Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 12:06
Static task
static1
Behavioral task
behavioral1
Sample
15f13058e3fd96f3132271f7a4af21ff_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
15f13058e3fd96f3132271f7a4af21ff_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
15f13058e3fd96f3132271f7a4af21ff_JaffaCakes118.html
-
Size
20KB
-
MD5
15f13058e3fd96f3132271f7a4af21ff
-
SHA1
1d8d32ab5ab265db23f02b8548f52614ad37fb4a
-
SHA256
1d261be67d3872f3e1dbc0695d4170fa52b18fbc330446b9ebfe36f99bcccd8b
-
SHA512
f6c81f9d2bcc5b47d34968bb20c669ceb11ed28c8c5a625d2c2c4aace39244fbbe41f7592070aa6006372309434f2951276711ba90c9ca8bb7f88381ca3f150f
-
SSDEEP
384:FjtVE0EhJH+Qj/qz1K7T6U7x4uvhd5bS5qTpjigcYON6eFoo2Ecm2F0cO/chAizf:nVAB/qx0Wmx44hd52mjigpi+IcCK/9h
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000238eb94fbeda7847a93fd0aa8a8b474d00000000020000000000106600000001000020000000d1c025371d2957778d8cf8f3638673595ef344826a9128a5e17c84d46f6ee71a000000000e80000000020000200000003d2636ded2b9a29529bb7b2082a99c8cd16b96cb9701367c696f69ca3bc2ae5f900000008e884f98d8b953f969a6be0bb77d6fd99e9ba43125ae764c0d2477c591e3e40b53536242582de5ad31008bbe4ac3dbf04968b36ff61cd9a64e988f9e89e010ad3733dde5aec81ceeb07fb1b4cbaa433f03df89149dcf32f2614b23692e1d85ab054b70afca45b91e0f7153c47f51fcfc8f296538e7097a50a166eb9790aa8f4ba7d34a47a01857c831e314df14edb790400000005b604fc1878cf2a66c7a81f4272c91a16a2c9762e81bc5dd767d004efbea8b8cd9e6f21aa2b17c1ce60670af9e826b25d44888e99090d43e51aa93cc230a2e76 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ee15858ac8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000238eb94fbeda7847a93fd0aa8a8b474d000000000200000000001066000000010000200000008577b4a1580fce0716372ecee12c270c9ef70f2f8f9219fd98643f83f0cbddc8000000000e800000000200002000000071327d3a0aed2e497c33a573de8ca9c7e5ddc46cdc3b2d27059abf70e5cbe84a2000000007fd20c7ad43a7aec1f2d1f0b244635b7fb4d90eb0abc06e72ab018409e5cab6400000004db65ef35505421ae9ad1d0530b3ae137a1a5647f8d466c9540c60860ce92650058358513303a844f0c7d696fc4dac3b9f5d2b0731c6e5986a4cefc36d23d511 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ADC555D1-347D-11EF-B012-52ADCDCA366E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425651853" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2288 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2288 iexplore.exe 2288 iexplore.exe 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE 2192 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2192 2288 iexplore.exe 28 PID 2288 wrote to memory of 2192 2288 iexplore.exe 28 PID 2288 wrote to memory of 2192 2288 iexplore.exe 28 PID 2288 wrote to memory of 2192 2288 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\15f13058e3fd96f3132271f7a4af21ff_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2288 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596a8dc3fb684f570d85b8c76d1cc205e
SHA12d6267a01c6dc072b47c47b6789215a1984bef54
SHA256d4c79978542c92f380e4bc7cccf91cc16f18d43457b2906c7a9f6d46102842e2
