Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 09:40
Static task
static1
Behavioral task
behavioral1
Sample
389b578b395da86d8d2820375365cfab_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
389b578b395da86d8d2820375365cfab_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
389b578b395da86d8d2820375365cfab_JaffaCakes118.html
-
Size
6KB
-
MD5
389b578b395da86d8d2820375365cfab
-
SHA1
6ac3b43cfb70a4f4d6c6215b6bfc0927a1798029
-
SHA256
12fe1967589a7a2e986ee2c36921ef9b50975ab91b5c4da1219037e77e8c87e0
-
SHA512
8da77794606b0c30de330fbbb66d61c73badedb46b3569f937b8d2ebc1e61156a53372e1f45a4d6292d39a610f32e5b55440b920ea8623349bdab41daf9fa317
-
SSDEEP
192:VE1c5k0YBB5/zgd4I8RVp5/zaKz690fGWPB+EG:iWG0+dz3pdzbvLI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000e0de1cfb080463f1608cb2d2eb1a41f2cab325aaa2f0a489efe10c6c39d27acf000000000e8000000002000020000000f60efb1823c2f0cc57c120cee0b6a5ea40013468602084b201feeddd553efebe20000000f0c977dc9f9f0ee756e8610627b1bd46e877756ebc1a215c43bb4fafa90b7b33400000001bb518dcf82761c3a9772e13cbcc862094d11574aeb763ee6e6bf323148961584c65054e3abd5748c7ab4a8b907752503fd00fd00f5fff2330764ef55322c316 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A15B8BB1-3F69-11EF-9FC9-7AEB201C29E3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60efbe7576d3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426852705" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1672 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1672 iexplore.exe 1672 iexplore.exe 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE 2156 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2156 1672 iexplore.exe 30 PID 1672 wrote to memory of 2156 1672 iexplore.exe 30 PID 1672 wrote to memory of 2156 1672 iexplore.exe 30 PID 1672 wrote to memory of 2156 1672 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\389b578b395da86d8d2820375365cfab_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1672 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8704d8e05d2fb3f96ffa1a5f27686f3
SHA1d5caac7b983109a3bd7a5a306243059ec5df685f
SHA256547b7d2c06820cbe6c1ef034d78b4fe94335f1673c6a466986aac03e51d2eb80
SHA5120a81318d2ba7403bb47bf1ebf0b69b83273ad52871b23c4aeec519e76bf189bc58e88cba79ad10ca5798451b4d90b784ec872efb45cbd269efa55e43e8c78100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eae32eec061f5776a4dcb75f273ee602
SHA1ead3a34d6edcd14c361136cdc32e46b602f566bf
SHA2561620ebecd6f99b0aa1fede8210f373483f8077e7671e056977769fce4da56913
SHA512bd137ebd5090760e072d81bed3ec9e03a82d9a423f17a3291040c8d3a2bb5305d136f456512787543c0c1b28e4bcd5b9716bb1a0b8b5acfe8d35ebdcfe00ea27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592a7f58f24a25817f6ec08d639c3888e
SHA1bb85257b93989d10b3fe307fa7af415f003e6eae
SHA2565b866768814b9dda7571a0aaa27872880cb88cdf5253e93a7984d35de4eb4d0b
SHA512ef436b8cf606566398d298bd82dc5b660b2d803095d893893da676c51e4723a0ba796f15a18c617d7732ef328d6da0091e9b839f50ea0373b1c140bc9a978d06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1b21f0ecdca5494090c8fee209e5489
