Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 09:52
Static task
static1
Behavioral task
behavioral1
Sample
dff33432b5a9752d71020e0924f365a0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dff33432b5a9752d71020e0924f365a0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dff33432b5a9752d71020e0924f365a0_JaffaCakes118.html
-
Size
117KB
-
MD5
dff33432b5a9752d71020e0924f365a0
-
SHA1
d54819c3600f73c0811893404394e2dcc9a40da7
-
SHA256
c0566d4ae1810ecf7f66762dea65e8ef97d4fe509ce417e8c30b75a797321712
-
SHA512
887bb6036e9a140ed9712b7ba9b5aee902e78f1b3527d544f714a4f39e3af7c878d3e138e92d42f858010792fdbee6523ea8aba7c71aa4c3ae9b38b5731bd11a
-
SSDEEP
1536:2+K3yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCW:/MyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60ea82f58b06db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{210D8551-727F-11EF-A97E-EE9D5ADBD8E3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432469449" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000aa47e88b513ecb150316a3751d1080dfe97fb3b6f78dfa8be7787107423f4e77000000000e80000000020000200000008ee3aba54c77e98edcfdbb570447bc3e46378bd6337c08522e7c3ab144bd91122000000027bcac1d730763e2bec26b2da85a1476e6490c84670311245df7084827ee4b18400000006a0f66514d63a1f6071d9ad3659828900664609da17b05da26359616937ff0733431645d65cac490af26d833ffc014d3e90f7da3e5fa9b9d140050993475e800 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000831877e8d2693b308a19f743d2644c15640a0d3e8abe6dd1b996ce3d9410ba61000000000e80000000020000200000009417408fd4996342795da004383ef1842878d44a07ac912ec8a22d79cf16ed6290000000b05b01f17e229eafc4c806f0596bd50d750d48be1c7298afd5a1893752e8b97a8d7be80c9f585f574a77cf807ed34121987bb867718cd67ccc8bb171ffe390a7b6baada8e3cef51069de7b583615d00f542fe889b9ef5f429b21a79ff6f29a9425245797f35f7637abc2a8786f3d79a40fee3187ab5d52fff1601a9be59abe4d26758ea0f124d24568abe5f8f2f9069c40000000ef5e414f9d81da6d5a4598469f8e04497cda04e2bd73a1990d6f3d2fdd90c2df1495cb58d13e2fea9ab044e1171c85e00de22b3cc794438c33788ad514347527 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2536 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2536 iexplore.exe 2536 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2388 2536 iexplore.exe 30 PID 2536 wrote to memory of 2388 2536 iexplore.exe 30 PID 2536 wrote to memory of 2388 2536 iexplore.exe 30 PID 2536 wrote to memory of 2388 2536 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dff33432b5a9752d71020e0924f365a0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2536 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519b73ec7ee74575366c0d6d58e86e249
SHA1ea8d6ce871921dd72f27353262ab4f93044ac403
SHA25680cfed19852af446472c8316451c4ce6eaee17f381bd8f83734e176d16183c6f
SHA5120a4f0ba2883f2c64d9c500b54573a57335c849c940cf59996b2083fe3db2095f3726a052aa02e510041a49d65f4a8fe99397061a83ccd7a917f2b9543fca1a0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514fa3dd619b9b0582e40a55fd0a35668
SHA10183d423f829d94e65ec09123e96760bb09d9f1b
