Analysis
-
max time kernel
95s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
ebff5dd79e375f7462866aa309a56e72_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebff5dd79e375f7462866aa309a56e72_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ebff5dd79e375f7462866aa309a56e72_JaffaCakes118.html
-
Size
42KB
-
MD5
ebff5dd79e375f7462866aa309a56e72
-
SHA1
3bbea45dd938e86ac1f609c7d748585242b859ec
-
SHA256
d26a14c505a5dd82735134c222cb1729a12f8d64c1cfcae6bb1aa4dcc3ebd69f
-
SHA512
09e6d05afb0dbe4e1aed962a57430f9b51c576666abcd8418d24a2a633e114c8364fdf833b263d82c2ee7ee41dbce924cfa6b3877a0d0145fccddd8f2f03c81f
-
SSDEEP
768:Zcd9QZBC7mOdMM9pC5I9nC42Vi3yJawBwow/7WWPd:gQZBCCOd10IxCBViiJawBwowTWWPd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432934412" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b01849aec60adb01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000000842af11b38a7d3f1ae22a449ecc0443d1d7754fd26adb0ebbc6723744f86a8b000000000e8000000002000020000000d4b26221eaf7968d54fd00e2fcce68f9f5aaeb67994adf9f9f1ba99c4244adf52000000089051ed19dc3392946378b442b95d832fd2ad17fd7ef9e0e75168a0e24f7ad1640000000806f337f76469bccf56239da13d2dfe6d7943839b9c9cf51fa60cd3772a5f335fdd048c2ae8e4402065db213e93e499c98dd01dff38716214308847aa7c8fe4b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000007d5a0dd406864304ffe6e4645b26b640b1d485ecbc667ab6fdcd0d275a8a6792000000000e8000000002000020000000943ad502a80f03d52ab667b1e182cd7a2eae6ea897694408fefbffa33909708b90000000a3ff161cf0128cda8da8a8e83c944348911396260aa9d6c5c868937a2303d3d1665b27f47319a2d9863c09389b7f433c47ae2314619e9b7ef73a082329270b648a0ef39c0be121b396e1ccce4c8f27f28cc6869d695331603ed74321342ae97f924b4095e0e7fb266433c828cbaff6207d1f2e03c14b4a91f2229bff2f85fc3bf8da224985f355f8c6769e8d42c7e1144000000021dec79577d69eb52d2f34a3b251ce9889765eeb1273a93139a23ccb3d12862e242a4a6677a2cb0e79840769c2d07da16279a81ae4db8c88688f15d9d8c087ba iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B3BDB3A1-76B9-11EF-A6BB-F2DF7204BD4F} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 3036 2180 iexplore.exe 29 PID 2180 wrote to memory of 3036 2180 iexplore.exe 29 PID 2180 wrote to memory of 3036 2180 iexplore.exe 29 PID 2180 wrote to memory of 3036 2180 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ebff5dd79e375f7462866aa309a56e72_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53afa33b73e1ab6720ad3fc9f8fb43526
SHA1a22df1a0d936192a2993a264db6bff68181c858d
SHA2567f7a7834d1df0f9d6fa16e9026eb231e633cff45b2e19986ac004546919ea339
SHA512fcbcdb72d691f2849fb3af125e75d28003974e14a7ae0f40e71159f4fa803622bf41c152548e35bc05372264d981bac536fda130511d33f9748c3b55fc5f9a42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53723f63775be392f67b64ab42fcbc8a4
SHA12519fb39172b57d44c69917e64975f7a49830064
SHA2565eaf216e85b9046317685da9fc3de9e703506c98bf80acd23519f82e73e4d5f5
