Analysis
-
max time kernel
121s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 16:56
Static task
static1
Behavioral task
behavioral1
Sample
8b1d87f5118130cb5e47130ab9e7b800_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8b1d87f5118130cb5e47130ab9e7b800_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
8b1d87f5118130cb5e47130ab9e7b800_JaffaCakes118.html
-
Size
196KB
-
MD5
8b1d87f5118130cb5e47130ab9e7b800
-
SHA1
ce2274eb82ec2786dd119f4bcbdc1279ea8945a6
-
SHA256
1b01b01846d7dc5f2d96c346c90c71ba7ca0a26c62f7af4fe3fb4bcfdd0584e8
-
SHA512
f519f38261c2bcbbaee2305b0b5e0e8707fb2915fde00d31e7986d97bea66d0d241b795781ea71cbb002689a3120b71f2e95c264b6ff6ff9f8a6abe9bdb4973a
-
SSDEEP
3072:OaaHSSSSa1DjJNNV9VggoPvl4SwQoSSUwNHGxyfkMY+BES09JXAnyrZalI+Y6XXt:swNH3sMYod+X3oI+YS1tA8
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b07e4aac44b4da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D7686581-2037-11EF-AC06-EEF45767FDFF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423422837" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000034b069e471292f4295219f0e38fec2090000000002000000000010660000000100002000000065557be84933663cab7afdc16e59d29e0c34c71e7e0a9b69fc1c0f00947cb9de000000000e8000000002000020000000157b5ee626fbca1c04b25a179b8d352c13cdc91567250132aa5242b30b2cd07720000000f0c889986434ee2b3c9501c80aeb9d37d3bdb971cbe07ff2dde9eed2cb7d387f4000000065b08e1270b22b8b8394848812118008bba3e25edb40a5d32d05b7d1e67040f6c9b7c170bd64e6b118253865f702f7df51bed9b07238ec71ec77479c3b7cde2c iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1908 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1908 iexplore.exe 1908 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2800 1908 iexplore.exe 28 PID 1908 wrote to memory of 2800 1908 iexplore.exe 28 PID 1908 wrote to memory of 2800 1908 iexplore.exe 28 PID 1908 wrote to memory of 2800 1908 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8b1d87f5118130cb5e47130ab9e7b800_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1908 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580f174e72d73c20c4390bc6f8c64eab3
SHA1c1ae97c51007dd2aa67c1bd6ab4fa86671c6e9d8
SHA2565f8fc74a31526f1674136696a8e946cef86325530a4a234ec883e57e88e8cd0f
SHA512a81795887aaa3e89f8ee0feb3a5f6138744dcba7f408c2e502b9fd1699fba68b98330043f66ca6447d7151b0f434bc6ca130a0d99dfbcd23d79a123a1037711e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b612bb7e14345fde877658882e9f4a48
SHA1f9ebeb189067d81b65287171cce1c67fa77e4486
SHA2565f946465dd0efd299b0e0cb08537e9729f8cc3578fc47f7d2e9a87383cddb2d4
SHA51208d657f25fc5ddcf8e58d55578b448fb167f16058863349a5864fd55259f6e3aec122064fedc74113d4f95133fd96aaa7b06f01fff3ec6b145d5d1abe9cde8b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7fda83078a744fb9966f126bef1e38d
SHA10eb2ea16bc07e597da36fa99dbbaf7a73cd6fcc2
SHA256c11b377c084c3e2439812d3c403a3fbcf0ad0c0f66ac49ef43c33eb72e432850
