Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 17:27
Static task
static1
Behavioral task
behavioral1
Sample
bf1a6089e5bd428e0ce20abf6bbb7930_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bf1a6089e5bd428e0ce20abf6bbb7930_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
bf1a6089e5bd428e0ce20abf6bbb7930_JaffaCakes118.html
-
Size
460KB
-
MD5
bf1a6089e5bd428e0ce20abf6bbb7930
-
SHA1
b1c6f1e34d062947632c72f5aeb456519c9cb821
-
SHA256
c9a32de27f747c05cc57f64596afe1cf0e91e72330cb10f484eaab30e0d640bc
-
SHA512
70d1a7157446c94d44f7d27e38e96f550d0202086eeee95c75eedcfd4d61fe4c4e97356e9a8c0a202faecba6c90449982cb23a72550e40e4a51bc9a8c2c5ba70
-
SSDEEP
6144:S7sMYod+X3oI+YJsMYod+X3oI+YasMYod+X3oI+YLsMYod+X3oI+YQ:Q5d+X3r5d+X3e5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3110F501-623E-11EF-A850-F62146527E3B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000003d669b909d6dafa6f700602e0ac2af8d3007237db24287e685a8b9e33e37d066000000000e8000000002000020000000139094cdb906c17703aab42776bfbd1dcf57e7801fe3dbcb0b16e9f038356d7c90000000183b5cf43cf23a46ecfff4dbde3ae0568c0acfe1b488841c7f44e3ce9fd549e04d21b4f22891c0a03437dd5beadd7ddc5a4f48415dfd5a0e63ded97e1b0e037f0daaf7699761dcbc91838c0d426ebf51880838810dc0886ae9b40a78b7c1524bdfaa049efe645c540a0dfb8537baff9f4143c825672758ae612d362e8fceb46272424baf503897f8bc61b65ac1a713f740000000d5a15807f8a31e1fde1235dd4ef3a8c3b556fdf45c8d96ff85b01742420c9679736afb28dfe0237c2cfc0206153af9f316e12f4e71d5f0dfd3993548a863232c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430682340" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4002a5094bf6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000c16ad4ff14f907a680a6864d4a9b984ff0b4d482bf8bf5c4123e3749d88cef5e000000000e800000000200002000000073b7d2d750bda04c12c01db4b074ed6476f45d242b10b689de4f9ec9f29ab73c20000000a516ffb1897987d9c79249394fa1c3aee21e5e9140619cd8f47b2b619b83bb44400000005376447601f02fc56618c908c4c971564892223487d226e0f75bd430543a1462d34f7603c73f5d0e30e11cbabb1c553db9c147715d8444d94f6e807281c41e85 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1820 iexplore.exe 1820 iexplore.exe 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE 1272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1820 wrote to memory of 1272 1820 iexplore.exe 29 PID 1820 wrote to memory of 1272 1820 iexplore.exe 29 PID 1820 wrote to memory of 1272 1820 iexplore.exe 29 PID 1820 wrote to memory of 1272 1820 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\bf1a6089e5bd428e0ce20abf6bbb7930_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585d53b1bc7942e6d29fefd070c699eb7
SHA1f18216a91467def38074e115d2d0264b32eb7651
SHA256f33124297b0bc41ed886335ec81afcbaca30532ad473f9cc339bae3b59d7bc98
SHA5123e15fad83ef4edae0820f0e9e6e007af926a91b1e3f9301b0e9ac301520046ab3c24998705679aae0d6e4bd5f2510b0529ebbf54a729cdb0b6a444632e9a610f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53933d9ec4362691296b72d6ab66fdc29
SHA14f3f0774ca2eb10c4242db25f566351f4e064746
