Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 22:23
Static task
static1
Behavioral task
behavioral1
Sample
94f9e4871e5cbc891a5b6f64990c1e6d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
94f9e4871e5cbc891a5b6f64990c1e6d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
94f9e4871e5cbc891a5b6f64990c1e6d_JaffaCakes118.html
-
Size
77KB
-
MD5
94f9e4871e5cbc891a5b6f64990c1e6d
-
SHA1
23f9fe0a887ad44b7c87be42f0ed715f449b66b5
-
SHA256
d8cc2b62e1c8dc52973960ee519ddbb663c4cdd907dc3f659c884ff343554cba
-
SHA512
633886e995365c8f45300095add61527d87014d1cc70fb0c5e63094f9680d86b213717f9a2775c7eacbe060bde45463deb49dae485d85c66e6a88c3b6aad94be
-
SSDEEP
768:Zcd9QZBC7mOdMrH0neWpC5I9nC4OoZlMyjOXCxY9eBz5HrBBR73rbNl2sDU1u12s:gQZBCCOdn0IxCmy4VJPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0f1d186cfedda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429749685" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000004b70d84def144fd80872efb402041445d5de4cd57d366289184afcdee7775044000000000e80000000020000200000008e46259cb6fa57f8292a71ee87b6b36b2fae12055e96ecd86a5000939d4e35ed20000000dd007216793b7d7db400510f8dc1ef58f2d46504b4bd2d3216ad0904195545d340000000240f87d00af7b62955ef005283e2d06bd8bd098e28a08be6d3fa6918fd598df526c3ad74a726f6484e77bc4f37316f405d0b6e3d08acc064400a6eb52b9917fc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000c401b14d198509bb6f260e43494320d56c3905617b5c862527e0f241cd10ac3f000000000e8000000002000020000000764f58fb6771636206509c6e7c5118462f220ff386ef6b8ccd2df6bd43e21aa090000000de899395457f7e02b5e30c011e47bf75422b35630ce2d6de48561e21d465133b790f665cc2fe660ad4e41fe2d7516c156a86bd4c147cab604d89d02ed59939186dbfbba222f7d264638192ed6341eb759e760938e3b5bac63651cb1925042a389a7552629869c73ebf0270f489460e57e96648c699c60ee2148c9a2cc1f57ef018ca55c0ba3eb81aeb2d0be6120a706a40000000ac5930627ac044154a03fde1d16a5408cc7eb4ccb1793454c201065536175673e65d2960be0fda62dd16166e9923e953b6f554befdd2a27be9bf2370c2ad72c1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AEA30F01-59C2-11EF-AB71-E6140BA5C80C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1908 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1908 iexplore.exe 1908 iexplore.exe 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE 2164 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2164 1908 iexplore.exe 31 PID 1908 wrote to memory of 2164 1908 iexplore.exe 31 PID 1908 wrote to memory of 2164 1908 iexplore.exe 31 PID 1908 wrote to memory of 2164 1908 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\94f9e4871e5cbc891a5b6f64990c1e6d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1908 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3f1b2cd1558d06a8803590feaf0122c
SHA14560baa64816c25dbf89ab6a8cd75202da343944
SHA256f258407598e1afaf552df81a27055081ed254a26f9b3e32e7161506c7c7bd860
SHA512690aff3751620ec7942e617ca243bccb83d492aa5f9367f00dd5fbdd396133ae884e354ed2aa7d17faebe5ab5d4a11ab710b2d1789b1452a6769b8e96cf34792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8bb431b25f0eed43a1f2de6b9e677ac
