Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 08:25
Static task
static1
Behavioral task
behavioral1
Sample
8274012160cb99cc98364a440e27d7f9_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8274012160cb99cc98364a440e27d7f9_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
8274012160cb99cc98364a440e27d7f9_JaffaCakes118.html
-
Size
18KB
-
MD5
8274012160cb99cc98364a440e27d7f9
-
SHA1
5b243b092d9cebab9892eba54fe418d8f8c75169
-
SHA256
6a1fb6691cf75a6fe3cc2bfebf528a5e2e4a67bc36b53b9e1c97dd15dfc2698c
-
SHA512
ecfc3e5761bac8cff69368b3b4cc4f77fe929c4252c496e4c68afe2f57adb9187b08a1679437f54c6ceef754c28a9e77972e8e005f73608ea4f3a83de9792902
-
SSDEEP
384:SI38uBlG1upoSKoe0eHK2ZlGlFnTnQ3Jx+GYaUF5b:SvGlG1upoSKnHXZlGlq3Jx+GYaUF5b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C62BEA51-9763-11EF-AEBA-4E1013F8E3B1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "436525895" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000c2a5b08aa5e9c65aa38a2b6aedbfa75fde7e42d27377fd187af1bfb010c7353f000000000e8000000002000020000000ba146df5e696bb5b2dbe4dc710edbd5a22ac6d033061343a1811f61a3c60a3d4900000006fd9162efd47b4908430d9601f5ee2dc2791ab7c6c7326fda57b9a4b8cc1324a516ca34bb783c61bb7aeb5759337e03cca58a0735d29e801666adbb90da9f07e14679ebb247525d57c831690bf5a5edb8e9b3e6285e1f0da567c8255632e96f4b4f8eeeda9e39c49603fff0bb8935270328a5406cccc85024c9a205ce6c2302d39a0c7049e8c42aeab3801a502771424400000004f91e61e6157d366d7417bbe2f3f8cbf5fb4273ccabc1b8db2bd44aad9dcc7c686a0034a585fb6ce7c07d68a6bbd461c5afb106f23371f76de5ed940a1bfad17 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90b0a9b5702bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b13190000000002000000000010660000000100002000000078c683fe70ea442ce0c7ae2ab1687bca19e830184dfc8b34218e2075230acb9b000000000e8000000002000020000000b8a023307a6039115f3bbe885444c90858e2942a599cdf2c9f747c46c0b77ad3200000004513ba8aae5c6af2c7f1f1535c3e8b52be578cace7ae5d46b0718a8455f437d94000000043a86bcbf38b05da4bc566abe4a5cc6e99ff7351ad23e945a40f8a69834c5b46966b7de2644167a7f61424a88055bc77cad05869890a5e13d34b2fa5a2a66264 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3052 iexplore.exe 3052 iexplore.exe 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE 2200 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2200 3052 iexplore.exe 30 PID 3052 wrote to memory of 2200 3052 iexplore.exe 30 PID 3052 wrote to memory of 2200 3052 iexplore.exe 30 PID 3052 wrote to memory of 2200 3052 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8274012160cb99cc98364a440e27d7f9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5520e253eb32f5bd84e52468842d8ca81
SHA1fdd8b997d9c0d57f3c1128d3e066ffbb6a3a390c
SHA25603bdba6254b4bd65902582e6653a759749510bdaa0e849c40e9cd0d67cead9d2
SHA5123968d0e11aa845faa5ba5a793e09f103c9d4dd5c925240e8f6a5e8e914044d16120031036194373beb8174d958dd0d1f49fb4057d4d4b81fa54369b705f94a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aad02b9f455bd1a62fe7238453d4c646
SHA16f875dc1a16102738d1355b91fbcf465204cffbe
