Analysis
-
max time kernel
140s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 01:37
Static task
static1
Behavioral task
behavioral1
Sample
37d2c7eb2729782daffe7efa0134bb3e_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
37d2c7eb2729782daffe7efa0134bb3e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
37d2c7eb2729782daffe7efa0134bb3e_JaffaCakes118.html
-
Size
138KB
-
MD5
37d2c7eb2729782daffe7efa0134bb3e
-
SHA1
0f8bc3e56d961dbcbd75a62c7cfc6c49501955b2
-
SHA256
e25f69b1e0edf27851a3b7c71f1d31bae8899bb3ca8e944fe4efb925f10e3c1d
-
SHA512
c99b162f6bb60bd43eb351c2c984ea0801a1cad985dc130da05bdd658248d7a6c18da0b6b46a64440fc9c9d3caa147329bb99ccca7fc6eb8b677a188b50ed3bf
-
SSDEEP
1536:SUFJ/gllfFyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:SUT6yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{863239F1-883A-11EF-A429-7A64CBF9805C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60c75f9c471cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000062702c3dd7673589e8551b0dbb2a3da9b5d8f98a2f13aa12fc3062179caaac4e000000000e8000000002000020000000b2d37cc36d97239d755356e80e63981a8190e493589fac1e457b299e11039e00200000001405c449aead632eebda568d7551c9e1ea2108040652ceeb8878672a2e7f8ced40000000a2c568de857cb7fc71baa12517551873f59944c3755e20330a550edddc7275e7b79ee113db7f76181bcc133fb12276d272a6f0609c7bf49917875c932e265973 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434858908" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1760 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1760 iexplore.exe 1760 iexplore.exe 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1760 wrote to memory of 2160 1760 iexplore.exe 30 PID 1760 wrote to memory of 2160 1760 iexplore.exe 30 PID 1760 wrote to memory of 2160 1760 iexplore.exe 30 PID 1760 wrote to memory of 2160 1760 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\37d2c7eb2729782daffe7efa0134bb3e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1760 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537e4c058136841cdae711d5aded8f2ba
SHA1bd223ebb14d49d6f3efdc9dd62fc5c17da723d03
SHA2561409a7ea8bb0492e537495c8c5d9710517cb52d5c7d4b748a02bacb06012fc16
SHA512f6532b0a35e274e0b0e88a23d0dd8690a7450fb4f70955a144819fc191929ae421f49de5e63722b52ea0c68d858af35269237679d890925cefcb90dd22bbfcb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5117ec27273e0af5660b1d21eb2881892
SHA1e097201872750b12fe70c1a22df8d239e68249cb
SHA256da193269c22077a523ca9e24cbc25e44da87a4b1de3219f0397f046513fad248
SHA512cf2e9a2a7db268d475db02107fb37a18deef64509ac7084b3c4f528572d3aa2411aee5b459107489e62371afbbe9c08c0594f5f561d95a006a1696d4d0e58e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c71c46fd177f7a9fe31239ebd80a371e
SHA17c6ffd1c464a6795f5ab41ec7684c64c85d4b5b1
SHA25698c02196baf073d6fe8c6fcd402b50cd9f607384d76174fce2abdf1b7325885f
SHA512ca9bad8b9c0d968d28b2393bc357481ee71a26658775ad21d29f8c9a5e035c99a2c5b72a5a2b642dfd880f032f26bcb3d358a8ff503e0393cf8e6e1ed8b48de9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e62b38865f89cde112573a60005bd73
SHA15368f1c4a4360414f9d238f219ee1f236d110fd6
SHA256e065b7354674c99a75b3b74a9e9b14aaf88036739ac5e024bc70e09f0fbae553
SHA512cb5abe1f40abff445a3b72135ae544e3c22fd101fcdd3901a2033ede2a1b1d1ea005cd50c861125e30c1876d5312859ded1b14955bb76eaf784440cc5d1fb830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7dcfb66601c398abc9311fbeff762f0
SHA1723929be8bbc54e1ea6881481b996725291cfecd
SHA2560a9a763646e7655a2d13f498eea3d9b1ff9b251ade991cf509c2f798ad7a1432
SHA5123de0589b1365374f43726547c8ee08f1ec06ea4de602cfc41a6e14e782e159b4a99ebe136a3b583cc5a92881d3db7df2e60bd04dced2b35d81aef1823fc46100
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5795483712ce2d68fcc9a7dca56f78395
SHA1715d350d3695afa1377f4bd979aed8112150f058
SHA25661fdad67b064506027323e463b154a74783a1c2ad693025b1553bb60df809e5a
SHA5122ad579f365338877cb29f4669be51c4009ede26aedbfa19d75d02b787a35dbe4dd384dfc6079cbbfd6d9b7e7bd6cbcf9db578a037c39002529ed8dc54ca0e8bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517caa1ecae9b7c25434894ce6ae46669
SHA19cc9839c3249096f2eaf52323c775e7c749a850d
SHA256987830c0afa70623e4e0f9630ae755a38fad521faeb72b765490d4d9a282854d
