b
SHA25623e782823d60409a2089b225947ed64c08d8dbf4c5273af80b2c767b39bef39b
SHA512474490e3167157f1d33876b429d147d2f2abd8e344c0fad56b830eff2c50975e66f870b1c1e599766a3ab9e578f6ee5ddb2fbc4dab54552581775a9cf425bf01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b370ff92062696fb5cf35049f53a714a
SHA1ad1d425737bd9c9185b9166a78415d9d1ceb3af1
SHA256d4f13853e87fa9009e981138af2da45227c500da0a0de20bd3b530b935ac152d
SHA51287bd55c93c0a5dea23bcf1db5600ac2cce068f081337b23dadbb74dac65dbe61203a2cefa1b11b6d2f6f756f89d1185454d557fb9c1dee9bfa78331a9520a39e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575e185100a38f787684372236ae67968
SHA18002bbe69ec4a5991426f6c46221cf0d9483390a
SHA256b82989d8b7bfd824c94f50d1427a5dd3552cb1f52c743ec0e79f5094bafb6344
SHA5123af2babc8a4a217ff16a4348d5d5e5706f45b6eda28c844171c6c2a0669b5a6d539346e6c6a0e6da97a2314d8ee54033029576b8a3e448b85cf7c018e7f7b940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59642aa12be1320bf3280c1de0445aac5
SHA1cf6a0e7f54c6ad3c4af98831d4a408f545d9c085
SHA2569858ab4af547aa314da2b3959dea808bba67ad648f61f138a8f67f6c9d2a66df
SHA512b8bfeb029ff0a1a9cdb4aead01c1e8a900aeb61dd6ba65031d55484e58dcb2d126f6d4f2eb6afee162f193c1a8fd4897de02a1b20ccc90221d212e04568593fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e353a12e1a1eac3a864b13c0bbe9fce6
SHA1f1b6af5b2a05a607f6c1e0e0ad53758693749668
SHA2569edb6d667cc3c5855304e0aff4a867400b15d0ed3130e47371e1517b2da54c1c
SHA512e59964dc49a11a2256471128b2d548a8423d75631e1ca37422722e8c189fd6b8f4a31a94bbb48fddb55ee6926c13d389a36d3e405da15a0ac0b50f13eb84217d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53748500a4c8d8bf211fc1fc85589b4ef
SHA161fbfb1fdaccb8a1feb7ba3fa4b93fc5bb9ca9aa
SHA2565ea450f3232e23d79d595b4dbedc2e2544b615f550f7f3f00c6998b091e132f6
SHA512b6c89856a4f78861d05228520db75e5087ba440fb4e5df7135ed41d091eb64f0c69685cfb99b1727b4c7488db55c2cab2447adaa5e77d39e4279780133154ef3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5574e8455d369de6cbc3551d6187e188b
SHA1a7dd51e8370dbdf5c893756f446d96f0bc529b60
SHA256bbcd93adaff80a5faf4a88c407a5a5de45f703d2ff9adaaa66c0adc7bfaf8c27
SHA51227153f6300fb8ca96c991d115be45e47af0f872333eef7f2b4c35e0313d088971215e8212536e6c2cd67fb8e85618adcde47170cffd70bce7f2cb995282b2091
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b