Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 12:28
Static task
static1
Behavioral task
behavioral1
Sample
efcba6500dd27ff8c33c311150307d24_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
efcba6500dd27ff8c33c311150307d24_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
efcba6500dd27ff8c33c311150307d24_JaffaCakes118.html
-
Size
36KB
-
MD5
efcba6500dd27ff8c33c311150307d24
-
SHA1
84e6c1df095571bb6be2959961904e678929c403
-
SHA256
c561aa2814df101d2566794c04f155e8d14f5ca4db723fabe9b7274829c6861a
-
SHA512
b70af62038008a7ac61db6df9c063efad175cd4e185e32dfaaa71e7503df68e922f2f3199b544c67bb37780451bc67e3ec89d40d83c14d29bd96040177184c31
-
SSDEEP
384:F1SaI/tiEM/Jo8K8ztXtLPH1T2QSZjOHxTEf6I8IxGYtXaMxKunRT5JO6Vs/axKn:FUtiEqJ13tIxzHJXQbKD/my/XwGhuWyd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433083592" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000076a0702c987420531e9c0595c7eb52c884710d78297933b26fd53631296a3b6d000000000e8000000002000020000000b7a9ab4bce55cc695ea0873f63d6e26df461873242e56be76fd0ec73e5e54037200000008aed706383cef477020a6b8056642e4fbb6f03ab6fbfdd6ae587c238b4d7aa7f4000000085ae0ca2995947c86f518ee8e5d7325d39f14deae589240d5de7892d8a480ef1d32fc9c07b2889991f6a1f100810bd3c4c927981f335d07ff80749f8230d57fa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000007cc465309f458bab4bba8e0d3f18f4133b93f2a5403fc5b07a025d6b309ab1a6000000000e8000000002000020000000feae06916be8f1bffc103b68c619d2689fb61821080da764eff60c3cc42e2814900000006242fa6be9ff444f6f4f32d10fd0fc552f61293cdd44a59663d9649eeca916c7e751f968e1c22987978c3b087d8679090a20e00c3a5378d9873bd8147323cc0a8c59b7595b665f9ca6a32799a19c2c382a00e136e6366516a87d118551b8d648af4a8585e8f2973af22cd90f3f406497f18622b891d11340f24d7521eb5679357a3d5d59394fac9b2a3b6687997432f240000000c129ab26e242a4f43867b1d5500e5c9d9c5392f5fbcea48984d8c5e0bbbb3c897e20429f03c3d5d19e108c8cd7cc8e0e6288798ce18fbcbe2bd3fd8e74358a92 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0B6E19D1-7815-11EF-B40F-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 603a9501220cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2388 iexplore.exe 2388 iexplore.exe 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2572 2388 iexplore.exe 30 PID 2388 wrote to memory of 2572 2388 iexplore.exe 30 PID 2388 wrote to memory of 2572 2388 iexplore.exe 30 PID 2388 wrote to memory of 2572 2388 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\efcba6500dd27ff8c33c311150307d24_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e073cb5b66bb43cbdd38667e6e578ab5
SHA1f2d79a4a076f34e97a0cc95dcb8fc66113d9a1ee
SHA256c81b858f3c1ec264be7b2d839c3430a74f132f0f364184532e40355b77c4437f
SHA512e901ba31763ea31cea5c6ce75061c16566c65927f3dd378e697a5dbff01c0945a0141d8a41bfd751e23000c03ea06c482e9023f3cf5699b9f61fee855ecbd613
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe8df4f0a8dd821831102abd890e57ed
SHA1066608fcc21ef1150db260d8fb963735a20c0009
SHA256f03edb0dac197abe5e65f7c23c1d798504837e3c4a46ad9ca9cda528bb53b4e8
