Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 10:55
Static task
static1
Behavioral task
behavioral1
Sample
c095c9cc330ab5233c9c2170524e5045_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c095c9cc330ab5233c9c2170524e5045_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c095c9cc330ab5233c9c2170524e5045_JaffaCakes118.html
-
Size
461KB
-
MD5
c095c9cc330ab5233c9c2170524e5045
-
SHA1
08d077e9d3cb2ed59e2b0d4d7a35e36f205efb0d
-
SHA256
2768918efa007788bb1c89193848f248aa4c2c8ef5ee0087d31cfd150f6fe5e8
-
SHA512
dfe29f73cf7758f2fd7f7f77698c89512905a6c908b00923bd1796f3b2260250930d30df4ef15c93d4892082d37e0efabe4fbe724d1ca51803146ce00947cb9f
-
SSDEEP
6144:S7sMYod+X3oI+YWsMYod+X3oI+YPsMYod+X3oI+YLsMYod+X3oI+YQ:+5d+X3q5d+X3N5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{88660651-62D0-11EF-A641-5E10E05FA61A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430745192" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000702ec2f7d29aa7d962b830692101294e5a1bbf8d01a7a9115069b602d4fc567f000000000e8000000002000020000000bff48fa1366eafeddea09a6b1b52d02b118fc1edce2e427bbcf47929e398e9c490000000ab4fb7dfbdb6705ca1fed453520092a82c1b5ffebd704f91bc59f68dfd97c4c92b9368e5ce77eacd2f1a7e8faac71612d0fefeaea49fcdbd998f7e5f021e556353648a0e40b4a0a6cbd4908537416d614eca414b84ddc87305925d623df3838a3eee578ca53b1777b357ce0a89e1b7beb68376bf2dd56a4b42d303902e56c490f6a41e9c22c94275c131f3dd763f0b8540000000ef8a675f5059be927ed8dd85f8e321567a829598eab33a029ddc6296d84851c6550dc5c0ddac7dce8d1c6ffae7aec2ddb6b4200a6e49810ed14c5e463f63d0b7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000006b01d758c410bbc20b5e5beda41d8d02e0febf306db3d2373f38479bd3ee8ec2000000000e80000000020000200000003e2f3e2cb55dfbd7a3eab6f61a56f59c8aa04779dc9e5b85567d5fe8df421e3b200000002e9cce6b086da15d695f65db48522ea032e6fac5060e1bc72e77606651cb821440000000b6bfa8960bac2c1ff5ed3c1885d01fed6fd11f5f00a7ac7444874022d7c232807d0aa332f5e1ecce3619ed42a9790311890cfc6c16784f95f5042c33848e728d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20bbef60ddf6da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 528 iexplore.exe 528 iexplore.exe 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 528 wrote to memory of 1672 528 iexplore.exe 30 PID 528 wrote to memory of 1672 528 iexplore.exe 30 PID 528 wrote to memory of 1672 528 iexplore.exe 30 PID 528 wrote to memory of 1672 528 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c095c9cc330ab5233c9c2170524e5045_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:528 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58dded1bc31434d57bbbd1275db449cb9
SHA19906bc6dd075a631873bfd31352a208857b2ec2f
SHA25696c94c21e7ee594628698fde7ba8f2792cdb7e3b01d407affbede500dfed7f69
SHA512a8eac3eb39107b1b58a4f33d5a7218d0e10e1d5729a2c0ccf8748a9c48589496b662f1cd913120408cca73e1d8cc32609da72848dfa9de46815ce69a6e9bc2e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561ff86f7d0e5f70ce04e0ede4bfa5f6e
SHA1da7add86e18ff8a30c8ccf7b160d86044973025e
SHA256e00a6321a90bfa74b4fd7fde290a2ce2370ef2757847109ef780e43bdd62c0e0
SHA512ee367d957326ae6817607015c29f854b4aac7a182954182e13dba3737721e11c170d50c2cf7c1a1239533d0d27f96032de8e731cb263ca82b846c07b3478dc96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae7f509f1d2ca3a5398d0edaa531e789
SHA12fa434abd9f109c4071a46881922e3a33521c517
SHA2561390f9c1d9de31989a1232b12b0b3a7a0f680f999cf7582dcceecb4e4732b90c
