Analysis
-
max time kernel
134s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 22:31
Static task
static1
Behavioral task
behavioral1
Sample
e12a873b6033020d06c40ec8206448c1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e12a873b6033020d06c40ec8206448c1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e12a873b6033020d06c40ec8206448c1_JaffaCakes118.html
-
Size
23KB
-
MD5
e12a873b6033020d06c40ec8206448c1
-
SHA1
ac936c96d3ef5ee9652f7db29ec6c366bf2b934b
-
SHA256
80298d1ddbd4766ae510a0e7fd93afe3106bd2988dc270f31c3b1bb5d25f5ef8
-
SHA512
8e57d7cbcae61bb604a7a3c5723e16ff465861d792bfc800743372672329095f6c5ff66e99e2c77be1c603f7d6e576942b88616cc4903d8de36ab5a91f0784fd
-
SSDEEP
384:CwQHpc1jHSL4ksI36jRg7P7Q/RnvtWDZiBv06k9jWWXnhvLK3ZKGQGV:CwQHpc1jHSL4ksI36jRg7PinvtWDZi+a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000942c9fa076fddc0de16b1a141964ebe8c6f469f1b4726326824e9c0a041ebe3f000000000e80000000020000200000004b3265a2e6a2e34a31fbc91489c92403cf604a79176abe39dfb42cb182543faf200000002c1f5daff3b76b5bc58aad9ef45ef464daa66d293403bdbae6c6f472cea0dd9d40000000dd4fc637cea5ddd6f8d395a513486e7935d3f764345c335ec6fbda374af9af6aa1627d42a31b1d47a7539abb70523c2f8268cf743b1120677d28c0981ef4b1f1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0CDFF8F1-72E9-11EF-91A4-527E38F5B48B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0e242e2f506db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432514944" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2784 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2784 iexplore.exe 2784 iexplore.exe 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE 2648 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2648 2784 iexplore.exe 30 PID 2784 wrote to memory of 2648 2784 iexplore.exe 30 PID 2784 wrote to memory of 2648 2784 iexplore.exe 30 PID 2784 wrote to memory of 2648 2784 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e12a873b6033020d06c40ec8206448c1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5333f69d2ad7863a59d2349dcf894172d
SHA1e41e53893a289bbef0f988b470ac421a4d76d418
SHA25664f30b488a32b6f758c234ffa31aa5e5aec6f79c604a24c5c9eced654402834e
SHA5128e9485890bf225979465395d172c020b7da2a0a5894e108e0151741e53ccf6a831555d5ad00ca1573eb9adc4e1847b851f7787732e260dcef733ec6823949141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edde2ab6c84ab512d461992f134225e7
SHA12897b0ba91e14f911f4bb71e1ead6dc7cefc1541
SHA256c3dfd94b30c59936b2c13405c30c6dea2b40997a91cef0b1e9f823894b8228ea
SHA5128f937a0603bbe06a8c749295dabf3a7625aade9b50be698263c21365ed89832e28ef3b23ee66cf9c2b46f6b622e5aece71327563b0c7086f45397427c1595dae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593a5ea35ff8d3f297cf52b5551c61d03
SHA19a8a91bbf47794a515dfcccc50eaaf7375ad16f4
SHA2565ac7630a8f6493726ae8fe175625c69e6486c3cece5e483da73c6057900f7487
SHA51277a431518345f5ca102cd4c7f6373849ba75bc07c6a381cc0106e270430b664e844a143e18d39325db37586c15c957801484adae89778ea0ec03e3c1f7249961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3470138350be4494c95b9a0a74fe353
SHA16e4b417db0e9cdfd68567c916f7806ea018f87b6
SHA25604ad1cb26e8e11404b0f485759965e453479774e46ee3ad924eb6ee9f0eb32d6
SHA51258e9a78a613c904e5087a17fa8ad92dce2419febdbf7b38066d71ccf96a3375d3c2ca6010390829ddd4d4b2d6deea3c1b94fe70d5e3713016507b7ad2f67d940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1b084ca0c61bb754e3612f03a6d3381
SHA1cd869cb95a0bce0db8ec958a9e35dc18a18f8254
SHA25677f30f97db17cd662203599f75b34d2b178e73a5fdaae573656f5c25759788d3
SHA51270922566ac7cbdd867b6d52558649e16eb3580fe1a098249b0516196690c1e4482885d854e79f38fa1e5a2387cd6784a7d8f2596d5874329e780409380d06794
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f9437f55ea125fdfd8ecd6afbca397b
SHA12bf77c0522175f50c2f18c2d72a270f15c06d54c
SHA25641bb4f20b6c46742c6daceeaf87df1f44afc867dc232b8f91e4284b6b84110b8
SHA512fc9d22fa61183913f325052260e80b6913f7cb1dcd45862a001aa54c64618fd9d884c6baf25a1c5fba3e3337378e1c1228115e1b3c4c597fbdaaefa52fbe7a66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a06f8cd08b04b1c15ca38fb49f485e4
SHA17788c278695fda7e9401abcbbb39acb78f40f82f
SHA256deb1081cd321637ebf558752f60031b7d3a321d459ff880660e7a7b3c6892dca