SHA512f9d5c395db15b0145c812a092f6633b486c2d96406274d2569ea5253f32f465a0d7b8af3185c63c703f6d609db998dac6a6fc394839008f7b604b9db8db53006
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfa3e551edc7bad376eb7ca037e57615
SHA162e80ea4f2e33c36c8e6455bce3ccb86229247fd
SHA2560f0ab9ec9a684d0cf917f18520e5e035f8595cfc17f87c07e4dda084b1e09abf
SHA512ba3b8854f3ae0380812508e1813601efae7352579835c807678d15a671f8a7fd65cae73e9f3e77526212565153c0317c34fec9cffde7689958b81ede6fdb54df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e727014dd188d47058b2a04d7a877daa
SHA147eb27d9328ffddad4c081c294c0a6c6e522877f
SHA2563b926d433751a7b01c4cc077f8f261199514ae214ceb25841d565479df3767b1
SHA512340b5f3fda7f98b80e044c22a51c2b7d01d990f69c710c73787f834298f694ef87bbf407580dbdadcceef08222d9bd6f9d89d7768bb441e2a2cec41dbd75e2fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509267ec498bcd477405d3dc8ff950b6c
SHA1e31cc70f3186051b99bda3688ba62f9d805d0a19
SHA25666cda60466a5b66a26365505a7bdcf3e56b206a78a87f49da2f15f5e77ad0c84
SHA5128a16eb1a3168171e1b8c69997b374bc4a98e68f92623547539722adcc75ba38186589dbed0e26d8a7c4146e478d9e26e1c6e31c79eacae8566e0046b2abbfc03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5507530e4cf295fe952ed67f211e7abe6
SHA1ac7a4601921563e8ca1b7f2aa259b0dafac0616c
SHA256b6c7f6e99210e41dacf90843410a6c54628abed036119354281394abebadc7f4
SHA51296f128e502dca835ceb2f1dd3a226be8973c8539fb97fbba37f85ff3323bc77b971e64af1215e28779a551cb74e7d0725386ed4e0299f8aa2ecf5a7a45eaa9b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5487af92d50a18754ac0b9062df128edc
SHA15ebcae7bccbef5f4ff8711cb2ed091810dc38968
SHA25603b3397f751e3781ff33b903c0e1463f6a893da5fa7b8988b7b32e8e7d22b0ff
SHA512a5037d5578995e9d4e67c392236f982ea2880ad2675922cbb055ee9e2c199267a28babf20558b9467914c58dba3fa74ec528e9368581fb78a6e3585f74e2c19e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5169434dcfdd353932f29e5f3606b8f10
SHA1689268468022a724b46182904ce9fa76a8faf880
SHA2560c84ff667c9ec2ca16de6db488af21a5d302cb8add48bdbdc354de4f33ebc688
SHA51233239116ed87249c623b30d48803d03819ff8301f29747bdc479986e76dc54c1d4dcf8f7e4654c532cfe2326b55d8eabd015618619134585904e557d51924d20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee622adb80f6211e38fa3c89a8c03bf8
SHA17065c1b6cfb874a4b8f6e23caed45bbeef1af35e
SHA2565529affe0345420d62a880bafb96a8b9c85be0e8cd6e10dc5d80fd93905749cb
SHA512ee4b769d342d752f459f6298922fb823ece5cc6ce9e813593192459996e7badfbc732e17f46c0c0a2cbb90faacd41dcb839545932fc26a97e7267adc5f592afa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dff0e8254e5269aa9af30dc6b3092dc
SHA1a7cd97d1e67f8cf17695a18c7d9ef16401b1ce35
SHA25674dd6f0e28415f75f6c8f30dfcc10cbfcdcfc898ec129f3471ec56577e425686
SHA512578b7370ff44e5c2723d8b0f9649714481f90a3f6a94e58ed5ed86758437901bced0afeab96ef3e930883decf86aaab347aaa2f4b804476aa99bf12329f8ebdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59eb8a3588e6b78254d98f8964d0de3c1
SHA16933a2012e068b31e6f6f879ee107cf4137f1005
