Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 09:47
Static task
static1
Behavioral task
behavioral1
Sample
d41304888963e25113d3a5dfb0fa04aa_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d41304888963e25113d3a5dfb0fa04aa_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d41304888963e25113d3a5dfb0fa04aa_JaffaCakes118.html
-
Size
99KB
-
MD5
d41304888963e25113d3a5dfb0fa04aa
-
SHA1
db58d0c4a291a843409c00c2bc40cd634cf519f4
-
SHA256
43399a23f79603bbe96dafbef05bcdc4fa7a4dc2912dcf39c14dde581c330217
-
SHA512
08c412caee168b0ee8f0853044cf6c91c19110b35eb5c79e48322f477fd1b054e6af207806807222bc67bbd725ccc12fba3558d5c3d34426daa6cacd6b6b4458
-
SSDEEP
3072:LTmyH4y6hLIx2crUg1GzeSFLoIN1KMPy92omCttkVK:2IcLIxyHKMPyQo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6CC94D11-6DC7-11EF-9BF6-6AE4CEDF004B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000020aa60b67d060eb9d113a2730d9cce6001cfabf0bb98fcc0418c63b423c07a5a000000000e80000000020000200000003298c300bd9deec7de96f3cc06873a6cdaa7d79b07fc10166fd9794f0bd617ce20000000e787461ba1e8a2188f8cf6cbe90ca993ad73972c364763e7bdf9bb5baed4594240000000298e426aedf891472dc106522ebc925f8172cfda838474434eb8ac125e8a72738ee1356f7e300c5f7b96ed28b9b5cbaf51a659e04768c05663b9422f372930f7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000006cf4b537291aea5c28995c010f9c3e0bde0456bdd5119bd33a468f1aef754f51000000000e80000000020000200000004de2a4ab2200c34323390b2b104886f0e9628a12a88395179286ee0b3eafa8e890000000fd3572de6d0c02e5181ffbdace0764f6cf0b28605fc4978eef43970bc9d908c600d87d8866f160e91e686d753cee5d4045d3b0755bc63b742559a8540f2d80f91c1eb5d5ca8142b0055e9fd0a087d724cdbfe9472841a603039e567d3febd7cc05fce2989b0323976a680351443ff6c657f70b344cd5d1780776592cf0e100ee5383100716eed36718294c3898234d064000000087c58b7efc972f0259ffa30b65a8b87297d1e623c4ecfc8ec481178aaaaf41f304c3d1021b3a3fae465439001d22413ec6d662c32f710d589b2fc4f1db45d060 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431950744" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0075041d401db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE 1064 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1064 2084 iexplore.exe 30 PID 2084 wrote to memory of 1064 2084 iexplore.exe 30 PID 2084 wrote to memory of 1064 2084 iexplore.exe 30 PID 2084 wrote to memory of 1064 2084 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d41304888963e25113d3a5dfb0fa04aa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54986633a988f4ef6f3159ed014793f83
SHA1668ecb5cb987b9db53ae05c57117eb6ce19d2d0e
SHA256d074e76c0f28f08f89004af4a244d689a272e44c6e86b89f6179e969819c6beb
SHA512f8438f3acc409331ac8db6ff1e66b97ea6f862090019c7ba9520caf9d36cd53f5d9ad7cb37e765bd8c4827dfa8d9fb40036e262428d88195ef81237caee6b9ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583a7eb94240769c73739b35cba28b316
SHA1789736e4ef70099c968c693e93e8798bbc22a77c
SHA2561c046c48951978042732dd7cb8a63cc1fa07544f305096d80a08cfb33b4b018a
