Analysis
-
max time kernel
106s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 15:49
Static task
static1
Behavioral task
behavioral1
Sample
cfe44de1c56bb928a8499f1614dea0e2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfe44de1c56bb928a8499f1614dea0e2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cfe44de1c56bb928a8499f1614dea0e2_JaffaCakes118.html
-
Size
11KB
-
MD5
cfe44de1c56bb928a8499f1614dea0e2
-
SHA1
af3ebca85277c885b4a23d900ed3527ccd53481d
-
SHA256
42106690665fbb07ba2b859c44d5665035245e074205e7f324c4a9023b13e90d
-
SHA512
4743b727ad46290ddf1cb11335d2f84fc3e03a81cd0659651593ac6f7b8ad5c1124da7e62acf624c9aa05c39acc65b5b1e91524cabbd841ccf638b5b74e7f126
-
SSDEEP
192:2ValIsr0r57M4exaXT8IG/w1wvqVkt1SZauBuLbdU8d:salIcIQ4exavG/g8kaguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A2432761-6C67-11EF-9E99-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431799652" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000cccdf124c94ca0f8016ad7be49ccdd3cccc68f7beab183463e7c03e14b413274000000000e8000000002000020000000869bafe90f09140e1afc0d55e717f06cd47c7c14fd3e4b0bbf992dfcc6d3c992900000005a77e55a0128f91198f9d170de51651f97baa6034ff7691f76fdcdb949de3751d9ed866b1a40609d562e661316a1d400350bfc89f7093fce8a28807ddebd13cd11de28e68c07ef86ecca57fbdd31392ed456745b1a6c808db8feb828aa3510751f7c488c26de052f21ad85fa43a517da503b2592b6a28ba6499bc67945509cfbaee4a387c115a628cdfe49396fee685540000000da0782eb152764e45d557e6889367042a575d4fb5eb793fbdcc6024060201e922b2765ba0b4937e380abd851fcb7f62cce764df56a3da2e8a1a7137fb54627f9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 603c96a37400db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000e1874c4cd1a4ad2651c77dde1950e5b2810b2f8cbba7ea922ed61933c8dfccd9000000000e8000000002000020000000f1e54194d5bfde5a11fbdbb8742e60adc946f3e82b37d79668157d2f4083a6822000000095e74c10bfca194e0fb66e1add40902869a515403e0a4fbf3ae5c443c24a2f0640000000d544f191c0f31a95dfdc9a60fcfa4a4ee002350e8db5294bac6c4a1de8388c89136ab2c5a5d4dc10fb4794a5ce7f5cbe92943ad49b27cae1ba2bd60038dd9f78 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2852 2252 iexplore.exe 29 PID 2252 wrote to memory of 2852 2252 iexplore.exe 29 PID 2252 wrote to memory of 2852 2252 iexplore.exe 29 PID 2252 wrote to memory of 2852 2252 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cfe44de1c56bb928a8499f1614dea0e2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a95422bf29ba76a7dfd0c89a3e7c1b6
SHA16bc697e67c15fb00c01944662a7a59c17de8f058
SHA256e6f27997f9080523a31bd47db43c5e5ae10cedc0a19b72b049d659919f02cfde
SHA512f4a222c1fa88b039f193902d5ba52fbf435827aa35a742d435a0c7530c04b3eefcf48470aecd55e79dd2825c8eb3a2651a482e4942e00e87c527436579959697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e016727c493eff36dc94c47a63b6499
SHA15e862a5503d24cbf2f4f996818bb13c540b6d092
SHA256c42066d452881c15e4e4a2a4fec7cb2fd79b9b32cbc4d1506fb070d538c8702d
