Analysis
-
max time kernel
136s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 11:07
Static task
static1
Behavioral task
behavioral1
Sample
da35628e23d38b7bbc7dce013233826c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da35628e23d38b7bbc7dce013233826c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
da35628e23d38b7bbc7dce013233826c_JaffaCakes118.html
-
Size
387KB
-
MD5
da35628e23d38b7bbc7dce013233826c
-
SHA1
21cbfd5cad964eb34ae035b3002cd68fa2d7636d
-
SHA256
652e2c18a553cba223b89e14c2c8c7456760545cbd99637bb585b3a00012d847
-
SHA512
435bce6ee7953b6e5bc160655519cea156a4eeb70b1902e6cc8f7bbc9940777ab09b813e3ccfb5043cd4257fe2c08ff20b1ae465b328a1585dd192a96c29feca
-
SSDEEP
6144:aPOhwsNW0/SF9ALaN2EEGTFbnpuBJgI+U3xWPPWnbU:amhwsNWCSLALaN2EEGTLucI+UBWAU
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432214721" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8037d7e63a04db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0A2FDC51-702E-11EF-A540-C28ADB222BBA} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000009d8020536e222b9412e69dd3569516b9d4e7ed157d29a07ec2eb20cf1da65e95000000000e8000000002000020000000c0b4e95b75acfa9c0f5da167ac7cae56cd3eefe51dda232bc3816006ba2ab3ed20000000aef4c5f6a17b921186699413dd1ba2c56d04fa712bd9fc1ec4625bfda3d1d53b40000000779faa6aa031b0b94b5697c998741171299775ed8c7af83139767b124fdba5db8d95cc3651b8c8f04f5b6612f959315c9458f2739bdb8a953a9a9767fb95e327 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1936 iexplore.exe 1936 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2112 1936 iexplore.exe 30 PID 1936 wrote to memory of 2112 1936 iexplore.exe 30 PID 1936 wrote to memory of 2112 1936 iexplore.exe 30 PID 1936 wrote to memory of 2112 1936 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\da35628e23d38b7bbc7dce013233826c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
854B
MD5e935bc5762068caf3e24a2683b1b8a88
SHA182b70eb774c0756837fe8d7acbfeec05ecbf5463
SHA256a8accfcfeb51bd73df23b91f4d89ff1a9eb7438ef5b12e8afda1a6ff1769e89d
SHA512bed4f6f5357b37662623f1f8afed1a3ebf3810630b2206a0292052a2e754af9dcfe34ee15c289e3d797a8f33330e47c14cbefbc702f74028557ace29bf855f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD566856a6be8329110f555d1596439ef5f
SHA1ae8e747d0d3a8aec50a0af32a19b792d620e88d0
SHA256df13ebc277d6855a507cddd0db486c277c7bbd1a1adbfb3702a74ee121b7003e
SHA5124f87928208625a12fbb74e8f492e32b6d9757be61b1156cf6bcb98753b160284429c5386c8bf6f32b67dcbd26cc1a44fedf162a55f094fa95ea22955e31c4750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4FA45AE1010E09657982D8D28B3BD38E_4B65292BF8E4474E2D57D38A629C5318
Filesize471B
MD5ae1975b62a39651898a234c25680d358
SHA196215a195a1255649a4bc100b635abf94614abfa
SHA256549bb833906b6bc9a3954231eece01509e36df5293b4be054a34b19dd45d602f
SHA512144190c445427238fb3e8ba1a7345fd0921e4910807def035c982fdc5a97713e17994d7eef8afa4781c65cca6efe638d2e93c1003a818b06776900eea3d67a2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199