SHA512efbc9fa6a7d2f6f64f3afbe690d2360836cae60085da8cc7654259d9cf41185e4afd643b4adfda095e192adbf9ed6433f22875d06ad981052de8247c375bb5a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e1e8fabe2845ab49c11dcde27f6aa44
SHA17a36ed762772c72794be6077c19f70bd2b89000f
SHA256954f3e3dd868c41d933475004749f0a617e68be7e76eab385222e277fa09afdc
SHA5120336242394bade3c5d2cbf8c0f3e6cb58c6f74146293e494cc0b210f5d80ad4b7789d30d14a00f273097144481835d3f14d15b47e1c23b1d80b766e44a5c650f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e12efcb37f7150b3c186c459c92951f8
SHA19c088601d56260011bc2fcc453c81ee34b0c7882
SHA25631325b6a827f872e4eb67d5bb3b7fc146d1c2455817f7a7088e6aa86d9a6d1c7
SHA512e8c8d92174d001d1396948579bf359b2e0d0d79d3b79447411086e21b2974c712c0ff9ba1c0a138d90fda6869115b860ee9d9f3c24fbd58c166828b98a1868ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4787fb0c9c09de86ce81ae226ec960b
SHA1ff5b7b0eda8d5972bd7ca983200411cc60f85426
SHA25692fb577e0b697f81dc57d873544357d846874fb3f50e9c559ae613046f5cde09
SHA5127e1ddee1e78efb1a7521a4ee2a96be3bcf128598e2204bdd27ccf94f2d63d44428094f6d88fd1b88e8cbcef56126fd5dc1ba067421a03270f22e7bec868ec7c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5583ca71e53d62e2320a61291f93ac15b
SHA1c5a1b9b6166c7e7b83eedbef85fba9077b894c27
SHA25613f57db759cb69259911c4730ce77bba49ec76485ee899833e180361cecec20f
SHA5126dc94b153dad2b7cd881cbccf8e69db5fc42c2ea2a39ab29a9522a2bd407c9d52ec277163767080c2ac0cec78a7427ebffa6fbad27b9aeb951b1a3bd2ba69c44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5233422ce7db0bc7033fc3d9bacc4d04f
SHA1bcf63705472c84fc46f54889eafc801b09334adf
SHA2560267c8615a26ea684e50c43a9409ba31abee0eed2e2d599336bf557b395ca17e
SHA51224f15a445d3cbe4955f053c677d602f23e57fa1f081d96b35d26eef8954f1df159512a1ee31e786a9c5ed87b9f7b53a40e3e25d7ee0ef8b85dc70112d4d8ff08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8db2da5fcfc2a981c50060e8537134a
SHA1c6171c69d995e8f9e0183064b772f908525d7cb6
SHA2565022235bf86763bc783e4ee00a780952f65b8d99ece125647ca14d04dd33b95f
SHA512ff54d98676122e309f68fe7e9979ef2a1269624b963061e1c939462a872d7ee07966386379bbbe4fc74524a1fbdc8f122f1af5b7f155e33d6bced1167d836812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e29c999095ece1fa2dbd0b9031402ae6
SHA1d40ad8e2d95662e86c79e115c5d5407b8c5f24fb
SHA2567b47896bb7c7baedb3bc057acd6224390968cd651542aa06e8db8bc477d6c7b0
SHA512d3051950bdc2179b17040e58167424303ad5141d04d12d595b1706c2d185fdcde9edc09114e64a77bb5ace9033377156bddedd13e4df4b2a4b9012eb080a477f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d2642271b61c889e1e99e093eb68c09
SHA1232e917c0b05d4e55b6ac64708e9f04f406aaba4
SHA25645082fc4663e33fb2df3d90db0b68aa4799e057a4b84ea18ca3cde5f44fe225d
SHA51245422b5137ead22229969f787259ef90fd0a025885df2afde39dc9b3eff8080685c6a9c4727aa4f0186cd5d56be8d1487a76b9806b64606456ecd46980f81544
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57594fc715ef1b2f3fd2256e55d21ea5e
SHA185a5cf4a4f24d712580e8a408ca6ebebfb6ffbd6
