Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
effb61290cab1e093a3da8e122608500_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
effb61290cab1e093a3da8e122608500_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
effb61290cab1e093a3da8e122608500_JaffaCakes118.html
-
Size
349KB
-
MD5
effb61290cab1e093a3da8e122608500
-
SHA1
186772cc2359bd8b948b642735482cf61e4b0703
-
SHA256
0d08036236a660c3f75327aac9209f314d50061fb14114f947a97f4fffe0f40e
-
SHA512
7f6b8026adf252526a404cc54786d996ad4eacd066d3069d006edcd783f0d4a3672cbb7c44e07239ade5e44f9c0ed639e1fe0fe09ce7d52859cec9e83ff2560f
-
SSDEEP
3072:fXe51jfUfNoNDFZwlAMk9GvKTP5mQlDQBNhM6HOeIkJDtjq:fXen1klAMkMvKTJr
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 300ba88e310cdb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433090330" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B893E271-7824-11EF-9F4F-6E295C7D81A3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000008651fadb4d30e8cc5c8da54738c08193b86d2a3df4922a76bd8a8196324e2ae8000000000e8000000002000020000000b62a0b1a1001ff47a6db93ca7e67b2f1baa4fb16fbf7a57ea25b2ef0195ce44520000000af46e99ddb8acb0fdab6bc94cdbcdb2ab6c0ddbf6959f372b5d1d0f29592c411400000007d931e499272a913b57988b550cf9e88cff63976bd7299f065b3831c5181aa1e543ef5f46670f544f87dbb39fbe62a29ad9850e8076615448c0b3fbf239ec48d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1832 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1832 iexplore.exe 1832 iexplore.exe 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1832 wrote to memory of 2128 1832 iexplore.exe 31 PID 1832 wrote to memory of 2128 1832 iexplore.exe 31 PID 1832 wrote to memory of 2128 1832 iexplore.exe 31 PID 1832 wrote to memory of 2128 1832 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\effb61290cab1e093a3da8e122608500_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1832 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD54261f2993d162f5b47e28562d5628282
SHA172eca6f86b4428dd2f2ded92e055681a2bba0148
SHA256749dd5f8774fb6f6daf5dfd9cbc774b353e0fc1f8428d590d6df6bb2668229de
SHA512f45e04b9835e9c7eb66eeb4f7cb967e1d35bee6b1a234884d568abf264dd4979e4aabdf6969960721d75ad554ae69556c1a82c4096395020afc68650069c9845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_0BE30C8E6128C0BC8455FF6A9904D7CF
Filesize471B
MD56b7380045e6bc9047b11ec996d72bd86
SHA12decc0caa8d57938af893b75c54ce89ce3d49273
SHA2565c78f0c98613c9b4ba1c9b3f68c1be4428fdf113cc33bacde8eca0b4850c924d
SHA51226432777fd2986bd893ccd18cd2462135f891ae204a7acb427e042c49e2e999b79e7dc6eac8f43bcfa00e3e7f2efbca2c8345c463fdcaf3f72e434d392bcfe8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD5a09a0bf959d18c8434c0efc805207a90
SHA1e86a4a143b097527c9af61f1bf04a17cc51b571e
SHA2567c2eeb9cb3795cd545ad37677fe1fb264230a23668708bdac7ee9793da2c209e
SHA5128373e9b7e166696a3948ea41796da734e19948d72be91e6ecbb64eca432f395e09b9aae2110da1331760779c4ddfc1fc3def962e70cc78e4f70f717d7fac9c75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4e23fd2e691584250aaabd2fdfd653c
