Analysis
-
max time kernel
136s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 12:00
Static task
static1
Behavioral task
behavioral1
Sample
0a8af9f43f289a8562dc864983309181_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0a8af9f43f289a8562dc864983309181_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0a8af9f43f289a8562dc864983309181_JaffaCakes118.html
-
Size
68KB
-
MD5
0a8af9f43f289a8562dc864983309181
-
SHA1
c8340992a88cf1587131f3f4e408d2333d08f145
-
SHA256
5d1458976b5ac032efd58470cc1a0d16dd3e68a9553bc3444953bf72ddcf859f
-
SHA512
76cc9b18c599155c0c3c7a833041c901f64385a0737939a3565d2bcd3af570f4fa093e9fa0f7c5f943eee8e52a0ef26a47cde0bf38706265d13f5f425d650362
-
SSDEEP
768:SpiPC/nfvfdOb/x4c4pvYe7wVU1HDCajo77B07KBbdoVhOpVcTNAcoeHG+KBhVZ1:Sekf8koT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000054d3178b5ec58fc8325033d3112838c71cae0e4272040c197f4dc11d2744ec87000000000e800000000200002000000033ffe743ad9cd2c8f1acbe902a83c72cffcf3982a426aa1022909711ed91321990000000083da8d9ca9c6f7c987fbca3d28a0bffebafcfcb25769d414a8d27bae0dbe837d44fb53dc3d5bf718e556579d8265b32658d040330efbd5701d2650507089ae93a3edfa34f0c98a2de5c2b27c278aef74f10eb9c2e85cbfb38a0bed5eb32f13f07d504686c30dec929065e33836beb53e701f9d71d3872cc417f663ab61a98f0dd084a687b1923bac159d249b6e914e74000000080eedcc6cb0053a9ec7563a866f7e2953ccda034bf30972959cb8ee59703fd0e6878efb52c78325e5ee6b358f8d40fc5a843955127d1499f75dafd72ba277ba0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DE8B6D11-80B5-11EF-AD4F-5A85C185DB3E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20fa88b7c214db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000b0e62ab97eafb8ade83a1de7a7898aeb646d3ba515f5c9174069cd4bd911fc16000000000e8000000002000020000000d7516073bc9c441ec1165936d6329452efab988c96c95b188b551eccc11993c920000000b3b716911f3e2ee0677e97010abfdeaa3e0b243ce3f0869c98b4ff031923776a40000000432e04608046528470b81512e278aa1c66331e7f22de155f3baf42ed6e64449706b996506937dabb04a28774b5483ec282d430906c8c456be51c944abf99625a iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434032276" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE 2568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2568 2364 iexplore.exe 30 PID 2364 wrote to memory of 2568 2364 iexplore.exe 30 PID 2364 wrote to memory of 2568 2364 iexplore.exe 30 PID 2364 wrote to memory of 2568 2364 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0a8af9f43f289a8562dc864983309181_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4e5aa073f4e9222dc340a1af1ed8453
SHA171655ec059e27850091a14f3f8db339c754c9f29
SHA256d13399dec6c44149d352e5ada833bb43127476e7d7baa3f707419f30d5114002
SHA51213ffdc44fdb6510ca8f869b2209ab0204b9d48b797db7455986ca1bedff87c6c1ddeb8859924c37fbc8e591356d1d77e80620c6f96ae450b177f846f3e455e0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554a1c836e4cd0d7a60f62a58dc1d090a
SHA1d839ad07870cfa7ecb649cf03f35c6816bb66db9
SHA2564d31d1bbd26f5cbc93d235505a51b745ea6c76df5e46136816013745a922c31c