SHA5123246ef5ce3a7471b7325b6c9262b2bf5cf79991dcd0835aaa796eb94bbc418d869c06f417fc7848d309d6f12a8870a146cb6b707c02a4ee9cc5bb3d9cebda132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbbe72ad92ee10b1ef0d5b53775b3380
SHA1ba9e02f88bbd291109eb4278aaf430fd7c6218d5
SHA256259031252794c2bdb0ed96840827592bc028495f6fb0b062a0c703d9ba7afd08
SHA5127eb22334eccd361eef2f7eaa58deb5e683e19ee436c998c3f43bf568a33816f447e995f883b84ce095b3303b618b1af77b668117adfc5ece857155e9ca2eaad5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5003929aee31d5560d0b713a4663c539b
SHA107495d670baa392b647dadfc6ef97df7f3ccf19b
SHA2562cd0871bf34cc9a7bb343748775a90cd79f6a7607dbc89e32338c181e0868610
SHA5120b20dfaed162ab64b43c45bca8496fa207cedd8abbdc58b654fc1f212616364d054f9a9db81e0c8f4fddce008baea5631a827c42931d24c5e1e934cca61996ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ad77bffb2df500cbb9cfd12ef606d69
SHA12b3c2a3a2a892045354cc118a8a4c7eafe11c439
SHA25601e28eef306ac3c647dc008a849631aaaee0d5aac6e5c7abd4b1462a3fa9d2f1
SHA512d47295c7197e665303101576e78f2821a710f9730d484a93f612b25eaf2c8a6928519bf9fee6c6877c6f09cade21e87e79656739e7683d3620ab81237175fac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a8ac6765f523521956b2f374eef759d
SHA1441bd51b81260738c29e2de3f57f959471a39238
SHA256500c7c4dd902573655b9c14b845cd949b4e1c9111f98e058ff9b4c6343677294
SHA51204251995bac3276a2e9d943d7556fad9bbeed2c019a757a9b4c8eb98d5c359a96fe37de2fd9895fff9947ecaf9124e2ce544b7b4fed33cb03fe960171060ac8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e174074eb7220ec455107a0239b1f88
SHA1d72a126334146254fe16479296ea5a2b58e846d4
SHA256c3ddf397c66206eb267717b0b26ee8b4c0fc2e212357c194efa0015d02dc0f45
SHA51202f1142b9d2e08b9eccc4745f29c82caf6afe3e6ac53b8d1b6918c4059c38177f36ff9c6d4498acf8f84794ecf8b188d6a5a987aa8e10f3c8e7fd11611125d65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5103e7f07f56e71560f4aefdd37816f
SHA1188f8cf3a003ee790073ca99e7222a2c88c80f81
SHA256f5f6d0762ca9b999b6c145dacad7496aacea2c0ac81443ae7c72afed74a6be09
SHA51296b132d17f1a9bd887870d1c689ccc3b8a635dca8af9341a83f365c9f181bcd8b2797a8c46a3754724ccf984ea5638ec87000650a070c9fa3c4b6fcd836315cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dda23fcac96132c480a42c6eaa378228
SHA1265a5ea5353c12f96585afb077c71504e074f14c
SHA2561a3b7f3d1fa7d2f627f9abd4ff14e74ae285523acbf58bf22741f715ec3c127c
SHA512c3477e6feaf9d735f4822f29e5b991f9f22c4290a23c9e1163c0b08f89a97bbe90f3fb1cccd729440044d9f941c7ba5deb2ebc8a43f0e43ec23180e2600809b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbf6c7295dc52320e50cd579fc075f2b
SHA1a0dafba7f97d32802a88b13503a088415291b56f
SHA256e1ef99cc7303496bcce662d99f9c14ec9dd2d8a52a298d4ab26bfbce98ebca3c
SHA51270f921d92c42254081450d61db77baad648892382a3391cbf0e7c75f56fb78e62737ce32bb51a11ed562c101287822e3c7b5ac2df62891e5eee7bdbb6fbf0ba0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d373ab4b38e837ee63ca8a8e7984ed3
SHA196770fabb1b4b4ab92de0cb6c8b796a9ce1c25d3