SHA256bd75b771a4ded3f1b773cf9b638489f943b9016546c5f982dfa75abc8b04aa38
SHA51270a2fe5c15fdbcf1fe9d803eb566cd04b496ee130ba8ab253362702feb3dcb05dc781ee64f930ca036c6fb19f40cad2b544a93ecd204e236a3a98fcf271f3ff6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54739ed9fbfdc4c538ef36066d74edc5d
SHA1936321494f1ec280acad5a68fc7e2f5ca8313ab8
SHA256291b95d4cdf7c9123713567eb82afff6fa6905c7fb29cf9e8a82e103a3774bce
SHA512f34690f96b3929a2a419a6086ca78796231525d2cc6cec812a3397acf1271ad8ea053008d2fbc533f72a5ffd2fa8906b18cd4affeea2d4a599ff2fa07256f961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580ba54ce61ec5e7951d39c7ef4bc7201
SHA120ee53c6a083e6bf38a095172a1382c99ea903b7
SHA256764cfa73abeeea44d8ebb139c6d281f24e5e3b8237849fdf16f24b5584e9c1e3
SHA512e6923a8419c4ea68fbf8260b1f4ae7ac5e7cc892cc804ef4abe213365d5aa6c1ac27442a1a37ffd25f7c3f7a32102c4ab48ca354d00349d1cd11b0ee40c6a704
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5736e9e7ba438d8a11d33feede5050dd1
SHA114393cf6869bdf9595466b46b63a4ea57d125516
SHA25610bb7778cfd734ebba0c57743e36ffa2e07894d4200358153236ed50e615c272
SHA51272c7bfb98bbadbe8278c4a02a9989d18d0fa5d14a87dd6fcbcdb732aa6255bc4d640cd0af02636bc640a77a55b680d61b591e324e93adaede9739be18d88bbfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0e2b8fefc002e9c0ff92216323e22b4
SHA1b58601db0883110028b986e840a3c2a90ed081f2
SHA256ec9bffc65e0df1519814227d72456a377b694b17786bc6603b2f0a6e04b27468
SHA51284fb052f8d632497c81f4dd67ab800b4f6ffd8b03d15e938cd41720eb32cd3489eb2e3190f012588584d6dd55e61df8af38e5271e67664ea341f30f5d36e4833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c2d87b48e5070b4c83dd60d212df37d
SHA1aecbed0d678f5b4a8524b6d126423329e11b9dd7
SHA25676be985c0e245930c5b520fc85e18776b71eff714686c0864ff2c1ef08c5d055
SHA512ebe9c8760a991bead9c90d5c5ffbf51861ba62cfeefdc5032ddfa6a4504427e7810fcb38020418ec0cb462ab7685bf2694df6979e9281816c5fbd62c1f080755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8a30d68ba40ef5acba8d833ca742200
SHA10dabb0113cda4d6a38bde5d5a81d649535262cd1
SHA2562c4573a47bc2563aadc9bebfab4914b3913a523a86c20a6030c4e147bbc76c62
SHA5123cd8bb5e2b166fc9f9a18d7bb8777ac7e5b17ae8689416c2bb381b1535ba1092dce89481d05fd6922a0475b4745a8665d4d92afdae7953460bd449e31049a738
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b8b224efb819badb3cc91933a019c21
SHA1d83fb55ee868444d69f8d3b94ef456c5d1e86e1b
SHA256e1daaa5c12297a787cf75e9c327fa53472d26dee2d36cc01889b408698eaa4f4
SHA512ef1f90af0f3f911f48bfece30c6e5c260b5f079687d7987507ead57d529b541e268c64c87a217c73562875e9612263908bf03f39f4ba8d1098774913414d0f39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529b8f2f12c0dd3a39a206d9aba66fa71
SHA17096ef851f1a6545cf2b42b7814a54cf480536f0
SHA256cb172a32940753a73c5faf304dc002a9cfc72390c0e5bf5c75336b70ea99aa9f
SHA512b06a19df054741e7647378f3deaa03c5dd76046438f9eac4e4128a4325f3039551f183ecde028744ae22d539f6d0a6b5bdfefda40f6ce83be61e9aff61a92f61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535b1776d726f75535640f67aa5948a8d
