Analysis
-
max time kernel
139s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 10:24
Static task
static1
Behavioral task
behavioral1
Sample
4de6c273af1f2dd26708ed7a38a4a0ca_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4de6c273af1f2dd26708ed7a38a4a0ca_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4de6c273af1f2dd26708ed7a38a4a0ca_JaffaCakes118.html
-
Size
15KB
-
MD5
4de6c273af1f2dd26708ed7a38a4a0ca
-
SHA1
07d7236f597858a7b3daa3b2c901da2294d3b283
-
SHA256
d06e3ba2f964d9fdf2e149a92928dfba75608bd670cc90230c82a41c87052f5f
-
SHA512
e0c2d4c41561892cc346110c92bb6b52f0dc4c8f5f45d060cb3de5c5002617adf4f09d7265b9d8dc1803ecc216e6d6c7716eb45818bbd1fddddb3f58b8c6fdee
-
SSDEEP
384:SIduWlZ1um6SwyD+e7gZMNvDVecIB1JW+kya:SsdlZ1um6Sw27gZgUxrs+kya
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9148F581-435D-11EF-BB68-FA57F1690589} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000006498e4d0ac1140d775d3a9b004d7a2727ddab852d49b6cef87f0675830b141cd000000000e8000000002000020000000ee12eb8705f30638337c3b664cb632099a814875d57b7aa9dabfcf64d36fcc5920000000e9aecb1aba398f9261084f9bad969d3c67b5e37bd7a14700e488fb292dfdb102400000006bba02a26f20823268e589821324434e5577d550346c1cba2f0dbce28e1494158962e074f1afa5bd93a77dd79f21744b9d37bc7f4c4db1fc0767d4961d5762cf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427287330" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0ed8e986ad7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2152 iexplore.exe 2152 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2368 2152 iexplore.exe 29 PID 2152 wrote to memory of 2368 2152 iexplore.exe 29 PID 2152 wrote to memory of 2368 2152 iexplore.exe 29 PID 2152 wrote to memory of 2368 2152 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4de6c273af1f2dd26708ed7a38a4a0ca_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2152 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f4bef4767e25fd57bdc8455a91e1b9e
SHA10c903320ee9b3672938fd30bf209af8b965ce050
SHA25680769e549993a0240a1824ea96150782da654080721d151de679090fe1bdd257
SHA5120055d28c505ff898c828cb0b0e45279321838f13d34994bd7d1433edea62fb8e59083cfe1d458e194c58ae2f0cea180fd650b97e8ef1fdb3a2468104435569d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5807043399db2322cb04fd6f707983410
SHA182aab189df279eaf7ce2629b625bf69473c31df1
SHA2560e0705ce7fe7ec4009d97e3c4cb96327e1e66fb035dd15ac35eb339f5f4f1a0a
SHA512df7ebf621623fe14f1b94e132f7ffa9210be656fe8052cca20a77e6d030f4bc42606efa287153e95c352b2be3a601695f132626d0aa1b516314165b83fef922f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511099d4c55fd9923fc70858d42bc9dec
SHA103ed65f8303ffa014afe2baf4ee3a70e97aedcbb
SHA256a815c694d42d8e5f6b81a32572776d4aa5aefbfce7bc7cef25e1a31e7f54dd8a
SHA512c599749bb839cfc850b758b40c8279066493d65d518c29459183b9c8e1325dfb4c75992d38d750bb76dca4b7acf0c1a9115427d310326c5fbc4f163352f54818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5770d4a6df067913bf60c0a854bc16127
SHA114dda29307837d05976f17ebe44becf75349ca52