SHA12cae4a231bd48b344f8b25b5639d8b232cfda671
SHA2563b32c6c819aa4a44f1215b682b1e8510d46ab035e5100c9218cb0ab371f71d6c
SHA512d1c3d7769d9b31a02ebd307488c2673b9850e0e835ac36e15519f80c8f49b67cd533a8d23fee02c1c7da5b1d7af28fd7c8f69a2b8676fb5a75deb84040145aea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581685ef5439bafc8982546698d1e2a51
SHA1f5d57463dbdf5f9b2c77014f2e8b6af4c1446e4b
SHA256c28adfc714c67646b89b4bb58c88c294c56784ab2e98a20f229d932bd3ba3a54
SHA5126ff3b65b58932d1ced4731283d45279024a40affffab288d9aa29f94459fffc456ab6ece41c46b43d618dd498cab0436ac670421429395a3a5140e26db3c8071
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a477d16a17aab5d34069fda03868f553
SHA1b5667a3574dca5f15a4598db3ede6cd7867c484b
SHA256fdff4cf154b41649d56fe47278314ae03fcf756d8853b0c24e557a54a53df0b1
SHA512862f1aa2d424d2681ee36821f0967a919ce475cdfc36c4d1c03d1bb0f65298ca9f686460a74151f7661b803c20d2061a2d4613b87446b9305c4ba9201617aef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55adb6f166645a7fcf204fb906e3bc4c0
SHA103e1ce862806b7aa82708fbf1cf5e75137003fc0
SHA256867b50281d5d126134af68e33c987526fae4ff41c7a45d30dbbf31fe185f458b
SHA51243dbc3348f240c2a994416b7036b0691c3a4245dda5ab0e8e2db3f20ddb6c559ef9860bd909212ea14649daec03d33ad25a12b800de1bd4d145cf1b74a006c4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7351f810be4efd42e9f59833f06c6e2
SHA16001e552b9b53527c88a2e29881934abec6f43b2
SHA2566457bf8cf31f49a29bccb1888d7e9b67d6eec42090b0c550d07946ca90f52bda
SHA512686372db92a16e4e64efaa56788d014de7658ad51082dfb0c3ea13bc677f013ecde5f24aab14876dc6f3cd8fdc69a2c0f42078b00b5a63e686695eb9a11b2898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570a4094add6b5e7938491f9c2e344494
SHA17f6f6f569c7bcdcccb0f8fe2c30f4b78b3c85424
SHA256904824a222c01badba72eb7904810def1f7ec017d44159c0d6d7ee3078954535
SHA512e76656f6a3df519aa471f46eabe23fb960a1844dd0bc37084d1ca966ea02c578cc7cceabfb8811c6791e877055d9c6d2e2424a8862fd34c880d22b375924d1c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a780e722eea277ecb76c67cde007a248
SHA12777a5b0ed21a444edcadf5d9c58fbd4b01a6cfd
SHA256c293cc2f1dce75484b72203d2ad8a99681148cf19764ee49fe8c4faa03657a8c
SHA5126b78ee5d263f365f5c7021919bc9c967a6e682a81b3fda965920a582b8dc5e00e6646522d88b5cf95672dffaa97e76caccd8a29503390cf4d3cb444645e20c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db212294b0f9720c6d0f54784bb04a2d
SHA1551324a482582ab0ffdbb4b397c55341f0b6d853
SHA25609962ad83d1c987e923e7660f5d092bb28fbd20a1443f96da5bdbd78f38b5212
SHA5128b0a10cc31da5c4dd995e36afc83ef9183af186cbe18d134c03a0bc1dbbd9801fd9aeb4a4964bdec832923bdd7d6758b6a9bd1aa87de9a7b3e6b409d5f408bba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c32dfb2c87e673569d51fbd0acd97c7f
SHA185dd6be518af7c54e7f8710b095f254eb3a20a90
SHA256c0741efff00eed3d84c665917dcc02d32865b75e6556a667085ca97b1c2af024
SHA512982d0369615a9c314548e303b5d64b9e7613a1c858b5bf5f1af5bf1308b795926f04d8e3242e9d28e4f8319e12def3a505d9fd5ff47f5c8e76e64b2d39317375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5124d4ff9479d92bd93266e7fb38d3b98