Filesize170B
MD58c4b3f4901cf876dea5701374cd04572
SHA1390a7065273d2330770efea17e161bbb6cd7a11d
SHA2561ea661a27ffd3c4277db9564242868801bbdcf611692479e8a4f244568cc805b
SHA512f8032a55878b1f62af067bcd2a60fdb9c414f05f41b61f330a8aea511dd53fdc3d8ae7d8c852986315d0aa6ecd3f33947a9a2e2874ed24e669622a4fabd579ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5b5e9c4e13e10b063aba338e433f6d3b2
SHA198a4debda744a740a3de0b7058b180ef456366d6
SHA2566c51ff094f21bd3da4bcadf4f64aab3ec84384c2211e35cd49d5e45236a63cb3
SHA51283a52802899fb224827307f60f89a98abc7f8d0101aa67f8ce82294d6fe15fea6948dea130462476e4690ae5a52865bae5a62a84816c80df7b1b06f0762945cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5ebf606fb5082d3e73ed55aba5c34f357
SHA1a56f32bb7c833afe392c7b378f2b039431e9dffc
SHA25606949a2ce41b9bad86a482fc7a7f670ab64d5d9b6a1529e00c3eb75d7ba6b4e0
SHA5127b5ddfac9841a2eb52abb4f6161f02e5b815d72b43a2384682e48e67d442ffdcd15d30062ca3e01e5a5fb84331a906a15f997e604e849037d66a48a7e4b6076f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD5ee9f881430f9a72a65316167c9308aa3
SHA1b51ca67a2d62f88d3c4a70e616e511639ac1a4af
SHA256b3f43a6084d425515b2c2f0456418a5b1c5e901b401c87cda6b30246c6e2b486
SHA512bd1f4957915188f0eea4676779602368e71698357baa0c1a8247339c2169d27e14a1f02d02164d5ea66a2dec5d4531a8b67fe0a7ac83e2778ca535ef8d184995
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD52173942dbe94fb7dd37ff616be0629d6
SHA12449e00dea8aba6e4845a2a2e9f754dc2ba11f36
SHA2565f8a6ecee8dfe61c647f9b791cc0e7827ae26e8c2aeffa2b83191b98094d6795
SHA5126f69927a7a0854363caba1880b8e23ceb58d03db8baaeb1973400d90b75a4a340225b5fbeea77984ff2455a5c18f198cc13ecd24eb571452b107761e661908aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54660a12e6727197dc4659933e6468e0c
SHA163d939f56af1814598d29db5b92c853792a4c735
SHA256a5b8929be62671e5bf97f407857720f543255bfb2f0c891535ee96127ec24cba
SHA51200105664f27081bbd50d103d0d058615f30906a55edd2690731c6503ad99b710a6595883d3d50e158d21db4fc76bcfd2901560ace07937443bb0d6058c164dc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57715939a85d4a5aeb9ef2298569bd76c
SHA12867716c44d73e74d4cfea82d43d4a5e184e6bd4
SHA25633093034b8910a132c1623ce64c19f9315048c7e08a484c2538cd6b0e798bded
SHA51252e3ac75ab3852c76dcab02ca3a834f8044b6e47559ce1370ef3e28bfd480e9c25d9460853fb39505fa4dc1f178218740d25b066cab44adadb35b723a6f6feff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d9c5ed77e740d924ac637f678043057
SHA10e2d2dfd5528e3abbf364d62e4b7fd793e2c7686
SHA256b17a010efaa4ba37e37227fd44b0dedf12ca743dcd569419db93ff1668338ee0
SHA512590b1ee48664ce4c9b6095372a0e8274029c9bc719dde422cacbc0fdd7cc337bb08ab5bf5d1a93200a73c93df063285087cc3ef2cf5f61bd25e8643affaf9940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0bef4a813bff804fa16f2784fd3cd9d
SHA162c6498864d2f1d0035ac5362f30891500565316
SHA25605af6fdd337de991340032578d3b60c009ebfeca2fe41360639da63bf8fe704d