SHA256145319ec877a897e2073ca6e77be9f193644d24f580a34599bca2cd6b9809992
SHA5120b8dcb088bbab2e91968a5cea4c71e9d4a45e5b1e362ef124f6e519beadc37da26d58e8d08901656ed2dc96bfe7be3d0f5d82a061cd3ea3835a4d98c70598fd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1c8090ee08b780d5d68c95730d2288f
SHA11d270a0c3810d8cffa94e2e58a31783c0cdeadce
SHA25657ab31018801d8f341166ee40c4d247d00c1b33ab57f4fa9a1d66e9e4337738d
SHA512732152d9cb3163ad737d367498aa5c088f7efeb1ce230afa37c3b86efe2d85f6ebe59dedc9e40aac25064ede192cb2414c26892c9358afb9d9b7524337b4da0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538adfcf0022ab780663c31a621a4f630
SHA14fc84ab1a3bef634b33f9b151c08d0f440f10548
SHA25665609865ec3b3eac0167cfa1dcd9b2593a853e991e6c4e62ce91888f7d36e716
SHA512e627c9b5d7a15a9bea3811b27d3bba0b3d7ac3e6533d9ccb1b5cbed800f50d212e3c18ec7e337e213e790e28abf380ebcf74225b81414471efd71c63006981f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57afa7ec8dd9a10b1eabf6e0d76895ea9
SHA112e11ae34fc9d0a646d985078d4edd37925667eb
SHA256a90fc4049b45660bf9bd7860c8ba9048c00e6b960127f57258112697e9957110
SHA51245a1aec8f0854f7e493e7db11385281eb5653dfd8701019e3c4a5bf660842018e8f668f9442b1d06503d7003a2abdd9b3d51879606a0432ef52d07c273f15566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5301f9a389967e6715e681129af92a228
SHA107d08e77d41c2d82f07f15dc086d6d35d03ac9e3
SHA256f23544862b85097137d99332f3a1e4c276f10f1bc3a75da8e8b5210bce42156d
SHA512a963ba3dac34458889edcfecc2b7023e7937b780a30d899ad2087a21ebffea1d56f94f9028d58d7e1e2e975b54062ed8508e3f27639da552c118c0dccfaeceef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59daa81cad28b452680e26b9c88cb5ed8
SHA117227208f254e9110cd37640edc377b47f53961c
SHA256334e966609f41f141eab1649cc43aa56ce7d55135690ce754d1222a0ac6ecff1
SHA5124aa7073acf154205564475779a97a1703abbf02fc6c814427a67248be1225a1f356ad84f7db00c0853e0a516449000bb71f5e6eb0465e4e64cae2bf7d96e977d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faba70b4203627d69045fad38519f78d
SHA1a1ce5d1684395b3ff48ec37d05f025655d0bea42
SHA256fc537aa4ae0fff145eae0500c2febbd6dec63f8a8018944c28c41c63a8366da0
SHA5128e7fb1a7e31f9ea1843c71ceba0a27eca0c508ddb885d5c2ba51607ac65be06be91a7330415a5340f32c129c63a9bebd9a2d4b6c355e61a06e0508cb5f93500b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f735d0dd59dba87364bc86c2c3228718
SHA114364746db466ad08ad814595c89fb3f93ff8129
SHA25654a8847680f012ae63db17f48a9f8612396641ee4580aaa0e326b866019403c1
SHA512314d15905c9dda1d632846c19caed4b943d6c60e6b5418e369ea8abf7ceb84471ac073b2e50d5e3701234f440c602c23e21d9c908282308cc2a623a4a0742e3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6690203cf615e0333ca902601033d7a
SHA191d03e21077623a530eba39c3cd676a5e18a86d0
SHA2567b2bf4d21793e6f74de52bbf3e6d95fbaf6c8962781e01b2e8ec040ec4c84796
SHA5123de4ae56c33c3f5218f0db5434efc5b0165e4e0c08b7e9cae76d935c39f6cf242369337c18e9c4085ab9b95351ddcdf855ddb5c5887034de75269f15fe7dc69d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50840d93e141bbce44bd0a8c1773385f7
