Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
10-06-2024 20:19
Static task
static1
Behavioral task
behavioral1
Sample
9bcef01e8ce57a8c9291ce017876fa89_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
9bcef01e8ce57a8c9291ce017876fa89_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
9bcef01e8ce57a8c9291ce017876fa89_JaffaCakes118.html
-
Size
3KB
-
MD5
9bcef01e8ce57a8c9291ce017876fa89
-
SHA1
b385c16bf840aa5e6e4304759bfe041f4ff427ab
-
SHA256
abd42ac6f2f560d9e288572203badcf1a0441e6b4a24c9dfd75d3462db9d2d7f
-
SHA512
2b3dcc7c6b836ea4d417b4028627547e0fa8951ee3092079c239a24c6fdbf52a06323a69d4440133cf466780b59a1a6c5be24170d20d55c6ce3436cb4b85bd9e
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005103743398c1b84dafee74afbaf875b400000000020000000000106600000001000020000000e03762adca0f75546a8133d33887ed2af17133e2c73cdc02c28687ca043a7375000000000e800000000200002000000017b6253708293d7998012235b276cbf586522cf74a21f4ed4974978bff9e09f8200000009bf7707149f5c8a29a044fa5c0c9e12f30a40efb356e419ce87222ca32c8847640000000c15edb27e40e0e805aaba571c706fcfbf5148853707540683108258def9744948698d8ad5bb17ad850dded024a86b35fb96833b46967ec01b671e9ba59e4d298 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005103743398c1b84dafee74afbaf875b4000000000200000000001066000000010000200000004241b8e59b020b1f2dcf5e3ba20c6bae7339b930033121d9257a7d773468b422000000000e800000000200002000000061ad714d66f5380117de6aac6f1caa7c3f069fd85a8c81d8e3586a93d6c8b68b900000009d87ea4101a328194837f4391eaef4c1b0ed5df09a65a5c077af90021a16c88acf8913c204ab86b10d857e4a1c0442b49a7ceeff32234c10e59338781e5d7499a26139b51de4ecc3adc9e0c67279902feb8c7af211c9c377f65b5eec2d9d6061a6eff85930e7fb0ea9727f15f878f13f9abe7d90ab5b574dadb07c8cf4e06b6c2aa2d3a6f0cbc2184bb8438cf28246bb400000008f901ce751a3ea466ea07d5a48be8bd74b1fab7b8018c3a4cf53a373910da55a7a2490b70586a521c81d553e99b8088f3f0c5eaac42c6357d00d312a10951acf iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424212628" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70c1fe8c73bbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B8470BD1-2766-11EF-8A04-E6AC171B5DA5} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2008 iexplore.exe 2008 iexplore.exe 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE 2112 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2112 2008 iexplore.exe 28 PID 2008 wrote to memory of 2112 2008 iexplore.exe 28 PID 2008 wrote to memory of 2112 2008 iexplore.exe 28 PID 2008 wrote to memory of 2112 2008 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9bcef01e8ce57a8c9291ce017876fa89_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575111581c25ddfd411c2310cbdeffa1c
SHA1548a7037702a6b01dc3663eeb1bb32bb7cfa05ce
SHA2564d6aeca51a76d1a3e9c2b57f270b6b735e4e9a524814964df70c1b5460f48c93
SHA512997a5b762baa50faf0a739dc82ca6ef5724ad04cda658d150ce91963f7b2b13b021ad51a7d5e0f4ae1fc6048d5fb3a0a6a24557d6dbe4027b91335e351aee21c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce8c6f7413c171e06320946ad9808924