SHA51214da6116b2fec34f7d060cf7768b165e8ebb766245059a0ab5543ddc3d32d36afa9be4697aa495e204793e7e77a237ab1943a1ae90bb04b7309d6328ce369826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5002bba0f2cd488d7457cfe5c3b2cac3e
SHA1491ee3a6f7a138e26ba548507754601e84b00a74
SHA256a8d39b1c1c55ef54d93166633fc1c80be9739888f8481a8efa753f530151a955
SHA51290d42431444afb84a83af30cea34f312abffca59c2570c01ab3bb465cb9caae0004d1d5824853af83e00450507a424ccd0adbb37264f714588b4503e77695e77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5fcbc20a9a67d141d1df92c77ab139e
SHA18ad8ea01144b28b42670bfa7338abef967142900
SHA2569d40a0d1e42938d29836e30ac80d6447118a60c5f14dcc22a29475bfa72b5f94
SHA512e1b63d26bce16ca19f92358f1e70901de17060be268a22bafaa5cb94df324b15e83c5870a206b8cb7f34f82d99e0da332a801027bba04c0e7cf8a1d0ddf8cdf8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5559eadd473202ac0c9ea8d37826b5fd4
SHA167bac744f91a6ed5d38915f7975104161b30943f
SHA256f482f61a0a620a8eed7896558311af3d8378bb97d838ad115118d25c0e74dff0
SHA512c21a6279d8960ceb501016b425d81c7436e62684c17adb39d6996f3c11b7790f653a09147694dee8a55cd3c616f5417bfe953520694dce6c4a05be5858f7bfd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589dc1efca4137c141e56077410efb5db
SHA13256b67ad1eb729fa35d37c6c0a571fe8af097f0
SHA256854ee156be6c160aa945f2ab9e34cfe80a7cde306b007d5f528310edf935f7b7
SHA512ef1bb6b2e3f6346105902c0453ef36a5cf9fe3b051b9ef5c5b5e08427d969fd86a51e3c8662c51be124afba1304ae1bc7fa38855ca759e72a7daabf8c3ad96b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5064400ec047da95b54300779d6cca738
SHA1659d83075c28745c11afc4c7037521d9d38d80d5
SHA25692c60650976e3317afcd386b3757caffd6718dcc5b8ab81d2d8f204554f26206
SHA5122093c9fb24095cac9ade6ff545627675e08e861cc2f844c97acbdeab8ee1f34e4326d8fae78b65a32192cdc7b0ee6bfe5e645934792624d49dd39d9d9b5d9216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a51ef4134d6b7c3f6cc8427d1af8ae7e
SHA10c4ab810af82d6181c0380a2cd4f0b22b5356d31
SHA2567a21e2e6128f5e66f1ba64c5f0ab41f6352273b52825c03cc4e8d47df81c7a78
SHA5122b5e7dc26aec40ac72d8d5921376b4d932fb8c770953a051b7ba9ebde54f16825d45398ed00c069262fde2fe021a3894cf2eb072142ea7049f76d8a9b539034c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf3becef501c311997cf823815758d2a
SHA18f13ceecf39e2a6f11e572e1e7ce620a2c57604b
SHA25688181c15e4811a3d9fa49c3e1042e8630fe4293974ca9ddf1873b00e3a1f19d0
SHA512f7720f855cd0895796377902045c5b696a4fc2c6afac53d302f8257bac07a10918eee432e66c4c77136d0e35e8f61b230a8ca425fd89a919b92d22a17a2a8b64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb5913392f8dfae069729d92b4fa74f8
SHA15c06593a345366d5768c1542360c05424ea98391
SHA256822471ee7e526174d9d296186cb1fd6da21ab26d6b88c914939cb81a74dff725
SHA51281878951a0b021941e2507389989325e3e10d42d61708a821f471f37e1d10b8153bdf98690e909fbf638a708d8ef33f5282e42f2c482f5fa2a372abe9400404b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5952e4873595afd25f8ae210dc494e9aa
SHA1719d345af50c719e1bb797213124dfaf3e99df08
SHA25688102a57eb96340d193082e8e819afafc0bd5effde7ee260028a9ac2031e935b
SHA512f612cca79d4a1bff4014ec9d9007a45c0deae425a419d776e8ead3cd1983d435706dcd7be5f16be08dedc8f449437128c2f728fe3e610623bcd10fbd5e581e06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5645cabedf7fe1788b3b493b5cf298c60
SHA182c645be0fbf65bcff9b4ba8dd7626e535da159a
SHA25673c39fabd5689e06eb44876ea1a36bd3ccb52676ab894a57559c7dd340b6dde7
SHA5122a6f876d5dc1f37d39d634b5c5fb1af26d4401ca96ec0e88072ebff1d460114c2385576d541d63d59903e2e5e44e765232792746386f587d180aa6f5f824f6b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9f96807fec664e3af6be0d6003597ba
SHA18c385eabf95d59eec38666b07a114b17b0e14584
SHA256c8553441272d45f42dd892677d1e81f3fdc2e5e2068e539e1bc58433c7845463
SHA512156ea37af547db7d9569a01e0db5eb6e9f86a8505a3faaa208167ae7a56e20e5a515876c205d6a1e07ef13c4191a14118b980095fb6eb50d86b2d601e36e9573
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea5059e3f3a29ec84542b4e93b4dc148
SHA1884f4c0b1f378dfe0670fa4edbfde6c1f6e6feee
SHA2566f143718fb7065b5e606eac170c3141f0f7c19de23751746ca2a9ac7cf401ade
SHA5120ab0a6baf4e9e95387afa68caea0ed1870fbfee8f16b621ca27cf4f8232b6e1f4ac4a674ee30ba6bd9d0be7c22ac2d3401ce2e55a875370507e2120a343d9a9c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b