Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-09-2024 10:29
Static task
static1
Behavioral task
behavioral1
Sample
cf56604787665626415bfdd18727a4e5_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cf56604787665626415bfdd18727a4e5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf56604787665626415bfdd18727a4e5_JaffaCakes118.html
-
Size
72KB
-
MD5
cf56604787665626415bfdd18727a4e5
-
SHA1
eaaeadd1184c9e33ab355e455ae167e38d57bfab
-
SHA256
cee6c83bdcd1d4bb83589edf862e3c7e481882c566ff9952f8185f2931f17935
-
SHA512
49609a46d32373ecdefa46eb534eafa1644122fc1a6c88565435b66a2b7d9a39887aa32e67150ba8bf38c3af89b9f8620b4ebcecde4623378d0b6e28b307afc6
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sw6e56pcRoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:J3xTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431780428" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E08BE431-6C3A-11EF-B44F-526249468C57} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f03551000000000200000000001066000000010000200000006ea75ac3b7a265e4f821d16b85100ed20a3bcfbd82e7ab7208b1037360f60b6b000000000e8000000002000020000000a0db430c5a76d5f5e8870789effdade565f2f30505136bef35292f58c716f1b6900000007cacd0c24736d2fab59227d43b9934f4fe9929b2ccf4796a391f4d64bf1048ccdcf8b1d5f7b3c3615360ba7c87524bc6669b12d86af28a550b2571748626ff17141f2530003f841fa0198501de1d615edac59c1ca15d98dfe00ba59ffd6bfb933b4630fbb6b7f4da049069c70bdc635037bf922c16915c27973888db0adca76e4ea43f52e6609f80b480ca60f07bbc0340000000d3923a9b1ccceb9b7310d624a70c001bd3ead2db4a883e12f1b37141d94fda7114a2443039e099c050c16180f177a3a632ab3ac8ba319e939c2ceb2b4f507db4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 802c88b54700db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000957bdb56ae752163efbd75110b83bfb69435f70e8195becfa071876e55f30dd2000000000e8000000002000020000000288eb55cd0ef2ee799b655005cd0acfcd36459ca19f3e863f3f07cfa626bd99820000000031c13f3f5ff605715750a3499731766aa2c4b197c0fd6784d022bcbc621dbfe40000000f6330d7ff09fc479c70a301765654f0246e40fd83441dbe5309be3a150867755455ffe04e285dc95e272ff3bdf43adc425ca9c569c93d6aa968cddd598ce7fdf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2520 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2520 iexplore.exe 2520 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2748 2520 iexplore.exe 30 PID 2520 wrote to memory of 2748 2520 iexplore.exe 30 PID 2520 wrote to memory of 2748 2520 iexplore.exe 30 PID 2520 wrote to memory of 2748 2520 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf56604787665626415bfdd18727a4e5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2520 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3e420084c8530d13262c317cb443fc1
SHA15658874b31e6a61f04eb53f46daa2028bf86f0bf
SHA256aad9807142b77229222d5b1338cf609ccb58ef1f993d97d5741d3d8243dc50a0
SHA51298cffc684de38f669ccfc7677bcf9afd0de3ea4e8a873f0ac47519351f1da5ea9c37fd2d65634510da4191c90b4f15916fac86f5ca39b5e115b92afdd8d5b83b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf253dab489d39ff29563ed94ededa48
