Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 00:27
Static task
static1
Behavioral task
behavioral1
Sample
181d6bd2cfab6a1853bbcef5b12eb441_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
181d6bd2cfab6a1853bbcef5b12eb441_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
181d6bd2cfab6a1853bbcef5b12eb441_JaffaCakes118.html
-
Size
6KB
-
MD5
181d6bd2cfab6a1853bbcef5b12eb441
-
SHA1
802adf69a35f9974842fe7de0583033d58ef6348
-
SHA256
46b1bb0bdae63f0c2b04dc2d1bb35cab74c3114931eb5f8189d0dc521c241405
-
SHA512
2cb601090700e1a866625ccade84c58c7ba495b82d86d374c8b691d00a6b3eb6ac9beec259d5687930a57bb58c7d904e3adfb02f672df29a42ce95f0bbf1405c
-
SSDEEP
96:uzVs+ux7/YLLY1k9o84d12ef7CSTUjwp/6/NcEZ7ru7f:csz7/YAYS/q04Nb76f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{40E98E51-34E5-11EF-8875-5E4DB530A215} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000fbe528213af318edab4ab48c5aa5b90ce50ff85f12532f87c5733910239dad3b000000000e8000000002000020000000809d999647c2f5abbc0e2a977b20964273a29eb8077714b1a2c47fbdbb8917862000000050aa2b128b214d133677685497bed3fc2e2248f784d0b1073a0cda4448a2a4e140000000496b0241791905d8eb2e697e4e8887486828c39217dd89e26f9fd2b64760c0469502282ef5ebcc18441856262be9d4999f3a331e4262bec53116365fdcc42981 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425696338" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70c5682ef2c8da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2016 iexplore.exe 2016 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2944 2016 iexplore.exe 28 PID 2016 wrote to memory of 2944 2016 iexplore.exe 28 PID 2016 wrote to memory of 2944 2016 iexplore.exe 28 PID 2016 wrote to memory of 2944 2016 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\181d6bd2cfab6a1853bbcef5b12eb441_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddff0cc5191e5f417a13ea971303f938
SHA1004e59179bcfdd5923081fdba295037df285c128
SHA25668026277e3f1de2424304f46e3ee19567a61a885337f00de87ebd0fdafbe0fc1
SHA512d00b9cd24707fc02ec7d1726c92bfb83d4e85f728d4b455bc8a15d29d5c5d1ba3a07171a63ac16666230a673950516213303044ada6ef57d01a7b800452e8bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c28d18f4ddbca723c55a589ac8e9d1f
SHA1ff1387d77fac8eb1f31873ec78970070710d0503
SHA2566b73ebbb1f98fa29995e9f3a1abbbfbbf45ddcc3cfbd50d30f6f85003c0b5dd5
SHA512065dfc558605f542ee1933bcb1efd42e237855f782f7bf7848b70a6359a197d6ea20796605f8db223d830db911d6a709dc1e8e28926a376178ff62b888fac1da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f07058f3ca231b34773b94913c9390a6
SHA11d4eb3527dc7cfd5215ea2b77a1333d770cc06f1
SHA256d271ab44c568cd8c4c4adb3ad3a0a31c4a6b0e17a730912887f57cbeea4240e1
SHA51294606c3a8d3de23e6e0d1dcb5395cd562ecbb915840939aea57fa8d9f5d5291059cc2749a8ca30fb9be8f3d33ceba200fb9c8d2ea433420b19bed5596037b26c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d5db7e599b7c58b2319b8a7ac6da081
SHA12d14ad1d59dcb54b1116639154545119aaeea257
SHA25696e4e7b374933000a3954324ae1fac03c563e6e546d50206fe8c7d9c6627207d