SHA512a7d7b1306e06a624f4e03fee359b7ef38970a4dfcc52305dc619cdb06601be4cf524adc160d1b7d92ab90fd9c4bd8030206b3720f2b538e4ea177b1d9c9c2218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7e9b91da1a7b54e9b8eedb1f6c88273
SHA1d69ce4ce353f591e63837c731c9c8e02f4cd7276
SHA256b463e2a0fad926dc81e9993a90337d7c99975e5e6b07e5e37aba931a073b5ac7
SHA512c9f97ed42c53e93e824df80e8cea7bb8019fdc8c8d0edbad8ae99214f80a36c495d849089aa697234f7b5a6c281ea13c293546299aa976c71a511bf3a93b4b71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a278ddeddd6cabc691535e77ded19b9
SHA1ed22a997169f342a78f0c0c4f32b2cec420dd8c5
SHA2562a98911e196f5b22de467789ec639ece6f348b33a12173fdd38f76e8ee7d059a
SHA512c47896595145d8e02bfbf4680861a0f28b1cfdc920f5242ed7b4206b03ed7e64e4796bba2f9f7fa85e2ca1ecfe687f4189a3862be1fdbc5d39a5afb5be3c1765
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1f4d3ced61bb55e5a2bc30cdccd9f29
SHA1cf7b25f9f29b53f69d1ee60d3696b0dd7b79a6fd
SHA256b247e39f5155d49ae6b96b19f682e1d7a10071e7cb3e84c6b59ce28660a4fab6
SHA512d8a91d380857cd97315e0ccfa4f6554f64c8d2a1530e64e1913318400e35c8cd67aa839d805e959dcac99382bc36fa1bbc6e1028a000b8d01407a0c022403ef9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cec54ff8046131916a5dee66c01e1fa
SHA1d007ddcfc46d33e585a6e6bea4a251d208d90a4b
SHA25629b124f1f95a4a2cbba29de27b1a6f3eab677c7f6183e8acb0b7b6e029e47ddc
SHA512962a4b4266e7ab09d297d2576570e6e287364326c68617932a048171f9d97caabfc793bec17b9cef3bf4beb970592038e3fe2147b25bdfeb7d4c443314ef680f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b41e438cc05499234bd12c1ba10dcaa
SHA1190b54decda5748b32b1a17162f96c973e23c7b8
SHA25665b83dd557c66c0a0cc50eb20ef18a476b87893b0186da28b9b94f1fec6cf967
SHA5122b8dee030135e44e2310621d8c336638d516825fec32bc69be4b1a4f74ce785133435ecf2b064b98051e0c521e551429115350ded22c47c48a90905c79013444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517fc28d89573aab13178c1cac2ed69bc
SHA1c882f6ff6a38afafea5fa15d868f31105a7549c9
SHA2560b3682d0b96d068b2dd16db986861a613e3cf9d6808346e7230083ce1ec53206
SHA512a135de4458533387578b17a8ce5db372e299c2035c04b6c46c87c376b9577c359ca776bb99e2db42055b97fc36d9e88b70e208dc5cb41dd1f4ab047d82c2118d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547519aa09e3476a445f6ffe6568d7d0d
SHA123f541c3f89bbee9e33a6184318abdda5cc474f3
SHA25648587780862e87bcf788d6a236de5e86e017de794b85f3b9a7364bde70c8ff18
SHA512db4b9250ddf9395675eba0d6cd88bc7b3ceaa70bbb0a7ca7310d0d18b7db11b087c4dfb968f9c59d4f1ae667b9e7596e17426cc5ddebb0670245e48c6cae4dde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5160c4285e746ebc5c89ce20859944aa0
SHA16e1a55e235ac8e41b1a6b73db16530960da0a1f7
SHA25665ebb9abaa0ac3924957d9493dc3ebe8803d1230a66c79019db6a401ad6abbe6
SHA512136580b3c8e0dc850504755a3776cf996ae538aa4ef83052c9121d08e5ee694d53349223ed3c89216e20aa09cfebd09ff75314b9458ae32bb2519fe079ce3b84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ad84f5250619adf5e2d02de46651d6d
SHA16164db6da931ed85fe3fb58d5a5affb79515cf17
SHA25600ba31ef16619654dfa3809e4b27cba52921108d1396be43e2e020c7b7f109cf
SHA5128102174e5172dbd6992296b6a7694c10d6744835493cc0f2d71aecfa33c5c1ddbe084d7fa9f0ef47208b82a7351653788f2acd52044cd71f8d1716a223e28e38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db0fbb450864030d4ce414591726f746
