Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 12:10
Static task
static1
Behavioral task
behavioral1
Sample
0e0508d46499263b26864ac8d7f180eb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e0508d46499263b26864ac8d7f180eb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
0e0508d46499263b26864ac8d7f180eb_JaffaCakes118.html
-
Size
53KB
-
MD5
0e0508d46499263b26864ac8d7f180eb
-
SHA1
9d0845594c94e70b131ea6b1ecf96ab265805052
-
SHA256
d36bccf25d18fba92fff6e87d2c400a28d9f9f2621d2a4be3e4c7ecb546aac10
-
SHA512
ea85650ce8fd2f766f51879ca275fd670e7ff2acb709c8908a33602b75fbd45c3214c7ec1a7c5b5a6d7d0fd13c16e2126725e6232c9bc7b8f26067427a37debc
-
SSDEEP
1536:CkgUiIakTqGivi+PyU5runlYG63Nj+q5VyvR0w2AzTICbb3oz/t9M/dNwIUEDmDB:CkgUiIakTqGivi+PyU5runlYG63Nj+q3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000109b60354346924395a85efd345e6d040000000002000000000010660000000100002000000096931cbd6f1aa57722a509b033665b3a2d0139578a33f813854bc3cfebd6eb47000000000e800000000200002000000013b93537b192de1a6852075aced66d500f8b7e0cc07ac319025de4660b7ecb3e2000000076a891d09895e4a2c70413aa24d77e982d973704e97a330ddedee2e6d5e4f090400000008ac04174da9d358c18d001d89a3086fdcb7fd6db451acb67706bd590f5f9454709aeff859ae3c0ee0831515616dfb9c567a70ca918f21bac3b3f2bee150d8a50 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20492ac6f8c6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F057C511-32EB-11EF-9387-E25BC60B6402} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425479308" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2036 iexplore.exe 2036 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2560 2036 iexplore.exe 28 PID 2036 wrote to memory of 2560 2036 iexplore.exe 28 PID 2036 wrote to memory of 2560 2036 iexplore.exe 28 PID 2036 wrote to memory of 2560 2036 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0e0508d46499263b26864ac8d7f180eb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2036 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b47c0b6059ed0e0c3fe9fb58ca602b03
SHA15b3828438bc1ca3aacdc5ec8e6f47953e3aba480
SHA25640aeee9437724e7bc682a754c60a3f0484bc34fa4f1ecb386ec48cf50b1a7973
SHA51200a460eb9676833a75b779a586030e106484ca10b42303926ca65aff521f8fc7a585fe147d487fb93ce9d62386aad0ea941faaf844e6f211ecadf6fdb7b61039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556531564ca5a9f577b37b69ec256f1b5
SHA158e4d5f37bea231272b9cda4920a789ba02a4b05
SHA2563e3329ae25564568d415b8f7cc53336d96371c5652577b6f43e1c2d8666712e0
SHA512a3172bc2cbada3f864fc1fa1c70120b2cda7038a30a2eae4aa98d2f2922382740f40c56b134e7ec87d1b8db1a8ae37695af091dbf7023877ae267dc35181cb13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521b8060017a76de32e2f3d070db0ed80
SHA10b2a175ff9951876eccdd83521482fdb18d18236
SHA256130ae35f630f678155c8ab2db09a6ec4a2fe7496cc3cd0a04a4ef232212e8cf3
SHA512f6329ad8b39ad68eba6561199e2e4bc9dfc6a3d4f5eebc2fc32b2418f6fac74ce9001e0efc08d237888e7387d7103785a574fa1b94585132fbe145f42e9368a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ec6599641c341cd16dd210385ad26fe
SHA105d4ec3e05997a5e1a90fb87b2551682735810c4
SHA25676f32581d2d1e31de622bfe4a898c9380e5b2ee0ccbd28df05e190903c9c68bf
SHA512d95902f496c4911688faec298ad9559a2ba66e3fa3495d98c29ae719f42d3c727cca045cf08abf69055df1719ca1a86acbbdc75fa49608d2787bb266a67aac77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51529c1a38453dddf75a898ae8a8a9d44
SHA17d09fa8b842172643125786ec0ac1980d8e9e190
SHA256c6e77cde7206a13cb778b8b729dbf9c05f64c573be86b6dfc7f575bc0873be2c
SHA5126e4604bc5e33e4eba5aef18b3ad728c45a7ee52399ee73e511d7f2452ed117e2b1b9bfcc4640291f5c81b1698fd5f48bb7f5152e7b90460dec885f9ac08daa8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a06aa482d982de4d2eb1e1f3b5c4ddb9
SHA10c65775826e0be7eb5e367f04d42581457c3c476
SHA25619bda447270f0a50acf93a435e13b9a595d8c65c5e9699f1cb945bac4596afc4
SHA51299e4d60fffbefbbdb87f03b02ea7c810eca13a9adb0dfb542391b976e3a30426b9060331a4abc9e9b0c2c83af756a6234b26ddaa6503ce807a5095d210a7076b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500e4867c8f980709ab78c94dd3723aee
SHA1f10a8dd801e42f875eb6ae7bc57e38f4eaa3ee64
SHA2560507d9e5066a7669b083b379d8d1444de20119e3e7aaece5296b97059b709dfd