SHA512083ef0d7c71b68e6fc3b71308b66b241e98af613b6aad5a6618d523f432b99c9772abd5893f9fe06732b27d0ec6c70b54bfa1a9532cc835cb24c9fb469123960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c1bcb4f75394fba670ffa4f88e958b1
SHA133b4eac9f999605750e95ec92c4545e940ee851c
SHA256a0b07fa0bc27790fd343cc1e136cac9913be0b7ca9a6523a8fa2ced4ab760c90
SHA5128be218b2679851a54b59827602a8ab1931cc085b38148e8e7330a58d062f1f9ebca51291929db026c40c8b6ad02e2ac25ed7cfe5d7fbe720c59285decbe7c9e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546020427cce78a254fa692c3a1ad276c
SHA15a004f09642603b15bd0314e7e51d98a7e326fac
SHA256e56d789851bb4491b31d6550b3876aecc8a2d76a6de366ddc768d9c029b918d9
SHA5121dddf027eb32bef7a59b8f6c0f4b0482cc3d7456c13056570ba5696d8fd0760c7cfb4345cef1466f3cdd142c659405e62cbe5a21c897ea22d0061cc43a7b2b3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52680387e029d0c7cabce1ee2b777ba2d
SHA19502ec27918912c0d5160597496c68893e01dd81
SHA2564ed44a62b7ce3bad85b6833c3c33ac5cf79af09186d72d686956f11254549e09
SHA512cbb728eacfd512475db76d3ae06f3160bcad6969ff4e1f72b60f5ac6ce838e398ff36577bab3d855d7002c2049e1c1ee8f352ab4473b9ad9a6a6dd5a079e6494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf028913c4f0904fe041fa3dd7bef5df
SHA13bbb65bcc14f1bf7d10d5b139577c0f631972eac
SHA256d275d89f74b0d13132ce8a3b965f850d968380537bc53c66dcdf54105d26108b
SHA51284b5ec3ff21398a1e6c3c539ec943ddf9954b88491de37b845dacbe80e37700ef1a8d13726c318d5dfe633c4e8cd8733cf94a2d16191a8fe8fea13dfbb9bd60a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563e9e44204eefc8ac743a6400340c09f
SHA181a3141d06d5ae9d793224c12712349e1a2e9fa8
SHA256efdc8f75171f1f82c72304b31e0771fdb6adfbead79ea7feb75778e287b63def
SHA51268fe225c5ef9eff6be1de384894568fd750e059299b0dad67b64061ec9541f0d0ac09f5c0333d961994cf1d74e763697198704f0413f36c2a30f495af4eb7b4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ed675cf2b0df3a6d6e1c34f6a7592ec
SHA17164ea5d185c3fc748d90ca802ae15a265502b9f
SHA256ebebafa3d0caae6b51be8fb07e7be3db57886d0a2d62fa5d93d38039f07641b1
SHA512c63c60687d7a0617091051315920448b087adddf494b11d17f161d0afda65a70522d0010dd755fbf23714de1bab966d6994e6082bc73bfdb947241886cfba06f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecb5cec49abac09dbe3fd5d7b92cd7d0
SHA1d3521180ba10ae8d9a983c05b2c5d95e1c2dbd2c
SHA25621d3d1f3d77e37a8f3aee7f9ed18349079b7434056026cd53f48996ff03ca2ac
SHA5125bcc1e8b4077d0b0bd396bbe5b85acacd12b6f4295fb6a8f8220faaf9a60b34dc7d3ca2aa0d23f5db3d2011ffc4138ef0064648f9a0bc9bd3a6b577e6767e8d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a47e86a9ca4cc9a3f62922b06be4123e
SHA17614b40a5072ddf1903c748805e7c1853dcb87a5
SHA256bcc5a60e240cd04bd6a63f3523c91cd8d884137a3dedebd1f8f5d3418d1519a9
SHA51207daf616bdfc284df9136fb1c7c9e64600527d57142a11fa92edfa0787f6d722c2f7d62bee3ed2533737812bb3746acdfd03fa2df3d684f23afe2957cfc64039
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efef9c895ea9ad774d5cd7ad8993911b
SHA1e600d729c472c1bc8b8455f976eebe62e439268f
