Analysis
-
max time kernel
148s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 05:08
Static task
static1
Behavioral task
behavioral1
Sample
891cd6784a21bd50940cc5aeedc5ea5b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
891cd6784a21bd50940cc5aeedc5ea5b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
891cd6784a21bd50940cc5aeedc5ea5b_JaffaCakes118.html
-
Size
26KB
-
MD5
891cd6784a21bd50940cc5aeedc5ea5b
-
SHA1
d1d0f67fec3ee7483298778b3ead167ac133b8bd
-
SHA256
5003b8bd4a9e6416bae9b11989318f4d9bfa71bf6ef6814e203dcd24ad82e3aa
-
SHA512
58fdc84406594960e004e34373c884d9313ad38a7d649358e74b642cc45c645c42679b28248a4d0befc9d40215e129ed65a57b01e2846756478944ba4577cc40
-
SSDEEP
384:qK1qPyVdP69GV1thPnA2sNz1VuqIqkwq17v2XUNqrVyjaGA3c6TlOE+NucMXMzZt:qK1qW7v2Xt/RywopnB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429514762" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B5502DD1-579F-11EF-8D34-5A77BF4D32F0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000666c543b667c5b18c940579cea55d88dcc7317a781aa49c232a2117b1dce5106000000000e8000000002000020000000ea43e56a9f6f50d0e7146ffdacf765c0c70c01bf420712891fa2f976a32aad082000000030e58dc9152a4755902dfb4abb20b68b29d8d98226c0472751b078399bfed446400000007f38e4dea28288df15119de459cfb9be826e250b4103876c633f86c99defcfad04055517e4b060eb7bb987938a50737f82b6bd650fa5a636b84fa4c3b24cfa27 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000ce9e390683b4bb6dee466fd30f15dedb69c89f1e3822fb38867947c9b3536de6000000000e800000000200002000000053df1330f4fb5b32912312389c0fedc915c90ac887589cbddbd04927dc68f8c39000000075b2266bfa26346e7b48172cdc9c03ad54f382d46b64d848cfd5355a30f417c456dd1505f2a63bec47a85b9476e1f9a62c717d36b22ac1b5312a4c8fdf543a7645f79a575ba23e562ca03d70fe33bc1af751e911194265635f84d3c0a21493b1417d86c021d877f1f1815039eceef53bad6fe4e82ae1ffca29da841811dd4684bc8221d74b601f2c63f9cc57a37a271840000000d43cdb81d9c80e4cf50f75486a57220731319c1acf9caf5aa71ce0db0273569baa2abdac2c74191c39526137e1b4c524c88f51839d8dff4066b9775b6b235810 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40eb848aacebda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2816 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2816 iexplore.exe 2816 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2816 wrote to memory of 2800 2816 iexplore.exe 30 PID 2816 wrote to memory of 2800 2816 iexplore.exe 30 PID 2816 wrote to memory of 2800 2816 iexplore.exe 30 PID 2816 wrote to memory of 2800 2816 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\891cd6784a21bd50940cc5aeedc5ea5b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2816 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56480c721a4a0abf882ed617e3bddcfd2
SHA1b60b4c8578a13be5dec94db12a2dcfc8210ab760
SHA256168bf0e24bf563ca19b72eae1340c67562f95a7df62f804d5f1c21e79cad886d
SHA51293ceb6c29b1b94d1b96ab2e16b1bc536e3a2d9f2b54ba8e1944599634cfe77470be44fb66239055e394f1694595b0c71ecff17005304214f91cdbf5dface842d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546a6c2f9df9657813e3f9cfc619bd775
