Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:32
Static task
static1
Behavioral task
behavioral1
Sample
eac3f5614032dd840699bf9108480e61_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac3f5614032dd840699bf9108480e61_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac3f5614032dd840699bf9108480e61_JaffaCakes118.html
-
Size
461KB
-
MD5
eac3f5614032dd840699bf9108480e61
-
SHA1
302ca889abeb099a5de40b90b14b641e570f0308
-
SHA256
b9551d9f702c4be5b5113339f52246c8e662065b3d3c99358a6cbeb511fa3695
-
SHA512
2b9beda377910b6f0921c66b8c4392cfd88727d0b6dfaaa9e0a540708d8ac02f97abc26e7f71df466b2231609060606a486bb927e7f3b63a5f24d5995a3d5826
-
SSDEEP
6144:SysMYod+X3oI+YPsMYod+X3oI+YNsMYod+X3oI+YLsMYod+X3oI+YQ:d5d+X3N5d+X3L5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EFB3BD51-7650-11EF-A742-6E295C7D81A3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889413" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000009ae8f9866c24b8cec3c19f2ee52806a71fbdf14595d67aaee414ca4d01fa7900000000000e8000000002000020000000d8fa51c337d4c136c5b488cb6e428505544e9723497ece438bb1fd184cf29964900000006f9a2bf0a6e9cb6048f4574a398182c17cda3b67a2d15aa90d7c4f407519736a96e8422299fb5c5c541c3464d58872ce6022dcd8e339b50a1dd1e2e96758fac5724bc92b0dad3f15a71351eded8b173245427a8a17d1354953e6a507a15db89c072dd2151313ce4095901f03731d7ae6984ea2a14b00637c2dc7fd7ba3e32ddc3a596d693c8ecb24e190c2d5d98bca67400000007aa9f56535bb18a18d00cda5113a093b57c07eaa8120e08ea8c0c2fc87e2e302814049750c9286c32f8613889863c6a797b9489ffc385180be4316bb21488815 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000ed8d2f3f606b447e0a02c0bbf9620eca3454347d1b6636f70d115470984b2bae000000000e8000000002000020000000876ea20c2ea4043d024333137e40484be62c1cb34c1a300b8c141022c509bbde20000000aecce1bc16f9c48b09d5d5341a9f7ce8322ca3da5961c728e2e7445131f7c68340000000052f9f607bd7ce9e0cf24ce5ae5b84d2a6a1a17e1e05f363debebe3f96f5080121470af38c559217c0409bb92bf07d2bfa5271bc3cb2d02087dc926d3814f95e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50643ec85d0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2112 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2112 iexplore.exe 2112 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2812 2112 iexplore.exe 31 PID 2112 wrote to memory of 2812 2112 iexplore.exe 31 PID 2112 wrote to memory of 2812 2112 iexplore.exe 31 PID 2112 wrote to memory of 2812 2112 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac3f5614032dd840699bf9108480e61_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2112 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d12ec1ab2d99d26526906bf38c50bbb
SHA110db2cece96626246a220ab1248ad055930c7862
SHA256b1221a13c6eb73e1c6a98f628b790b93459194da33e6cd6a96251c6aa28fc1f0
SHA512e0c9f60fd3c2237a61a09ed14fe00c859271898140e9cc6e77d5174599edf2ed06206e4c624a91422ae229b7546ffb99111467ea2829513c4a652b8742bfdeaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0b854dfabd2643cc203b2be488f1e2f
SHA18e7d24c4e66a12c7f0596e511443cf0d8555d8ae