SHA2567aeded2edacc4a2ca29ada5449bcfcd43b50f2ad0e43110033247ac8f8097591
SHA512f3f24316ef9033ca6ca7a2a22c979b7947ddc18b613a0d1cf70db44f5e69acdbb1870320523797b25a1b709b1f147a37f098b06b15eca0a1932393cc4975539f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0c089904cbd74ae99349abbdf90f69e
SHA1b42a4f471bdb20ee86e2a21bb588b3ab5aecdd62
SHA256582d83dfcbbdabbacf290e70f473dfe6f401b74e9da112f63b3d12ea833a992f
SHA5125004c794824a16cb3b2cf3863e8fb3b93800bd2ff01cd63f155e9c1ec7e453f33abb4cd3b9ae3cc39310202cf52ffd7eaa9d23e52548a724d4f958173769bbcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532f6ae95b188bf6de3b245b6d5a78fc5
SHA1b151011f3780d268017ac97a08e79c78beb8a7b6
SHA256dca61d656d7219edb166c9a01ed5761a65f561883fda7999ca0bebc422ae28f1
SHA5124a68cb5fb534a531e4fe1cae6f307aa7769053bfe4094bd01035a0c3624aa06de212df62ccb24e5d994b0669f08db13d3548cbc68c8bd971c5b871dab8efb8df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580789615656b716575f247549b6b7b91
SHA141b7817ac8f18ba5e21b22af68a49f0aed374f59
SHA256f262bc3e0315b317e742fdd358eda1f010f84efd3ad5e99a2ecb8054a7fb9479
SHA512204a001a8de97d50b56c2695f083831410cb84b31e678f6e91f6c41fcf2b0c9eaddf3906cb400628642b578a46d974c49c24ed6d68b2000177cd632bcad2db10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a980aefe52031840483b557528faae9c
SHA19c60edb451eb06acc0c3d98b8f68828f224d398d
SHA2568305bc3f9c473bfe2e7a5be0ead7ecfeb6e430061c8d86a5624361a0388eb0b5
SHA512b48ecd010e4978c7e8349d49d7724c0d78d700bb727f5b29b075aa762db67f5a649bb9f4e668c5dd0e954f559411c0f38a825f0817e09adc668762f3f2a96efe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a4b9d906bd477b0aef81221ccacc1fd
SHA12abc0e0b0ab15a1f276da54eb12b336d5c2860bb
SHA2564161f331da401e5e9f92540a87a7324bd7f6a35c410943e15484467966229b0b
SHA512ad5b29ddf6ae5dd4a6e6178401a3cf4511c34ae1eac684b006d196f5d6a838408781ca000dc41527bae8dccd06c35b554a0d566aa3078927217bc2b62f2cbe85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59411065db0caf68bc2217735ec09aa37
SHA196141115701e02341f4ce0e35236952f2e7e0ed2
SHA256524261467f84ed4e332e2c1cd96dc765bd77b22b283132de5725fd6b7aedb57e
SHA512e43ca14d8edaec4eaac826b3b05d2e33ea5e8cdc5b30654d1e8fe0642669dc2d48b91645a61be1b3c13f53a7c4a8dba8984a4588b7c10c16099e4f456c27a3bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6bb5fd4860cd23159f00b8c81cb6386
SHA178309421d591add910e8ef7ef506cacfdc5285c9
SHA256ee3df3bce5f89887a111ec9c7af518d8a45f9df0077ecf216cdc2a0b2b47e56b
SHA512c7a97eef0b8c94b73af35b14046b958e18cd32aecd3f03f9b0062789f165ebbf1fb2a8ec620e5e850b61fc4b407ec4bda88aba058a08983379a56a3128f3a75c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c82f723e11f181e8044ad2bb2ff8efca
SHA1d719eeb60e097670c5ecd5abee6fe97558a6243e
SHA256f27618bc556149b56ba69baf4781930bad0fafa3f19a70a88366acdbf730173d
SHA51290862fe1c7e8dabe26e92cabbecae100956265c7a674be0f6c426df070293d9c68ed3b0e2076b21152d9fa8c9af72f825e09875e8a8609ddb470ed2744af0a00
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b