SHA1969bbe60f320d2fea49ba0bf35a7322a0715b4b5
SHA2566ae498aaf37a83f3815866888699ac46b9f68753cf8dc52eae25441e3da4667c
SHA512943fdc244931f6205c73e54c7e603882b14fc67fdfec65c20a7a083b6c987dbf288e2ef1d5139300ada6e83e86bdae2e2a32cd7608afcd4bfe99db1d8f0d3d8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5089104834e64951ed8eca57e115bd9d4
SHA1cf2b91bbf4e5509eeb82de851d45fa1d331f021b
SHA256cba181652efa0d548de97e56cea9c4a396fc9f726c6eeeea0a6d73afb227118e
SHA51226e61f2ec959435dee113e2660ae08b05f41bc75cd988595446a6216af917a4ebf7882ebc67d91fe5c86ec00d4b20cfae34ca5017fb7d91b3bd25cf66bba1384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533d1cbd71743374cc4cd795524921c7e
SHA1d0eeb8be231407e8e71ae693a3fc0910fb79f4ae
SHA2567caafa60bd6ba1a722b109402a8395d3faaac08d849748a6377a9f450d2cf943
SHA512dd57b95c777c97f8c598b076cbc6be6bac3714cd5e32b1d166cae803a9b177541b4c86011fe6c9864e3ea8f5defe4d8e7c3810043c47a71a333edef979d6106f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1b9237c9d57e9768fa7184f2922ca43
SHA15e3d5b762488280cddb7a189cc82923a91a1364c
SHA25626fbc7032e75610d882141e811b1c9c89092dc61c6cb172f38b6a870724c8cf8
SHA5121c7ebbee0f8a7b985f5c02bfd5c411d189e4745aa5be46806f8a98dd771ae64522c2ea53e9fd93cfa5883f6ada6bd387793806673b072d284831e78b3771e0b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0b31823696886ff1ff9aa6c9d33f114
SHA16749a5244dd46733ecf0c8813bf6dee2d3aa30c5
SHA256789390b275c77e93b7d0e33501b60df7a17012b0d894c0f62e777ffd11c4acb6
SHA5129bd82518c7679e7b15190be52141d6c7443f71b48075066766b4ff6f810383aff1ab89a738611630906c83990aaa22f352e43a850766b50f7359b2644a4ff3a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5287f34f66810b53ab101bc2cc7c21544
SHA19d71be285466ec54f28716b0194fe0271d06968f
SHA256920a21facaf241cc23ed100a92757512cd2e0b65796f58dc7772c86010c7e1fd
SHA512b83b6e3e7c01cddeadff950589c9dd027d4cc1e3dfbbfd9fcd700b7887a5f8a05921d143a40c424821aff05a04b283bc537eb0ecdee695d7f9edcc916677d7ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5274994e215227b896bdeb7076a667d99
SHA1d271ac6442ccdc70d4f564e5f61f15786e850300
SHA25624c4ff9e3d8bfe271c0deab1f85d702045b08e871051b3c3e70cc898656ad058
SHA512457a909f9ac76fe4fc4a440a5690cf6ac2a944361788932641c8faff0509ebaaffb5d53b749962e353be77fc7ccb29d4ffd300b299f18d5d26210608e085f2cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c726949be4cb52f5bee2d1b672f2a5a0
SHA170fd9f807b31607f5b261f0de0424ac557785d1d
SHA25662297ee0964c6615003406fc0dea0ca35bbbb30fde221dd420f3bbbcbc9dd61c
SHA512968999f16ecf0af80d7dd540028072ea6a68f6db06bed0a25f4bc0bcbefb5527d96b20bfab2700847f50e52c8c2323b65cd0989508284fc4f0664788f1bb3776
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592cac6ce3d6b999589bc23372185e8c0
SHA193c6323692f79cae39c6dbe4879865a17375cb4a
SHA25633d2017b564be644db1dcc006453e712b5fd6d96dabdebc79778a8fefe0d0e06
SHA51259c273fe123dfe1ce92fa0ce2ba9c61feca9497a541740cddae3ae997f603228ff98c920e61d642af160b2549f702f949815ce25fcff16b3513152cfdcd09306
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b