SHA1cd62e4724f8fb1bc65a05ee4bf7ffc973b74ed33
SHA25654615b0e6273223100102e4b80f5b5395536d20c9d33ea5830616b7c94d2b7d8
SHA512d29dde29b1d0bd277422e660fb5dfdc5f814a8f8511e02558db48fcf623d3540589abebace5ec8445fe50abb9699bacf27735d6e4b4df47f633b8ffb75a22ba8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5630a1b2bc50c1870806e2062087a4866
SHA165ae9907129ef08fd4f2984f20a5c43be4fe677b
SHA2565281f5b348e647d48e91d0dbbfe22dbec73cf5ccfebf52079dd6b95c575c0e2a
SHA51269b259a6405c7ebe698f73bf80faa247c09f378dc509dcc71d02bbd1ca5058bc692740d77fcc44150f048a1ae38f48b75074bd347321d89e5c478f24b90b1114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5797e49b185fd9e444f33948f646b0ff0
SHA143a09bd8e870c7ce9887859ffff931ec1f646ccb
SHA2569d785a9b0adb9a89c0d23715ebf01f21929c7d18c7737b8a710bec6521655454
SHA51203ca0baf7f7231e0b38457381ba22fe263603cee6aa7d936fac8e192750e880dc80d6bacd5d9008e994e6c92256b12e51d631f378aa846c4cfa468709dd1308b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0d9902368fca17ab36221a192619911
SHA140fdb7b7ff14ce5c9ee035bde1ebab41622a48c5
SHA2567bbd1d45215a417d36d0b6a3c6644ce1b77650d1f47ee235c10839126d9a4964
SHA51286484e40d33bb1ace3923b1c4a0e17a89818647d3867bed0018fedffdd2cc7d454aee12c59e1af4bc2678236f539f1d438126811e37b1b13e247c5d58532deb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58abc6048b86ff777cd66d3ea0a86271b
SHA1bcd33e65a5117b5379e40f8c8c8b0dee89d83194
SHA256ec9f8c4072e77b8beaac63505222cbba62f15ff4d7919a8f33231acda5fbf6e5
SHA512a4b925868111392282925b3580f594e06aba8520611b4ea5f2f226c90a189de978e4989d876211f28fade1857af872f07eaeba95c0ff771496080a2746cf6157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ab098e2b9250edf6a2dc56afa89cbae
SHA10d06e0bc73d177389b390bc703aae786e1e7805a
SHA256234f9b536df0e7892ef4ca9d91505e06866774e29e779f4988e3c7484efa19f9
SHA512f8d9d3f61f939a75d0b31b29998ff9cd136cb937e54e1b2a5b93a47522422910ff4c3c15d8b1ff8dfbea9b0ad9c04301a771aea4c514aa9f6f13775b331df911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad6e6e7d0abf6924fac1b3eadc675759
SHA1d0d2d2cebadad46a48b45cf575019d149f09e082
SHA2560da9c981acb01ee743c4a4afab16f2aa2348d776f6d699e79bb9afe0390a40b6
SHA512f8b4cf3577ed7362af2d8680566ab1288d32db8fa9141163dab434f6c6cbc2d4f91b516aadbeeef0da7b873aa61bc2b293a04cbf42af29a01c898867048f97f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ae0bf467d2969dec5ff508635ebbefd
SHA1421bc3e7f150d847d881279b889423a1eb4455db
SHA2561b2ae92874fa4708823f42054140df98472c65537ffe7d3e4c13bdd9d2b3bddb
SHA512cd5cc74a4e5cd693cdd9eeaf4ee40bcc7120cb9ce9ec75cbd11c4359d63ec17de488f6d0ec0d9b0e5472ac7c09c298d459b4b4e94799be83bc99705223389b3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e5d9f7e1e719f121d6d739949dfa4c7
SHA16d3c1034b8f6c70ebe0115db5b3385a70208b7be
SHA25631f7e8f26f05f4bf3e40fd2081d0ecbe96b2fc4c2122b27314044f1b8a59c64b
SHA512b6d21043c428b60e02dbea3d62656d9de3932f64091c04703ff18be81df25ebaf5a2700c2b59108e2facf15aee8a4b627fb308346f783038d957fe24c232d0c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e5cb632576c3f6107ae79f4f18aa890