SHA125bc8127543134f6cc7a72befcf795c6f11b7aee
SHA256f79c648c230e25ed2a92f802cdc3b39ea2c1f5bbce8a14fabef7e85dcb4cb976
SHA5129c8cdc201ff403c2be0d39de8cef97bfc1b53952b7e96e36b52ced1f30715fb2bd667e4f93e64ecc843a923d565012d91aad4faf71212868fa910d1b0a815830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b95097bf463868a7ac345934f11a70c
SHA1d03da6eedad6338522d3cc902386a6c52fb4e8b9
SHA256a1fdc844514dbf2182fc488f4d2681407c8aa41e6b330123d3e33bd53e0d2080
SHA5127f562a810222c5b1fcf9917a22f86e5898e1ec15bde5c11f58f1f7a557a66ba6d5dd449ba31e308d237013e49a48c65deaed2a4bf9e15ae5f24bbecbee6b036c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5ecb29f4af2bda4123c0404d57a46d3
SHA14240b02d6a45491f239d93363f17b468cbe29f6f
SHA2569459c125e0ded817ebdb62184515516fa3e7b70ad2f42a8ea7bf84b48dbfc2a9
SHA512e3cb039a12c02ff81e70ce5db8f66ff3313904f8083a9a4d8726a4c6673739d26bbbafdc3658862f9af9ad5b2e42af1a08dce06d789161bbc1517ec4a1d57c8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c1192578e4835f15a02157c389df5fa
SHA1158e8bccf2d6c2bc8c37215994a39b0e6c5c33b0
SHA25680967425e31d9b5d84faa1992ec4f46ca031eb15d318a896ecb3193b18343003
SHA512d0585beeea850e110be1520f1792ab2864debde07571ee950568cb36255e9cbdb11244e82f251fc77624b604cb7e3e80ca4c4d6a8ce7f8092401b860096c15e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545164bacc6bd650d680c5dd31fb8b30a
SHA178b076106fe9a0fb11c1c49a653868757e9e4ffd
SHA256b24ddc27952f2e5ca731d2045693665dc9a5c8edca00f1792d335cdbdbd66ea7
SHA512b7f2bf3bfb7b072fc5876b41fd21e966abaaf0306c8786b36a7e497c4152250db1bb296eb0ef0113b467da1c71fcc67ce5da07a04b9a75d6ea61dc2f21b34f41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d62180b6c0bab0a696bc9d5d7336b20
SHA18c303e006adfac3570009bd2206e0a7c218d670c
SHA256a38591ccfb998b70c024f9886342f45613e646ae358c6345eb06803bbf6d6975
SHA512f22636e77c8a1c239a0101af203030b41e396d7c9af48ff479735ecd8ec9699f9d118ccc52139f46ba72dec483cc1925bed33460858cec24c38fb727aa525a23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f609f69b3dc5524869a0228429ac75f6
SHA1996079d4537ccbd35982a9070d5605565d4837d8
SHA256dcf833aee2100af1ef155e502dc4fed796a7d63106c6e38697ae40a8223ed46a
SHA512a769373fa6f89d30a2ebb78faa516b73e3dbf8aa6d48de562d3b4b115934c8992521a8588939bb734d1a06a250c8384dff1e16828af86f6de49373305d420912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ad2af7512c799413a76592f559139bd
SHA16259f9d6fd2e202d0eec5424e717fec644ce4062
SHA256a2bcb70deb099fa6303bca7c70683071f344e460e07b2c40daa46d350dc7a64c
SHA5121172686868505aa6e962a1525b3e065d6f41ae9ab0b6653b6c84a6a935f80274c6a649eec3608a7197e958afb45b6adf3cafb2190a53ce473313ae4dc0bd62a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572379387447f3cef3468cd2258c74c50
SHA1a386b8d3c272feabb8639a88ac4c47b509ca75ab
SHA256326b8dbfa4f51234182549f7be81a9adfe2fd4fe9c0cd080b0aaf9a2dca488c1
SHA5128ec2f2c9ab72fb881b81342c121169a6717053738df45663c7791b2effeee2d8396129949c80ef5db44969ff49e4972c0ee40c6b26b48df328db335d0b39baab
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b