Analysis
-
max time kernel
135s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 00:59
Static task
static1
Behavioral task
behavioral1
Sample
eec5a58ba1a7c51a85dd2ca25627beb8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eec5a58ba1a7c51a85dd2ca25627beb8_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
eec5a58ba1a7c51a85dd2ca25627beb8_JaffaCakes118.html
-
Size
2KB
-
MD5
eec5a58ba1a7c51a85dd2ca25627beb8
-
SHA1
2ebed10c4037cf29ad9bac1b6e54c8b8df9f1cda
-
SHA256
d56cc804d3a1a087f78fef9ea0cc22fda6a9d767071cd58d4908b7e4639eda66
-
SHA512
075871e6eb97cc1ec3585b234222a66f81a26fac80a844c1a475f7c167582b95a0ef8dd21cef56f90b0f98a017c2aa7bd315b2d32eb9da1689e71daa8a40bfce
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CC37B421-77B4-11EF-A7B5-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433042256" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b00000000020000000000106600000001000020000000acd27f9861ab2d2119d61721b16730f90fb4fd8f502143121e92aa64e8538cd2000000000e800000000200002000000064cca49b80b937dac3d4523d09d42c5f05ff336386af4b3cbe6b6be95f6ace3220000000d15ffa2dd7edfb58ec1983af9978258f49a9f7ecc4611b10853269aa22e9612340000000647ce918f632f59bb8b7eb3cd2cf829da46ddaa5692978c3e6ef2f4093926ffe0da2021c1ca8ee2af994d9fd311016d459e6511ad23b2bc346e3c4fc3670081e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0e295a1c10bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 588 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 588 iexplore.exe 588 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 588 wrote to memory of 2092 588 iexplore.exe 30 PID 588 wrote to memory of 2092 588 iexplore.exe 30 PID 588 wrote to memory of 2092 588 iexplore.exe 30 PID 588 wrote to memory of 2092 588 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eec5a58ba1a7c51a85dd2ca25627beb8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:588 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a04ad9cb327d271b83a42e85ad1abf66
SHA16e3a1f8ac79393d2a6335aff614ceb4b430e9db3
SHA256c4bc59cb0fb3846f3bbd9a2c718a412261216fdcd44b8d9226eae6b103a155f4
SHA5124685cc9ab01007c920bce0a51ccae81112e381e8555a1443eec559d702f0ee174a378264c2b76b7dbd928e2f4e98b52f5486804920ac5874457c43b8987454bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502b3874118bd6b29604a93df82c6cdbf
SHA1cd73c365281c10d594521b6a48f7dd3964e1dd17
SHA25636f5438b0c09fdc585ac3bcc2051ce94f96c26edd0c4c1a83bf25346a95beb53
SHA5123624f51d34fa25c810de04578ae903b8d59eb8281e678e8662dc69bacb66a1dccebd1e3209c6769639cb25ee994055b12a4872be85ea7e9439a4614f87853c46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508af5668f655f38957095d7ec2a1cb09
SHA15111e1ef674f0b73df322543b27e197567b09e5a
SHA256f10d635bb79f155ab62956e8108de939967df094ce2dd9894e7746cb9c36e059
SHA512b8eceb7a3033221e76722e42132b61edda86e43fac002026952821b299b10985aecf9582110fd6296f54b3abe14813e750a62d4fbd3a40bf04fc5610e74315a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c17b821c23747a17f6a1d004d1bfb66
SHA167f6e29809258c37ea191e2f357c256051ef3748