SHA1990cb37803232780933b5db3e05830dfd79627d2
SHA256051389e809a9c5fc84ed0e9e205bf986c7404da4d4b102aefec918b760625ec7
SHA51238c35e52ab3f23a28addaf2004f5500d749a3cbeee1985ae3ce2f9decfd56f79627e49f65723543825ef8901bf9225a2f0479ae67ac6e059cb1896f6cb804f5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573732719e41b44551a982b8260347bf5
SHA11b6e321e9ef9dd96cdc31c2f49623c2b3b0f2bca
SHA256f7cf7fa54a147eca5af43a3fab62bac639d258093e486975671fb024a04d14d5
SHA5123c455028922f0024e3fbed6bc001ff60860decec7673a0bb1d7cc1fc5b0e576dbae037bd1a769256c7889ad2e72204957b99a5c1e082516be487b7f0ce923729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c77bde1026cc6e1b411d34dce2f9c7cc
SHA12ceea5b4b66fa73dd873ef2e2d075d327a20849a
SHA2564e81dbdcfd43b783724bba0b897b5a0f651147b2dcf89b4b5b0c9b1cf53e5316
SHA5122d1f276b355c993e21574baafda669062c225add2524b0183dd576ac50f9040125797913b57ecd458589789351470f5314c7a7928639703325d28c9dca540171
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594bfd865d65170b6328e19eddb99b2c1
SHA1feaea5cd7fc954f322246d0c58cdd1cb3f396c63
SHA25655d83eb4094c6467a11ac044cc1cb3f837d6fa64332d7ce06ff40731a8eeea29
SHA5126b390f659db2bec9d0bed5affffabcd76ccb28be18b14f2a5a26e9837a107dc3aced8031de6de71df5cf11090a2c1bfa74fa1f03a0a361d96e6bd4bc83039b59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50eecbc29ca4b8923cff9a90ef80ff02b
SHA1d7980da8fecd6437c29c9f1169b9f36bf3f2fd29
SHA2566e588098b6a49658aca9e2a4c036c82b13964861e27a4792180398238735dcf9
SHA5127e0de87729a4fab8942c7e5f4a3b475c132e3bfc51b5efba82815885115ca44b94e50ac5b95724232b6353d614e08a9dda6a625ec1fdc3e73895be12bb6624f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1ef3064744623f70cd3cb8516d6ff25
SHA19c4dc2d3f9d8e2716b978a00a3358b3a612a2d98
SHA256a848bf2dc38352b71c8872b14928387e11e7944c7f1d9df29f595b0f4010269c
SHA5126d620df576a256f8cce59162a3386a40b99bf0554f9817d432f6720266dc4d2d820ecd94bd9ab6eefcca98688ed52efa83914bc102a16891101e6d8d7bb78417
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9216f136ffb216500041020ffe7f4b5
SHA17f91a7e83b74c3fe84c86c714d45b05a42b8f648
SHA256fe9e2ae76dd764231cfcaeb066c75dcac7735fe7c1012c508f6bf14c7af6a71a
SHA5129332748e368179119c94f3b93c0fd43aafcac0388cf1cbaa7116b8d4bcbb7193103e305c06450f76d8df8fdc779c671a4e8a5fb8b36b298c58af3f4a52680cc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad49a04feda5aadd2f3e54bbbb319c18
SHA14232fe1c476ee77e34b1292149e380ce9c36334d
SHA25634dc3c02c380dcb1e3be95ff26a4166ce45c8d7f0c5c9243727085fbc9612995
SHA512362871975c79ba2b32ef8eeed5fc34156f5b59138378bce6f15d62dfbb54913d0ea02601370d70f9593b4cff2e555108f04210ea1d26d57899da964cb4460784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52be98c7b190e6365e66ef3285a6f87fd
SHA11aed10cfb5ba2ade0e0217147fb43b127c02e3a0
SHA256333707649005f2db9fdb88e96a5d9bd5c743251f6573c212507ce5dae663e12d
