Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 00:26
Static task
static1
Behavioral task
behavioral1
Sample
27b4c277a51839862744c2179a9e53f8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
27b4c277a51839862744c2179a9e53f8_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
27b4c277a51839862744c2179a9e53f8_JaffaCakes118.html
-
Size
40KB
-
MD5
27b4c277a51839862744c2179a9e53f8
-
SHA1
eecd79efa80bb843845d3a586f6060ceafcb199b
-
SHA256
ba99d2b8c5ce7ae2615014d62012de0018f8db0bbfacded010365a3d4ee864c1
-
SHA512
2a04cbc8d71990ce38c3675cc1038372ea7d81102c5725474189bc05c5fca95fff0752759a826d399496df45eceb90e96563901a0d097f93e1c5782bd052439a
-
SSDEEP
768:JmTdcqpX/pJdgz48JRj8twEotJWilE1FXk9PuyWUZaNtH:JmTdcqpvNgz48JRItLotJWilE1InFa
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a099542b1d1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434620841" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000beeaf3b765a8ffa41c972deee3be63765dccd3f7e259951f948b37e12893a405000000000e80000000020000200000002ce4e8c528758427b3aea1114a8688fb4ca1441ae33d8be3d77f348fa6a5ef4120000000cc54f7ffd85a1a7e4780eb4aabf203a84caec5f0edce7ff3859f059873d9511940000000126eb4f64e3e8a0e8b33a0feb8940b7ca60cdfb9d17c49fa3ad483ab5c7f954ee9f54362526899fb36edcc265e5c6db8eefe8c3859a0a30809e1f47c5c043d81 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3B376EB1-8610-11EF-A528-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 3028 2232 iexplore.exe 30 PID 2232 wrote to memory of 3028 2232 iexplore.exe 30 PID 2232 wrote to memory of 3028 2232 iexplore.exe 30 PID 2232 wrote to memory of 3028 2232 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\27b4c277a51839862744c2179a9e53f8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587e21a50226951eb02d786ff5c1573d9
SHA1a42feb4331d3dde7d957960f55877821af184ef1
SHA256b6ea6915bede2dccee9c40bb0a6d1035c9471d9266463a2bcaebc97610487e10
SHA512b433351edb87653e7de8ecfbddc2182d6b540aa5cb07a4f9d89374c66994e5a5e276aea58ddd37b631ae4b65e38737e676384e589f2e82eb944b1c78fca14c15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578520cdaeed89f61faeac51d869eba8d
SHA100b3ee190b877c42feb998c68fbc22c2a3b91246
SHA256a9d84b504b6fbbceb73fde743d295c087ca4ecdf71d82ae4ac31d90d03725aef
SHA512604bac12818c1ce3595df65f7b777ac8d5d7e329dea15501cbf90b426f61b2a486f592ff722559802c73ae69a8d7c36f89d9f20df914ca8ead4c7c52fd3540e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfeb9f7e00875a22a0be1e61d94154b7
SHA10e292f079d6d3805b8f37d87b9761fcbe7f97212
SHA256b04549b7ba72c0762cbe099dbe727046467e4b123c06d6ebb607ddb32266a0af
SHA5121b68312bec6ab3ea59148cee4e12eff3e06435331126e7dab9e5bd5e97e403caa933d4dbeccc1100d17fef77887e98deed2b1faa5d8a3126ba08a14560442e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0f269f5fef8755219f98da59bb9475b
SHA1fa7ce93870b7be3ca7f6505a13b9d69714b7b383
SHA2565be74d82f656ffdd7322fa7f6ad96bf2a09d8c848273cd8a104318a8ce6abe28
SHA512316800e065cedca8d16a4a9ab8959a7984a4ddb95793cbbae52a814eabca87c6c894e6e692a51892cc67a5dd61e7cbc558e101b3901f6d42d61d0958929fb01e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f918d923cfebdf85d778da009072a6b0
SHA122aa48eccdf74740bb4ded97a1510fa1713f8932
SHA256ee060794d98c41f259f2994d17ab994df499d903a1ac18b4c84c8ef2b1a55291
SHA5129355e08cdb02011f309e6cc5a6a5d9044c214d48aaff50eb22a0d5e7db4c360d5b81b01ed1e51427b2b3425298b82bee1a16e0b3816996e2327de06312a96411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523b538e4be339a245b00078b1ae473e7
SHA100bd9c2f3865bdae8381c3e3c4acf3557c1e3afd
SHA256ac5e5ce70923052fe7f922fed4c18850289e77bfca4505e44f9013a731981b82
SHA5122f48cc117dc5fed5873d4fe7bd4b8e03575bae245d5e7b03ae10a11875523605fff9b49e22e22fc3ad1510029e65d5ff937c32eda7ab4c6f387217bdc4a5353b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1656e786237d787b2b30a3ce8252e45
SHA100b508325d60521708e670e0b00567d2b503fb12
SHA256d2dcdfc2c084d3f74fa3be7936585915f8cac9dde4abd79dc2bab6aba2f9d312
SHA512659bf5ef35b5130f9bea37efe0d86b5d03da5c580d3fc72594226b8cbe15497b6e8e4ba67ba59e0414a9c9a2ef46a1f25ef5cd908b70d972e3207a8c9efa0463