SHA1d75588ce925cca2d2b3c8b2375423702bf4cd73f
SHA256faf66899c185817632f4369ea9bc58d7baec15186a260d6eb504ef9aabaf66f4
SHA512d060d4ba5e9fee91d095c7f1e68dccac3344129fcfb3ab4fa59f7f4a12aad1026b85b68e37aa210647561e61a52f9dd290a3c2992fd97371858ef2f5af3f852e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591daa20d2570957d1f655833eace63c3
SHA1d0219c07abe7ae382e8d88cd38839195a560b28b
SHA2561d99705fcdeec5e9ae70030a2cd98fede0b024bf41ef20b999967430287beb32
SHA512c56a98c88e7c4b429a0ca74232800443248603c7b38263789afada9f3f834297d2193fd5bfdc06a9dc8a6d5a3be0380c1d54d90c4d34d4694629519bb9a22d47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee212fbcaace1d480f7676fa99b6e715
SHA1ec01666cb61af75d849d581848643269f13e6ede
SHA2568c67d938ca734c1ed6b672ce4ab32d6ca567aae0b2231dfad861a19dfab71d98
SHA51243ccc2e9b118f0acd5d6da170a18938bbfdfd9e698118a46306635a298ab5db003d571c564f1068704d5a9beba4df1ebc45fccfbe4340321a74c34c7f85c198f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532e75266dea6c07dd21bb05c3f9b51af
SHA149095489df439c11c2dfc97203ae973180068f8e
SHA256182866596ad4d94fed0c4be6ab7046244dc553acf2e4b3795388c7547271d4ef
SHA5121be20ef98fe94d70dc7b3dbd3121592374246faa298310bb92a2bb610e867a48674f6462564a5ba57e9e6524acb8d2d667590246075185b4a7f87b42c8dc583e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a877a833ccd40b053d681f054b8dfed
SHA158a865fbe771d8f17169a2f8c265423b81644ce7
SHA256931b58fb0028f84d5ddd783679a2fa29a15d4939d8ffd6b212ffd8788f2f59e3
SHA512abd54cad6c56054cf05fb0a3443b6d0302b092f0b533882c5bcb169138f096253ad34e012514d5d94d87edb3abbbbc61346d0749a76da934e994686dc93f5707
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a4c2bc9c7b01c9258d6b08195633279
SHA16e1f36435b3403a435c43096c8bb552b3bc16881
SHA256f780f8167e72db0dbaa35c6b01f508f58a1c03b6c00332cf432888259623ef78
SHA512108070880b15fc43050f695cad938342d46d6951ba968f47d2e24a0b8fb270cb792891d25ca80b3caaef8df6f0ebb5a6e0f96ba70a4b28697230af6ffc93f998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9ef2b0b44a02cc2d89fe5593637a74d
SHA15e21afd797020335d4e3fd9ee7e1ff8304c5f8c4
SHA25623e188efdd5e7c4164766e819bcf9c7f4d962029b976ecbaff812fc969147e88
SHA512c0d587e8e42691914ee7033914515c9bb1f4863289ac597a6cf5a02a2159ab42bacb13d88f733af11bff30f28f5d0339ecbccd0dd6c412452a48383986fff346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516d50d9b3f5a98f1bc63a8ffeb46cb72
SHA15a8e9a4e86e8ef855209461ef35d92f5cbc5b041
SHA2562e2de9ac5fde936f8c3bab5ef65577ea31878d5244f30a00302152784ec84e15
SHA512f0407efed2f737b0ac49fddd23fd39cc942b9bac15d92d3903e5f10c378793a17a0a1b16f80252a5911115ccd16dffbe674d1e6dd73cdf7446ed25305c036f8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512ac884e447f1ff3cce866bd49c65fc2
SHA13054ebde3b7f66169c45aeced745d8424a4b25d4
SHA256dee55e988f24f90a0f6ac4b92d4c80c24a8a55c43ea4b474a3b00308abd007ca
SHA512fe6a18fd67c6c2baed9c1ff4027472804f42e184029b133df0ec8aa4802228b7acb4893c4b15c3c31e8d10bd34937b78e5ce05a667b673f7e9b095dbcdf7b8d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cd6bb67eb434ef354549fcf66d06ddb