SHA512215ed3a5c75e8746ee433d27433ae3c7d4832fb71ef424c46707f8f397f3669be6c29e29bab47b4b54333b643e872d9d679ea3914c27ed42422e1f9de3df3196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557bf70d246d2c3525c90f1dfc2dd8e8e
SHA18e000ffbfaa1b8ba63121a3b71f985fef1028078
SHA256ce13bb1dac4d43c563f3013b34891590af71d42e9ab73192cc6dd47f9d8dcf6e
SHA5127906124f5b44aa14675fe9dd115c112bd7727b6e182a4798e08dfa5ba48577abc2c814abcf5948669e698dfbc1e787b692389488e1702e9a895ebbf48a61ae17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7c6d29b6558b9a9f8aa0e2132e6d816
SHA1c173076c09031efe6e78c55e3ee25aa2177bc486
SHA256146c3ad4c705a71e078379d4a31096c8e8228feb95cd3365bfb8069926ef4a8e
SHA512c3d922a7cdf77393fee32b07d5d88f2760ce63b5a06298fecfcfc820d8e22a2a564dfee2c31ac596e05bc3199d5e412edf85545123d1b794bb09e3e27ea2f761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fbacc5d78b90992a7d9a3add17b6a88
SHA1aef9dfb6aafc7248c24a95b2193a74bfe82e8977
SHA256c1f7e951c0d3ff135923467cc5b8d7401df21946da25dd9f7875b8c094a9d94b
SHA512230c9da8899978995b232ad95a635f94514fbb1507c681099e71cf20674c89c218cb57e25f528a5ee23c4894b0bfd524123083d4e7f2666c7ac1a396a08d0e2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee47f6fb625b1785c14404443340332e
SHA14d4f64b1a0d5bd31c688d4b7998b495cea50d84f
SHA256ce3822f9ff001236b36e7564032b4b35066facb6e96285e0bd12cd93ba9efc39
SHA512279807b14d134175cb3660e2bbf32dc2bad6cc895a7f45902259962a6688673e0ca7ce59c80faf576013c7788dfa2bad54cbf7d66202f8daf9f33c7d8184e14d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a239d9b66f771fd497655081fafc495
SHA195c9849f689292aef5a04841b055e09da5648a5e
SHA25697acfad05d464a76ef57130ad9b334abeb2f2e0b772b0276d344b5d81d8be6af
SHA512b052e593eb82d7267522c0b18afe219cc1fe86f85b8d057a34d253cba6ce5b262f0090eddd63e704172d6f0719e9c6db57314f2db8106544c30a7322d443d8b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563b66a9e11cd20961986fc2037b8bee4
SHA1f5bddb574731745e48bfbeb98a0f491b8b44c33a
SHA256a47daadd8880e78850a3e3e2ac468fe0491f1e6f32f086dfc2d8e2068f90daa8
SHA512ec7908e1553197019a7e7febac22d365ac5a7ecc047f28ce54bf0cac3e80b4e7795e688edbed546c9c99e7df83c870e50854aaf4cb4bd5c8c7e2c10c2e3c594e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bc73a58286743898fd3e762390e4d50
SHA1057767f933e40e746469c1ae88c9065bfdd9e6a7
SHA256ac48dc677f67baafafbf33d40175112e0bfd6f7dc8177bb58a19f7b6adf6f9f9
SHA5128b2fbc44d13b09c840aa2f22ec8e08de74505a6faf6aa0a1e4f0ca6aa8052bd95bad717fd8d548eb12bc6e8100c79f6cecc3396c05f9ccd36a91820bfe7240b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581a9910cbdb736c8bbee4eade0f0839a
SHA192e0cad2986488a5e54512879569f4c7e77c7553
SHA2560d99cb1388a61d9f49ecdfd671ef4965f189c8e440fc81a7ea748303770d036e
SHA512cdfcfa462d98cd8857984089f1c7c97529e929a5f15aa870f9f3061f7884850506f8ac73f6d1d1694ad34e4212d432bedc1be21b9c5c5298013c460917517bce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587108ee59057f53484353bb4ecc11a1a
SHA133cd5afa3dc30291e879397552197ab516a07717