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f283b81cbb27d6d66af23ed34cda353b
SHA173b6728e0ffada5af86210577235fc1a6d04f97f
SHA256f286e3855d9933d1040151fd61816b167a679bdbbf247a164dce1837c886171e
SHA512ab5c37dd78fe7e17455c885b18bb4ebf0a06f60216173b3ed8bff4bd1f9db4b3bfc3e4a0765d2f70cbd325c6c6feef4a56bc0919a4221b545f54b00cce117f50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576a6fe6f2b0297a12eb0260b68303538
SHA1c112f34afb401a1c9e17e952fc9ae4799d024b90
SHA256dc8431efea020214c3e3733e74b2bac798a6083808f3089ac811210e93b5a3a7
SHA512faf8935a76d701df02897e81982a2b502a434bdea914fd30261d5ae3085c67811d53b6376712945e73551155e42339baee51cd0506a81d1657deadd637849a71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b255343d8dac50a5283f208574ecc005
SHA1854742acb031aa71b0a3273c239c8e6bc827b2d8
SHA256301c61347c945fda8386df266e751cd2a82a3d073669bc7f7297c35da9064192
SHA5120baaf54d2e78a488fb69b161d037eaf43465b92797d94293bfd9d6733f809d03be14b43f4b1ea74cf23648b68e3dc5fdd6438d929961eb5cab8a14fb0045ddc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2d847eed3444b744f7b5b721c0eef50
SHA1c7196fc65ea6efabcdb2d2ec03562e7018907842
SHA256e811a535d4878b8b2a8d3999511804d59d45842618ee000d360d499c9527eb21
SHA5121902cac94b86e0f36bd7ee1133f0df8e037180436654e6f8056652034b6445ab5adc46fc76f372e0ff1d1ef02a6bfabab6f4aaa0dc335ae1ac7b22cc041f14b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d02ba0d1c7ebfdb95abbb1135e7f6edd
SHA190099db75bbc6b62a4fe6aa80d6404332e54612c
SHA256cbaf96b71442fabedadef6e30104db516217bb45dabf8d5c47b0733daee0e08e
SHA5122af060b9599c804fc7cd74382e7ac0f34cfb441738314d402b6208841194c76f1c18098526cdce53d443ca087e523b97a7ebaf0174acea4637101516672f3cde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8a2523c445301b7116781576114fd26
SHA1275802cd63ae13fcf135a539e3817f2e515340c8
SHA2560117553af120485e67714d93ce9f1c9453b37c1c0037bdd21ed2a1fe8d8a6aa7
SHA512c6338f21511714cec66499cde85f0b7169c5703556f67f502ed2fb7e93a634c574af03a63ad3702aa8144e922c3268b4f5fe9e2fbb8f14c47c4483e5d6ec7a14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f823886143159fa952d273b817a54ed
SHA1200d9dd1ee1adc51746170ff82f2ef40003cedeb
SHA256c02a0e19e587b0520959ae3ebd47172f41f97d5970e1f3c02646179d62c834b5
SHA51239926fb38300c624c1107536cf01d394629af5b833b4af7b7aae2ca6da62083fa70c9241c0df49c7d483a464697a0f16958d374e0093b44cb4a024f2d147321f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2cf9d118d1051d428843b316ed5dd6c
SHA1a76807fb27b7a68a256eee351b402d01eb074afb
SHA256d10896ce785f2c8bf5f2b6660e4acf656675bbd28bef39d37ed8a2d95a71c173
SHA512d5f9e427b63ad83d21a4f4832d4ead1d1b51a8efcd1cf72c94a1583ac81900560aa7150bbf16d2e99bc0003dbd6abccdba4dcf7ea2bce0715adadb4bf9fb33c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583074a0d4e96c2fa412cae66f4df895e
SHA1dad0497501f6419da16d7fdf24a157942dbc0e5b
SHA2562b815a83c605c5f1ab7e540bd671799aaf7141a021ea8d0acdad15c6eacb3d9f
SHA512899a8cc0b9df37c9a3d7213fe8bd9163a10e71625c26fe5d92048802496f126f716ef9ffe03335954ef70133052260cc7a65fe0f118acd66d339a8c12edf205a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d80dac85360255c738ceb7a8061bd495
SHA1d2ca9fb1b1668cfde798635fec8680ced90d945b
SHA256b7ad70837769d4c33404e735be2d6797f3711fe89706100b795f5a3303fd75bb
SHA512ad9a625f985396fd0f6daf2ac54c05465a7711f937fa1850836d014c78bd21251a42eb58d21708f4f94bf0249dfc0e39d1d557ad9cbfe37d1c5d05efb58e8298
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dcc06f92ee5fddd281b58f96b85437a
SHA1b7f02c7b0cdd82a752bdb409fe9c327f9098ff90
SHA2566adebf539f9510b0e640b5da4937349d18c4dd1519bd9872a0b9c9dc92b6db21
SHA512ab6cb37434953c061f355be61ccfd15a489e5dc5d4c3e2169dcb441de818a1359bb02a2a7d8140804d84e3d526c2b77c159ca31fa443fb2cd9161306d27ebaad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5150e1d6929765f1f2fdde6c146c8bae9
SHA1934367fb101ff4860138be35de1f6b56c74208d7
SHA2564f79e24e4df2fbbf89b9b023f461307decbb07bfd3f0d38d3cf93c29ebcacff0
SHA5121cf3b1f585e5b89eedcee802ea9c5de7be50291ec7e3cc18f9286e924ae041c17de0061ebcab017293e8367b7127faba4cfe8e24585dc9f75d72c46aba425b11
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b