SHA1992bb2cb0310a17de5c3b9004f56951716ccd09d
SHA256ca3a54af3087fcf37b083d6b654330852ba8ce2d8a029ec570a3e02f80ea3cc1
SHA51290306b4216a7791d7dc22adedbabef544a65460017e5a8626c68e3a2556960a76caeb8cf5b645ca9b6d6485341ebac16a30db77f1861f2b8ac012a9895f4b45d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2cb19254f9b582a3e89b79acdc345fa
SHA1e507a520733738da70246d0b5e0c94c635110bc9
SHA2569a0895d11cd57bed7f8a790ef0c88139e441968a02793cb856616db7fade8044
SHA5129c7a540727d122fa39c2f8b1c2e8dcf24b9c389e1ec2cb2d63367144e3376822cc26a8856bd07b222fbd0b20c49fb15df83a7fb420736eb793c45c877c3e823a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a390a6b8f9dfa93793d292c6a75fabce
SHA1ed0be686839617f34699968f277af3de20c96a45
SHA2563f2ec3597522001bef08433d82b074bae0ac14c9163d972f77826e7c76c9f53b
SHA51205a8bf68bf973d304823e721d6c99ba8e1dfead19a759bf8cb89111b1f2324656796e7807941ca8a038a83ef792b6ef32d19d0e231a1712ca2ad4f694c19cc28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5386807ea64386bbc6cc104b56c8f8698
SHA1d8245bbce325f1cf02b0943a19ce6e178433f6dd
SHA25678ca06c0f6871e440693833995fdce23bb0577fc023b18b4a3fa283fd6ddfc22
SHA512f18932f87946954bfebfc02d41b5ae4f723f660ef85a8dd041d98f0282279f250ce06b805b420678755794d00909d659cc39044661723067ae03f1fd2e90375c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8b8ae7fb04db8a2129a94b801c2937c
SHA190bc88413e71e7434532a3749e024f482ad1140f
SHA256bc295ab548052ea370d46992dcd3235dff5de83ac93255e4e913611b2a8c97f4
SHA512f837ec7d6f519a58470af021626698b7dce9be13f9bfd76e0f20f13a57daca87f778395ba4abe30dd55c40ef31c969b22d6242738a22a56bfbd0c9113faff12f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc8d65c1c9c38aaf881f2250ff40f603
SHA1e72055f535e91ffb713b80fca7abd711e41776f1
SHA256524e643ff5175a7771318bb23c6a13c09314f1e826de3e2f626f75788085fc4c
SHA51293b33e3b69e68348e5acd7d3fab0d01ba02f16a61a76dfad2ff7edebe34d285224dc028f2978db90f80f8a8e70056735ac54ec965ed2a317eedcdf2b842c7490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af9c4246faf1c1a55b3540e25c77df25
SHA102c87d7e50f8acf93969549c9b673e2c829eb08a
SHA256048d10a831337532a0a4f3d83f4a9d798f28b0aaac50ac070b9280bb5e9bbd3d
SHA512eaa4b09e7536f12287341631a7005840e2a66ea5d5a4551ac55a9271c70a48456b905383d4ecc029609b51fcd0ab17e0293feb449b6e51f723ed288ac0045249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a513718127cc6603c6d5c184db186cb
SHA11412a4a0a7fa1f88e558893518057625dc48b89f
SHA256473e781d4dd5701e14f637a1b97aa1e15423f8897f7538adb17677bd92ece78d
SHA512971be41c8f33d974b00886c85758161bac644004a03d7716e5f4bd7810cb951fb1c6411440686b6eb12434681367dad9be9175aa75b3528a1f7764dc671972af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56327387f0edbe22be755022d22e729b1
SHA175e799f877b7dd4114c233241539300a05298030
SHA256763e2cb235013da5fc2ee6b0e00de69701bc2d01047077713c29f1c86129b6e1
SHA51201ddd07d9ab31eafd9d0d6b6a499430596fb98d78eba7a48f43d6942ac7651e6c11205d9a910f4043c1408cf48394f36187de67ba88312b19045daa6b4f919d2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b