SHA256c0032f1a8f4ee4458e3bc965312d23c044734c2fa7763a74585025133ff2c69a
SHA512cd4aa9bf9e8eecdda10efa570c6ee9fd9e6a23455a1b6fd1b0eef4acdbb58683e65e3d2efa30127e6b7859bf42c70a62a505c9f5c0bba4aa93812ab27a9d64ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f8ac291a814278908b4580c55d16c73
SHA1a4bff69945b64cc4bb3b0487eb52249d7e409a94
SHA25681cb0d69118f3c95aa8dc4b5a3b3c4f2a3934e4a9f14c02a874476fbe41d6263
SHA51258eb52bf2024ce229d617e3452dfc3ed353f0f91f467044c5ec0a87bea98988ec47e1b1bbd5cf82840db473fa57753abe4becaa1481651c88e1c0c1fdf452c4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f472cb51710d29d2870eb5e26342c16
SHA1afa8848d2e59b0916d9a529e8ec648384b5577e5
SHA2560167ad4fb039fbb5d99b4adcea163198abd5ca7cc1208268725efa3dceb926a1
SHA5129040ca557e2b8d79fb76e594f3f30b8d47e449a3fba4f914f187daf5a99e3e3f2b7c0736caea4ec029b34df5600fffbd5a2540b384307525fd16a67682566588
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58428b46f59d4f767bed2a55fca84418c
SHA18435da6a48ef84f67e5bc44d32c77b3afcda163d
SHA2569288df8b052ddfb90c61190e2665af3fac4a545ddbc2fe5d17ea079f8cc73d9e
SHA5125f903aeff9e7b86bf73fe07b8ba988adbc2a4afc8597fc0e01ed2093b108c7112220872bdc10876ab2e96bcb3bd385911a9e2c4a64cd88359b3c00ec34e8d3bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a7806b4fa4e9441c55ca3a9d5e5acdc
SHA1c0b53f0d6de5beeeab833488cf2adbbeef9529a5
SHA2569668d2d5b0e9a37dddf82937e947f0cb326012d77fe7ce59068159eb9862d6db
SHA5122e90035d449ff3be454d50b4622eaf18f7906a02c77f737d5f565576f8c00af4ff8b45b9e27e4152d76e8e9de9595106f21471171c9f9bd69809c5451317166d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a42bef70736a555f4b4497d95a880e33
SHA1c5bb104cff805abc4d4da40fcaa599039bbe916a
SHA2568efd6a0aee4bd28314d72515d50b897eba7a9c93014813ceba5f5c36885739c1
SHA512b459482ab47d941f4c21dd857968733455ca1c33895da054dd2a28b753446084ff39537e002640d2d67aca517cda2d30dcbc3e130a8e880e323579ce08c3ce7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51897b28dd99f087a9ee757e4b1313b6f
SHA1f9297cc4ca596edacd532c027287bd8713524508
SHA2565843117694346be2a44337309b67ded407995b88b47444895c124bd2db836e96
SHA512ccb869a81edc7c24f29df47c2f258d01ace773f30305bd2f78f5e69a2d27b1db2aef5c6d287b79bfaaf078e048bbfa3127ab4002559130bfe239a69e3dc5fe5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b5b6ad05cc2e37592542de96bb8f6a1
SHA10768ed997b5a4ee854aa4bb08dec32a3872cceb3
SHA2564b6102f2fff99df12ed24b5e2906d67e2682d0709006a7946b361eee36378255
SHA51290c8d2f0f0a412aa584b44c0b822e3ad24e09cad04891efb814e6329265a3bbed8d9a279227935b6eb7d1e16410729e3b82520e73df0d51ef2014d22cbcc2447
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eca1207aa93e6a5344e4514f89b62f65
SHA1465917a5652c7f3f3ab121cafc128461ecf7995d
SHA256d3e5af6d7439a619064153edace7a0180601481c3fa699e61067c117542eab57
SHA512b88de1d2201ac12c582e6605fec33ed13018cb899b7b7493d29408ebb8cd89c45a42c8911e192f654e497f524ebc085fa3eaef6dd722fb40f11e6db22f29224b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b