Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 04:50
Static task
static1
Behavioral task
behavioral1
Sample
16399080a77436866dc3a5cb27e24730_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
16399080a77436866dc3a5cb27e24730_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
16399080a77436866dc3a5cb27e24730_JaffaCakes118.html
-
Size
20KB
-
MD5
16399080a77436866dc3a5cb27e24730
-
SHA1
fc1cfd21b7da6007692ff439a8762c5d43992257
-
SHA256
7add9f690a7a9eea2107933dea2a644b1549ff71b957551049430038de65511d
-
SHA512
a1d8b52707f6fa78dda6ead9f862e315b0544102741dde40b5a713a604f600e9b9f231fceefdfd0ed9def5b2467b16d868a137f293116ed9cbb374627e72569d
-
SSDEEP
384:0EJlI/Iz8f83Yd4ZLl+qr0cWqcbDcNaca/cy9McP4cMocAAcHscua0QAHy8aOqvB:0EJl0I4f8c4V34cWqcbDcNaca/cyScPX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000005f48578a2d0c50217b63580889c1d26fa1c46198f20cf913eb8485980a86fca2000000000e80000000020000200000004b0d7600b44fcf07ab063971011b2eac534c58bb6a7ae9e1cfef79bd858817622000000012e98989f7f2954be47cd7bd6aefaf52f66cbfa0dd8dcfe68673ebbcedfe1e1f400000001ccf7498ba2140aef887339b09758f65415191429cbeece84a30c6b2308ad0f938fda788f3aff3eaafa8e67970b79367103fc963490cb9144ef6e2fb60c64aee iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70fdbe52e216db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{63A632C1-82D5-11EF-B40F-EAF82BEC9AF0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434265716" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE 2392 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2392 2348 iexplore.exe 30 PID 2348 wrote to memory of 2392 2348 iexplore.exe 30 PID 2348 wrote to memory of 2392 2348 iexplore.exe 30 PID 2348 wrote to memory of 2392 2348 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\16399080a77436866dc3a5cb27e24730_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2392
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9e2a77968cb7f264126e5bd68a7e88b
SHA1bd1caacc80419485643c4bff168a81ffb4297e6f
SHA256a7667193b90976b1588c5bed976c43b3c4879f30a4d40db025b82feac5fff5cf
SHA512989bd352011f71f9849e0450919bf465c59144ee92f2476a04a781b951b1206606fd3fc81d5630130b8ccf4fc76134b9cd6ce51c15759f024a38db1c99500cf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f84b45c09d495bfba11f75f46c22e3a
SHA179544bbff7544ac6079efcd3d82a564bfc6a6f8a
SHA2562eed858c4255b708578f3551368e0411ee973484054be031cb40a64036bcccea
SHA512eb1930cad65bdbb5f945ce680610cbed695d5a4652e8baf189275275447b2ecb825347953b193ae57585eef07d61056ad567536d3dddc1c86042384918197ac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4f71fdeee4db4b7c7239b0082a47a42
SHA1c141eab7845e5c80a34e43518e085dacb79aa670
SHA2569266840f06bd759ec4f068687105e6652cf2c4480bbd58d30c22891045ca1e34
SHA512409786cdb77cd199cb630404c44298914f1e059cfa52fd8400ca426105fbcbb99a8a5c235f801a85b5dab08c3e1e6e8c0ffa43a3083d1c15ba6eac4324147f02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae8b6b9f87c22b33e820fb9ced22a6e3
SHA106cd05868eb7e83a45f9795ed67da4e7d5157c22
SHA256ab1857c6efe3b07a81f64d6591085f1fd95acc0b35bd5579c68c2069d1c5aa00
SHA5122ff13fba423c9d9cee78b68ba6c0cca1d7e90bc0d3401f54e6fab05b22778250945f1ef21212026ef21b7f9b829ce9fffba82a3ea1a92b2252c8fbe8e12aea3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a805317b54d56677dfdcf485012b4edc
SHA19879679d95a1674d115148cad314af6473470548
SHA256c841a5877d9e7ecd3d03aa76fa386481d41560083d7b417900f3c04883fb9135
SHA5127a41f71df1db7b02f73bbd5502f435f63cf802a7c198c2026113af9962c96469a1d2f01628c28d03bd83dc411df93e02f8d07970f7cb5d915a0a93e3f995bb8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5734372118280b5812e60b9512cc5f6ef
SHA17ff59eefdc3c5c52a3e2639a326a90ad35001097
SHA2561f0d7bcb142e3fec85c51d2989e5fb8b9778fb6f98331bfb7c2bc28f3887d2f7
SHA512df9d7499ec2426cf003141e3f6c89c4862d651470340cc8d882fa6147acdd176ee37725c4c95ef03593c98519e020d52dcf5eab4c01ada6e9f1123f305756ad8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0b3bdaca6112aed2773c31f5e9f07c5
SHA1b296557a7033238a02c9fa298057768ef21fe9cd
SHA256d6bcc6f3b08e0bb6ff6648a1ccce86a69f1559301aa1c0f8c18726d41cebff44