SHA256de5b2a12947d8e35977b6860da01ec819518774d915f8442ac0d5ae6acd13f29
SHA5123525681642930fe5d3e22b0fa136b18c3caab8f27b91a7c3f2e401f9085c8eda576043b23d1403607bacb170def250e51dd3c4a6eef10d33e6f86ba9db550528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50873fc766a12e49db272aa28d31dbb15
SHA1a8d64ba2685b154518880d6f58c533725c6e2b52
SHA25681c359bde5693f300c29d8d2388819c725910c30c7ae781651112bc5cf3da347
SHA512fb83822899f58ca9bef66b23df9835ce3e405cd186ea9b7ad6b9658a92752879adbb401fc25cb259ed5580bc3fec04ffb8bd5577ed3b661886a81468144eaaf3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577a0374c7c6325b2988c54f27587609b
SHA18ebdc47a91fb547ba073ad753a832013eeb42296
SHA256ba8bb26da4d8fd2615a053d890e6f1ce2bb03a2c8961bd773fe5a61e19bb5280
SHA51290493ab5f0fdeb349cd747fa0013c1a75f6fad1a6d346f57689b1eda0bcb21e480e8bed273505903d840fa7a12ed5fb377577d17f2c852d6184dc5e4adabb246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544193273c8b968901d9fd82113d90087
SHA177fbc5153beedbb6555ed34538753526048edfac
SHA256575e28fe153439e598252deaaf7244b3429adbc0cedfb8e7e9281e8c8f7c3f7e
SHA512f59b8f66d560b295c9633bed1acf6fa16b33f33e4fa8ec8aa6e2abe3862eeb950119aef20222488e0c8dedc9d863c2a84cc366e257869a7341bd010d9cf9c08a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b06dde3eaf6fae42aa87fc55512d7a3a
SHA143f10899682f50971de6b3236b7d3ff61e8e9666
SHA256ad494a962a8d96d21143f1879fefa2a8307da72310a935e2bdc976c61af816e8
SHA5129f261d8489d7a9699415277b33f696d048add2dd11310a682848a4425637a69f348aedd8e07ec3a214617330087488f355f8beab1cdbe3a8fe7b34d1c05e3413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c540fbd22bd1b574ee9cc5ed233487c
SHA1b7f53261c86682ae58b1dcbb1a5b47f33ddda21f
SHA2566e7ce74f68bb1b21c5a8158e7ce632810c60cac28ce2dbca569088b168361e62
SHA512a05eb9939b06913ded60782398096689ee1586b3897d1dd274b37637d276cb075a42f45fee146a908eab45ec9b1f527b114231337d53bb4368928b290e876eae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bd4dac04546a31cc9d03c6958b1af30
SHA19a6c96e7b8df42c6bf1f3a6e47db956b861f23c2
SHA256f517ef519777a87b82a28ef7cf7c5beb3a635c08658c2935e6fa592cf9a62dba
SHA5122242310ad0294a1ff66afa06a7a8a7778f22ae82f1e4c308eb33713eef6f7193456ce2fbb048bde63803391635d7e6c109926d8cb11d8381eccb8c99ee417a38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d317750b9cb5d00cbbe711141d77b6eb
SHA1c1fcb8748d21cdcb81424e4b41c3beb0b90d946a
SHA256f5025d85372ae28cfed86e79b1380d1709d272ea7b56d63fe48ca0715489592c
SHA512207c8461df0fa1d8e6c496537969516c583322d82d2fcbbea9d8658c960ac29f55ad9b1bb90f0c24b0243a0f870c10d5e9a9f03cfa08f900f47b7e3602113081
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5197291e1fbfbb074bb9887cf2790400c
SHA1143ede4c18304352eb918457f95aa7c8bc674358
SHA256b7d1f6782e875e84970b13dad5675835fcc90bbcd3b395d087f14d30a88d19c8
SHA5123fecfaaa8a1191a17c970a167492be7abc841fe5787b49d6008a5bd445b02eeea772ff5892d4f5c727de3362649596bf1f908abb9cad67acc91eead955bf9ef7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b5d078cb4644f98ce8e47e4bb377b4d