SHA512884cb1668113c1dd07af7d3e83c7884171b95a0904f276e4dd7256d95691b60ff8b57769cafb66cd7bb86aff73838a9e65392af58f0d28f6d4e87dfe755c5aff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5295560c775a043a5bb967585af8d6c2a
SHA192f7d42e3c57b9c89f89079e6d48ab2991780a6e
SHA25683474807d98678ce37f16e5359f3335be73e62d75a2b65f9a4fe5e754e56a0e4
SHA512f71e89aeec4c5df6e2213b8e333d1ef85b90ad24c27b5dbacf916d30a43f4c1c4235ba7c7fc1cbfb31b4bbc3c98a28ba2c956b6b29ba849e644015291d6ffcd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a95814d53b5c5625dcad0926e6f5c4f
SHA146fa91ed8ec16c1ae791bd48f93b553c63ec8449
SHA256aa857e462b32ebbf2b9372d9e3cb8bfeed8f89e153c1fcb85f7a031b550e59a6
SHA512d6f6bcdfdf652f9c509c11865f9e555990e8c3ee15c24495c276af914985a374c32abe3c1a7d947adbab9c009007d95383a8730a0ada913283c7e9778a331df2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c416003a4061e476e09dd8337b851edd
SHA1d3934dcee68f0f6b3c73bb4b1533d6f513041a9e
SHA256ffaa23bcfcce24e2373f8d766c4a87627e1dd0b6289eb4db3c0832fdbb106212
SHA512881edeae85125c7f73215f2e5ae8b020ec4397214f468a771f649735a3dc5be904f5a45d1c279a4b42999039094d19088350755c910905ba2a3d0bdf5ab959f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b4280faa5e085f6c7de22894aa4d13a
SHA1952c65f287e8545e9a0b21bbe38d7e004715870a
SHA256b7d8017fc8d49d9e5162580e39adbba4f3406a88efb56e27b20c7e3ddc21dd54
SHA512d005856588f3ffbe7abe6f50452f1fdad0005802a910a06f0789c1b0622af8f23cd4cf8e1f34d726400511311495e02182ee79ae6d28305c0594128dbde8ddd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597d77d2a92cb7c0a45a895f70b83f975
SHA1ff57beb1db59df06e1640593544534bedd0346e3
SHA256848f2ee02711d0212e9062a03490cb11013c25c13b160e0dbe0a9b2a18f0e6cb
SHA512868c7a29a865ad0b6ae0488a2352da9bde5966980683000f8ef14d080fff28d7202a067fe3bc83685b2ea88f5ba8817801e94ba9f36509807797b22a989cf6ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543a2c523d0e9f735f86fe64009544f8b
SHA16b41186fdfd5279f811db84b89a60efed22f18da
SHA256114265198eb7838436e17137c40b8b492a725aea9dd535e0f9d35d1a65a84e0d
SHA5120ee4795572714fe0ea79c51260e8fe669783a213a784f476998a3ade5662355c0716d1677f4e51582a52f582dbbcae0c9bf95e64f6b4656cd1e9fe2d235eb7dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eefac0a876ae66d62505c1cbb129cd28
SHA1ecaff4d9f9dcdc090f6f1a22396e01ce791b6c7c
SHA256262591eae16f8b5928da667597719870f9b4b8efcaf173707d3c75beb998db82
SHA512993851ec3fa8e9d09d54aff7ffe66cfaa3c2bfa24effef6244c84fb5cc719b6d98d9f58d848660f8b8d3c14229f1097f62673c1575a0617eb24bbb179653dd5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565c41e1103e7ec000c2acc73ff1147a0
SHA19b9b13d92227cfd24eb05a925c81526e35a65062
SHA2569bcbc2b1d85d133fb9eef341070b018216fb62ee419f9635f6ea06a41b73772a
SHA512f6203d663df4919befa7f663eda39b6aaa87289663a62b7c62998df54e6250b6697ba758e43027f22a3d5404e52454aaffc94ee2ddaf101ddd65a84419c9c81a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc1936ab57fe7ed1743e785956870792
SHA1d97c871dc7fa85f091bbf4110b3ec5148b7b72c4