SHA256cf89f4bad4c64f1ed9edfef8f45ca1194760307f13f5c4047da6ae57214e093f
SHA512f50cd5f0dd96f4471f07ad41186ac6a8f807318b9611de9b378ee7081de1cf73c206c06ccde0c10ea3148389b4e33305292afb5b9b28be8aac07f1f8f4464a41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c78044c2c3b454b57b96ee297b2ae605
SHA1be5cfcaf408770d66073c3ffc0facbd1078bdcbc
SHA256fe3e0ffffd33a61653aab095f2b649eee5428c20cf176fc6f42bc1e1ceb9b59f
SHA512a7a3c1cc553ba787fa1dbdf15168b8f191d576c7bf6eb003b9a0de29fdd54bea5e86533446e4f2664b450a6b204fa92f5a4aa9ecec448e711517e2043dfada71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5720704c9d68061125e7be19d83317e38
SHA13ffc9af1be268bbe3fdf78a10ccf191c5037de24
SHA256b657096226dae9254a4dfd9cca3f1a0c76792ab8d47d8bf7007e11038ca62c93
SHA512d7215834fb8414c074f7ff7f17ae2784797e507e5f125438eb382a144e387a8b89b49ba23d3afa6668f4c081e97448c225d0ccf11882d0f2c92a099395a478ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544b14726e4f8f00c01cf2d047074684c
SHA15380a92d08d087158679f67c07e11f38597b6a66
SHA256685faed6b95463faf736ccdfcbea87c54958726806956632a1bc8f7eb0b2ae33
SHA512540dd5083e2ce9c5b242a82c815c7ae1f9d3d29d1475d62f7efa47a45bea77a9393b62392d633cb8b34bf1fb99a90aec6ba754e4552a06efade70cd391695503
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51db9a89f13e3c7e72f426fd6c06e4732
SHA1ff7b33ee9a119ef6ce8c757198389da79efa582d
SHA25652185c4df52efd6d74ecd17284b0b81854e7c687c0716cb82309a54a88baaf87
SHA5125c089a3a03bb686865e5403bf7b18e3ba74cccddea074b072cc5ac37251da929f5b38bb9eebeeef000ce7421320cd5222bc123afd312cbd692951487a4afb82d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c910acc704c8b58bd4ff129618f4a70e
SHA1400a4b99bd213e0d0b4a7d939d40c8accf984e09
SHA2567df612e974ee68db77f5fc9fd8005146e2f66fae8241adf4bc56759e60cb9979
SHA5128d8d5e95a46585d5087082b99c72248ab2c3c1e36676e7af708875286613400a819d1cef15d3c06c3b318ac612ec44b8fcf6006e0c77695c9730e3161d23125b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b99e5843f44810187dd55aea64711acc
SHA157edd38bc4f9d631b3e919ffedbd82a9bd10aa8d
SHA256d0ef0922ef5bca808197521eb940b11226a64cf3aa1cd0e32864ef7cc6ba171c
SHA5128d4358fb886559949c17756651f32b8de8377b907a88952db71a245d5d94546a0a639bc56195d3342998a299fe168d947688e02b138a21c75a376f2161d5f19d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d240aea9c939f10b913ab7ac66110c1
SHA181eb6ac8102c3dcf4f70931c432a08c814888668
SHA256c3107d2b4d39fb5f63dbe2072908f1060b7fc20b2be7a440f649b264ca46cd25
SHA512755ef11130643597f6cfa3ea612a7a5b38a92d68d3fc114ca329f8e81e7f456cf790909ab8adf56694563311962f49049ea298b831fca8d619e4d274c8eeab2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59334d9ddefd58eb48ed0a219be626f73
SHA160fb1c378ebf0b105f5e103fb6777620fd9d5346
SHA256e1a23d5c54f42f5c3f9289cbd4cdb40ddc2032da942e4811c871372e10fcd118
SHA5120139a33e772a9aeeee37477998c4cf341115c489b0baff64964d82f95871e0633d385f96f7cc25b90d824b187484d292ce769758e706b7886b608865a8879a76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e2873d90f16a6d610fe0780f245cea3