SHA1ec19b88848662f13e1623042b08a512f0712a166
SHA256dd51ddf902ee4ef76d6129d859f01f90ebee084f1b3e1a066d804ab0d84e4d40
SHA512c857e40f27a67e063e1936f43cae5555e82fb762f68316a3e9091cbc8ebadd5a3a6e09d2391981d7ba82fbfae51d5a9ef46f4b56c74bdf2048446eb8f0d3c865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5812da28d3ced1bd9695abe6e19e1f672
SHA15d6c88eb03fc4debfe9b772ab1bb320b00271cd9
SHA25697ea532d58942ddce40d30ff531392705ef0750e294b47d8ef48b98f0d96e430
SHA51232b7487272b5c3fd0bde8293b9f612b56e7e12ff79dc0b94506d536135940ead813ffedbb67fa098bb9f9175c50b8b4f0a32ce2b98fcf75e3ac900451193f625
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562371e19fc9ec64e68ede4aa255b0806
SHA1a79a9beee309b2151e174f8916509e65a417336c
SHA256c5b2d501151c9bbcd8e980be7c41f91b38bcdd6fd55534c78d9d9b2e04e7358d
SHA512b5d924904e6469889005637c8a9daecc15bfe2bf3d4871c6ebea1bc2a781a2c6153d0dd870284e0e208cbcf51869e6b051c3c0a8292a017f98e2b7373f60097b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddb74082b326fa21b710246565bad7b0
SHA1be75c0714e448846ce0b8a8163b47f574f1a456c
SHA25623766bc5c2b2db64694a271f6fe2e873e69b439c084c4ef1e43d9ca69506b3ff
SHA5124e710842604c1c6a48da971670fc550861cfb9a764e89d79ea8934ed1f1046d623991f52d8c60e1b627f8f1c99c69dd9ee1022b20be4c191bafd1854c2e992ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519a7cc04952d04010af68eb6c853727a
SHA11d26791e17fd8db7f4c767263122017dcd79f71f
SHA256cdc1c541ce788d840e7e13ae6a81bda8b17f86b48eeb11daf8906c93984d6c2d
SHA51270d8d94e17c1bebbe684102838423e3c8608cd684ac6ea330c3de79d243b429e3a700368cbeec2b7eda16de54f98501108f73fd9d9969d0cd5105ac9178b1398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50455642036fdfc185871b6e4a31058c1
SHA1e5ef34343c23a43fd58c2b867274d32cec66d896
SHA25631c96240017ead1790cd6ad71f85cc59bc1435e7b9c41943a45fc8de03eafa65
SHA5120e12e3723a8bbe7a213199eaff3859dfac4efcb9c709d2d76b17371e03414bc9544fd678a2e3c967bc4e83c8ba322967da84363c9345e85512f18b1759a1cf1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b05f1e34a80d0ca095d3d1849cb91a4
SHA168493b7ecad4145369d8aa9df4a0279df432edfd
SHA25610f6a06a9acf1ea212598c7b856c530f4cf83c3a0e128a11661749a5fc76b4d3
SHA512e5924ff1146aa8526aed3dd33519bf8271c36c280f283e0f120424ecdbb83b24f5b763d4d09f51f2a97171efd1f1bc371ad5546d5097d883db20f775ba139b5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58188c61b4c20553e73d7486ef0e0f8a9
SHA1a7ebaeaf8d76e890e0c5cc3067073b46716fa312
SHA256ce8256af05f945f6137dabeab1160db1be374d3ce4f9d3eaa681de6b0207a229
SHA512ec4196828210890186a18ba21346ef6c160a519c8c28851bf7b79a4d6439c7dd193b1731f2d572b1f9565b33671fd592c5c7baa979b95b1ff6bd8752c76df12f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598e9032933b71ac74d6230767749ed6c
SHA12d31e844bd0654d3df7d5b679bc2c477c045b705
SHA25692c24926cac9609f117b640c4252625d6f0d4e127199886f7850ff6f70370920
SHA5127b581905401643163de7105ee745d896882cb783933efed7c7ce117d428a245c71f85405c139e4f5aed3f64a2607a05e46f9ee22b9fed0218604689203aef43a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b