SHA256e87d0d73cf7034e26c9a03ca1a8ae2fa6d03c9e8aadb82687d2c44d04e947d94
SHA5128a159b0d7453a936e1dbafee4b3255f6e693bd980dc4edfdc89036633e23eb0dd4c03d4f6b0e951175719c5b314ef556ffa4c35b7dd30b4078d604124c01bd59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e62f768a5d6942c5765d980d1384e2d
SHA164393b4fa026ebe7b0f79d6beb0297228c2bec7e
SHA256c98bec6ef14d9c2c3c01a38fe5c370661df1257b8730575560adce5771b25d93
SHA5128fca66713d83de8994b8bff758168cb0d4dee9c3caab8821bb30ff36c3776dabf4dd000849cb227cffbadc379535676f5608df9a4c39ce83e1fac7f01210935d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55044ce6d56a03afaf724bead0a8b4aa2
SHA12239215e7d0ce6ba5d3158585d1b480876b47ef7
SHA256a3ea03e9331f3d087737ff7a822b1640476d36d21fc3a020b0e19af3e19baac3
SHA51246e5a5e85eee776abc945d37513d214ba4790dc5c3daf67eaedf479ec04586708eda65ce91e2a38d6fbefbcfb3625dc3d2a7cee5ca7076caed36cc1c768e3e8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510ebe59b0c0d55785c4a6d6091546f4b
SHA19c69417e48f6e4ce315eb4a3792c00ec4da780a1
SHA25674719f63fc88137d38105147b4882f56d272f589967e7e688c69d72335fa36b2
SHA51219de2b4bc5be7a17d7bff1720fa7455cf00507edf6565b5489e2314d8081c898f4e6ba77ef91a36c965bc2f9eff028b6d831579ab017abc0cc0fe3d2d5b9cde9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54349ea8bc5ad414305af2b12407cb4c0
SHA163d5a2cb927e7c0e3c737e8b00e2c9a50a62c8b0
SHA256805b2d0963a05036df45eef5665088e181638cee0471944d0a883ac1377fcfe3
SHA512c845b0c447829a1521dfdea4ad348673cb5df620b72a61c1fc8fab718b4f5339752e4bf5fd80522ca83890610c8d645c62a02dd7fbe3c2d61c6ae6cb276b012f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529d3beb4300cc115ab45981b4b2f961d
SHA136d66d6e9e6ecf0676a7de1d6c2ccd6fcd3127d3
SHA2561b7709cdf9ec4ba7d54534bb862250ca3fcdb14467a02cf896b7ef2c08778263
SHA512a59975f87beccfdac982cdd320adcc125aab95b7829403d728d4ea0a13a1821adcc7269db968e3df0d02e887f1bb18be8bdafea939f4b86eb162f78640de0378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ba35c53f983c75f1c183d38c6674b8e
SHA1176e0a97a3c264560c9ef3da0c9edd88dd2530c7
SHA256ecf6a61278bfc928b151c3e876f4531e5d50cf24314555e2f03079323c4645cd
SHA512102272e2274a23a373f20f07a37b96bb991e266b1600e52dd02307918954649c3e58c0982ec2bd2d837c5e682dbe76165827bb0e4ff85976683e1b9b466596a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d621ea1d5a9d221d8c6eea6356d6d12
SHA13c7bb24df75d80d5afa4ca201f46eb9b8b1adf52
SHA2569ba87243208cb56f18a6ef23ad2b6760f7b9ea7d54a88729d3748244d8f2734f
SHA5129e54cae04f90547188fd4aaed40b16e44539985328d5f2242fce5f12e92d1b502af40cd3f1744b1dae7c7b1eed5cbfb68b437c09bdc9c79b95a927080f07f4d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523ca186bad155570eb4405374f2d05ae
SHA1348bee7b6085f4d4cc5feae9d34cf8658aad7f33
SHA25681fd7b00c64ccaebd64358f61d2a6b882629254eed0acbd94650a5e091d16575
SHA51228c6fcac51d1d5964c684ce36ccfdff14392181bd0791038759e21fc91a70033327b62a9ca2ceaf4e2165eebd485fb25f46e03edcab41aabb5e30c34fd0dc7a8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b