SHA51227c4d51160bfac76fb2d1ed657e9b3014faf00cca52247310db052b3b6ea9a4168d0c4a6405f6321b3a608937d7393cab6904ae055d827bbab5e15714ebe67dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6987ee43771d2738dc8f93e2296544d
SHA1fa71d326e4b7703cf8c852d916bfc516201747b4
SHA256c98e77d6c309dd2bf41777e706e43fd38346e0af68fee82660b8948e9ee222a4
SHA512603d13428846efd42d97189ceb184d7492dfd4a04ea7d9369a5314198dd6e203f81c1b0dad9f6a330bcd6b7b4809beb8e1dc4298ce4277b28405d32b7d9e5b7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57538afeaeb1a7eeb50dc373f05044e4b
SHA1bde2b51b1ac69d235aed0407c51057405b5f4372
SHA2569e3a22f0d658a903d94b140447d1a8d311f2ce01dfc98fe16ed0d1e6f1ec0f62
SHA5127809b51b0e9dc6f8a304935228cdcdc8366b82c1617c1b33f88d4c3762737f9ae8fdf5e3b4f1f39cdb6da74b00afde327f4338ceefbb245f71bef5fa33009314
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8c595f697b59b37af558bb3d511ee7b
SHA12254f45be730cdbdb924dffacbd0199e134656a2
SHA2562016c538b4e8a78f4fd81c48b570308c1436ab8bd040f2d1ce0d00943ea0a922
SHA512e48b9a3ddb561a84cae1c212a594c69e477b82209335faca9a571277a909ff4279649d86ebc52432bcb0b1445f6eb42d60daf7a69b6575b6b0b017fbac489b4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8b75091149c20899f183760ecbd30b4
SHA16db8928a1e2a15b5a5d00e266dfd7f0479fbd14b
SHA2567924344dbb81d7087326335c0a00e3a070292750fe258d1bc5a8419d3067f4bd
SHA51237b2e4a3ac06addc0a823f8dccd03eb0b1d85a470a81e794bcc166c42dcdb1df0b90d089847a0fc57852362f82ab4a3891877c9c04554501ec4b92b80e0397a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562b4dcd09c3f71674a00057f43a844f9
SHA1ab4570676f949df4f31dbdea73c50cd0fec0036f
SHA256e3ebfd829eadce5079ee4f978fc78f862d9362f0208cb07c9b38cc159717dc94
SHA512f9308c010a33a6beed37c51209d0ffb964db3f76aeda3cf436ec1501feb0fc249997746cd0a2f6a6272d25ee60401d24a078e761d4ba869f2eb860b8c7566e1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f56622110aef4d16a35b3ad568093aab
SHA1e3f2d3106da8e8923e43e39319abad02b3683460
SHA2566419c0a67036e595ad60d918892a9cff42b6aadebe95f6f252440bc970af5c66
SHA512a3a3adee402825fe8dda607d355753fbd19035991143b6ad3b73e66248c65b6a2d9889f952f94ae825fe7c6044ddc53053fd5cc39316df2af3fd05513e7aa097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e920045291118e8eecbe2c09e6e17627
SHA12b36c1c060037e49b62ca90588c3a14f650d57d9
SHA256424ff9080ee0dc62b33b865a8251ce0ef9365edb0dacf09936347830261d30e4
SHA512c3598638bc498c145ab6548d5d5d910b6ccf5f96b641c1edcf74b3cab13740ca12d335304e589c4f37e22f3c5bb5da51b2ce8d84c64e137378888fc003ec934c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee05417f35c214d46ae41bb098f555f4
SHA180e9847befeedadad0f14c688fa006e5e1f68bba
SHA256fc47fd107067eda2aeb5324d81057e80eba1208d93dd02fe30667e737df75c43
SHA5123c16eaeab3a0fcd081e03d17280bb17b836daefac183e9fe419eac938e1d6ca8c624429bcaf282611baf27029281bfef761302c6693cc0ee451530a4ebee6c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5795cd0c4701e6edc6a42afc1fb3d5867
SHA1d2c5366d9ec345d8f3ed3f64058b559263a73578
SHA2560d0dfc90b4399460b92a95035b1773ae50d39835b59789ee930ec6e1f0bacafd
SHA512bc377e6a2b87d6d4dc368c53106d4705cf9a1ed15e8d5b83573d1b95a0cb870b47180690c8ded1ab238454e23d8d6722535a3e87979f71531ba35729f6154b31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af2362a2b75d94182f6b46d693fcbdde
SHA1aa4c31f15e9e90f07d95a8f589a5c8e3388c5d7b
SHA256717ae4447e8518c7b875cbdf97da581327473cd96e228aad297448001082b509
SHA512b4f758842beb4aae1c9c43ff12c6c3b1154d8006e0180926a79bfbcb7d1bd07d97de5f8117707d1dccb66648f85d4ea3c71e321be1d2b62ed20eb98db9f9101a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550098f30871b3fffb2c1aa2ffb14c3e6
SHA1ccdbfd4703d306016c6faf56dc123f3a19e72025
SHA256667ab669a20fb02b0edc44c613ecd9d5587b8b7b0c14e530126d3ec4d03a207e
SHA51229e898c1ce5282ae59e8360831dc33f17c7f73de60f6cc7584ffaa372e6da9e11341846c0f6f9383a76e4964159ca746021f8b3e6363f752f033d120da95512a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58eaa6a839d0b9d40c561fc175815a3c9
SHA1a651aa1879a57cedf2047758fc686210495ed3c8
SHA2561f2735e190f59b748b1b2bc341503b38e122258a4615852756db269193957204
SHA5125e73217519823ad9d2cbe7ab93a11787d715e7797f4c37fe847f2098f08690b9c8c07b996e0e1ae7ab44d19093806951caffd78295c06af910028bfa52d63f12
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b