SHA5127570195b568b39862dee4aa8268421e91db7f4e0aecce5f78524aaed82393946149baa9378597949f92101adb001643d95c60c11966b887890632dee1ec4ebde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a984d50f4c793e6421610f1199441493
SHA1c6ef01696daf46b01e1f29f2393d0a84cb3c7e9a
SHA2569ab0eaafc5535af3aec4d1664d67d71184b51ba0bbb45467c17bc455a9f1b78b
SHA51202f4f375410459797b8d5a40d5cd9a35e5e9a919994934c61ebc07760b3cef345147ae5c483a4ef6927206adbdc5059767d54963570c5040b7c3dfbd412251a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7c18ec1bf7aabbecad25337d4132daf
SHA169e5ba5a887ce5cccf4cf9aaf963a5638a24c354
SHA25607d8e7c42f64ab9cedaa188f8282c550b1e6133cb38eb6292b9c5e83d13134de
SHA5127251599eaa72b2f9dee8ad7c28bf6989a0ee94a154a38c11e5a06829ce09f0c901aab59d4cb55641e07bca6189500359dc6113f7a453fa04a2032c9eaf2c38c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd94e5cad02b62c615ba531208bce2f8
SHA166263e36bf57fd2bf3ad424aa4f7975658c8a007
SHA256a381247cf6f056b0ab6cb9d9ed514e9bd9cb72617afb7090399490b5f6d13370
SHA51255d50f2ca9482ff45e6f44c9450179b52868f9f140063212316ec8220c506924118183b9662ddb1c4cd944987cc79d8341ebe36236ac9f82067b39248f156646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b9cc4a9c21e833e263baf8de640e802
SHA15fc3a611f41a51c25fa6e5b539c856d39852743d
SHA256a715865ec50ce7ac1e2c61436991ec57667ae96eb76a6273ec9f9008513fdd6d
SHA51240197965d70c3eaf59a8946b3c1139ec953f679c7d35408c5bb8fa19b49ad797979ba3b1350de3b76f0d410ccf7db558eeaf0d09af8e5424e76e88296bba82ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eab42e4e0083792ed213b91148df511c
SHA1b75fb6723c2375991e45f711670626d4a301109f
SHA2568c9db3b438d92c10701963e8f9fb6573e05045913270677568f572d65eb90317
SHA512877b770374f7232ee424edb669331c031ccf6cecc6904f969313b96202c4a801c2530d7674106d6598bd3f070851068464ab6e67dd871dd251f56bb194ecf3bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdbc153a71adb2ab7798c525e5dedb11
SHA1f905efcbe1fb6cd53e18d5c8057bc421b9a095c0
SHA25611475c7e7e254537f47f1e0462d939c775c77b251fd2b1e3cc82815b9a121df1
SHA512f21a83ae6b933a31a412672e64fcc89d604f72a6667c4e0c971615d351f38bb85ff90df2b1e50041d1e30e996c41340e1502a88a64c11f43945bb87c0590b7a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce278fffab7cb2c40b482b94fa58d0ca
SHA1e1611c95bbf2bf273637299d2a34bbec01a63ad7
SHA256f11c1366c19f72906368c04261441f61a4a056e95cb3730207bd95407166987c
SHA512d20467ef4bc6551d62ccb281275be2105273af04fa91cdfe7fff68b8c439a51d9c4f9d902c51736ab5e1fdef7e00d401ddcbb001dd827d8bcbd5b471cafcfe8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd93c94ad86c831c8c0fd0e7f6b0460d
SHA1e80e74901e7e6e8f4ccd80d7e373202389d2857f
SHA256a3b6b0c093dbdbac1f53424e2e07563d3b44ab73e66005f1d379f3f2b9f47aae
SHA5127264da9ccd0d7d6f19570d0dec88abf5573518598f935c31e725bba06d37efd97bda812012ff7bff7229e175647c7ec93091dbcfe40bdee23ea0b2b71a562d10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee3a17aad6b464523af5be743546dbc7
SHA195c1670dbc8ff5f90b78b21b2c953019aeef3973
SHA256e6263751d19a65a6c575e91eabd33840852b46572495ca9911fc571a154c7bbd
SHA512ff1daab0df15f40e1d40fd9089b3a6bbf6674b2136e3d1bbc4853ce4eca627cab326532d3a0d0b89d6e1acf3df79ee5fe65ad6f7aba6bf2e76777bab90900a5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556d84757ca2941b003724a6c5780fe88
SHA18d1887c1f5ec81d347980b421510a05c326274b8
SHA256b5fa21b378225ec48896dbe2582d69c10be61f6c1eeacfe1358cb898150ba959
SHA5120a910458dcf4d3dde0e198de8e80d11d6b278034d69ecd5da65e584d3fb80a423e7fc858a6e04d5ebc02aad4c9a973ac571c8e1810f185e64002ca662cf3ba00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb270d9a8ba71158ac96087485ad7ea6
SHA1764e7445d00a4bacb403155dabeb1aa9a5066a54
SHA2569271953e80515afb8ca5d12826a25cac5ae9db8732107230f78f7c5017c07ae5
SHA512d8723c845c662693bd13a143819284b54ae5b34741b923f41099186802c70c5dd6729c233b2bb3c0f0edc9858ade0ee85e7b0e532fa4cf69facd88700335e254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55dd7ae5adfee7d5e900d733eb0c6386f
SHA16733c3402ede78b6492bbd1366c4b4d6178600ee
SHA256eefc6b5ecad29da94acd5d9bc831a5c930b61044e2617820076e0962a63d0d10
SHA51230f39abd577334ff77f942f24228f3759fb73f7e50ca9cc85fc5322a080ded57c84c064b3d3c7726a53360002c7b4a7d2b3ad1eb4e458e97112c26aa03a2fcb0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b