Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
d468bddd24c459085fcd19e55f737821_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d468bddd24c459085fcd19e55f737821_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d468bddd24c459085fcd19e55f737821_JaffaCakes118.html
-
Size
7KB
-
MD5
d468bddd24c459085fcd19e55f737821
-
SHA1
587fe6c7abe16211f06208568f76944e388d3a3a
-
SHA256
299900beb9e0075fb80819da20a9de219473e71d4db9d0a20a7880dc0c60609f
-
SHA512
baff94bdc17563a572cc61875ebd88ee1f9dff212891d086383c292c3e9a952af23695d49cb53a1d74cc44c479e0c3d28a97947d7ae896fd88d9c07051c14448
-
SSDEEP
96:uzVs+ux7m6MLLY1k9o84d12ef7CSTUOzfqK9xJVycEZ7ru7f:csz7nMAYS/TGb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000ee97ae12742419acede7ed0e5d98c7e499b395643601fb20538af3326acf992b000000000e80000000020000200000006a7277d258b4b1fb5157e86cf01bdb233baf500c86fb38f79b71b532beb35692200000007b0adcba547293d89190047cdea92e005d738b6b3478a274b4d0a4010e96ad5040000000bda542de91ba5d139f5bf220b7000c4a5283b051e0670daee73ba1225f2ada64fa15c1a758045cd257d459692e6a2c6f656dc401de1525320fbc5e2ce6bf020a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2007b286ee01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B0303FE1-6DE1-11EF-B9BB-7694D31B45CA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431962023" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000729bd401a1bf016a6d4158be2c76aadbb4dc065cbfa2074762ffae39b62ebc70000000000e8000000002000020000000aa7a209500d58797cd0073f8c575a1294d1848465e7a92782e1fa32c866436d79000000055e7952b0e71bcf11afe2925d17836cb0c5e098a90ef96db5ce99abfce6d44400855a514d54be1226bc0aae9203d92e1daf01da2351bafea8b5497a2587764a5e0bdd7a46feec0c3cc312da2a654e7e4888a262644d577d8918183be844c1bf43cb89399453aaa7e83095e515e36ec136af3c5a9b61f2e577aac2d53859282315ebe0d181c051ecb2c4f5f1e5d8f7de140000000e1877171657a4bc95dc268c8bbd924cb15e7eaa593d06621d1f5d4cd10df02017c40c601a3f75e46a0c271114a881e759f8200338723931bea734b4d27cc6a40 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2096 iexplore.exe 2096 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2096 wrote to memory of 3068 2096 iexplore.exe 30 PID 2096 wrote to memory of 3068 2096 iexplore.exe 30 PID 2096 wrote to memory of 3068 2096 iexplore.exe 30 PID 2096 wrote to memory of 3068 2096 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d468bddd24c459085fcd19e55f737821_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2096 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8a2d7f30bfed8ee123edd707e0e1d52
SHA1a32a8ffb3e386b135385c4ab3f6944e62118d608
SHA25605233f4f6bcee601f9b5530b4dc2adae215d67dfd437ad3ed8f0eae12f9385e7
SHA5129a8c0f03c15c1fd6411646aa52535ac026bdefd8779d0cb6ba17fc95faf047617e2a727bf28e54d3d22d5e57f349eb4b005a9d58f9ece0fb3b00bf7a373ab3b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbe7e430afacac125c1361434f57f57d
SHA1c7cc6f15f55868542d8ef4ae52bbf61bc3126ce8
SHA25620c74efdb6dacd08f4f63642b5bda5a713e052a3270d011a5f112134e485f1a2
