Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 01:09
Static task
static1
Behavioral task
behavioral1
Sample
767dab0ae4efd78e298e89d2ade08f0d_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
767dab0ae4efd78e298e89d2ade08f0d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
767dab0ae4efd78e298e89d2ade08f0d_JaffaCakes118.html
-
Size
6KB
-
MD5
767dab0ae4efd78e298e89d2ade08f0d
-
SHA1
9798a7b92569cd5d1a09b302a1cac5b397685e65
-
SHA256
477f34ffe4d15bc2bca733b6dec3e550a7e45d94c48dbde0950578ea2e1b2d90
-
SHA512
45de381d913f150cfce79e06fd39495e14ad93d3fcec8f6061b52a9af0abd0e1697c0f4e7653aa882be9c2e142e36336f57dae3bbfead7df6043b8acec5f30fd
-
SSDEEP
96:uzVs+ux7i1LLY1k9o84d12ef7CSTUzLcEZ7ru7f:csz7i1AYS/Ab76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c003d55d3be2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428476592" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c92000000000200000000001066000000010000200000000c29302b96171ab92a87ab865311dd953078ca57c2e9d82f219b9c51998f072b000000000e8000000002000020000000f19f178d6bca3ef1a2ec2f910a87afb7204cd4218da7fe9d8ca6f9566c72080a2000000012db04bd55720919c3a69e3a8df68f8ded04f99f9f455e057978591782ba87a640000000e8e36cfeabee8fa95110f847b216c8b5a17651b46f854dfd788555b41e858a18d87d88d802a0884b8259aaf5c5dad693bbb14837ace86bf5e8d8f08de0a369c4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecca440099c424d92937bb9b1db2c92000000000200000000001066000000010000200000004fa82d6b9a97f66d5db8781b990748c4ac79e48a2f511e9859606e379bf53dbc000000000e80000000020000200000007f0b66e05bbad07d9f1715000d9daf7a520c6698d1499dd2cbb40ceacf40d2a190000000170275f7146abf47c028c5629bdad6ad2b4f2d28d28410a778c1ef47ee08694e5925726d285f31dc64725a3328f2f5f8ee187cf0cf7f29383f74d6c997ccd0b99aeb17baa102cb28e5ad7782e1aa6c41d4ea43b2b14c0badff2e81e75b8dbca80ce39b6180d6394781a089188054d61ded23f691bc2a5d5c9a330e1def10a9e35d586d3a45902bb1b88bf77499a1698d40000000e4850ef2b53eb10133965de369382a8b4e6176a4407931165c386424ff8dcd55e0501104281d5e6060294669e97dff946b984d680c65a5020b2c5bd50a063af4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{88D68121-4E2E-11EF-A17A-428A07572FD0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2000 iexplore.exe 2000 iexplore.exe 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE 2724 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2724 2000 iexplore.exe 30 PID 2000 wrote to memory of 2724 2000 iexplore.exe 30 PID 2000 wrote to memory of 2724 2000 iexplore.exe 30 PID 2000 wrote to memory of 2724 2000 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\767dab0ae4efd78e298e89d2ade08f0d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2000 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5183243b3c351965819757bbf1a06d613
SHA154636e66a1a8231e96e7a217439c72f4566fea00
SHA256996eb41d4bd86028e447b191b7370c24d06ab1487d67fe228c37091fd56484cf
SHA512ad9f3945c2ae170e7456e30e100a98450ba91e69f9991818f3110a448621f1aea3e5f3e747880aaaf2db9bf28de3346c47ec6839f2d47b1d8e804afd78cd8f19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546fd6b1e59d3dd723647e8b79f9821ff
