Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/08/2024, 21:30
Static task
static1
Behavioral task
behavioral1
Sample
81cb0a6627db3fe068fc618b5c38cece_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
81cb0a6627db3fe068fc618b5c38cece_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
81cb0a6627db3fe068fc618b5c38cece_JaffaCakes118.html
-
Size
19KB
-
MD5
81cb0a6627db3fe068fc618b5c38cece
-
SHA1
95f06a115da9d86979d914cba6ae5694cee4cc48
-
SHA256
afd73633edae53a7b24d5c4464f401247428cbee9cd3e7c7771ff3464778d19a
-
SHA512
2d51d627d25a07b883cf6982ad2d3a41d8ccd41a505d62a35ca9f1a863d56e8e423119ef4a31f2fd5f0466929b09abdd9829760564d62ed59e4c971db85393cb
-
SSDEEP
384:SII2RagQ4pAS9qgtgcVfrqLFtxwRagQ4pAS9qgtgcVfrqLFtxx:SKQqFbXrqL/xsQqFbXrqL/xx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0d772185ae4da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd0000000002000000000010660000000100002000000034607e3c6534c430de643bb125f765e6a8e1dfea6574b0c6e198ae7a3245828e000000000e800000000200002000000004219e7326758b080570753717198352ca924bfc64d3af8f8853ca6c39e88a5b2000000039471641806f040f5815af138276aa18c15658725de2b4b693b8a0c85a2d46544000000023191eb1f9aa763a86dc4bbbefe6ac74d291aac00dacd8b3fd44820ec55b7faad91b59914569b72d2ec60094f204adeeb8a8b8c480c1040955dcaa3827a84457 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "428709689" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{421D6021-504D-11EF-A5E5-DEC97E11E4FF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003e1c4d4a7885794291b78de8e6dfadfd0000000002000000000010660000000100002000000087da066f461d455a2f1ac5bb23f599fc046331b50ce12ab01699923654c5c36a000000000e8000000002000020000000b7c4c25b241678f04afd185eb71015b2cf54cb7e6e320c988eea20ee77799d75900000001786f395c4bf93cc27a6d56985f868a2c49827f6fe75493db5acee3744d8c4aa2133329daaaf1891637d980667fc6fda12a4243be96a3f59d311b715b887172d1573df5f800ce6f0434b22f09cae5c30865bbf9bcbc6b27d60fc2a76b760e1473bf5546404bcffbecdca3205ecf4f9cc8fe97392307e29c190ea3b3fe8a304e14274081e312b54088ebbf65628061d14400000003c4648fe881e49cb352be6496d5d9b34e6f523fc5ac63fa3566231674df9d2746b7f1950a98d64b1d221fe6621342e5f25be90d02f4064eb0d03a54dcf77ece4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2364 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2364 iexplore.exe 2364 iexplore.exe 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE 2396 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2396 2364 iexplore.exe 31 PID 2364 wrote to memory of 2396 2364 iexplore.exe 31 PID 2364 wrote to memory of 2396 2364 iexplore.exe 31 PID 2364 wrote to memory of 2396 2364 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\81cb0a6627db3fe068fc618b5c38cece_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2364 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522075842a9dbbf71e8c54f9ac3099a9f
SHA1da2f05e91ef3b2188ef98de58e92bfbc0c2d4be5
SHA2564f099d36ba82e877f216e1f39629683472123ac0dc0f41d9ff2a9863e4cdbb2e
SHA51293fdd3f30332436920f1061bf9f3831112c0c82f74b95cf3345d89a028f7af56ed9b5de7166387d7f7c8fdb4ded9c5a3626f19e9172f390c87355a59552faafc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2c7c83e1db0c8c4ed23a11211f9d1b5
