Analysis
-
max time kernel
136s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 16:41
Static task
static1
Behavioral task
behavioral1
Sample
de7f9f725fd9337b0705d69c8c46f9a6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de7f9f725fd9337b0705d69c8c46f9a6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de7f9f725fd9337b0705d69c8c46f9a6_JaffaCakes118.html
-
Size
214KB
-
MD5
de7f9f725fd9337b0705d69c8c46f9a6
-
SHA1
d85f04690a83606ea4b44761900169ddf8020435
-
SHA256
3b175c9fd3fbe0627339af16a48f37402e6c99286491b30583b48628419fba74
-
SHA512
ab33e352f04856bd3f02572d7f9acdf78bb475afb21df268266edd26b3a4cffff8e28dac22429544426acba519a0e38759cef105eee546b924c972340f553688
-
SSDEEP
3072:6rhB9CyHxX7Be7iAvtLPbAwuBNKifXTJi:Sz9VxLY7iAVLTBQJli
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 501a2217fc05db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{03974B41-71EF-11EF-B30A-EAF82BEC9AF0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000e20f53fa63932975668bff06b57fbeed479c5270e42164b06b01656bfc3198c3000000000e80000000020000200000002c1dbd602c5583f501f5e7db8944109a997cff7bd5a050e22d04da5a22fbca8f20000000c3cd192216188c1efc7996f32f13993e2c07923e6b3c61b8386fea2a104d5db040000000f0e8b98ba9f8f1a84daf002badd31e7b1ea0d70578852be17e9a1936c0ec942acf6346120982869f0aef599742e58d3f1667291006b635a409089e410124751c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432407552" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2920 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2920 iexplore.exe 2920 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2748 2920 iexplore.exe 28 PID 2920 wrote to memory of 2748 2920 iexplore.exe 28 PID 2920 wrote to memory of 2748 2920 iexplore.exe 28 PID 2920 wrote to memory of 2748 2920 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de7f9f725fd9337b0705d69c8c46f9a6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2920 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ef3d29cc4ee244b5572ff4441233316
SHA10c14bfc8c758f4ba6019a86dd8064871b6504d07
SHA25681d4f42348969e403de99dea5cb672e270887c347445bd30082485cae41a6adb
SHA5120253f6e27998458c709362bcd795f06f85e579fa389a1087aeb07fcc3a834e1b74c206f7798c9d68674ba4d71a904c89f93bb4635422ae3afd7d0e3c8f8dea73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54719e3a9037ffa223ff6d362a5d15590
SHA1f477d2bcb901a60ad0476128cab977576ff1d10f
SHA256f7684949653a3786c9260ca0f228f04459b7cd681aada2f3a613ef442040d5b9
SHA5123a54980c599c8f1479c2ef9dffb873e659534ac87a161f8f31dc47bb476cfc8a8ca14b480bd94f4ba1aef19201ef678b8be2fb44a6c276ba074512676bdf3393
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5168835a4760fd2f0645ca58f3a52a79e
SHA13720a563b296cc8e1b9615209b786892650c10f0
SHA25672846ebd0442380b6b00b295b2a7e18a326f92db6f5e8a13cc185574deb72978
SHA51279ac4bc2d278ae8a2eab0bdb0076f98794a0688180055379aefc1bda7f8c27e1365c1fd07d2cec53c06473304e7fb9b82765260ffdb9f758a8c28e9d9b891aa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589b1206d9b3b328118b9b5d86b411cc5
SHA1454fb5f7981d8b67ef91fa9f15a9813a16fbbf19
SHA2562020f68e2450519f3fd5bbeccf1fba3696dbeba540fc5c3b750c83078bee66d8
SHA51269c2b0e919e537bd4b7c6966a17f7189ac1c55c42e4d9949e7f580dc8322e45716e763c111ba4d74516f266388de47a72450bac2d9583a2b796060d3322a8cf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f741b8b7cce017254aacb60db46f635
SHA143fb936eb63845b10d7b27413aad19a72df049d4
SHA25635acdaa70e70f8caded60a52e1c5885fdba13903966bb156a1adc3a03bc7ed2e
SHA5126837b60f6091865d1897928ea98524e8276e7ac78d524cf78ee97dfa39f5dfe8c3dceafb5617b5f17d54d4d36ac355d07fad85cb21427d4a0c2d4ecb3f04151b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa0fc9e96d861135ee03eca5a0d7f7da
SHA1751c9c51473a44ed96f63300d78ca1cdd85539a7
SHA256ab10a1a19a9f3894bc41873ae1f6a121f5ab3815cb837c677f56fff09a27f26d
SHA51248d32f340d766f42bd7a57aef9707d730251403cdf34f27d15d18843e3c6aafd420d3abfc9e53b2ef673e789ca0b9f7d86912d56e5051471b24f21a446c2e534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba5124cc4ad60f1b1e7d49bd1ef257c2
SHA1b8ae8cc43a33492b20f623125aed4ec3479f71fe
SHA256c9e3b285f69d76ba497feb15a6161bf145e5c6f227e74f05ab71a54e69184bad
