Analysis
-
max time kernel
135s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 14:11
Static task
static1
Behavioral task
behavioral1
Sample
d48b0f758ff7cc111cd6552effbd5ae6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d48b0f758ff7cc111cd6552effbd5ae6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d48b0f758ff7cc111cd6552effbd5ae6_JaffaCakes118.html
-
Size
67KB
-
MD5
d48b0f758ff7cc111cd6552effbd5ae6
-
SHA1
f34b037fa99dac732c063e8fd2b0216cbc86c451
-
SHA256
a66a596c48f356ab2cc36616924cbf8c8d5bc1112e4c4db1b32e0a31919aeed3
-
SHA512
6bb1bb2fa9a680c5a9f93c8d5578ece5671439d49be5c117d1de7d82ac9da0cc1aee53713e3c82f624e399248c6ccbda8c5abbc9fa5d8f3b5702df270f131c93
-
SSDEEP
768:YoKuffzpwDjExh7I6tcyC/I1xBZmsbiyC6zaO3zZF72uLHSCBOpA:YrUkjIxvDbiyC6zJLBS2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000091b46673794935f7ec550ad137bcf134d2ff7ef7e8df355b27714672c2ab9e60000000000e800000000200002000000016fcf529c9806ca527697ca364392411527ad4d24c718e55d377e24ff854fe79900000006247fee29be8ae98d6592d2d378b179d6f3d57aa6240c011ab4563ed5b66d7343bd8f61704b1d07be258d5b8c64b2d2d109a8a9654da68250079b5ab8dd78183e4cd6f8ba0556b5157bafc97597ab457614baca04ecf80ff0de38cfb20ce206eb7fe121f19a4716a2f1e4a989bd6e42bae05c5e4a1b9ee30c4d26f1ac1196aa6bf9b71f9c8e4ccd3eaa04b81f2e75cb540000000af7a911bb2a791747ebd28484a535350982cead19df57c6947679f6dafd6ee21213e8c0eeae06fafede06f05d75e672e2f8d2318f1dd5e2a4d88dd8dc240d4af iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d074a556f901db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f54200000000020000000000106600000001000020000000d22378d8d0175417e0c2445b22dbe98aa8f8f57aa227447b515badf786705746000000000e8000000002000020000000b83e044126658d448ac7530a02428b2688a40c50268630e4314e180359addfc52000000033a632251238594a1c4ef09d62541f570ef71e4676293d6d7413a8d19631c855400000009ce17b911bfa04c05ffd3596af4f3ab2263a125f8b6285f1bbcdef34f04d2761818566eec63b2c1c1a4626072c3f76cf66fdf3b109274bd4a97c19ec1e893f21 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{436C86B1-6DEC-11EF-926E-C6DA928D33CD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431966568" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3028 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3028 iexplore.exe 3028 iexplore.exe 1536 IEXPLORE.EXE 1536 IEXPLORE.EXE 1536 IEXPLORE.EXE 1536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 1536 3028 iexplore.exe 30 PID 3028 wrote to memory of 1536 3028 iexplore.exe 30 PID 3028 wrote to memory of 1536 3028 iexplore.exe 30 PID 3028 wrote to memory of 1536 3028 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d48b0f758ff7cc111cd6552effbd5ae6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3028 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59188d4d845bff7b589107b3ff47553f9
SHA144332edb50fa6bc626b504764b27cf2e0c5b0f05
SHA25682c039acc1118333e115c1d92e95f1465a8e5c11d43fa7368852c691aa00f3e1
SHA5120f82575225c9a96491cbcab4faab8f2cf9c3710d0882c3e60d14324d3030e0c64a8ff502c3c74c62f674d16f6ea38918aec2d4187722943283578479f0eeefab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7f9ce5f20ce7f80d9a5a5cc9517a5fc
