Analysis
-
max time kernel
137s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 12:48
Static task
static1
Behavioral task
behavioral1
Sample
fe902dd4ae36210ef68272d22180248f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe902dd4ae36210ef68272d22180248f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe902dd4ae36210ef68272d22180248f_JaffaCakes118.html
-
Size
158KB
-
MD5
fe902dd4ae36210ef68272d22180248f
-
SHA1
8b467297ef7b78c3f194841d8d998f7259be27e3
-
SHA256
e493d0c709513bf9827a0791f9d28f08851c1599c2ac69424b2c149e58817bf4
-
SHA512
6a6d98a5e76794093618864f4bee423e7fef16e644ce661d36005773a8b5edf0a85a03dcbea3d1dd25fbb47ecdc32146150f3fc22397db38f1831601449b955e
-
SSDEEP
3072:SMHzWMNVuDyfkMY+BES09JXAnyrZalI+YQ:SM6MNwmsMYod+X3oI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{27F444B1-7E61-11EF-91A4-527E38F5B48B} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000005997c6b5499a0a17d53aabe98f03e4cfdca541364019bad15af8bc04e2d5e025000000000e80000000020000200000007174b91d4dbf248738246d855bcece858567facbab1d979a5ee58c6ba3446dd120000000165a1b389b8a3f91307f6a4122dcc63d093b469ab0f2764256957426b933ed8e40000000d4885e1195210321fa432988a13c5aa488b6e465bcfb5aa5785f3730290547f19c13715c808ebb2bc8b3205297fba6441f2b2f6f9a17e608536231645378766a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d013c43b6e12db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433775991" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2792 iexplore.exe 2792 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2808 2792 iexplore.exe 30 PID 2792 wrote to memory of 2808 2792 iexplore.exe 30 PID 2792 wrote to memory of 2808 2792 iexplore.exe 30 PID 2792 wrote to memory of 2808 2792 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe902dd4ae36210ef68272d22180248f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2792 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ebf99eb9e994db5c04c2d9b3bd885bc7
SHA1d531c8410ad76cae7ce30c917aa109b02c1e1434
SHA256aa31b9bd1736bf8a1c41a419de2a4ee673bc459c466dd4c1b37c6e5c71c54888
SHA512ddbe8225ba0a3223d90f4b401a4cee747129eb5f3e93519f22ecc4984793e9701fd7a7e13410c65b0afb20bd0d9698293a6d5e19ec359ae69f0265eb1e3c212d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5333e7fc95db8490c23461e3b4db84d27
SHA16bc551d850429096db2b1a8f2b3cef313726878f
SHA2563f8a460fefee4bcfad55927a40d7ebf87a9122cac9550cc7932aeb9fab758689
SHA5128047ca255cb50cfbe261b2b30cf504e6459be543c7df0a1d27092fe93984d7b089e5a7eed7192923ea72efe40b20228ff20cc7546dadcb2a7e3362011f61782c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ba23b04dd791ba6d2e85651890aa97f
SHA1cc43df3192543147b9b98b0e32f9fe4212f60565
SHA256ff70464d6627ab2d1014096f5df14a122e9a39222f8149d7f077aa776e5cf594
SHA51273612ef4e034e669655827aabddc53ba4322f9fbf62a215f9c5747a447de3e82c8bca1ffa7048b5cc1403cfeab6809db2049795ca850cb8a46122483c174e2d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f989765642dc741943419a481ceeea4
SHA1c2d42a04f05510b1ae9723edb3d497e0a97d1306
SHA256c69c769e4bc46e5b60cbc177834e2f7f37e8cd0439178b1b96b3c027b692b223
SHA51273aa40c961975ae87dbd41c604b23d4becf4962eb0a9af10569a4cb66a82adf22f9a913b578dffdf3fcb73d89646a2037dfd9768f66ef57a30b3c3e53ce409aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c31695dc1a777d0a23bcd9e0158869e
SHA1a4a90ae81be4cdde0782431c6eb03f123263f75a
SHA256060bcf4dbf6d5ac853bd8a3c94bbd7db603947b51002c51eeda2ccd628c9a732
SHA5120c553242f0efc2dabd31f6df484ca1068c0b4f37e85fcb5a6d2cfb43d459ddba3a2ce119de247979553964f66a6f8b2945b5179c5879d36185ab57f60c97774d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1ede6b5d6e21ddf87aa7aae9fba574e
SHA10d96024138308835b458fe762b5fc24738cfa64d
SHA256c95cdf42563daf30628724fc6a89f83b4125c03434ebd92c81534c07aeabab32
SHA512123d4d857f6c4f894129e92f20730134df0a7066bb694cbc3deee6ff4bacc6f83ca0cf4e5e5dd180195eb477f5074e3af5dd190257ab6b25bd46d9ffb3262d66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a0087c2b89a8307a7429c99bec13b46
SHA1dc510d20f9be82b6a296a9180f6b1be16d249ac8
SHA2564dc8cd24b22bcbde0cf99d17d305c0f82044c3188136865f420f668d9a4ce5c0
