Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 06:54
Static task
static1
Behavioral task
behavioral1
Sample
9d5673670b5df34e6c1bd9f7b89155e1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9d5673670b5df34e6c1bd9f7b89155e1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
9d5673670b5df34e6c1bd9f7b89155e1_JaffaCakes118.html
-
Size
11KB
-
MD5
9d5673670b5df34e6c1bd9f7b89155e1
-
SHA1
aa862654f1c439e533dcd6d3b5c1c44707813b27
-
SHA256
d9210b02a3c62dce75a703f10176506752f36b997d1c3a8d56ab35eec8543c2d
-
SHA512
03149e838a567b51be141c5687232e1f5fbfdf4261595f4c718628b1fcd43511253b153635ad226279aa090a25cbfe11b52502cfc881820e20e6a189d7935d23
-
SSDEEP
192:+cZpDJnDk7J0L27wikzHj7O3ZZ+q5hRPimQGHu:39naJ0L6R6qJiqO
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0046f93dccbbda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000dffb12e452fce54fb53e8c9fb036a992000000000200000000001066000000010000200000006bc8a25a9d0dd7a07ff6f0255dac87f5f622cc4d0add3413238a18c797353517000000000e80000000020000200000006ea1605cbee3e672e61a1e335d2f3f6e72377e069baefa91ac1d25658385189e2000000021d6f36ce37e5324175148d8dd239d94d156709ebebfce246e9a44efc9fdea69400000000667f622e5b0cd545faeb06d26921b18450f2e6aa7118c74b1065bf86915a07bef5791f1b53c78c5d663dbcda857792657192390d076e29401ded6a66ad15e8e iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424250721" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{69709771-27BF-11EF-A01B-4AADDC6219DF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2936 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1964 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1964 iexplore.exe 1964 iexplore.exe 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2936 1964 iexplore.exe 28 PID 1964 wrote to memory of 2936 1964 iexplore.exe 28 PID 1964 wrote to memory of 2936 1964 iexplore.exe 28 PID 1964 wrote to memory of 2936 1964 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\9d5673670b5df34e6c1bd9f7b89155e1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1964 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f885cb93978bc32525adf0e17f11c1a6
SHA105cc64fbc40e42147b195ce750026e919b4f7de8
SHA256933506e5249ea49b91f4bd8ade4d54cdc73d0a86c53d5e8ad7bca390952cd28e
SHA512a35886da717eef25728de28a0c1fd913e9bf9eb437d3fc8066a5856da28fb8d552099e7d2a91480b893eea18e12a82b3f1437d3fc5d000b13eba7a4bdbaa794b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59425e7812734d80254679727d6c3548c
SHA18e083797e0d16bc65310d9ef6771e926a989feee
SHA2568645e301592128c932eb07a8142f7d63834e3b2c194fd8f93193208864ea8323
SHA512bc91e16c869260fd4a02b3bd9b9735f6828d800aeb31c9e7af61a954ded30eab743b065674da0ead0377f056785a2cdb08996ef8ad9822c2ff9e4ee675e95365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5503a746733b3dbcbc03bec93b03c603b
SHA12009bd822c3de30aba76c0ab7b44623ff0a3395f
SHA256de51a2aeafa0eb01d526d5f2fac2c47b78478bc6a6e0b02b6b90af27c3e3735a
SHA512ba34b68c44deabac1abd101f951ee3063fba03b7fd65b218af69f307c876e67804a78b7db8119f96bbabc5b9fd84c54ee1801d3248ac7c3dd069b23b627d5d96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5485af899e353ae525e62d4ce7713a50f
SHA186853fcbb2269a4d38541b7c27f92c02e5aca36d
SHA25667e1ea355a3a107553e76d921f5319e0b90f59e98eefbeeb3f2b85288fe17e08
SHA5121dbcbed7df7961aaf2b737f94c64b1ff66c3b5e07923ed7a99b06a6fd835d05e4352388e98219c6531a838e3db6836948635865c291c059f22de5ab3d8bb549a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c61fbd2be027ce79fdc3493bb7fcbbb
SHA1de57865d046d59cc6e092512c1ed403edfb2daf0
SHA256ec2d9947d8c4aa2cf36204a4961afe7c4095b0bc8e3ea16f9dbf2224ff74d5d2
SHA51215c26f9c24e1003ee74beaaf5dfb1b135dd88eca177895bcdad7711de6d08e61015452eb11e94b1b931f6db27bc8eb4470b7b50b5916e3d046e5b77cab975ee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52273571b942af856a431d77a129f42d6
SHA1b5f96a735df9ec759ba126744022b568a7c3d357
SHA25643707c696ec5baa9158e281058d53d4e560e9bb7b9fa85dcd6216ba613359ab5
SHA512b6a63508905f33f8650a8fd973af384a7801076f71a30bbb0fdf827005aa1ef317d549c96e23ddaa7ac8704a777d693caa5464f17eadbd58679f1e2d1620ba7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a4ae774776402432ff2838d7d148d57
SHA185a4b24d004d727cb70401d3d3360195aed12c77
SHA256b42ca90375712f82d2776cf8108d705ce3e3a6ba652e2ec13448dcee125fd610
SHA5121045c0d1f8f6cbeb25daf33a35c31714a3bb13c14eb86a2adebdd8496b24184c3b4c87bf48869496fbaac17d1a55bdfe7219dd3ee7640aed7dc62714188f1ec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8d9646d5e28b34c78a3412bb04eabfa