SHA512d1bb0eeaf3a77750542d0838772dee696771004a1a5bce043d1cafe5fdc625c5e0428d8c52d6c4fadeae989c38aedec0d667a60c7b1d21cb8fb4652bd1c7d186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d08ef31c460950ccc2022636e37750f
SHA144a110af8e87e63a3b829a94adaeb721738a56e2
SHA2565c3f16aa8d78799638957e91f33ab7556406cd22ac355cf13b74ca028d8cb3bc
SHA512b74edc55c3d225d0f23a098a345726651e9cfe1561c77f2d615405fa37b3c1b7e090d393a7f9e7f7a9959502fbdca898fa8ee322bb142b34a6ffb33df4306810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526f1f1d8a7604f3e0bc26a30c5bfb5eb
SHA1743d340e79f1e7723b578abd70050801f60d18a3
SHA256a060f6c18c22b59a9a85fa17dd447496a911c728b83532d028af400a60adf9cb
SHA512c62bd4653b5546163067d8567d817cf79064d0c9127e9920b2bf87e1944d8704723b2d736900bf7e095bc6107210f355efb2ef5bb05fbd4011fab42fe0d304e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557423f64d09aa862335305bff1d395cb
SHA163948ca17837844f9c1f2addd506c37899855c70
SHA2565e6a6565468e00bb45612aa0c8e122212a51dc50aa83435543ffd656b409073e
SHA5123e45b64a743f08c3fc8aa42e834d2625cadcae6042c65a6500c4979a27a715c51189a586d2d36bc02d933b0381192b9ac7d83280b2b365cb2cfe93dcdb442e7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b25488b658d11f54defef853422955d2
SHA11611507fb778acab9b06b6c24dad820da9511ca4
SHA256f8fe7c19b8611eb508649ee7e6ea8d81e433fef2e5ddc2ebdf8c1a0da2557434
SHA512b063135f95735e99330668060c1c9a0774f0317bff646c49392cbe37e3b3e725afc378871d4fca5a71dd044a67bf43609ecb10f458ab26a5c3ec4431fd267384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bea621ab8accc25b3d17538be699562
SHA1b7a831410d58eb55c46f0a7518b776a546d142d0
SHA2561ba292ae858c38fb94ee70d6ffca4fb99ca3ceeb3d603af6de8f6725a6283baa
SHA5125f267e8be3980ac7e340e7a90898d145149f2ddf85f525c0d32ea6b55cec5894cc87b836cf1554be5fade040b6d3d0da155a85dfeb031956ccc09d60a7db6c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd3b59e9c1f1d62b5f59606c904c53d7
SHA1912f068678d55a3a98e2aad81ad208184045581b
SHA256e8a2267165a0915def217ecb3f2be7596354db014846e3557970e7e608d40360
SHA51251c527c627497ac27ccf752f15d29cf698f515e7454020d0d165a136a1da98e3d0af8d81d264693dad11abd7c1bc5b3fca01dd83d27cc7f90749f7dbfefd1d21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57553d50492233da68eb621d9d320806a
SHA13496981ce5686fc28342612ccbe3188406668253
SHA2561bce46f579d47a7c3455b846d58fb723d69b19b46eec7b0ff7de6ad8e77f6d9a
SHA51253bb076e3081a68f7aa1d5fa3757221ad00bf794a924c8351163ad055dd6be1386df885e50cf7ed55a7db82241a6ee8a3ab4d5ff2f9e129a83e71cd84ccf335e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581e0828f49ee5fd7ec0cf92a38cacea2
SHA1ae119c95729b181a7ee9a0057ad58d35ef483949
SHA256b6b591d9392248e79f0b7790bb691310c45a6fefb31a3328993a0019fd569b53
SHA5121904a641ddc8741698d505b908d98fdc302bc8944d5e166fc6659a13bf5d66248915e67342b273c003ea626850cde5bc982366659fea9bb643510cebb33e6fd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532f211ec409fd1c06d7a51ddf86e4e78
SHA1028f5991e71047435e8b364a92c0e550891237e4