SHA134a9c03a10d2289dd3244bf6107ec9e125c43a8e
SHA2563ff713b7c87628790d0a772438824827c79445f00b9f77926c06ba9c837a0d7f
SHA512befbd2710fe6b90d72c537c85d6bc2da886d93c77930872b3416d638b5338485907e85a10d8ff2d1aef8d8491166f972057990df25cc1e4ee9793e750fc76242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4ce03de47c32c7c8753c25ff9d5747b
SHA1d5b2440b7f34a4328bddb57f0ddafe9c716baefb
SHA256276768db8f4646af22c50ed3da9c2d0b865f22b96d1e3fceaa729bc6e7e4862e
SHA512a4eec8ebf7e14bfc4e767d457d7823afe244e16e15c3284f2099c314e42d39379064084e8da61194747f9cbda5951036f3da5afdac74af65d74af77e901872e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b26fb6b1400a19ade816f6163d0b4354
SHA15440c55667a0cfd984a5b1913e8bcdee6c53cd8f
SHA256f9e402c803cd07c64a78a10cfb360c9b1d6d42b2226d27b852e34646e1dab8ce
SHA512ea65c6c539bfc347078d766259300e1a52b0fa89c8f3dda203a147452f61d2121512dcb72597813155d83741afb7ae1a9f0b3f2e751b7b2e31c5444d2161a64e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5974be4f65509e7679fa291b17ad154de
SHA1d40566dfcd7d8300300ad73867a3a48b4fcf2b55
SHA256116bb8d94317be76e03b25c6db604ad69aa1dc015157577ea543d777cd3e137a
SHA512cbc27dd5afea9fe8073928a95c9b3fd3d6689cd00c0ef4aa86cadf18abad18583d641463aa399853f9b2c8429097642139c448254dd765396b9df6aac231f4c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f479dcb3d3cea923ec020efc8b1922c
SHA1a8a99dd68035a28b3243ab84d35add263d71f524
SHA2569f2427287d2b860420c3318c44ce179e7df6f03a149ba476b0c1563cf0e7fc9d
SHA5125fd71d8e9eb143687fd545416f7d58ec37a2e6c3a08d427f707a931b9b202e070304b73b35f391d520333f24edbf7343f250faaad80569f983080314f0bf8ec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afbb75b8227de7d92a8a6d407d3e0dc2
SHA19e27d6b8d030c23abf00673f332fdc73c2671d72
SHA2562c54edc8b08689c0f438bec3444432ff6507b3cc505a4ad3761ef1f65e24d079
SHA51254832f8d16f87d3d6fe6c75a18f46e33711fdfb1b560f172a6c84964623d9649ece1acc8e1033b11cf687675cde6d5a128da4f55a8529ccd790ceb8aa559c336
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dac6e77b8c7c442227fab9c68324b094
SHA14c2d518e2de6ad6c0e252576a19562f357d89ae8
SHA2562ea08f8c5f596c612fde4462be44dcafe542f84a794deddbfbc3c02f3e8a1b0c
SHA512a7c60b9802113e635e65c42f125b0ab3e474c0aae86c4a7f002d665d72eacfaecf928bc5a92e37c616f9c08212c8122b79c93e2b9f2d83b2033e31ce92516a5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdb670ff1eb624da46b2f1a643061997
SHA15e8b1f683c926ff5721d9bcc7454ce8e598f4607
SHA25601fe0a3d774db6b8a47f8026304eaf878e75178c9982c986b86c260de4514103
SHA5122df46d58ca798366f5cb947bcf231d9623d31745054a90df39e99e569d5e21f9bf9d5d6a39eb09b21dc25b0ba777c95e51be7db94859f3647024d8eb6b72397f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab2141dd52d11c633a5c1daa16ff7fe6
SHA14c04fd3316a1fe96f9902149bd8349efec70d63e
SHA256164c4f8138e65a41a6c2636e9b7057625d26aa9b1d83cfca0680ed5c05568c15
SHA5127cb55392fb390991bdfd0622ce14ab785ef3b9bffb74c340cbd89da9d8cc68987ccc9ffa24a0225df0d12aa88e8df3f0dd2e1150e1d598bbe52cf32eda17b978
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b