SHA1685f36aa09023d66ff5d64777695fa74a933ba0c
SHA256e9aa651f4f5975b0e06c73c1c0c4991094768ac062087dbc0dd926ce4d5423e8
SHA5127395e39edd130f0122a0ebb273bc584a3012728ccb1e37d9a22e977f7806b7ba42e6b745e5a9a2d74e41ffe63129e66968f847e51e5a4a213bf0e6ff45633709
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd641bdd608fe55482820384f7bbe9ef
SHA1807fb5bab39f3bcaadc249583e4e6b5e65a799d5
SHA256c09a602ab577b7d81bd436c00a359a702b818cfce029308c778da2dd81bb710e
SHA51213544e9443e1442a6a6685afb2f9fb3c8fc9338b90f601db7df0c436ba6b3acf73c8497cf10678bbeebd420683b043b3e801f21d742c18ddca67e993eaa2f58c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c98272211761889d6e05f2589e44b761
SHA1f2385ef945f1b4abb901b3dba2d10e6f9fd55678
SHA2567fab9050b929e4e23c99739052a804d2930223ad1cff864a01a14b34b1c013fc
SHA512c02de03770b38193ceee451031c72072bf29fdf0334aac83e95853f7787ca74ec0604d171c0c5111af1d16b7a486b58b30d8835aa3b62a1e91e3580d187d8603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d85c8cdbf4b782c14af7a59a0ead8f6a
SHA1b457c2e5722a4ac67fc6b77c834b9e34a25aa182
SHA25691b3656dcc6378421740509e2b67179e3ef5354b108e414ce33745c185fc11e3
SHA512f098e2c3797b0327b4f7e506278a339bfc04c2b1654146efd4e95a452002aeff6130739fcd04ff8b360a1843ed19216ac63e1f1ba880dd9bb714e6e8664e47a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554dc9a691c04698a67e2b5de55275b85
SHA1752dee5adaf5c0bd1ad88bdc17d2cb78ac941c1d
SHA256c7131e0d1af263072eca53aa24fdb98c997c51fb1dcef9a6e38cb828bf8b22fb
SHA512012d4fd9a48970bac59b4ea3059521548bffdb93e0c91cf26f71829d19f6721fd9c375cdbf786c4cc844eebdff08b0468903dae11fe0aba70fcd04ed99c70125
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592c6224c84858a571a8386b1c8000f19
SHA1d544069ee6bf1224216f9a41ac0c68f9f057035a
SHA25644954251962deaca14f7eb0865dd4d28fbd4f2cbb3997498288b3f30a9e63240
SHA512cba5e6522ec74a34c1d72204e2eb9ed8497d2b4258867e2a836bf55bcaff5eb90a511d5ff715b8e054ecc42713f82b1e3a048d37d6374eefe423bea0a8b59dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50224cdc99d47ab5f042a0552e6788e73
SHA1ced766f021570fd95e5e26ed242a54e22f1735be
SHA256f7535b10bbabd585e66d53af9211e4cc71f2430d00a088ce1dd8cf25f3c26576
SHA5126e3d2cfcd4ab158d4301703037500f7b44362873f708b908224f1b9b0708cec4ef69bb124bb572f6bddb5951b64d8f82ea667e5ce7fcb1a54900c0d226458015
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0ad51ec9b91a06d7b04520e6b3b2279
SHA19b550b102d8b1bf43243fe98ed86f2165c9dca85
SHA2567388f03498447faf49e085cff6461f7e798636d2e6548088579602032ae6bb12
SHA512af18f3f75fee994d80f05c4614e4d2700fb4cb0f89df636d309668ad175b100199470316c2d9877c7c7f6f424f279946ad6117efd38b898281a566de48f3baeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ca56c63e72d6719c47774838e1b1255
SHA1ed24ea941b9927876b9a250e879803a053c71590
SHA25697d5ea19d097529afc752ab50a549bbf3fb490bf69bcd2d9539c7855c2a752fb
SHA512d0a081696d685dba2f5a8dc6b2bd3f8414452521dbe1233c503664427bf1fd30997983eee3dcf049624688e19b03c9940b9441bf4b9d2d34d1408ec36a4e75cf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b