SHA256660d21f7bd0bf90c072638ca7837b3c6866512ed79d0502e45fc6a32749d39ec
SHA512ac2657a5e17034c623bddda957f36b4252af25e761f09b8882290742c7f950570caa0eb8e1f13937ba61a7f495744c0cd326c443442cb3eaa394431a2ada5d39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54205d2adb1c1f4d8128570236b449e9f
SHA11b01240153f3c06bcaa38bf046f4356a828ebc56
SHA25660220f639a7b96dd769f97d7bf3d6685e31238065f13522a9d5bfb4bab9332de
SHA512ab276f4df7b38f5dce9d132e0dd32ad42cecec9d643e039ffbbd18ede9ce3cd99af168fa976dad6ff12a0eef180a00a322f25226363cb79d7f7202b20063b389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542c050f3efe73677cf54dec3c1b8096a
SHA1a8e45284de10cae224f8744ecf29e95336466a91
SHA2568b839d5c0c0cf8be01a4c0687a2702e6dc3586bd535ef4b74652e7ba20eb2f2b
SHA5128b3d488dcaddd09cf59cf256ee325dd8d3079430ce8437713664c036699ac9e10ee188b9a5ae73ce35a0ba80404f8df9de4a38d77812546d0d3f4c6d4c6f80ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ac56b32fa396ed716454cf7a1a552de
SHA1969b54b5903e9efb3c3b69c2a8187dcf09432192
SHA2567cd1f22f949ba95486aa4a85f14b5deb4cb199475741d7cb9ba6ee9f1ebe5fe7
SHA5122d4dbb833e176151900cdee85c20845dede986da8f22bdeb5008ea9c858295e9449ed524c8cba3a9add4f30548b072f967da2467607fc7acaf1bd86f77fc983b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b9ef758d404bc8c2e31af0080c81f75
SHA19ca59437bc9e21109d670da05df307e7ac291d8c
SHA256b9e6f30a3646c0345f7b36d73f9fd5efeb743af41d607baca98e580c999c9688
SHA5128c952d0b38a5b5676a11f82fdcc696f0dec8dc9ca0cb83d006dec8146fa4b1d55a701aaf7ff6235b519b172649e07170b47fad225e233254f1b75692f508a2b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7e149cbe1399eecee5a4a9252f8f8ba
SHA1c16b7a466f86fcb20665f49f974e47615d19e685
SHA256a7e2ecb20416195bbd3ff77116a1fe14856b307d8dffb1d239ff1cd9fa29702d
SHA5120ac8044bc3569765130155c595ebd5bc823c1ddc0a7e9da778b27f71ae66f006de2cd8068084aeedeba0cf00248cd0b1f1482e4f209a50984b361c36d92abe1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d11b67d548e84361ff611919836a9bb
SHA1cac9c8e1c260f51c4a336ebadc7177e4a5a58fe7
SHA2566bcbd8fff831c9e89542be2f310e1da94dbd5b0b12c2b6cc5c937f81bff66bb2
SHA512beca4108498d1904d03885e09c306e34cd3c3bb1492b301e9edc25861136863d7e970c8dfc2ff30330636e88f775d122f203a644a4586d181ae71d6904695546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a425a4898feb1446b9752c1cf3f6f53
SHA18160f520dc5e7896652b03b83a5f684a4424f5f6
SHA256cbb4a664a3d8405d212cc5d446449751b03d3eeefcff8a6aed0fe82c1a5c90dc
SHA512d954a2ea669e0ba93e9b23277f8cd0da00c73429abf8677a7148bfce7b3f0d28e68c76d9667af2b2db578532fb3f3bc6998d78d5a675fa5b92d8b7b5c224a5e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e31ef3f387a1f44485c2efdba6b09ff
SHA1d82f05e8a996206b7280cb69cbee701bca804770
SHA256e36aa9ab50b07d242368c08a7e30a52fcad279c89e00bda6aa40f3b4950c811f
SHA512217329af9dbdeb8c0daaafbaced10bcef688545248e4454f24ccf4fda729f6fc608d345a81c71b5101ec3f0c4e40ef1878ec3566daa49eab301f8c5ec70e66d4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b