SHA1621e533975b6437ffeeec12a63c999f7deb9aca1
SHA2562fb6872575113d836b17392d0aa5f5330112583d450517b7d0fc5ac90a13fd16
SHA51206ea6aa7c7e838fba02ba79f2430da0840235509281aa7c0eb5539e8b1e0409c9c4279a59cd28d7ac12d127cb523497b945600ead574a2b6a2e1dfb7d63fccca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542b1011dda28d836a0f04ca16801b205
SHA1e2241fc1aeaa757054de07e65f6322a687d14bb3
SHA256722f8322377393312e16bada93cbbe0023cc1aefc9c02ce8852ee39a46f4dd78
SHA51237a919f5907880e34f536cb482bfcb31266d36996fa2e6e88b6e9cc0b9c8ae8d91a1a3424141e37a80a52ce70754b6657800c48fee50660bc6c22d8b17664cc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd7d61ef928393717dcb0ccc8113cbe3
SHA19a17768ebde36b5ba8e0c52385a7e298d7209dd1
SHA2567ef48f69d456b10196157e866b894df39a303e4e5c331201b6118e62aed20ea1
SHA51222caa339d8b0c1cba2ce86b6d70f8b8db5ab706876f80bfefbacc4f979b6887cf6967f2d8ba6a580220a9d5b07e57a8632a821162aa03fbdcd5f0dacf3ad1a75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519b872c12837fdbc0f10bdc475b0e614
SHA187f6c25287fdf5fd93d64dbedf22673e01f14e88
SHA256c6fef7e36bc68974ba01e23ebaec6acd7cb4389cbffddaef824078dbcbc6535f
SHA512a59c20e3490ae27971c1c3f0d6d2c111e216134a5c5f1ac60800f471626503e0c6d17c6e9919beb53d22ee6f76c2a562546c2eb295176907c7cdf508d760adf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f1d69f92ab40eb0f94d32238f83f2c8
SHA15eb328e4723b01f87625de6ef5d2c30933a5486d
SHA2561ce08416015686d6dfd827b41736f198b9de9f1944cac5c51b86ecd2f6283414
SHA51215ad049f5824fe9d14134cb445aa7435bd4fb558835c1a43ce2628289b4a146cbf2d8c502e806770b5429251fbf4ae4ff48b1dd57ee23c2adf04e5575e4d4a56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d01eba44c3fd1e7b3d4d5b80ae9d3e54
SHA19fb38161616b6127ee54ab0236717000076d1302
SHA256853d10f00338c50e925b66e35bf68abd41c521aa70000a18e9c3da228422960a
SHA512b8819f8e576e490ac370f2aaeea10501f6b0c1dcaae2f939a46e5bcb4c07df8e4e65bd9239d6c33cab024fb306980960b7cb7c5e20e35fb8b851787bccc9e3de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58274df4239dba21f3680589c43d6a64d
SHA1d91b75b7885d05792f478bef00157b5ea0763024
SHA2563395e5b54d65f0804db23241b85a631727b7e3b0da76a44e9e11d6171facb3c0
SHA5126bcee845d0c140f89615684402bc1e6d4ee9eeef7d806794f085cab5fbd90db69fb9b3985471eea13c122a462421abb7af189f072f180869c8a1e69dae1b07e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e443985930c7acf86f1ca57287aef48
SHA17349d8e846844b4547bb77435d4c79dc511bae42
SHA25673f6a6cf37986c9173e04b94e6e8328603fa14757f68a3db319b6a3321202799
SHA51270c08903db80f6dbdb090d54db8e93a4fc665859139a29ae83c75be5a656d0bfd48533dd66e9bf6cbc291651220c69310fefd9e479730e8a6e2ccac438ef150a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc164205955fb92bfcfc749608c940d2
SHA186d21782625c159a86e7436598ef78e6af3e278d
SHA25664f94f5860312009f72dc9302b5fe33ce10ac35f1a578d45a22ba01286310583
SHA512349ede7af741342e3e80c28933d09d09c57954ed1ffe91da9ea3df0bedc60999196510a851db94fbc9e2478d2836f14972d51961d10b748beef58a33950efb21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563e96281ac7b816d3944b00b2e927495