SHA512f5992873cea80c7d0856cba0ea45dc259710f0788e44b8abe3761f6754bf675250e249f15518f77ee9ec1523e3650bce8de4109b087a35bd10708cfa36237d23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585defd26f49f81eca8436ec4071e87ed
SHA16d42e6ef2a399b8a2ae87dbdad3a832b7af7caa0
SHA2569fe0e8c98f39453bbee2cf03736080f4de85383ff97b94ffe0b6cf2652d0143c
SHA512be6e642d4d37988950d7aa0b5ba3587611524b4884b99025d8b6c187bae6ee3c1b7f3641b143d503542e12c69cab246208445411e90288f4d8f38b404d13f504
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1b37cdd4bcd256846f3ceff7806c431
SHA1bdb8e8b96d1cf537e84a3a073bbb730b0f726168
SHA256fb98823b6d4657b67fc347f22e399c37bb9568548675e7770163f8b813d5fcd1
SHA5129d38d139f2e006442ce9951e46a19b536199115d4da7cec58d02e9c5ff3c35ba84adf820696f9169cf947f2bd93add0df4287dbf01bdafa2565ba4bdad0b43d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f6e3a8b45c8305c419956eae99ed7d7
SHA10fe62ddde8f801514e87ada5ca9eb4e040fa6153
SHA25619dd4dbf1b25437b71531c44d7bcf22834dfcb1c3d851e81ac74ad214cecb914
SHA512dd956a2ceabc9bc67f366fcbebcbc644cd97f0504e0b4964a1a3f9bd7ea0c72a9621192cd3011f19253fe1b7d6e12b5ad7545fef4ad70a558bbe46454189d131
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf9c2a8419d6579cfa869d99cc1ee7a3
SHA103cf7c1bcb3f83f978e4dcd597454c71d89d24e9
SHA25659ca7aea5f23a04bceae903ec94e74f2ba38176924deeb0920ab550fa41687a8
SHA51270ab311cf705e48c933f205d33cc306d0ee49bfc6cb13434d2a13b521f3c87a5a1dbc6335e47b46d2b36ea60cce34d638c7753a3afca00323c56fd13cd67e889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a694210fc257ef5fcb244f8fe39ba29
SHA118b976031064d35c83444f673033d50e91bb389f
SHA256c7f29ede3b3d8d68e23e3c67f5febac28c939284ac25952b6c5e8c723487a570
SHA512bc1cc906f8e44b0d33445efe72c30517f97cdb35741abb8c86e25b19b2733cc8e609301923a06eb5ebdd1b666bb64f337b3adf8286fc93f6ab45ef7a20fa3be7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595f0e8872d014a45267d40d3395dac4e
SHA168d0b01988b22703d636213dfeb21d7c33fcde71
SHA25610008cd8021ba5e1e4deaefebd8beefdd594cd866cc50b4cbefcbdd758fc822d
SHA5125d5152f8737b0e467f22924ffe1bcfd502093a363b7353b2213b6cd4c8659b84c27eb1a97fda41c7f4e6cadca527a83bf465c687ba5f25b406ea6385bba6bbb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56168e59a2ce09bbde36ae7fb43b9e3c1
SHA1c8f017b2dd4dbad79f6400cf6fc5e8e968309e46
SHA25673aa5dd833615d0a45f998d4d834f014ff0ad7295855bfaa3bfdd724a8cf47d1
SHA51208ae43ccb72c3ec51069e39d97a62bd9afe175421d1d5189e05ef6a4d42d116efcd202b4ab4a5343126a44e5a121f3fdc8b672867c829e4e838c77f6d649ec53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ae9813a6ececea9b60d7672f2f7f70b
SHA12af89c39c47bce29fc7fc93e0471ee839600a051
SHA256efb692b08e401a0f4fc24dba48319af44846a18858155e359489260558ee6409
SHA512055a3eda106676678992e2cb673397df8a3dfe20b7d5ce9826b80386eb72680e9d97940abb4381efd8844a2eb5a93ab7cef286a5df932931a98171aac99c8ff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eb3c73dcf5370475350812c79e5829b
SHA165f3e76049cec5606e7256257956a23a415f1c13
SHA25670311485774c9ce82689862366bc1322b0f4b437d442b105db63e67b7c3f4ab2
SHA5122fa922e9a6d20ec30134f98313261bda907b795fe7d9503287af3151c4b356fb37e8554798f45f8c3480c0ed6f050f664aeb5f22dd370f1a0702a46dc0cdf5fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594a32596deb2c40d18b566dda074d582
SHA1459a7c2767891752aab32ee3c69cf62ee22815ef
SHA256c5a974e40538a090ed860136b0f9516c236ae680731dfb9bae40660eb6a46cc1
SHA512e924a2f29cfb905f5bcb9486542fb85b393912b5d31a457e0579210bd2cc2ea84e0506154f90532cc2f8c6c42566d6a1c85767586784a05a8ae95a83cae0ed74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57307df83650db44227373db7f320aa0e
SHA1abe409bf71e6a44bbb2aa7d0b4ddd44211b60bcc
SHA256211de89ff211893e40809882063efbf2685a5378a9ec6cfb97f68891063142b7
SHA51207abcefc1f8128967ac654438df0c2f11d50e2c0144abe519a9863479ec5c1e9d6188e26ed494cd027b4c70ae2f3a586a9d52d9860fb5779a01988069d45369e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5413ac7cc5eb96e0048b2003d6b9e7ba0
SHA1b5eebcb6ad81da31f6a348391ee0057480a9ac20
SHA25668b8f02b375d19414498ea083c9e8fd3469358b44533a57d3c4f6d97a0fd367d
SHA51264f9ce1cab1c2c5619ce87ceb56bf590a26895ee3c0f650e94a0c099d7469436236638e03455ba56f0bd2ededb6dde157d434f6078a8d95a7cf321d0aee46c2d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b