SHA2566e51af30f332cade25e0f4ca3d75d7a73c405b0916a84ce253fab554ce263097
SHA512e8fa264146f37f5311dc1125d7bf58a1d560a2c5b2b820a7c30f47762983d96c5f399bf8476ea3c611d5d39327a9f84f92aa8c285eee9393432000fb002bd9b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7de5558cf686da94165ae6ae111ee7e
SHA1c9e48939a45e6151709b378d97f7523c373613ec
SHA256e614ede06bbb5239b5a2f69cbd27626791acee5ebcae27fe6fa4dd618d48b47c
SHA512d5fae513ec2aea38ecf3668e4843ce2891d1740d7ee7c19ddbaf4f0755d3588200febe4a3014d3c802b30e9eb9c591e1e452e081b8f2270fc6ccba2462f647f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5618ab3fec08bbb626ff62951ce1a1520
SHA1759962bc8b4e03530df699e614491150a45c2bca
SHA256e6aa2fbf62657d1a87969f29fc3082acf82a8a495c6fd3e2e60e881ce086a62e
SHA5124a44ab4b5c9f009306c0b2da2f4bde6774f7d07879ef20db4572b2baba7a78b14408e1241d23039de0891b3d576131750427ca53a95c5b72bb578ebf21ef5363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50462be11a28c721f4d151ded70e04c18
SHA10c0c2df31f188e256de07614950ce8e87efe3aac
SHA256d1150bb8c85b4e83ef46531594096b9519091f7043a5034bf789afa5db65eab1
SHA51231183ce2b2fd16994d8b432d88efbf75ab9979f8ad17c41a8a5c1064ac9d1f17754791de71da7bf397887f98f75fc0b4a35c8e1361d25929870bf7045a594588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5045aca0b960bae2a6e1a626504d476b5
SHA1b25d5e9715564fb6085818e9c669935a6447179f
SHA256381f7501ff19f433c93d229d3167729cf54815562d1e88ab8e58210b9aa4949e
SHA512be7581db80b0470893c0dbf6edd8e897e3604a6e76cda5c9d52357f4346e2f89aecbe4bbdca5be102a9d64791223c3d41ed3f47cd176eb3b37ecc27d214ecde4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cd6554d043f52f1ac8fa0a1612ac80d
SHA1eead750d840f9020657135f739f9b0f177b9a742
SHA2565dc009923b157ab86296c2c91b361c24f79cf6c121deb077bd51e5807f88e8e0
SHA512e16ca9be7fe38ba9713a10cec25fca9d8115896fed110a2fb2dfdb33411cee252f80f030a382777e5bb537699d188e79e2159df461c91c4271c08b1cf5181aa2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f35a9f407b5c4f5d1a479171e22483f1
SHA19da9ca85c7082df4672628852ae967921dcba1e2
SHA25647482f1166ae68491f60a91305292b689efb6d380f13d28f753a936e0d497def
SHA512286c71554a3a8f4331ef45b8335ff4c7f64da3ff26bf476d8f279aad5d01acb37b2501d1858ee1e40c82e7671ad9f242832da838157696dad854367768037dc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd2626939710b0bad5cc89448bad6b8b
SHA190270aa0b237d164841def5bc7a969bca9a7450a
SHA256b7dc46df6a49ad924445b37c60565593be06e590308e00fa9a93dcef22cd05cb
SHA512a7c969653e147cf30e87ee3cf6badc8f968478622fe83a929fb7943430fa6eff4805ffb62f7c24fd687bb017ff2ff16e3ec0f181291ddcd17a893ba4dae24bd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0864ba947624ad4c7f022fd378130a7
SHA1034bb3fc1833a045373e2d303ac9c5639e24db44
SHA256655d791ed7b0f7eef21e992dc4af52d6209dff312884946215d6284a00df7867
SHA512b612901f7d8b7ef22d583d03fbf0ec80a12e9ad53a8bc17753cac5b466923bf4e78981028d2ddec6be25cb0d5d0f4ec6e437962d8521728b5e8f5494065a71b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513c51e6f07fc9f2b17707ec1d4b40f89