SHA512c1d00cf139cdf14c4b2701daeaeb9565f877c7e71a81b9b91e1f31ea98124f3514b6abf9f69adc16315cd225acefa224e33dbd9d894ad51ca4a31b68360befef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5262883b99b7050aa1b49db5286e5efb2
SHA18762d2520abc0b22db27027a02aaa20dac6eaac2
SHA2566e25bdd5963ba6324d356d4e80ee2acdea4744a2a01bb277e3f474b2d7939cf3
SHA51290dc6a2dfe143551f65a42dac784d0faf704bf62eea68bf242501bea43269a39ac1ec8e6e9776f92d5c891914ece1c6daa6a295bb8e14356517efbf65fef49e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521c4553fd1f4dc709e01a1852a303847
SHA140c3774c9f54a710fc8b7cda9d7a79747e9bb33f
SHA256c33c9ee73739930c9e2f097533a774a250b0ed480a3a915166cfbc5defa10619
SHA512445937d792f2b411c505af2384308145750fa3424f3ead70a7fa410479c962f881f9648b4e6ee43bc8a6005b19912200c7c36f525fd4c9891931328b0305930a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552073d75d7ef52e8f892a00c2717f6db
SHA1a9de09ca7f1d5c7496c2fd0dac402ced75ee42eb
SHA256ee203703920909cc596947588bfbc5825d73477159305b4f3e44999408cf1030
SHA5120a7c2700a8b306567ce825ecb11a40ea9c5beab517b4427722da4e31c8a9c9722bcff86a3986f0525e3814a2aedc34a58a099780320aebf5f6f257d2737f0cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5744415bf6e7c10283207b9b3f2b8320e
SHA166e3e06d793676945ca29408aa00f1e101ed1a38
SHA2563191307736c3878938f0cd300dbca599bfe09d299591ab2125890161fabc863f
SHA5125bfd2caf293fd8e9e059ee5ec85fa52e6cb5cb1f1cb3a26df97e063838ac1210cba1a38d15c68b8f3478bbb02f2f5419bbc04faa2a02060f5b6659e1c8368da1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8a2763293de7d2451a48d72d0cda70d
SHA1089a6ab3be3fbd36a12bb226515112c13adc07a1
SHA2568dae6836d6765899636f2d650666be46dfca9c719dde1ba5d43424c9e0f5e5ad
SHA512d5d89ea534ed1b1a6b26b718cb59d700ca70d4bb03a33eda356b60394fab12bd7e61be9619313c35785a825a19469d1afdaee75d6d201a8ecd884cc402c2d9d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55198461fe4e1d9d6f8acb6b7e9d4316c
SHA16e7a6b0a7639e9364f753a66e105a9a17e3bb52a
SHA2562c5792a32158be1f38f63c50f06dc9646d7ca41102524b69843def4bc36e1759
SHA512d46ff0ae7cc7f7b5d8f9c7895f85f7290aacfb9dea8a223caced2b5cc65bf5fa21455e7948b1c1cd1fa3d9128cdb0af57a0394607a45bdbab8ed7c049cfde139
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca40504f0841e72c39ade4c5966aa86f
SHA15ac3262af87cdbc8ef39cf9cc32bb50cd80d30ed
SHA256f4394d9ab49a4e92f2da61fb7dbd169dbf82af9abf7a4a7489d36a4e971a8ed0
SHA512346d3ee070ef50deb2d506cdd65088bcd0abdb253d893eae426e560d0e1b66ad3093d95d2cf9b78f6ec8cff4489466a3cdc750e32e3c6f087ae0f724757d3d95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584ef256b5519f63df079a57a1a9281cf
SHA1c21af9bd3e9c88cba57991e493cd950d1cf96b7a
SHA256984024fc83204dd0b23e8cdcb81fe4e34bc515df7868fb4316fc80c148c20b5f
SHA512793ce42f50a61955e75e9f3972ef7dd0386ee998fa35c4786085ced618f3fad0655021fa1f24427959a976c8aae13c2aa1a831ad92071bcb0d0bc7e5474f0448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e945310794754e339c121e8c4164ed1
SHA14afb42232df267f959e830ef8a694a0a681d6483
SHA256c5d1aea3a86d5cea6783f3c71949936aa6b1707c02405041afa7f1cb6e4c0af2
SHA5120dde5f137ad22961baf906bd7627bc13cefb74c9fab92dad78ea514aac954e1c0fa71f39a9ee8552f735e611863256101be0e4be2108fa9e4d278a77be6ab76d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a9a2e68bc811a2619e5fbea848a9364
SHA1c446d456fcdcab81b1588d94e9d57f64cbbbc411
SHA25689c135eb09484d0be702d98b1e9226d6bcc52db91315548d4e0b82b68ecb205e
SHA512a5eeb5773289deecb9d7094fd5bf87ff5a8f579988c957202ea767894d59e454cac2ff63c488b0b097aafc480211251c79cf298abed39db9850fbc2075aed97a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51415262d583038f13dcddad4cc34826f
SHA1da8ff9eb5827d90eec6f2576dbaa574226d6666f
SHA256f9beb8d6b356148813499bfa8f109c0b3a088c9a26e6cd6b930599a0bcfcf273
SHA5123c83482d43c1efc45d083f43287fd791b5b94295917ae54b849c779ed95da8c87cefd51ab54d93b4bb22451f47404c5bd8fbfa6b9ed994cce99414b69d57b6bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522623130090b38da0d658ae36184ff13
SHA1577cf3d80461acadcc6fa4b13ca1e4e51da59167
SHA256fb0b38ec77992d5737d5f035babb66dfaad09e16915eac277d31a499336d54bc
SHA512d7971efabfb4eb8fd5b72cd6f92cf3f514dde556480655c7f15cda2a42972a8d1f067e3c17f81fd5f691634cd44f00b65d6674e82f9d4141a7acd0c02854d1bb
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b