SHA512dc08b048ed60306f68bc22c5b77f56cd246ac32999dd4a422bc9ec1a49cf916d28c9484e0cb77828b85b5e8ba2d12d2b7fff1a0481335985d8eda9ec00dbc4fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d6d288bee8fb948380a1ffb1ec088e0
SHA177595b7a23e7a1a8e55757de281fdc7f055109d4
SHA256bdf28c9349123b842129e14fd76016e3bc84043cea58d726ceede188cac7cce8
SHA51263ca1474a7f4f2e051dafad5b8c61dcc41d8b281d3b8622802bc2f06d5247b35083432c6ba7600b5a76a6040eaa5162ad47fc9065cbd0dd5e7140f89acef737e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e7d901eb45f9a98ef0820be9f44fefe
SHA1fcc84179cdd23e721cf7b551078ebfe51bef0b47
SHA25653978fedd61bf98bbdaffaa1151bd720139cd53522061c92ab9e06b71010f135
SHA512ed51f4ec42e24405727959c19841a0ab485dda1d2d4c19a67db90537635a87a704527a25130cb21a9961a93cf493f0ae721253d9ea743a4e2a05236b870564ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583a283799639397f07d67d1c3d4dc548
SHA1c563df566823ced3fdaa216ffbc2116a032cbdb9
SHA25690249bce580a2e64878f5268532d0461353ae0fa31a796b5d7ce64f4598079d9
SHA51289dd0fb793131d23bde03710488194c9684d47192830b5483273b7ed87e2ce9e8784009e4fa514034baf0875390d78932ea12b46249404e4a362d9882d32bc6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529ae1120335530578cd8f907c407b60f
SHA14290669dabbdae68be35fd9b4bc455c4df8d6271
SHA2562758e19281a8c361ce7327c1399db0c143a8ee77db0b8c8372a32c0b5635a005
SHA512b1558bbd0647e02994d6f62f9b39172a26779d89023356401382c6e2f75887ad5e670b243acdb7e140952b3ce13cae00ddce4b7e23d951c8055652611c3908a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a04ff6ffa9b235d94747487fdb94efa
SHA179e3fef9f49a795aa2c88aa83886265f7c75542a
SHA2566712b19de7f8ca208f13281a33ecccfc0aef3c0b48ecadee2698a77c6bef2004
SHA512ba60fecb542bf5b4c04231d3e5ab0a92834c14fb01bf66df851aadfb22f6797f70f7943a4a00cb993847d3dd1acf2649ebb49b0906b8c512f629feaafb70adf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7ab3df0e6fea99f53c051522d304c8b
SHA17d27894dcf444fb3aa0c7673e8fb6062921f83ca
SHA256530c3f906898e9a3dfbb26ed48c369aa48519e0f97c34975bc5b15cbe7f243eb
SHA512359cecae8822591a98562c2f36748ce6fe846a951c327f83ca9e0a566998ce690f7d28b100f9b6327d762ff70282656cf73e6829be8391519226a5aaeb930932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb3f2ddcbabbc90b340c94dfab7202d9
SHA109d2096afb5c81bdc6220d15e2e45177d5d6a66f
SHA256b2de732b75a232c0058e7c02cb5df22c57fc01486bf2d18c78926186ea02d956
SHA512105bf12c59feed0bcbb1d945901a2f07e289195ced6ce7e9ff626e526bba7ca710864947414bf843f48ef92236bfa45a025ec694b8863a736fa65d061be0f15c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab653015971f86169bf9d7af0911ec5b
SHA13480e3325653af69f614d13c0c99c491520473ef
SHA25609b8765c6d152e95f351dd6e0e2d68b173f4ba3fc6db6c817df3dfd10b598287
SHA5120b20aa4e6d68e7017a5563915a835fd6a6a131a003a0ad7d9bb4b709c48f64e0fa7dd2e2706eead04e193bec9e57851fbe6dc4d241e28e53d7154b4fc52421fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3dc9ce9507da81d06ca8c9ef699b8d7
SHA1dd73c76886bc62dbefbe17fa3a2a62236ea58375
SHA256a36adbbc68b6fc3218c14eb83187605267fcc1fd0cf0adfe7f46aaaff1b6d246
SHA5124bbb5ce723605b5689be3a2b405e409ab6e181d3d1f791542dc2ae6d44c0237477a43a438eb14c5f94029087d9a4741dd92ef0d5fbe4c9bd22783ee843afd0b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524628499f96a530b64143c1b8cc212e1
SHA1254ee1726e68c2c91ea52e4e2c63dcf628ec3050
SHA2564b8ed170f8120b990c1c06bdf2bd3d7b6b3a4176e98b139a0094f0507aeaa915
SHA51285634f6033cda9db58bd8be8b9cec7235c5794720d4505d11a42ee6bbe3de368a44ecfbb53ac99812584a1a6da9130dd80f52f872d6cf44c60dc0c349d14e4ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5358043708023fcde76a7a60e5370bcdf
SHA1c347ea1b6e73d232f9d947c8a87c360a726b4ed8
SHA256940c3163ab62b84efa54ba062c313cdac80e75392612894eed892f81dfcc14de
SHA512ff8e7340f31619cd4209f0851dfbbc963e9c7aa54b792dafd7bead75a29e13caf6a910095ddef11a494c21105c54fd4feecbe47bbc566d5ca0887c6568f0003f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc4f93708326dcdfaa39b73272d8bbe3
SHA1c7b5853aea4f9f64537c7c81ab0c1c1f1488cd7a
SHA256ed56b4dfa01cb380e4df2dbd4e30340d1b54feabe197c37070670b3ac169ecb4
SHA51277eb9d1fee312104db3ff851a1ac2dc3a054a76471166a8d58e93623d3e997469c6c351a7f507223a31e58878eef1f8e13a854096c835a5c0a5ffcb2f28ead1f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b