SHA5124a9b4607e0ed8e8d386bae911aeec8f2a08aed0e782bac8567eaef79c56d712e84a6c5419e45890e9b506a18e42180efb5d61eab4245356b449a74b8e1f81593
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557149c3c47190d3e9f4ddbd4bb48c6d2
SHA1b0cfb9198835be8ba16677e6c090461b32bc1697
SHA256de224e2fce166a12a2c09b6ae9d76e06ea9e5e2b2e8203246ebcd18a03b3bbb7
SHA512805ad47c66b29a16ec2672d686219698ec1d541b4f09ec9233336b1189af39357e892fbe4aedd355bb273b6c544e6a1277646c5d787e2349c544b21367239a9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c833a40a6df6a24b5cd5a849939a83f
SHA1c8e508e97ae0649986edb0ec5a3181455d2bf7e2
SHA256bc6c6a5266c74cb65ceb6803af61e0ebb8d10291112a36f60558441439f8cc6f
SHA512853ba1c6063d6e5e3212ee08979b641ea5e248990b1269ea9915131ecee495d23e36b006cf2b13827314b9dfb7e333427e6d0c7ad88071f4a68c69ba1a4bab66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d2c8683324485e248eb6f2f713b35fd
SHA1ada408e41e628bbeaeb9bafbf87bd7348e18cec8
SHA256a13037e0f5a9fdad9878561c52f17a78bec5ee86b07441ca0ea4ec0cd8ad0b43
SHA5121da47a2f7eac5ba1e2a2610195046c0cf5c40c2f7ef42be8f40fb8384f6d53f2c244ebc8eb27c9c1e7f2dc9f3ca29d6e2e72666d9e55265620b6605eab02f986
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb2b92f43c5416b098aaa90f6542d279
SHA18aa6e3d71c5a6ad7f2bd33d588e18bcb9541f5b5
SHA2564016764da4cd7dd1bd1a26ad449fcb787de2e1afcdf4c3281c8702cbed0615dd
SHA5122fa7518e3f39fa5aa8e1d94ecd17cf9b510d0656b9a811271a9f2b6564d1cc53a09136dbb3abe149f9897be9620371aa38df5ac5e774da2876b2baac990696ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8745b5908653a6a9bcf5471db72f18d
SHA18f94ab680c4a7649314ff2ac271dab730ef2237d
SHA256010dc3c2a2d3c0080672fadf53cc9eaf31bda9706cc0f2305e7dedebaa4fa7bc
SHA512e972f039477de5acb2e751efebd447e30624dc109d4631b673baa72f9f58dfa06144e155ec629af36718bbb0952296cc063c090a007c3657e0f826a18bd1392e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d18a7d2f9b536c17e52b85fd4085c504
SHA1ff34193f290ddccfc5c6d3aee67d5283b8086a65
SHA256c2f4fc6dd2f6079e32ea6493cbd0e2e13b54d8f89faed44bfef7ce43a907fda8
SHA512fb8abfc66877c64ca16af9ad5d9836edc9c9affdcd3d0b29d604f094d7e7ce57706562f7d3227ac95573f1d960f1c2d5ce602be823830147c2f0880e26912c41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5186cfd45d9771d448cd7e7de135dd140
SHA1a8bbd6cc5d3643c51eb0011c4c3fd3d1126501c7
SHA2563e0029ad1f35be2b89400a4303642412eb104c1763d26be82c5c7a117647e281
SHA5124c1a07a21433495c0ebd40755ddbacbbd750001c8c3d6c6b32096d446942a7675932ebc13eee501634e5f25e0f90e779fbda091521be45b0ee87213601752432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_0BE30C8E6128C0BC8455FF6A9904D7CF
Filesize406B
MD5bfd87a664c69b609694e159aa210b7f1
SHA14b9838148567fbf552e0b1f21ff0f2bb02c006ba
SHA25608ecc62ffd671ae885aa12660488349ab6eb57ef90a374a58e96c411d557a497
SHA512b235fa4c3f85ac0e98771d42ffeb551f5959cd9cf1975c39ace2b04c1ccf16e09cd652aa358ac5c9e942331d7132c09e01905425a37311b535f5a371d7709be0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b