SHA112e7bffa17939e149b1805864f8226a091e58589
SHA25603ed948473f8fea1903b9034046a73cb7083533e560f9e87e627154e87e2469d
SHA5129b0cb3966f2f9879c0d44d39292fec28815cdfcfe6340a6496dc0542022c435a4028510d754ee652408d391d7594ff2bf0564f32cabb7c71d33b7e1278cabd19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a289e7161b6e110e9dfcabb3c69207b4
SHA16395681039128b67ba0e904a34654f19ed09b390
SHA25648bd2b6b80e63ae81bb67f3f223c00004e4efbc08be03d0fc3edef201c0762a6
SHA5123a96709c19909f445640fabd5d22f05de9062fd2280adf41f11d8d534f939c4fc75b767c8aff6472a8b1c37319b1908d378137ad82c50bff6e89dba12e31705e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8d30205455cea0d513fd0c984a150b1
SHA1647dc5759e7a32a493e90229b0e2d6445e889ee3
SHA2565b7c30b0a5b52bb3f1e9b0e059e704a42d97016a5b389ec80c497761bea4f215
SHA5126344c21bf1e1813dcd32a6df7c09d124217173c2a37b12d8489fd365af7ed5c6719508da27d431ffef62df686ac22b0414b206baa15b9ddc3d28a3acdd50745a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f05252d8ba4be1434a1ed1ccc243eb00
SHA1c419e72e18010173aed0a3f8ad596b9749b3b733
SHA25637aa0efccc9780c4b8be2c83e6df99c6a940c531b17b76b73f8b71e9081f9efb
SHA512a21703ec0bb556bd62657c8f29b0c1f70fe3a8a2e71dd2bc83d450dc617cf671fc71f81775bc0f24e3f90cd7163c2dc04b7bcf1499f43456b9f840132d5a63b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec4a5c2f9fdf3476107d3bee15f56c95
SHA152044522297f92553136e6f2800a9c61761bcded
SHA25685e859d64c10d2e43cb361662c4096cf44a20618fd35af655acfad40d3838105
SHA512a033e654a687579626b3cbddc6033f094b65b4e3352b9c3904bf53be0216ac986bc8a8d2334ecc089f57682cc84debeeff2e56faa3619d6c676cca44b9c0883a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b293abd2d050c4c030603069ee96656
SHA1ae237d038f04bda1ee774d1addc49fea1fe12f0b
SHA256be079767f66f0574fb6864e942ccd8abc49e3a15ac3e551551cf17a98e125f82
SHA512dd6f0cac3e0353a326f0be5f9cc273467b6a8715069717ef0c4a50b5e475e0ebe3c603c2ad53bf81772b8db8f58a9a01e69002bed8825aa2d5b499fe38d56c14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539241130a90349c6f3b8b51d1b642663
SHA1658a470458552e5649e2570f084842be92d3315d
SHA25693e0e79791b8ae206b293402e44f234372281196334a91a5ac686562e76d56d1
SHA512dc07093ee4a906d7d193b799b35bd817a31679bd5349651e73ba530a41caeb666aa78275b4450c5a4804dcc1ab6db45506585f2e34538bf2e4f2d0c9359a7592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5f4168b1ba6dca716a3323daa3803b7
SHA12f8b1b0538813d0101e3b056c8de65815b619774
SHA2565919d7897b0af9804a5b58698810a2df82b970b7806f267b560b890932688b23
SHA512b2f60558a46f9b80deea19e843dedcabecbb67cdbb930bd6e1782659f9945e397b753ad0fc57613aa06c2d4a64713982ad76818c17f805ceac5e8b7ea784bc86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5144eb24efcb00ed55654bc1114b3a0f7
SHA1370b48b80d45d722f4854cb9362293f96e6cb2c5
SHA2564c9a78be31b7f3826509f0a7960ec147ec2bf73a1c42f919e2eea55e1eac0ac2
SHA512b49ceb1faa8a2d1ebff9ed0ee0ee9ece28e32f2005762ef284ca5e4ce595a89a113334c546526813a2f85a09eae9b39a7812434db194bd33cfcc88ea8eaf2d37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d97644a32e99860a00d7d1bd483cc96
SHA1c401c662a432da050efe23a7ba6bd8ed64cc9120
SHA256f406a742b38c4a462657413e836f0df1e235f044d203297366f1fba82be4cb8f
SHA5120ef0543fe7fa85977548912ef551538ac6e00ddd360a5f7e0cefd8edb666c3e56226a58a50d8fd1f59cebb4cbb25bec773a8b2358d0a7504626828098f9bd47e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5484e5e617f4ab26bb3faebb3984fa64f
SHA113f7333570a7b5cb799e4a10509e5da37833e173
SHA256a2789fa0517165307e03112126a07d33c0693c8919b0a02570b8c47a2c68d73f
SHA51232ff8719041889e25a820f180d088d1fe311f6abbf9c5cf62ce0c16c576213d2521a6c28ce1de234bd99c599bde730279449c9a893369a631c8a35039c91a3b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c932ef98450135fd924c69235f99f69
SHA19ae406c164842043d551572bbdca0b2eff0a1475
SHA2564ce80b10f957cc7b42728cf6e781649bd492687cab09ac6b5c74f2fd6ce53f73
SHA51216065665c6d4dc9020db4d7bcb1c098329ed85f705d9b99a85ec8b427e2af76e552fa77e842e2cf4df4a90e04ddaf3b06d82459f1b3fe9af066a9b4b731873df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540969ec4b03cd6842fab272ed7fd10dc
SHA15394113cc76d2bb8553377db98bd2100ea435146
SHA256a5a30ccd6c2267f4d1b9e82aaf9f0aeb57108aaa18a7005446dc44c1c58c146e
SHA51295a311290798417d2111ecb686935a14d3a4010ca0f2a9ef96bfd103a90c0c9db62abdfb8e9c7e4005b6556a51436ccabda08601c62913a55b3ad2062e406ff5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b