SHA1bcf88824d21c5216dce1d748de3c7cd223023709
SHA2569e981e85e520ef73bee3533524d614f789571ad974b854251a2dcec46f71e532
SHA5120faf51f24619904f4fed0d229c9d371303f3543477b2b2485a58a575052d5f1f6585029fd510591f5fddb14348de706ff813fe0c995139561df32a925738be52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bec371096a4b1a8f42e5752f58e8d62a
SHA14ba6a8168625f5fc728b6cf26e0c4cc9964f111f
SHA256c37365227116fec287bbd1b3517a673c1b621fbe4298d183580950cf71ec1dff
SHA512dc471d6832e8c8953b1ae932f23c4770f2ddb442652dccb273dcf1acd31f911d1ebdf65c0d6a2a581be6869fa8bb5c4641c17463dd06160c3ccc2d0e46ed36c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566e14b286ff29e151812c0e43c9faa34
SHA1c555718c6c979f7bb3cb199290fbef0fb1041639
SHA25620db7d68bfc84e9141088cfcd539b9db6df93e974c9659ee8c8d9a6eede394d3
SHA51229b1c8175f525c414e86767176af5634070c11340fae3e9264283cb98c69db3954d9862d35f132a25c413f0f2d7c875512367ca2e1cb726df8e59a87156edb74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc33643a33c744442b9382bf12d7de58
SHA1dc4d303bbbc2786b98c7bbcec53e7f6471b5b0cb
SHA2565ea3b26530dfa8873c003caaf4086cbedfbb8fef154e8bc29d1694b01b50c7f1
SHA51242d17c6252ae2c05f596837e82045306cb4f6d0c79bb456bb900d8749fb03640fef155ae8c4bd9e962740fdde6a4cf34fdfc184b68fda09097204d35ace95991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dda2b2f3da88c12638bf32e902bd1dd
SHA1497e27616ceed3708f9fc3a1d2d4b07ae4606113
SHA256f598b1dcf346cf2980fe8e325000131b73456ed8d8397ccd3e925c1ae2045aba
SHA512db286c5ca6404d3cbf50f91fc51e29f3dd2e0f5bdefd1e96369eb14c10227c94e60fef6cd0236893281ba369b3c1373bcc22f35853364dc296ee344072d1e2a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b3f2bd34349a3caaf257a0098058846
SHA15505ab361b076f3e8e3bac984c3388338138d1f4
SHA2567bfdbbc5d9bbda91fcdd2df50ca847b3b99eefab6dd7572b5f18dfc94ab57f62
SHA512cd602fac1fbc6e97ac44b8c15b3458f310ffb1065f8ef7738ed4ecc1f05c446b913cd7209650f8623e80b1b14745ebf434cf3741fe4c5f4c1ec461eef262d314
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0fb29d74474c05a2c5ec37328fdff42
SHA16019a2e69fc3d4cbd9c0af5c7e64692ae2439b04
SHA25690fd8d2de9b10599f79338be28b3fb50da898a2ab7b29530e45f5dc93fea16fc
SHA5129b42c427465fb84fb6f1daa90c40e352523cec7ff59779075d2fc246bc6b14406dc5ba033118398d0962f353e626be95fda653067c670adb5dd5e29b89b861c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50771db094496030726624622849b1acf
SHA1500befbb9ca204d5dcb9a8c803ccd88fa42a429b
SHA256987019fff3b22161ff7d52f4c2edbeb3f37cdd026753720162fa490fd4e9a060
SHA512ef8ae0f56de95681ddc6b1d22b2af6b70543ba1b2a14804200fb5f0e003b67b25b18bc7a3ed6c2b2065db1db8effeac4c93fba28454f5895003dc26fc156e842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c2ade3c090f61c85dc5735200903226
SHA19e143fdaa03e37d2288f790e9b63357f0ae18255
SHA256b719480d116dfdb864240b84e8c2b0d1fd3c07786270ded42d5815e1accd8b9a
SHA512f992c5cdab1a27700658e032823a7b8c40a629a4b46aa113d91be42baf13ffe790267e9775b5322c7966ad1574d90653705b69a691a76cef53f47be408d60270
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596a548f3a0729e93ab30e18965e55ff0