SHA25661133384e30a3be60a93e4827a5b7e714bdd3a156b4f04a98ade2f7f122d7ba3
SHA512d84fab60c294e1f75c67ae85a96f6bc967b15bc0300741a7cbd7c9f442732c883c78252ab67e465154340b1202e8e9a671e9a78b496efbf36c3e1e3e810da435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527522c9ed38914787d0e00836aaf4f2f
SHA1e82cb8b158b9d2cd7c7ce1123904064e40dca5a2
SHA256795c0c0f591a6a0e8e1722a67a2489676a6c25d8eeb3d9d21d4440682ea977b6
SHA5123688d56350fb643c69552a73a0adc5efe26a0e93c139e45ea2de3f3737ae4a7dc0633bfe5fb6ede3d003126925973ec0a93ae707da58932dba72152cb6f81012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51116b70e3b2132873b86167553c74036
SHA19bf38cf4d821229fa2242e9c45004d93964e6586
SHA25645087e7433c4a02ed09616339ed31f719f2e198bb44e54c5f8600e4ce0514a80
SHA5128c6a3c71b42091893e4eca58c865bebf4038faca0e050b280afc73998febfdbbcc103c3f7c9a70de93a534e0f93fdc1ba6d1fda2cf6c0df3787dc812828fb3ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56975543a3f61779bdb2efce22c5afc95
SHA104fb60282dca97cdc8bd67f7bc09ec06c2e404e8
SHA2566369335b7d3a18179e467789f53084993f0277b04c4a2fe7d6e342eb8d2e53f8
SHA51221d2cb6fa948a3e65472c4e8b8902b4cfdb05457377322bdae7e36faf6c63eda5dce210dfb8f07c9718f3fc51fd1768892e975c5b51215f763233a3116a3eaaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a98b663513f918cc8467f6cf42e3735
SHA1767cb3e8bfb521ebc46d51a8461625abf1d2a1c3
SHA25690b9903fde2a862ad82ce8d4ac0acfc379c68c2eb5912fe910669719d7d9d874
SHA5124209fb41266376d359f94490ea9ffbcac0715e1f2d3090e1c2beefe6061a33bd2a0686881b59d2f9670fbbab778628956f99ed65f12f27a71a677ba8651d1c3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59105ee32124ae883ddb9cb66abe394ba
SHA14b19d684f83c1903f1494521e1bc80bf128a22ee
SHA256e43a0affbf8f166550415cd16b203af52a7f8cf84627b47f7dc68826d044be70
SHA5129ff07a8f8d27031ad423db5a1021cf3508f3e88cb01242a0666007fab2b2f50dfa6ad848b7b7a5842fcf035ee191d222c65e27562332de14e14e8cad5a193c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c72d3e52410e45ccf665807415ee3e7f
SHA169ef861afc49cf1258b3a30db13da055f60715f3
SHA2561be2035f80e8e1e7e72b29d12c397df3dce4655b850de264c00abdf9a8cf248d
SHA512f72da5c8e9a1e17c10b12a8dea253a8d76b96668f51df0814be6b53a854f5623e2186257d0a7fcbb31ce5b10af7bb453bb3daff223e2ee191cc1531d0be58366
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c7da15adce00b533bc04035f2be59ad
SHA1c22fbac14c12cabd083ebed605449a4feafb0183
SHA256d2f171449aede1c6c1d9fe104a32806eb66e82c75ef0dd6ffb85ca5dd25c2c55
SHA512ee03334dde2b5a2f32f55a6b699d9b497bf7ebdb92f82d699cfdaa4bd158ceb303101bc051b8b0bf7c66f16b6df93db126eb1f23ccc69275c21485925ddfd229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1ed755ca9f0906b759dc6b1b63212a7
SHA1ceb9831654653b693a7f105b52b684ddd8a1fbc9
SHA256ce40fab0201badb401f6f1a87172acb6b476ac69f40118e932719d506826e892
SHA512ccbcf80e59039242bcd1339dea2a1aeaf652e14be945e77cc6b695a68d85bd90061207977177f3a24444b7d2750c3781065fa797be7c2cedc743ef975ec6c8ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a27a82e9dc034ba44e26d06c008b62fc