SHA119735539c4d27ac1c4f21baca3317c3cbf584af0
SHA256c07bcd392b85cb4696cf9e0870b3f0bfdfdebb0eecbc72e6bcd3f02314026982
SHA512e1f852af10ef5bce474158f1948457d3dde4356af0fc2f5bb1d6de9973bd276f89d6176e222856dc59cc4ed35b79f0e3961fabba9238e8afa1af15bed76a0252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c6e1eba1eb598946879cede88e52602
SHA1849de901781ea836ae43b83644193278e104b31b
SHA256ddd17f8455003f3408859cb616295b01acb1f9eb0746faeb9b5d40af9e36c525
SHA512ab0468588de6faf47e19fbb558e1562b18d12fa0a1803e2b9e209a5d342bebeebd1df5eb5186779cf88e9401ea95fa114150f6c4fc8aa0766317ae2ee9aaf627
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538750a47c85b7ce660f2c57af84858a2
SHA183d744b9a98ad7b67582b9133f5ea9639eaae93f
SHA25685c56282fe0db10fe867e09504997430a6f3f45dd6cffdd5d7e5d0fdfb44df98
SHA512aff23ce8f10ce95797e86052f1df84a43a231b86a94392f01719fa96c5b03f11793f93aff59feb8e4f6c6033d210f561c1a9251bc2983f45650a5c60fa44e311
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512bbd3216b3f14afc18eb455ffc223fa
SHA1a6c62aaee657d95aadfbd2e17005d5b6c41d7364
SHA25675cab7b32082e79abcc55edcecdd8959bc352dc90c984a9b42eaddd0baff768b
SHA512460be5a5bdb0825072ac32e51577ed8daf0a8c550892c43156b71b9db65683edda8aab671cc29d170699968bba0537c0472e1df8386632b85d8e4bd98daf4c1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc86512a729db9cb2efd0eeff850fd23
SHA13915d0ee1cfd06bfe048e22abbcb64740fa8384a
SHA256bd584c73754bba71a83a368236917c4ca647e14901cbc8ed09d2cc5d419edaf9
SHA51249ca62a92632c146f2e609e066d58a6a21bd179a48666e9a6088ac6f7a1de14e2fa9fbce3c0d5be672e701b643126c40e908758c24c9a411dcbe1ea66f579d9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5682005c6bde556d354ec58b45d38e750
SHA188ef705964c75e3bf8d8d72e3adbb4aa4db46c9b
SHA256912bce8126fcb8775ac0636156f4f175b7d52b85835c407ffcdd9890f2e7f964
SHA512c623ecc980c7d624ceac363bca5ffad1be7e682e4641c485fe7b43bb16bf7d83988ecc2232440e4a68ec3e4d947391eb34bf15cf35f70b51c854b5c6af5dc741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e1e081c8a989cbe8bdeaeecbe63093a
SHA1bb5022e93bd01af6560e1b67124d072e6164be1a
SHA25626e66d71cfeb823ecbaf5eac44d2e99a55177fa44391a8fe5b13695d3bdc8f9b
SHA512521f5f351baba9fe2044622308bc1cf8a82701126d3ba9fe54cf3ff525b47f98e371fdc2560553620fadd45f365a4a79721c5021b7fc4340a3c8975ec67dd267
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dce5018ad58d465c7e7801c9d88a6866
SHA1187881b93ec84c90f9f6676bf897fbfdbdebfb8f
SHA2566dabf9c421e4e8133f1214a4f723bab977f188e763d3a46ea90a99493eef71c3
SHA5126b050e7eceb4b849cf4d0e2c0f74b1bb92216bc5b1490c0cc49801d3dc998a87261e87e0f23bcbc3c4a63f630933282353c0a9c772efed3ba675e458a88a3f08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550f057287e0d3c28c94f6256077502e5
SHA19ca16be7fce2718b79e32f1cdf051c8efbbdb5c6
SHA256975d4a541640e27df25f9577d017c2cd13f3632c385ec95e423c929bc844e3b1
SHA5121191b48d9277025b411ac83ec95651f258ff407435eba9925b006937688924aae51f6d8deacffd7c7b498707825e1c8955b51cc9fb89b85659583b4fc39dac38
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b