SHA17eba5108b62223b4bfef36b6efaf74ad41333917
SHA25627b21c563e4e275cd2b444a0a7fa897f8c0a72a24e2c7ed72bec00b86bb9a85f
SHA512a0c4c1039e15cd8791d5c25ac97694fb21138f7af90aac09290b945af4cf68ea34dfe5b731527dd66f72ad31101992c08a68cceba9e0c2a1700d352173890eff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5208a4d9162af67b2fa36c4be1a95972e
SHA1fefeff0e2fc2e5eb5a169523c836c9e838b076b5
SHA25632cc30f63ea601dd80992fb7150afe023a55805d72c2badf40f74d4311a8d5c7
SHA512a80ddaf6f544b420e3f1adee7ba7af21a8dffa57a28d4b52c4fffbb35bf9f4540c6cb3e1a0a61903a771a580e828132ef11471c8f106b863fac6b026badace5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557d5cd60f884794a852f762d6bca6aca
SHA149a8961257c0bcce0ed0ae80ed259f79c668f98c
SHA25615f826c85a53ea3d22141c0cd62cefe72194742a6aca491c4439bed007162ef7
SHA512f9aa841747b55bde8b20bb314fd2876ec5ec3c6c399e969858596a26aa5ef9aaaccea3e226c958bcab3b311ebdd5050a268f208246e94d319b934e29d70aaac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3856723ea0ffffb6db141b06e0465fd
SHA12ba4c3ddc8187f3252025d380d4af3b656b7c3ca
SHA256bb493339c7686cac0cf3f8399d78ed3db498a096d8df81a9a927da3270619356
SHA512a1eb8d5a0778a60b296539beccdb63d38e5f3ef7a2db628962920438b85f0b5ddfcf5973abef650e8c3332e44f4ddd4e4ee760a4f5bc3bc3267e0e7a0134a137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502dbd21ae86ea61c327c1ab59933cb0d
SHA10a335d8a5b803700744b348baa4c5fc9b7d63d8e
SHA256761e870a2697d256c20f69e88611189bf468655cc245fa27b783aee048f23f16
SHA512bab412f23ec08f2eb4fc571269c339e5d733fab299338dc54fa4a01ea253f6748c346b0100ce1e82feedada38534e771078f36ee3ca6b352436040e79f0a898e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5586c18633933d5d78476b49046951a0e
SHA196e038950e2b437e54e1fc599a360f7ae80e5756
SHA256c988593c2f1c8ea27a94fcfc9292296498ca59601a75df5560ab839b77acbc5c
SHA512601536e8fa94dec4800afaacb4f4967ed5a37adf4909985940fda0933ffcd06ad4e1be578264f08c462dd2a491f410942a683bc289331c65e4f30c9103d34e5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504d1902da151d277f817e347fdfdf0c5
SHA1a605854a28074ff60776cfaa56fa43d040769dd1
SHA2561b0e5caf32a2def609a9f04f895ca200d355a2ad4ce270a28c085f699267c28d
SHA512b549e89664b46dd669d4b4297f3eb202e730e49812b7d7963a996b767321f5a060be43bf2645c8a8cd3a406ed8be658685839b385a3d4802e4356b0821e933b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530f0c8bcc0684ec65cd3c2175615e026
SHA10e08ede18d4924f5fdbb19b9ff14685c57d2de46
SHA256ce45c250e7cc3e3e25918c070bc7656d9ac768a3bc3211bd871b1831ef61da50
SHA5125671912d906eaf60481c64e6cc1e7b2ad3657b834602895a03b176d470407a940be3483466ad784c6c8b0e1420ad01d0da96d25d213f0247d62902ef26f6eb77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a08de92770fa5e59f2ef312b7b6c5f17
SHA144e15db786f89a0e162455524ded39f127f5772c
SHA2566f7c7a9a0ff0c4af56d6411fcf69ba50d4b0948df7dc62a54258eca1ac178e3a
SHA5124eaad098fd0689b4588396f0483230a844341190ce2405f54a05f6ef4efaa632df04aeb3bace1676e3f87d966846a160ec39680a4494199873aea79cd4bacbfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8095e3386615b8bac5890db73848b7f