SHA1c29b62dfbd25c8a3fb7a6ab221ab2d1d896566f5
SHA2566bf43c6d4a54acec09b5f545ad2914dec4e697c2ff55c3d8dec70a00176c58b3
SHA5123831cce31cc91e84c0a1dd5ae88449fdc1c5635c159885f3fda4559ed09faa16a966c5ff43a046811205396431a8d05a7352f0542662ed4791497e944ad60723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51214225a678197961ac7d15e3d4ee54f
SHA11d4ac9682f2450ace0dd96e23ae5845060630a1c
SHA2564120f3ef3b4160addbd529d78d4350215db0e147fce2c8e031446c30ef905c28
SHA5121a0953d3cd232b8f7272388ebf179ca268b9abee278143f7517732ff970c3092095c42b326b288170e23eeb52c9f475e370a3cea41782bb1197f810aa3bb2190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58860e25aed21a8e4cab520a9c52d3770
SHA1a769b9fd510243a498b1dced1cca226e43ab3071
SHA25647a9990bb120f1814f1e904e6c7f4a4c6952001ab879f1b7fd4e935b450ce961
SHA51263c5b3312efad0a9f0515005e93f2ac3ef32d2ffebc66e7cbd5bedc84af64abed4f56134a35b8c45dda7b353243481cd913420aeb675812b085a8e4500ca76b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532d34a5d3dc876df9daa6dcf66aad7bd
SHA154366dbedbde23cf35fd53f4f17861c830ebb25d
SHA256de73d2e600df12c836312d19ce199f901ebc958cd52888d199769737006cf2bf
SHA512c1c90545228f104944c640fb7261a92c8e38d56f0fe7744c2d9696bf6acd63accdaaf5e8d2bb82a94aeffae1b5ec13f77bc255cfb644187ec8f1ca6236a5d848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52411f2692b5dd216ffd8ce1adbdb6a5e
SHA10b0f82135972e8cf8ca32d300652c954c444a85c
SHA2564ca8b38b3a5f054505e745c1c36526c915795b2c95e053e81edffdbdf7609c7a
SHA51244fcca838be214a55b75d0e08f2d6b0d484153fa07ef86eb3858dcba774d12da43a5dbdd46c6470505e5fd101207302653edea06bacada8b7138616a20ada350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5919ecd5ba595e513c534de2512de1721
SHA1b056d1f3c6ce364ea846d5403c3e9880568783a9
SHA256acc02f25ae66494f4b77f23892b935ff602754f881b368748e871b9f5bbea8f2
SHA51231b7301dece882da122548f862021082e118d7a1333d4a7e75a87bcafc7830ff9e626af4f812a9a750f0724aa5aa53efb236ca7475da38ae996b8b453cda70b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce7780bbc5a40b755b5ad522b37ea945
SHA1c4e0f2390022c885d07cf886d9ea2bb8e3f61c80
SHA25668c1d87ccaa6925203e0390ba2c498e2a11578b72a63a76c6cfd8e302fef858f
SHA51218b522fe75a05e76d687daa270710efc2b5d53527c4874bda138012e3ed9b485400c9db29b85f39f0885d630d745594972faa770225ccf896f6d75212a1eee02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecf35cff606cc8873a6399f2442b988a
SHA1ada9fcac5685d3a8d6bd81e7ef900f4c3e39333c
SHA2566060bc0e62af9948f1a030b8a582cb0279bcc8ba99550f4dbee4de61458cf792
SHA512b1021dfe578574e01a805a9f2d4f143da4f27f7ffd9eb9eb947d05e531c1f0e91ef3c5b8d9cedb865e775a20fd0a81e029ad5863291e7f3f77ae424544b29b6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f2cca88906b8288151ae2fe5a7bcf2d
SHA120e58ce1720578147916a6e006d64b8471608cb7
SHA256363699c94cadef7fbeab70a7015d74c0177dfcd3216eb51a5d9fe781d2c37f0c
SHA5122efdaea2a17afe928efc637c9dfe2c0734bcac33b012f4104014a733a28510433fd9c985efebf0fffb3ad54e05c0a74e92867258ba7e83768800ced31138c277
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c44ba2d53e0d76ca7647049758064292