SHA1d65176cb86b5669dc8c943f539c9711dd1e87e3f
SHA256b3bc368d4a00b05747d3cb76a01aecb0987422a13ccf60ebb0da1eee73a3c3b1
SHA512f66298b483e8b5417c6e00fadd74af791ae3440dfa8c1cadb27bed97f047c6d5672b7f573da857b3e28e35673e6fa380b30385a5347ff1ab6306b2a4fc5709b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe5ca77413cd5c0cf3c51ea40eeb0587
SHA1067de07b5785f18f009340eab92aad4436271183
SHA25689c7bc2ff5e8f9bf9e2349ba3de6379f820932ca0d0202018e0d50b1a51bf1bb
SHA512b09464b79b5f60dc8f37cdd287e02894dff614eca3d5a66d9757d402d4e5a4986787b103188df484f69e40c81f8d4397f9b3237b0510c22c1097f03dafc8f89f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57273b51c7525e21ad90600596a1a4faf
SHA1f68ac5544e33ef2065bf67c55f045f2f33e9245b
SHA25685600324a38a5d5efa128144f86999af6ac78122d63f29cf4bcfc2082deaa813
SHA5123403c302049ba9ffc4e47167927482b664469a23028874fbd9101255ec471df14b87486238e00c39b413fb12e13db6e074320a5ac682f6deb889e26ae71d87ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536fdd8ee6d6a7ea206b6a28aec3fb5de
SHA1953bec8d13047d313578515d2bd9ce9919e9bbba
SHA25686e0c068dab6a2ea5af56f9aaac8060f12645805368694b2f85322923150470a
SHA512c2dd5cf7909362137d61cd7cd3d6b942df6a31665d8765101cf874de8706f0d5d27e984b76b29232e707f031085e70a5a79fd7178e56c12df76ae0302e88ad93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8a1afdd593ec8ba9ade79ccffce1c67
SHA14d0c04fece2265cbacacdd8d4d6438a31db5640a
SHA2566ae89f42c3c343648e19ab34d61f7a0d71737544c7a78e4f4fdcbd9ef1128626
SHA5127d1fa750b3c54579a8da49d5d13d9aa353ead9c4938efadab2c40dae5b272f649ecdd7060c2b8caecbd0212e0d19558dda542df8313242ea1940047edce4de19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac8c9ec238c47b0c1c644d2fe293aa2e
SHA1e5a1156e318d376a84800e5d24d04c2a5e238aa5
SHA256e360c374d20632b23a9140b68504b339d97e3b6847ec439f82a73c726cf61369
SHA512fc6263b2212860362522f17028cae98f545eaa5b4861efa91f718d6da9ed7ca3605edd10d2be6eab2ec698af45e99b173529e2b5376f75368a32f908129b1acb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbb73f9585a95df8ea1bd41b802d70cd
SHA1c6ff74ab0dae5c8153427076bd82e303648ba6f7
SHA2568d18a6e7efbd720c30e4bc67d45e7de8ad91a1fd50eb63033f275d5f8912f2fb
SHA5129f341988f4bb60a9f12c84c6d866c9fded1fccdc5a6ac16c232ed69e0f49e3f370dbd9911be6bff9f23596d1a507b4b9691486e3e76bec875e708d90506cfbbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbae4947f792c6b8edd7fa0a9e82d2f8
SHA16a17f9065d9f9e9f1c9ef2b33540ad0411d8df12
SHA2563fbeb78c24509311aff5f6d5500e573fcf1f38749d929e55ac082b0ec9bacb02
SHA512214dc1e228d0426f2f5cf191b338d8f5314580421bf428dc223850d5f2e6923185c68de8459dfb3071ec654123f6bcac7c7a7eda914d34dfa688eee7b32199d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a5db6c68e57c108cc6440cf522ad517
SHA10856bdec6974f0b1fc65370f1c3692ba2db7a6e1
SHA25631d7a5a1f3ea47524366b634c7a939008f95207b0770a26cff940914ae060bae
SHA5127723e27059cebb76943756de42c226f7484389d4bdd2234ea94fe0e24a1d30c495b39f0a132e5c22068eb5cc45daabbe793747c76b1b282dc476fa422997cc70
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b