SHA173cd6f8a0c54d2a3c80c90b89641b608363fc4e0
SHA256f8ac4a91e86dfa32f755f193aa43253785844b599d8550ccc7b6f2532caeea4c
SHA5121c4ae4601a228b0fc0f7fe2ce44a55048fc92821fd541476d7b44c82ca04b42a3ace725c9c272a39a290226718546503562f7a7d443ed0dd3b9f1abda0957832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52de279eae14824675304fbdb4635793f
SHA176c80c96466416ddea2a53751fc6d08e975e97bb
SHA256e45916864af21c53f17753f06c8b98dab4d6a1c102cdb22cb97890e31ded2334
SHA51218d9ebe315709537c0c21bd9c520051f9d3f00cf63bd827f99c6ec545ab28b62f707e771e5f3245630854d628d9d0311ebdf3054513f8d74271bc51e82801957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545148d18e5fc03368a284eb30b649cd3
SHA12f737aae1d2bc065326c92ca01e4d3dedbe10518
SHA256af4b838e562082b8b50d7b4687174776e2532413a41bd62fc550c2cb843241dd
SHA51278d5b91093fbeed1b46ca4e6fd7df10c95a1825da29517dc53c65328733fed31b353e2a4c0ad171996e2ade003774335f09379eb71bf480259abca194baf8e23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc2baec05cffee5442e1d8049d1d3df0
SHA12f081db388fcf596030c4dbf82d2f8c3718dd990
SHA2564d8cbd72a8c11ad90a9db4536bde5f40e9ccc0f9b71f0fd91014e279bf6ba70d
SHA512b82b833d42b79b532540d019f8132fe14d15ca5cf5277a2665361ad1ee7bada9feebbf7c4116059eee9ce1aeae5ae36c44bc88a6b19393bcef152717421fbf16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d33f18939db908dcbcfa1a86efd366b
SHA15cf4bc673ac884f01d6f92a74bf34a4389607d12
SHA25641f7eb2acbf3e94919915e2f1479741a54e7bed480804796821c05f4612bec40
SHA512ccccb7cba94445ef6f2e204cee98038584190b6e0fdf54a4c275362fcbf86b4f059b9c1f15ef213df33bc37d8beafb76ae5584b637dff9ce37cdcc911bed10ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5500cee197e590e060600e830093ef4e9
SHA17159c528e634d916d2199b5a4c12fd245bc4cb9d
SHA25604c21f6fa77a507a593b689417bc121f9c10d3846eea2b5d989edfeae3a5510a
SHA512f5c63e7e3a6f741720f45b680fd385c02b1eac95a4249e0c639e09ac16de035183fcf11dcb5e4f3c76c891b67e1a47db106bb2c1702ba4f0cf139aad7448771e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e66a82099bf3c08c3e6559c31f316ebd
SHA1146df2abae9b90fa57fc0031613b450c509a6864
SHA25624447069aa3569856fba1016a684e18ac9130f2abc9ae62b06273a23109d6e9c
SHA5122a064160e61020d824d91e52b583fd7a83aa401704e79eaee16226f9e7056497c38f941ac807d404eb7331990acb52ac9d38eb6c4c6d67831174a306bd54fe0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562432133ef2c41bd74049ae3e91935b9
SHA16cc5e49a2a5c0633b7b31c27ae426307fbd6b0e7
SHA256d9ea7921281701ab8a7b0d493706e0c2ea6b69ae945aaae2dd8860eb457f291f
SHA51269b408e9380bffae046d8c370ffdabc5186edd8e374c9d606b169c8c89bef27bf1d967b7aa3962e66fe3833bf42b515f518df5bda3a375529e08ae8da68d5adf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509536cf5a9a57df743e76ae376227138
SHA1e5f5fc0b9b9bad6b72ed4f6b380da7401cd4461a
SHA2566c4b286a196aba13c7fa72717c5027bbfab7ac94ae4b8883f76f29e251581f9a
SHA5127f7affeab1b1f84191016822da3ba3bf12b798740ebe6c7bad1470b7da06a842bb177b16c9099e0d5d26f93ba8ecd4804c6bc79f19a461a34239d3142e53e76f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ac6e864b882527c7c1fa2a0488dbb16