SHA5126ca30ae8cc37c8c0c03b650d28e64ddaa63243b99c86bc402ebdfe94d7b5c2dfa62db57a100fcc504b46bd25f412b4edd7cd5fc717881a2592d20483828375b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511b9ba012fc0cb4dec8a30845b76d4fd
SHA12f4525f570d10f5701dbe3f20718874d0081b1ff
SHA256170d0db531a35a5db3c717ee5ece47ff05741907af00d58c6052032fb743bed2
SHA51273486947c1c82b7dea217b7179e3c469ed0da1f9f2c16545e14269a4714781dc9c41487f20b86af5f7479e8f9987239ce1a9bb4ce0a0c5ecc9ee528e3557cdc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5689f800f5ac4a0c4fa29a6455ce445aa
SHA1f56a93e1289c102750799eb149e9f2ebeef05dc5
SHA256cfd0da3542ec211050d7da4407e5e8c5ee9895941fcc470f023c45b8af289fec
SHA512499fba753942222bd168299a44407aae3a40e3044da305c19d30f54bb1a8bff90449fa29fbed09f7ab8ea67073329dd3ac2b48a298cb2199ee4bde097470ce69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b2e6fe1cb7dfd0c459c9d8e75b0a659
SHA19f6fa94f3fa9b8ecb8e51981aaac1f1337adf2b6
SHA25666eea6d1c9be63b89d2baedfe4d446d2fa99946cadfd3a0ab6c4ed8bd3495c5b
SHA5127eea8259274d3c50f27545a6fa529241cf0c782017b3b0416cc7727c92a6219786df3ea185af2f894b46306696681bc0298b9cfc5d90038156e44198d1ca5d14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e6dd11f0af650b6aa43feceffd2c9c6
SHA1a0073c47688255717518233a1816aea91866b726
SHA256cf6f36ad3b6f59bccedf08afe8d6f473e57e64381817087f6a668e3606a362f0
SHA51224fcc3b6455e425835cfb31ae347a2d027ca5f6d6477759cd1085b58ed32c959df7cb2b514099b230bb6aa57d3547516337aa7e81445e65a36e7191e4cca8874
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b8eb5cb261b0fd92723ebb0339ad05f
SHA162906edf7e8b70012e025024609d4e4e1db8148f
SHA256172ee765e1892532aa5a6fc2a7b9f5c0be48ebe316635035610e832de5f597ac
SHA512298beaf27b58e16926b6612707a649c55c74303bf9b14011affec46958cfe24ce41e4e578a7d67a51bce634468c1785d4550778f2dcb131f392a995a3ec2a4a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541cfdf0e8fa62dd04c5956924d7708a8
SHA1dbad7527b5c2745f65c63e53889c8ba41873ce4a
SHA2561c81b31b18cb0a5f347566b59f3249f21309a4ecca423fc384234d2bda9d4cd8
SHA51247ea5587862cd6439b2d125795c0aff9649002f5ac7278903ed3259e3d8615c64d5d05c7523899dc1833a8a616d379f5663a0c645e292689c5fab1c30d4bd8a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c25f454f77bcd161e5da63c5060d031
SHA19a2dc0e423b729ac5a28bf7c05f6dd20374a9c41
SHA256fc7a9c96addc2b2b6a38f643aeec9110efc07a574588c3645ef7753e0c9cbea5
SHA512357ac021aa39e2693c18d2af1fa399c73049fddaaff0dee83b690469b43e59abea1f15a5f1257462347a8eca1ba5e8e075494bb7929213d4f9fc540e5e11f141
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZKZ95V4R\2727757643-css_bundle_v2[1].css
Filesize38KB
MD5c6bef00b7471799fb84ecd3c7d93b889
SHA1a6396b397197c482524473491da5dae89408e93d
SHA256797e19ac51bd552cb84849b171fad7cf0563b4a14bdc3f751d1edac71064ff56
SHA512d44ae98a63a5d828c4b2ee0f62edebc8477f487b4eef21417f8957f752b888c75eafcbff6c8c81a809fd2e75e5d588d0b2a8f345c3c644831551a9a1b79af791
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b