SHA15b4e92db45d4081c393f2e0ead93f96d2df0ed4e
SHA2566b188035f4423083cb7808578493c3750226c013b605fbc31b89039d1a2145b9
SHA5128448291393a8aebed333252109fd8d384dd9167d7c6e378bc2cc956debc8bb95714b94df81d399cd74e31801939cc4e48942e05195023bebcf0077ed6d5301d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd9e1799937fa49687014c7ad48e060b
SHA1b6f396d4ae6c778ecb3d4473e09d478740a65e7e
SHA2566db340fd8217e3fa095f78899a4bac47f8591b104c249951ce57d5554bce22a9
SHA51211fd229de9c081003ecc9ff4130ac84613b59a12a6e527016a98ce7f7d048042e126cc03a173988fb271bf6d639096eb05fce7d350336b74cf188769cc2c4fd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7eccf3ee5afbfb7897be451d005b4e7
SHA1f1926b205afdccbdf6c6748eaf859206190a4a09
SHA25602517cef38882e0913c08990b75a0cce389a7bae22493719848a54275ef6c56a
SHA512699752f9db772c29baab36000df12ae224c67492ed58de1fde63ae658ce816ae6aec66fd47a301264029839adf293c1ae4fb73d9413b306322fb3d6c19c0741d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565b4e982686133bf3afc026ecf47a6da
SHA184bd42a62f290fa7fc5c7c5a22c7fc0d8af96cb7
SHA256274b1adbf3ae91d225f144be40e42e6a3917588d71fd80ae3f845ab9d8aaf93a
SHA512635ccc7c93b806da51ae5c319fbc6f7f85a9aeb08f10610a85f72a21f068b6d4e1a8c09116e69b0f4af09b92bb2818246818db97859140369ecc287ce443b714
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da2f3fd33056c1344f39fb8bfceb6f79
SHA184db859acd0bbeb81fda215f41a8bb9589189e23
SHA256a4970c3d8dbe88f9f85d067e57c95b16ce88c2a078a51fc9c464f23427c13ae5
SHA512a2d825e0ed2f1392c081585b3a2ed30f146b1100c4e7295afceab2519a6727cc741317e16041e0d4e61606803df5f83071702ebb4de7f2086cd416643506ef6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1cbc5609a09cf7af8bfef7665463e98
SHA15d9a63f0ded98ce8f47125392c2088e1b794a305
SHA2561908fb4be3ea9188f1ea317bd3bd441ec2f4b847be552423631dfc6c6917522d
SHA5120014ce691362c26bd83c1ccfbb8995afadc51dcd3a5cdd78d0cb75527ddc5a422ea0654dbaf37b1ff9940e7b1c62bff15f37d7dddffb8f8f46b1e5afa3f4f35f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e17685eaf7f45ec7fbffaf3b713a1c5
SHA1b82379967a450074a6c8023baebf71a2a4c23372
SHA2567ab0932d53093fdfc05eb842459a8b46abaf8f1fa946e362fe559e0a168e9157
SHA51283f1c923dae528dda5ba53b5fe130c4cacf132b2ab6f5284af592e78c59d91723b4efd3286fdb757e81c44a3c5c4ab5e9b730dbeb6957b0eb84818c83a2a1a3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f9052e90a98b304381c85ebda202512
SHA1f597ce784514024ddf5cfadd231404257cabf184
SHA2568f746d46550d06691977ded9a04dd2806ed4bc886ad34f37508d42f4c311c976
SHA51230a0e9b87e773f84a6e04ccd75d19c0760e0c50fd29383301fa5abbe2edb29cc210c3c0d5f608a00906f37c80e7bd4add2738f155fcd4ca5d997c238711b5a03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e42eb6ba6014099775d29d8ab8e5adf
SHA1616b89a23f394bc9fdce6d6319dc9187c8084f4f
SHA256df94339695bcce661838942707ff95bb732372dcc23a0db58f2c1f63f748b457
SHA51248d2eeb88d7d922e4f0a4a25911be895f6e6cc2668d6c05c112edc3efaf11a36dbaf978bc3d25b02cc854a314f228fee41855feaaf9e7832f4d6d96d5ba800c9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b