SHA1fa80aab1a6e8f6f97713c19cf78d58038f3f0f3e
SHA2568f73e6af2061a0b06f18f4c0d3cec6f4715631b52794eb9dc93c1f12b2476924
SHA512642555aa7fc92bdb85346ed2fb448cae42806a736c0023a9761f09a50c298c9cc0aa09c175f85e59c24d353e01aedbbaad57e03e94bb9b3a239d7723541154a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cd42e2f937ab8af2db35127473f7640
SHA1441dd4e0bf9db4ceab9f5cd2eea63b3f4cb12bb4
SHA256ce17d3e7cf3862d7645f516acd30218b2179652f7efc6f56e63b3e1307466346
SHA51292cf6ae42262a250031442e0bca8f23c807975c75547fc6122e7a8ca16aaafc902a62e3f465db507ce17008222993d3a6bd3f50aebc9d97e680521629c29cd2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa77e01419b2746bd64a775fb8875643
SHA1c5032a4824b49a9f14eb8befa488241090051e25
SHA256d507a7753b946633df606b8f4e0c54b3cc8be6c6d6ee7c66694778d7d6473107
SHA51268602dcce960a004d8d9eb62d2d01b49555b57dc02571f89f53ef4e1482e6a6015593907a70350f117a68729df4aca0cd90edb3c92f1e38bf4efb83c0e98ad6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fefe7380458a5a2e4cc228e58300fbb
SHA1f884b48570935406f26dba92e1d8321acb234ebe
SHA256427900bea6eeb8207db86b6bbcd0868d4999fb3685798403552cc0248a9e9bd5
SHA512a26fefaa398e995173b1d9399f538a58102127f419baff393b6fc1df1ecb66a6190aa3e6afca6edc81c8123f4318d9df57181d45f5cf3e541fca4aefefc4a59e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a327a073dc22d72ceb28d926eaac1dba
SHA12d4a7e9fd62d1a315ac0eba70d21a8469a2a6db0
SHA256f6c44725347d02dc3827b50af52503f9a597a5be8057cf2a9da188d1eb4ca3cc
SHA5122d82e170806065cf5f69c51573637e0c16d5ba436582b78ada45e2cb4589be89d8d0310b63b1fc8485e162bb2a365d3645bba0b2c8fe3dc70e2ac01a677041b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc34ee862cc1d87b769c7ab33e393d5a
SHA1275866d206abf7e31a0eab2c986179b9fd853cec
SHA25654a49e884cc3884e1aedd285e414c92cf9ad434a6f501766a99ffbf24e1d3ae8
SHA5122f6897033c288b2d626a30064957833ed2fe477261916e0378f99f81f9e6b678d3ff666f2ba87de0fd4ceca5a31251cb76948944e0d4ddaa501d91bc3e986e10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b22828e876e1674bab1fe39be4b1deed
SHA1920f94b0e2d607e41d0a9d372830d487d038e8ab
SHA2561009f6e819407e9f8819d8ad79586115ab7475a02133cbef8cee13cb36548b40
SHA5128e46418479660747fcf238dcab4f10b1c443b956572dcc957c02644a17495c755764c2830b858050c0337348cbab33cb8250e52f0044889c3b67e8ce548303a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dc0c92e816324c1bf294dd512dd6eee
SHA1380ecc5469d08d0d55048ebaaafc7904ccf45506
SHA2567b38a27e75b55eae84e27e2c877f3b24ec400974d6b34d9720c0aaf53d905d5d
SHA512712cc99562de06c0b22c26a2598d1748c363fb6d6d1c68c14f1b018cdb970a059acaf46259120bb2c2a6523092f92f57d1903dff1dfcab1c379e3f09d5b91a29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d87bf23796db18c11cb695197d749af
SHA1228c76d121d54191edb15d4242a52c173bb4ab2b
SHA25633d47fd134307cbcf9601e6301a8ea18443f7a2aa62403d8636f08dbf9156583
SHA51209ab06c453b09d8ddbf7d63c85c000f842ede406469612fb1b7f3eeefcf1f3109a868cb58cd1c84af543de92c292c09f76e29250f61e9f1a579e44efa531b1ac
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b