SHA1e52dbf5210be7803fd1e8eb01d44929576b3f364
SHA2564b924d86169e8db169e098f1a0fd8f202812bfd2b2ca0ed6819598c9b3d69a54
SHA512d353134db237e3979eb8ee8f620e93c9bb8ecbb117e89b54244826f8ab911f28bf151c77c36edb1de0edaba8fcb53a25d4ff7532503779721b66b420b88c4b8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb50606bfe148585c70d2c75470ecc47
SHA16abb132b9bd98940390b3b4c5d5ac95172a8ad5c
SHA25621db28304e13787574bbd7b8604167ba1e732cc951e023b12d948278a0e67ffc
SHA512aa4958be702243cfacd9fd1bc723534a8bba4eb456a7ba765d79594eda9f1ee6d0a1beb6c9511410b83ad1665f4ce417c01e841cad96672add5ac138fd77665a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f55ff52b75d2e6adbc0c75862376d7ac
SHA1418494064defbed23d5a24b6a1662c8fbbf2ee86
SHA256be11ba36aef54d9360312bd03aa2bdd9623797eeb54aa4f8ca64654576643982
SHA512cafa8e681c6db40f4e587d632dcaf290e5fdf24d278a3123070fbff375309d6b1a90af7e0be98a252a97e25923e6c4a28492a614b21085b841483a3b280debcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2afd659fdd879bec47bc487f195cd42
SHA1b1d27a9b9cc5c8242ff840bdf5bd19f32412b37d
SHA256153426e88c5f6fa46d7e270a7d746ed4fd467db2f562806f54425518e8d3dab6
SHA512351e0dbd9e1cdae68a0057373f78b1ab140b26dacf07d0453d8aa74d7b7de4c66894e014d2bfef4f61d3c5b94a633aa91c89dde253f88e0aa8eb7791e8ec47df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592a201579554903225b4eecffa030423
SHA11bfda9aa51fbde1e04b4335cf362d608ede2920a
SHA256db4e678642116b3a1c7e7e3ca6653d0e09bf1874698f5eb0650f419a686d2366
SHA512207c08df699ee859195dda0574083ae2878c28ddff6b50d5a1cd7db768f9f1bcfdd07f4508a94ba601f941f9a99edbe22f62acd8fb9dd6f54ce4ecfb570915a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b064c05b42721357486083da64399b50
SHA13f6420c6c5924e7d4702b4361cbddf947e3c0104
SHA2560944de1a75f193aea8cd503fe7483ce75748f70b9e02294cd3e5c767eaf7d8f6
SHA512decced8c6d729c1db640be4652de72be0e0cbd0f8722163b97b1dad9a87191e269526fb4a662226edd0a5020f2869218822b711aa89b9d8a9240543e1a0361fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5423e6bc76796082f646f6801f502d03e
SHA1fdc1b3de6bdb959968c4ff5672f6c50855e75ea7
SHA25620e34cd61101f47c3fdca6967de1b1af9ccc5f0914366e0deb018d17cced6fed
SHA512cc803e8db7dd7f4f21d347ce2162ed09d4727d232721e3783e2276b2c5973095e4a803c9fd2634e66da952d6079594eaf8056b71b09dfc4590cf843be7fae24c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505e6a66ba05f4eab2c2c8e93f43ed702
SHA1447a80cbebccaa05cad1328079f5493c3446b910
SHA256e9960845eb80b96d95c2e74493136a221f78dc51281cc1bd95480d2efcd00385
SHA512218681aa442ccefe08ed513c67dc6f1f7d87107f281a7a8577528853e1ac17798dc0bdfd704367392e4d5091f59a2ec009a192ac34f488bd88791d0dccca64aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a3a1cf84e3812ac7248134db2375f76
SHA117455bbad674a62a401601ec9fd4dba1380e4c0f
SHA256c8207b36e9062208506494832565f6adfc3d6a1de8abb494bfa3a4e43d6d7d1a
SHA512d962735c51f9ecc3ae0dd93161ee487fceb40c80cae5036dbce07ef8e0eec2d706f7748220dec0b1b8bafff66cf0c4d303ada194b9d488c649717cd03478d83e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b