SHA256b42941a9cd76ffba29b11a458dad9706ecf51f4bc2d57ff56204e3b252a738ca
SHA512d7b124fa5ef8df4d174104d2657103e14f4f366c6dd1df2a76a9625ea484badc7840ca53486677816e0b1e483aa6eec95a1be4de2c89eb1aa15dc2bb717964d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e0f1ca508a8189926d5d86281c7e395
SHA1cc9fd27a015347245cfdcf8a14d51e10f78f5afb
SHA256f7918ac134f303a42bace14921b4ee08dfb78d73c5cfd09e9463cbfa79b1b82e
SHA5123293b0b2907f7e40aebaa2796d7bfb010c4662ead717998fab2ea230ab56a3dddcd1811d43e25a2be11ca2ed4c6bca2313975e458dbbaa5bacc3595d20a1cc2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebce2855fc2715ab2f709fe46891776c
SHA1cbd53d2d5b7a03688e0d085b438e15a4b899ded4
SHA2561e218438683c5d5ac3670d7ab7a4339e2c91f3cac49dd871f86e7ebb7c66e6d0
SHA512774fd47f121e66e7f8c12d00f4cdc9369c11d0ba84879edaed71475815a85b2428bec33c45ba3c05779a5a4b7360234fe9810b17d040f67fac4b748bdb3a1b32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e0345504ca5cf3d1bf4e88084bae399
SHA1ffd71d898efe15e346d3e0de3f40136b05d6dbc2
SHA256479df1d1f399e74e71b36d90020ff3012c54fa2847cc4acd86dd6a9beced7d60
SHA512a5b8575270902643fd346e955bfec42f297061a5bd26a9caabfeef78cf4da139bc89ac0096369e93addd7a9f626c79f4998033674906579ce68155c91c50d685
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51482ee02376c2295f4489c74a1737750
SHA109b78b2a77abbb5acc83cd5b8e898a7e8c77bb91
SHA25649c1ad7976dacffcb28140e5f97abd59a018a95125542ac3ff9afd9e97a91f10
SHA512cf708eba7e88d802b599e714421657bfbd1a8775ee93ea27d0385c39c2e0f6d2bfe39d61d14aa51aa27aacfb0b76f1375bbdca8740651dd315796a9390bc69c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a5fad3eb87d5158278275048feea80c
SHA1989e4a302d9149cd8180186968acadaeaafbe817
SHA2561f3ad184441475602f1576ac8900e933da03a2c8ab2444f354526b2f8846ca31
SHA5125078f0e688a27cd819673ab64b51cdb34e4a34c21304e2681dcebc2728affbb3ff5242390c82cbbde20db55868720eac36cd635dac2b1679fefb182b4e81aadb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553d3f22a1f7323bdb9c76461d4d471e7
SHA1fef8203f99e1bfbe93239129c3294558812e3590
SHA25658e70ab67cffcd729aaa690da1599ad67c4cb57b8b3143208be02e9303e625ac
SHA5122efabfb3c2b2fcc389b4f80bd8ac887943d926c5dda3e7e4c99259acd797362a46f075eb2f6d5bb9fcae71b6083565e9d622126653091688e08b93d99a527975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6fc26a97181ee318a7569ead4f51508
SHA128fc8bc13b359d97914c9d91b6fd5b08bc4eaaa3
SHA256cb1806dafc54cb1184ed74a7d5c215b4846912f153de412b4cfc39c852a482f4
SHA512e71fbda468a99dd497c45d2da9ff499f8630248ea4442a9e202060689a5a8cfb379ca3a149b1137bfbba22c133035a69189617057d202f5f7405079542f85384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb7271352fe38c35a4de1b157d901411
SHA159fc64c5bcc9f506ddbb94dca07c999afa01fde3
SHA2568790029cf7fd343e46e167f5b85735a5ab92eb00ef1f5d33d316427a009dbbbd
SHA512aa5cd4cb5bf1d0a30518f16b75c645e341b0773877087e41a7182bc0a4718f3c3e99ae3c7df4fcf252f94e29ef16244387192209c53c549712aedbf63aa4b80a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b