SHA2562a767537dd865d2068483a5620dd47cc4129575a244c7d5e28ea6a84e242222e
SHA512974bef8abd24d75eb4211b03c68339fcb79a99414a07415ca2804f1a33040f7b07baa921bacda87a50d2eaa264be4c327d4193126965defcc28e3be037f9e439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d30ee47f27f41d9d76d33c529d2bb287
SHA15b2521c8754a787d6723369f10e1a34e1b631dcc
SHA2565c1087af2415b154d09474771ddc52f077cf7543d6f6f235c5207847bd50894d
SHA5128e32854bdf7b0a5f29f8de661a72502d2c8a2d886da9a64706798cdef6e820fd03b63b8d186f151e07c0dd021283674c329959986eba13ecce372a47e5df5357
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eddd8045a4b509a1098928db9c127a08
SHA1d24bcb7f3ddf8cc9943269c278eb2cd9cb640a8d
SHA25655700d11f2bcb1f80015b2ae084fba3f357fb1703fd67e306ed4a1a53f563e31
SHA51220da4cf996e325fcfa023fb8a1e266c26b79d354da8361df2c8402794a271f391b23005294c309f1b084be730a2588df0476887b39fd4d534100f4baa94d0f14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d32a8f9538c5836f90cb2d28e5323b36
SHA1cd5bf7ddea16ccc4e9534f7a29ebdfcb01c0eb73
SHA256f7bce43db8e36c13f90461ae2cf221647c27ca2c464e94baddf71d2de484173b
SHA512277c072be7f76761b546344374f3cacddaac0f1691e7f9a66ae83be5287ecda7a7d5a3dd490ed69e340eb23594a19a45dbc25c62605c03647044ca91a5003a19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f799251883bff759a722ba74166b451
SHA1cda9b3199c83144d763a50700b9a5d833dbc8af8
SHA256a70b71c339717efcb9e5301a1e05ca815dbcaba6bda8835dc0cc97791c65c6d4
SHA5123536a57f865954efd4357bcdfa7a90bc2cf039026d98e7f2d6d6bb7d4b27f8f5ea520fb1db1ce9c3bb9f21228a1740fbb0fb0446fc893654188a6abdbcbd12e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8e0d4b66fb769bffd871512b259c5be
SHA134fbea40d4349ccab2c6dbbd2352ab460e5102da
SHA256df1342797495898be74b7ba9cf8e35dadccc63ad1a82ec3c299faca2780fb88f
SHA512feeef16a99813066bd8155ae2bcbbbc166b3d39e35084c6aa3c23aca35b460fab37b5ae0a1d51bcb90fe32f77f5919c94d52af5eb6e805002ad0cbafa689ba2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588290508b07d277a1071386d55fa6862
SHA16de756378655f9faf3bed1cf38be95822516edbf
SHA256ef1d43f00362d02943a8d9f6fb26177c31a4fcfb90e4067e588b49c33f732275
SHA5122f2e68c01751ff31903853e3d039c02b3ac5cb81af30fa13afa8b053a84f703ba3696f405cd689f25d4912123df389bd5676a85651959201aec64187c41ad101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a73f12100ff35ceea296c9bfdde29507
SHA180fa25467e48c4d82cb8984d9c306cba015d86bb
SHA2568d6d9bfd8b40af382a5f117d902cf8eb22bfe431ecbafa62a0046c7757606541
SHA512ac9a1a2d8f21591571a35a82867d08b72e1e60de4d34d1e37c2e24edb719c51b26fc6722552bf773fc7517689fb4229e36e5f30b93e6f5f0919f7bb1a947b856
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d8670b42bd8410b9224049b69119de9
SHA1d2b335a3c77f22c45bb2fa6715c42a516eeefa8e
SHA256d69de267e62f49ce67a6752bfc05f13ddb248e06fd0aa205ea16acdacf819953
SHA512f6844ca0ccde8e247616ca0ef1a11655a65eb870568017cf2f6eeaf7f3b9fd6c78dc572527003ede15078a477c7fa72567b9bed85ba6f5667f796e11dc74dce6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b