SHA10df6b4ba104d4713657763e1f716b07aebab50d3
SHA2568b7c66e7095567e895060e29d5945101b0826b255f9837d4b935a7068a57c91d
SHA5122d2a6e10d49cda865a19128a4a002a3e52f2a61b7bd7879b57b34d4f1330c96672e3b5013de0f73d7644818017f2172900a3c71d99aa26a4222a2de66c111b67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea76d010541ce079ece335f9b2a23ff0
SHA1c106cb8b5bfc41ffed9203abd8bafddd091475ea
SHA25673f7ae4d84f4d825295992564d653f16d9e275b6edc8add8ea6e9a3c9336011b
SHA512227a690e1858f00dc28e167270158818d39a9f13cda54e84a07020de71e5fef892f3854d6dcf34f254d6a844ae34192bed218692405032686b3d7c4a5752657a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51751ec1580541b08651fb0f308ea7dc8
SHA12365c0e5a12a959b1dc81cca0a8d06377c5f0ef3
SHA25653ff6c48c17f99252545a5905d79e73629cd7f3e93d7d7afa42381e5d1f69610
SHA512c81a71cf1e0e59d1ec372c8fa35af62e916a596b89a0024e4ed94199e82f40ebcdf8b9a71e95e96c9c6d5d3a3431052bff0d21d8a8b99a3cbc62b10e9b710602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5976336161cceb505525109842ea47409
SHA12f99ab7c2d9bc5988a262b69c407ca75debbb7cc
SHA2565d293d1159a4fdb39aedf79e94990d92c7bba807aaaf7a21b3b6524dc7058bae
SHA512eda5eb35dc34bec24a2d747300b931f9661b8bc8e8134c7281d923225492b7e6e055d697cc71840159c0907c6b575eb177e70e0ab790f5a71e55c54b4428cbc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511c980c1bbd24c133520e02070f70bb5
SHA191db1e4192a6b63261b2349c0343c501a3f55f36
SHA2560ad13567c76980b39f45d788c6ebfc9bf0ece008b06291d9f70792cafb149acd
SHA51222e7493b5896390c237d858cac962624e2ad67df1bcae46ac5ba0636f6efa604b935fb8b2f0f40e548b763aed1a7a75257f95f082c25c60adcbeea725f62388b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e3b6da4ae9effbb3987acc56265b0fe
SHA157dcfc16e1be48c0c52f7ca4e48d208c5b5d5325
SHA2568ac63f088329e72ef72f4473e4b4bc5d93557660419d09e123e753dc8c511866
SHA512e5c561bc0cda13f14d403f7c50cb33ca15c27fa1c19635d84e6e025a5fbd0d4b14675a0f46b92d75829ca42ba18d15ae42881925700e3e15534b9860fcf08831
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5019fa1ed86def631441a69ba84a3369b
SHA13c802c5cc12d2a7c24c6025e004a9592d210d785
SHA256aca8d24b09f634ffa21ff766c02a77b2c9581e378c2836750fc44c09b57d6e04
SHA512c06e27cdd915d7d11f41f69e506ce98c628da3d1cac4ffcc33b094696fbd536cd214d4012d53f4eab61e6297cd71daebe20039a0d7b5a872f02c45ac08dba44b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1043216a416fca002be32018c37fe25
SHA1d426ba63d142c2fb2661bdd87a55d8d573ec74d3
SHA256ff6324bc6c7789bbffff5fd8c154e8b9fa4b15f51088a44b763291326136e548
SHA51288fc686603344ef3f3055ee30690f154baf4b56c970a1ba4c48684c9affecd50ad36a39590ef2982050fccd7cc9e42facce60c4968897e6b0596d1c4d916a7b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f029343d70de894918c30b8dcb7ee50
SHA1012f678e2ec9ee19ad1da2e3667aa98ee19343d0
SHA25637a278bb57288e838272bc0e84796909208cf6b18e65b7995db63222b377ebdf
SHA512ec704541d366ea2b2ed47a10d7a918e36938de8b91e617097f8b1d32040c08d541e0c7a0353ee55edb90ea0397474bb426e709d34a2faf03e359c8e5e3f2ee39
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b