SHA189fb89788371a078048f1881a0f4de67c20a2c8f
SHA25647a8fd360aaeef8da5e9c9761341d4d485e475790adff290e7808df3d9765f58
SHA512cef5ffc4ca72dde7d51969d789d2483e22a65bc2909c27f53ffd4d8d713a1272ebf32fc65de6b41045daf6649f425925bb869ec3b50a4d90a8038ae4bd22f921
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a425e7839fe2d24469edf1b380621a77
SHA1cbad696bb2b392fe0e84cccbd67d775a6f23045a
SHA256c6469c1ab5f5aed8f2dccfbf67581cedd90daf9235a77ca1bace24f80cb78dd4
SHA512824a57917d7467544f83dac9d545e74dba4588a7113fc363a945940fa5e052e9677ef7dc14e7cfeaa24b396965a31e5b34b6398ac76b2a1f67a64fdc99737602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8b32f079f1382d2de49b450d245a3ef
SHA1774274aa011e4327c555f3addc6cef42f2248fba
SHA256ae04d5b2d740268ff2c742bd6842e90e15108f8fcb8f21129c47d8157d9a180e
SHA512bcb094aa31c4488bde644d3e9a6d64227dd0aefcfb2cfe3e7cdddd099cfc9229bb86eedff0b723ad56b11b60644c0a0fbb3b245e13ddeb3989da3c77de580ca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5912d5cc587bc71263499a0ffe4f584be
SHA125019596b1696ad58f2edff5cf6544c61793eb28
SHA2560100ce684ed5d04e01d453aeeab784c60bcfcd7914b8ab78863ef96705cd6ef3
SHA512148928836f7cba02b58945f7379bbff3bd4b200a2f7c21a226a51037c0ac12ebbef43b36502d3713a9d712071a5bae1866b41e9531667782ae62d9203c1309c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4c07572b9f6e51cf1a453bd574caee5
SHA1ac3470dd24d73ac27859861f859ace09226a3dd7
SHA2569a1c4c6c169f40decdd271356f97d8330f5a8ebd649ae7931985be6d96b2e3b6
SHA512a8d745363fb66c3f9f0657aa8d765e20ea5ffc51f2ed275eeffb33751c8bcc426718548d624fb7dbb768bce1225bd24c8fca0f6abef66c79fd33567116c855ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3142871e02ceedabfa14027a43636a4
SHA1693bf7cbaf5e96e0313038e6e9e526e10bb03bae
SHA25659796f6ea6c63054f8c107b7a99c873e58151f4eab107b5c37a81127d17342a5
SHA512edf2b9a3c9f593506d9c7f7bb0b8bd4b943ac7cb433064a6c7cf140b8b0799ba7da54ca97d374bdc3492ac0c15e23a23c2c1e725b0878dc269b58e50d6c42f55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db452a2cac3a5032358801aede58876c
SHA13d9641a51dbac9e0c077f0c317ff1fc1d51ba6a8
SHA256fe8ff78590d93092ee8c6178dd466d9f88968411c89e33244f6b455736481f17
SHA51254d5ab11941233297adff274f5434ec5035285577592e1cc71ab7fc7d7081a23374eac901e1121b63f1a1ccacae9cc8dcd4b703814d9dca0ee3af5fb9dd5bfbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddd2cab1202d79bf19ecff50627b68b5
SHA10520c99eb9b7d18dd00d4534133e0ca9eebed079
SHA25679d1f3360d0a2af24e986136e38da9a3f6b13c729e7df04b7b01a97e1cd340eb
SHA512c3668ce30430611b8674a2bbe2a1038a12652d483dfb39a8c869c859957318e3449f437f453ddbd3ddcd4067d465d991b0c6b6a448b579ed07c9fb4c3df69968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7d09676c8725ab0a60e00200c3b6a91
SHA185c3eb38175a7924504382833ae83cf59a360875
SHA25682ee49e49e4e00d8a89ddb7403868aa6520282731103b82f82db2a45e451d3d4
SHA5126c99f96c1964ecefbabdfe513945c2c15fdf6a4d3fc800037dd10436aba27bed11e6e44065d18d36f51f62447914bdcaa3f1ea1ba63c78e29dff4366bb425ce2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b