SHA51243135dc9d8bfbfc86e102d3c259cc29d44734352402a4666f3de07d00b6bb953e01d68e7789d1bf02662838c84d9175b629ac1809a5765a84f1502974189214b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a855815fcb5e502074905446ee0f9e7
SHA103d6908245d383ac95839e8e657fd446bf743f4d
SHA25697a4d107d3a9cdeaa838361cc751582bd62bdbcd25a6bec70c2296f30a9d21ea
SHA5123ed63881dd858c15ce415ac5b1ceb8240bb374a4ee2c89976d95e59de5795b74201e024ef2d755daa8decdb47df06c38e0e46769ed35aba14302b579d0560e24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecd5e4898b8ef67bb124ddd8f0ec2aa9
SHA1d41095e7a3cdf3203c439c1b21f22b8752e7fc49
SHA256b0955531e627bd1baa912cc1377ebcaa8b0313bdefe9fe8cea88132cc1f49d68
SHA512a789ffa14799c4c02664fea3fde050f250b43716a75a0933c878394c0afe6150fa5cc313e0ee654f0ec14e16b8d5b7ffae1e415bd0c976091672119a7c2e52eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a7fcf35f40f187c94bc137a4fb7c642
SHA1dc146df6d5060564b17fa1ff97d4cf7eb1351f37
SHA2567dd4d5cb46b3879e233d0a2104698b99df11560e9a8895080c3fc638ecd842c4
SHA5126a1e9a0b77408d9c612b499a6a5799356a8ad0446c6b1fdee62032b526800925f2a1809e44c91fe2ac67d2025064bd8f5b19ea917ef83832ca3c4780a7813bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7f27638ea7d759fad28231fca1049c0
SHA1c81c22c9012dc76c02c56f2a46367299db4ba19e
SHA256f21a5484535f9dbdf23133d5a349129a62cd790f3e6ef157bdc4954af9061312
SHA512929c8d3a3cfc7f5d598d2a603d67ac88caff0ba0b835809ffadca67cc901011a3e0905e440cdbd69f52738c615b897507c255ac89b99a616ed98bc2c87bbb294
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567c471cd8010c2691689d3244de6cc90
SHA169e09c1e6c7a0cd02f12f99ccf1b487d910ad379
SHA2566814fa512c891cb0ba5be1b08081324caaae0539cfa1215beecbb75d817dc123
SHA512d0953c6b70dc336c3bff5f448477df87acf83cd1e24f3540da344fe6834db27458d20cd8880a746c992818c2d630eb9341bbf01a0b5bb7f565a6d5287883a8e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551c42630a2712f9bd9c52f7616acf78f
SHA15b238912b07238fc6f1667dcdf3cc70a33983115
SHA25661786deb0734516ecb97d3f60eee1101b0ebe539375e5ef7ae7ec9b632479d41
SHA5127a1608cb39b797e85e6c5977213c547848493daed3b17c1e0ea7208db7782eef059babfc82e010b3e5dfc96c2b5fa7322f7bb08dc2aa04fd691abbdd7c9280e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5858484ff15a55e63b332f64205214ceb
SHA1d699b6862f06207610f6d3b4358ef8411e698ce9
SHA2564e3c36498606187074a0c2df165e8f9d287dbb3ffc9e5ae85505021eb8a44080
SHA512285f58356dbeccd88a6cd868fdeb5356fbe9a06d9199dcc908f8578f6a25e982fb42406142446f1d4a3540823e5d2ec91766ff02b3344e524747429ead997011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59149598521683caa06f1fae4527b98fe
SHA19dfd068cbba3e66e607441f46d3b7eb37c46c906
SHA256b9c507b0553607934de307179a3e0ca51ed909c71b31d1abd32e099db11f7a9f
SHA51254410e4dca213f75c3908e62955b5db3459888c0199ed7157e1f59c4a3abffe6e3fc5be73f75546912a9ce4fb1f877274b2e5e2110be6b1ceedc8ae18bd28af8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56316846f1def2accfe985835f8dccac9
SHA11c1a1d959da5576dbf0053c71a6570a461754164