SHA1c751863aaa1124303c0455a7665857f6178fd188
SHA256f0e9361f9ea80b1a62edf224ccaffdf6494caaf3176d456bf5b127ef4a37e34d
SHA5127b2d193622f00b816dff122888c42293b5cc553dbba78867455f9a366811082b9094881827afca4e2f5e29717cbdb162d69e8576a03b65a063e25fdac3d5b7d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59135f9c7597f71215a40c101e7ea7de8
SHA17663b5a6195690380fedd3f7983356cf24ca0638
SHA2562b5773586064604077292f202f0428d6400a71421b1e4d478082b65efce47cdb
SHA512a2c49f03ac2cc94daea146b2bfed41bbde4e8b3a3e01acb5ead93a178d212c5f4156e28a5898b799f5d6c0f23e8851235a064b4ec0df14e5b8866c3ff48d148e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ee367226fc089ee52de659ce6265a57
SHA1abb26ae5af1881d8b2574857243294f7237a313c
SHA256093e879f82d33dc1746897b060c082551ea3a0355aedac6e170178dbf1897a3f
SHA5120144ac7b5631ba781841f39f57a10ea4b9b1f33469453efd03f441883f3ea1e3bc32f8a4901f4cbe0f74f22591aaeff79e2d46f0b9b23aa2e505941225d574ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d66f0046bbdce7a72e2ccfa397926df1
SHA176a2a07bd7873fad19ff5598897cd8b42e80676c
SHA2561810318e951634c055c7a81eeb3b231eed41cbe2a1b52a3e719da982582c2b04
SHA512f805835a4e64978aafbe5487eb8c7337ccb333e750117301a78ce717ff2c86a3095bf3ab68dcb1d33c36e3e45dfd23718da0c8724c468750bdf078f32706cf2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c14122e9d75c5ce7fd897dc177b0068
SHA1d0bea0888d9a6a76f3ddbd67652c3d7376a41500
SHA256c2c914140f427c0cfd38975d214ac6256fed4208b9db94c94bc12e995ba617cb
SHA512e41740aedfe355924b3a163b2e6570dba9b5e8a7328e0dd1fcaa64a5ec92559441c0b41c0654ca878a39ea3f978b89bbf2faf328cf40675efff32f5d5b1f7b4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5555451b9c757da6becb125701b5c2ab7
SHA1b88aa50774ea75579e599c6d6cddac913432c42d
SHA256717c77392618529e72879d6589029578cbfcb78aa221759b70ebf577284058d0
SHA512abec16fb3aefc04593d1681f5e0563c824df1b01341b49a4018779727512829bf90d2155ee69aab52e963e66dea753ce8bbfd555a80a5ca55bc07da30d73284b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576c4d50bc990d2e67b8d564502a487d5
SHA101419f38da58464da1d36e83bd560bce174cb82a
SHA256ffe4e8876e01931ef671c0eeb20f01ca7b02009ffe3d32ba2ea6d7cda7405270
SHA512cb747337c27cfe0c114928d2e43d44e59781db6ffcb64c48e0118308389f4323f805708cdc871da527b0eaec7a6f7c04f29714696daf1791c7fd111a6ff2a1eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544ec229e5ebfa7af8176d53065b71ece
SHA1f2fbbff0edf879dea6d4878b936d8cb46641467e
SHA25672bcb7869fc9ff3a6ebd87ace0ff5c6dd93a89a962beed64ddec1ab446b310b0
SHA5125bfc1bfc8c5e6ad2479debd833e46ef1edc642d5831c79521d2caef0746d7acb6b5fedf33c6fb65ce6989cd5a2d72036b040ed9d9e85419abbb56382cb2bc54d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edf3682e2ff82f314880cf82d8aa3070
SHA1123af7babacf13918ea4c06f2a908e884a7281a1
SHA256c48edb61485f1c077d3be2be15f0bec135860ed9108c623dd401dda0ca172e86
SHA51283c90284f4a728a1f01ae67ccc9fc9ab8ddacc82167785ef26cbcab51339c404df8b5d7cea7a1f6fffb645e1d8d0e43f9d70773f95c6e965cdea7a9462b3e6de
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b