SHA1ac8628ad7f7fead98dcb16939493d84923547575
SHA256fed9359ceb3a8293d5c10d461041e0438c0ffb7e4d7ec5860bd6ac8f0de77849
SHA5128b30ab86748dd8822f6feec04f0d6815fe0b33cd4c325811d6af5ba46ca4b63595a03fb572d877be0a0ba3c04628187d7d31587eb5bcd6200e8b17bb2742ac8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5831e5a09b45f77b8e9a1f460bea4d95d
SHA1c820011fac9d7c4a271135ed0ad63e2860f11721
SHA2564a34e04dd01885d36fc74be6359e9b49bc900fde857f45245b41cea58ddc58cf
SHA5126994fd80f6e0f77f5daacd856126f425e87d166b7d2fbfda5eb085ea10cbe451f91643b72b5d90f44dd2fc6723d3005d5b188db89d9b8c49eb8efc334584f96a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5705d9c3ccf3a3e5acffeb9c2155b8840
SHA12a563f3259c87d8d43c4e581001500d527c38b6c
SHA2568ef8bf72d2950625fd09b4f4e6b5ee69309ed54fe61507c519f1f19de2040f44
SHA512dff07c39f71ac6a4be09ca0f6aae7c8c902b10e138df8020ad865f6e439980f88f6fbef243f155cd299f8238953a2b342d36dc96c91d3d57f0b09c88a9988d9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5565e995034b721fe62e5a0bcc3606cff
SHA1f9f960f29a1b586eab6d9bb0cb1d2fe5420217e3
SHA2560e7bdd75e1a984383d3b7e79cc35404535af29a050311ed1da24d5db7eaa5499
SHA5123cbb94c208d3a5a9bcd76f88bdfa76d4b778e1677353057e79b3fb0a0e201e568eb19a445b73cc279761f36820d3ce7c4d61f4f3861b6354f94d497621695619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58254141f8d292bc437ed4568775314b7
SHA186b34843a5ae2201c6d06b4828259577dc893fc6
SHA256069dab20a52c3c9e716c4e231989ffa13ce28110d8258d4061961f5fc000e6ae
SHA51255bb2666199841b17cf770ad4e2699ec40d63776f09c7836b85a9cf747e84425146e53abc276178ebb6afdcf9db4e96b4a0d3a0e135f8c00d98edf03f66b0608
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54016cfe971f45334497b89b3d806bc21
SHA1eff8a623a8a2da8f8af2655276fd133f1561e20b
SHA25658c63acc10bcd938ca0c6d08c57fd939ebfff28456fd3c01b91e3eee030b7ad4
SHA512eb9e41c409725719f7849a875645837fa0046224e69d48a5b5f7bf07c8602a583150768b7bb68f1db84f8dca6706655e4578bdb842fa61ca882624605f7aeaa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fe69026ac77663650a3c26a41c9e0eb
SHA19d13389ef1a89957dbb249a6bfe8940adef4907b
SHA256f08925f6506c836ec1409f44740687612abd1ba5f243477c0b0cf8f9dd74f40a
SHA512d943bab7980cb521be6b4a291e3c84d9f35704c937318d9373c29427c22eccc1fe61b76abfc3873f64183f707c6225d3c9be3e7ee6917b3390964af005d3b712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52318b51662569521877b13f9b2baecba
SHA1c1bd4b208e6679ebb7efcdad498e6b000da6bbdd
SHA256bc5c23b662020b5c46617c8708bb5385391a46b3b1e681a03fdde739725d785c
SHA512bfbf615376fb135dbe4fb9df1d8724f07beacb6c285566deca46994811f522f31410a7dd51645784fb5fa218de2c4b8d4e264b73d4da214b79110ced5ca8ed00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ecea55d8a2481c78f602db613273473
SHA1bb16aacf31da2d29a2b31f10145fbe88efa719f6
SHA2562bbb02f3b754a70ae528b0f543bd007503f5b844b70679258c823d725f31007b
SHA512945b75db06659dc8642255d78e133abb596ef4be36bda95d89df091c6c190d95fc334e6378e42a24c50eac7e06fed06e3e67eeee06ad274d5a0d798d1e5358f4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b