SHA2564def2282acde6ad117d231f01bc627edc08b5ca3408590eefcfd7ec56b2cb442
SHA5128e4439d0d403c4f3bb2ad76920b01fd30063d788ac91aa39de7f896e92e30b6eef0940ae31860e7eb41adffe374a628c45355123f1266434c7510120a13158bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6ab5d38d76fc5523de16131880da943
SHA1dfb5ed0465a82a2b0699d276f235fad4c10944d2
SHA256cb9259a103137e7e446645b1b527c9e9c3df24cac74776f18959984e230c13e2
SHA512f1dbb45133208cbf5ed318399f40cf18404d172e91ec339d36ed161567539e601d98518a4ca3d5f8db6675687d4025377f6ebca67236665a0d54226cb9668bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebe6718305d8d6a2cd6684f5be582cd8
SHA100f3ea9954348755aca0dacdb786996038f04ab7
SHA256f4406404da5154e0448c24a725da3ea9876fc6378f142afcf305c688fe3f5709
SHA51296bb2476545dc3615bf7ccf73efb306991af30457263f06c9c703a1be291b26e36e4541e5e54211af7c7ac76e2dc4f5fdc05866902a6c0f6377dc2f05f3be912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54160080d18a3cb4fb7d868e1cd457d31
SHA1bd8c29f03d550cb3ccc1b3f1e3bd9b7fa0a8a77c
SHA2563efb106f0f93faaf522630a9d9ab4c494252eefc5b55c4c73b81f12b4576a779
SHA512556972388231e14fb48c37da56bb9999e682f907a3f6882fed7c2e260f9305d60123b4a242bad04f0d88d15bd18be4fb8b829069f59bfefbd4a537061a6ad73a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591dd80d922d5b068d2ab6e230041e737
SHA1afb5e74d50ed3f89e8d52ced207ff1f40ce38d82
SHA25643b70119ae8d90a5d90142527f6ec5cfa0b843acb1632f8760c56d8eb69ba5c7
SHA512e134983773b6a16f6ca5d5c796656825866ea699c7700be706ccd2a1f2b5f4144fb01f1e5fae855d602b9c372b39e4baac6775861d8e96cafc84037d5c23b9f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a744d1ef847d1534cd117d1a3421b293
SHA14ba6d95f253de701a42cad18128a96d7263a0313
SHA2568910c7840f9b3dc4b0e427eecb1df1588e67a63ff1dd825ce54a8e80efb78e60
SHA512791f84173da04c025817b185424965e150ec0134caefdbd58796a3fc9f7e9bde4bd7e14fc070432c74c065cc954442b78debd89f9ca764327845fadcaf471e70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c48bf8070a35f2cbb22e8442f3ce62af
SHA1fb58141324593e141d7f8af0074ccc5ad9c1541a
SHA2561f8be714473806651b321449fd2f4868cf537800bfd00dd6a136b1a705c39ffa
SHA51257dcfc00e7731eb62f211f5ca8b0ac2a433429c8c9f4c933ae70d135d83d13361fcdc28fcc18415ac5cc0acb5571deecaec6c4465454386fd02cc0f55b2b720e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d46d7a26baa87b9ecc9822b4002fec9
SHA11872257dc1d3e510a0ef530f921695d93044e1e3
SHA256a3c5003a3b3a2d0a7b2f0d94183b8a990534d11c5f3ad5694e325e5aa563cd54
SHA512b29e0309585d627f01557352391e99be1d110bb5f33929d65f32140f668f53062985ae2d5af3b5401e2351eca7108012f431685eb6b80b9f2e73ad5e1cb7d1a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5791daf55100b0e23a7fe0e1e99a6b741
SHA1e6752e0eccc1e52ef82d385c48f73ceb72adc1b8
SHA256efdb59a6cc91347f64ca6b4fd8782ff144d0e05784411912fdfd766cd846b76b
SHA512421e7e29123ff6439e1c5c0b71478630bf083a60065c00f6eb144d72af5e550fb974ff2a237d64aa3d8a05261d99b936334904f28a781368e8f9d3a1099ec188
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b