SHA256f7acd2eee7e24f08919b1b7eda336a0dc3a7b82eb78f1f2213b591a0f7f95192
SHA5126a9dd1cf775a5036945f3f0ea82f83bc73fa98013c5a0cc41048393a5c7fd54a308d3e137a163617f58a9f0f44961040b0882aa56d26451b8b68eff40531050b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5787d4849527e8a55db0452ff5c9bf216
SHA18cb87482b6be1f51f9f3d779a8342be50644d759
SHA25630a0a56415dec9f40a72e0b95d5445fcfb2506e12f8b630c686f894ff720bbe1
SHA512662b1f0c652875bbbec6f0165ba288b066dd5f073d910f5b64d5bdc4c766d408a251de681a1b8680e604f9ab4d7c789d0e43564108c28e9e5f5f045dfa888931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdeeb86d56e0ad73249efee49d2068af
SHA172914cf1d4803add7e2d738383847626efb05675
SHA256fbcc6f787402ce8d2d9781fc5e93e1bbcbf3f63ffb06ad7c520f5b31f7287582
SHA5125f89e93f5e8a87fe72429191e26e5a4a21fe87d181d3e2964827b6d5e8613c2cbb218865aecdfac43f3faf1d538d702cc3da4b0d08c2caa5c781531194a7738a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cc9690808288a4d8648a841c5232f1b
SHA194b4c897f6b8624478bf0208d0cc1d3e479928ce
SHA256a2ab929566e1155e459d6b3321b7f313161dafb358cff379ea5d51be37536eae
SHA51206eb0ed8b7b39b51e837a03b33d88f9a0a75c9552dbd2033a07075b27a2642a988f3d4a6299b1a868e85fbf88c8699e7ddf351d390c4c94ad2c77655e1ed4725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d34b3ce4e85593be0c857aa1ed1c2925
SHA156f21ca1a5244ed1bc27efa20a961c287b849892
SHA2565c512f8a78ec16a02d52438cd72ff3c70f3c65abdfb6e3922d1fdceed1856558
SHA512f913b727f0c31861591ba7c5bab2db361bd0cdb2b4c6d8c1b0882153386092612245cffc500a779ddff7bb33cff162a6bea9cf50342a4cd467b3bec84e91ba8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5c60f299192551de727f461baf5eb87
SHA1d037790f25afb6b77baecd3e65114e732c4af4c8
SHA256c2145fcb4b3c3f52b1f956879ffe14f45fb045e3546ac79cd2d66e8bc21c822a
SHA512fb6a7fd4490ee1f4def7f491635b6067d133da196decb5315ebf4340c9181fe7774dd2d6ade21281454f50f55ae9447a8d059d6004506ef89634fd1cf99a3d63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55744ed5497d4331a9f9a0c66b9781aab
SHA1d55684635374348701ac3e2e9495fc274fb0035f
SHA256ad227bfced96452776e9a55a97050468f188510314d809d166e357a9ee5517cc
SHA5125689d80b3f7113f0d1fc9d4e6942816030000dc0515070c9580572c0fc2ee8a68b27da24083eb1f9b01f3c61d96f787805988181ec733ae63ac63dd2951a5cef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a21405e00f0e0709565d2140e1b23e3
SHA1737ab4ca20138987d604006039d207fdbf92147e
SHA256b7695dbc8bf93fba7c87564457476a5849ee65e5a579080bdbcc5212ef5a2c4b
SHA512b77b35c56ab428694b0b781c015904d77f1cbbd1487d0bac9b7d799a1b1dc3a4464601c70c94e0348ecdc82d42897c85147be44d13264e26cd7ca7dff352b642
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3d83e22ce1fbb5f08ee4fed381b4195
SHA19fd51118d5f3d49433bd53571fc7dfe8f9c57f2d
SHA256f5daee85bf87d78c3a497891779a7376a6e7626c0544e92a4bac1be76a1c1a6b
SHA5126e8ae45670268932c23eff0b035c9de28098ef521e74de0127f04e6c850ddc1041828d8202e95646a4a9b6fd2b772e7846fb22d2a478c9bf9207f66d13430881
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b