SHA51273f765c5600a4f6076a725c135bd4ec1de08295fb9d9244b5e885328d9b011a47d2942c8ebeef0099b22437685c04f94f539313118320267be6d1ddc5f9e562f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56433e48a3545c2e212d8222161b755da
SHA1317f74f91ff9651050373a78fe71b6841c719580
SHA256f9cc9391b6e705b2f5a37f7641ea7b575d868dcc7e5aadef4574d5941f7ab721
SHA51264a8c94b49a9bb8a2e93ad0dcbbbaaadf5f00b625c610cb8f8adf83d58dd11f463e8dfc73f1425fd00f1de9aaf045520d5b29851ddd594f0e6c31987f8c0cb84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d63fc7804f0608c296366d5f37fc9ee
SHA1c5f2f5225be96bb5c0225e291b2a5ba880d2d8e6
SHA25621643ec5c8357fa022b9271fa1e38eda1d531a1c2142ed7f233df426bb24dd89
SHA5120989f9ca05a2a3b220e2841d8e08e5f5babf5511c53c9cd7708a189046ad7f47dd12538d7c4be670f9962e822226ad0c26bc16aeb52ade6bfe374ae439733e38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d8f4386771c256fa55ea458d71cc5d5
SHA1292f847e812009b5203f0a57d6e83db523b9cd0d
SHA256dc2f5f3ed40e28340606ce3090a7afd0f0559160fab1934b582a6ce12d2a48e6
SHA51288c8d9eff2892181161e95ef808957141aed763194771d806cba8c5ebee6d6da569c567840fd52c5e6f0159c5fd222745cfff5e70273b1f3bebf6e647a984630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57480cfc151b8d53a394659f4082bc9fb
SHA16cd703036d377ebf7b88a8a03c8ff7f451379a0e
SHA25602e98d3b36ec5a0a6b9e417cfc0fda46c577f1f2c8a09826e34cfa5d31918ec7
SHA5122185dc65ac170d10f5c427d3d18cce9fea7dafa85f67eb74485f4827c84fa49907734f59f0cc4616afa2ab5bba209854a6fb4f722a60a131ff80859491faf2e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce74423f9e3e5479818c051fdce3161c
SHA1e46268f1ce2f93780c8c1e9c2bee9ac932508e08
SHA256a8259d4fa462be591e2d385012bae7f061938e517499a24868b339eca2d6917c
SHA512b380b668552d8b5d1f4db15371e967466c579675e7179ddb3277ae166a65b3798b633a1f6914b722121ad216e19aee2ceb40194bf1439e21ec47c11b2fb6a136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55861db2d55bce6d75fb88da6d7f5da8c
SHA1433f8e48cfe8c7bab5712ece0166653c55060216
SHA256096b7abaec770f79cc66a786642e0b0afaafe595361ef0a3becbabcb5fd6e34f
SHA51228017a2b5564e8764b05b4f483bd0215cc120298357dac6ce1198f3733451b92b8cb701756f852f337acdaf588cbdd7c110ad51e7b0c37e1bd9fce74c9e55d2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaeddb48096a262dc7b6f127f89a44d1
SHA12d0e3876e068b96202e072bc84a62505bf303176
SHA256a9d70cf28aa5b5c1a53b3906e88bd288aa360a2bbb25a7a1df14059ef616b4cb
SHA512ff3b4afc691bcaae67e3c46d3de19eb00de043e218c979fc5f5615072963022b9c94dadb3858fe3e0647e9ab0dd63b92319b2b7436bf3da69d665151b70b02b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57618f633111c16f07a7d794390a885c6
SHA12bd69553b43221bab22c1ef58320373299902232
SHA25619ea2b174de560ba0d4b38bba7cd92409f374afa29fa3476ab12e359632aaf3b
SHA5127f2046a4f014c003bfbf08e7e7a31b371c10e1440f10b89620af92d698f318edc5c51736d99c8f320665f958c6a1c9494612fb25ac1fd77d4d4795d87a9d6b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c1d218dd36b79a838e62e94457b6c2f
SHA1b1c5a082b34f49b6a622794fa259633110b932b3
SHA2562bccdfee3857553f13d723719269dde72e6826d9840d7160720d4ebe61101164
SHA5122230b1caf6227e79351a85afc0d30dd6f5c8b140b71f7e2b2e5f32de7673982a6411b2c2eb576735e2752f6211a991433edd32ab241ba889b03eb9b8162f49e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fd5e025ee9ef29e62bc409aa1a57075
SHA1f5fcc19d64938363461e101c8379e58a8e5385a1
SHA256a91d85710dfeaefa69fb04953676db3e2d02368fa55e1a841340365e496bfff3
SHA512e74785e1a3e5cbf0dfe721e3aca13ca2e2f19011c8bdae61eacb91a0065068ff46115515face18bf6714323f556e668d5bd927b6b8e3db0509b292cd1a22696f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5970a58684e46c9be379d6c100c96bd59
SHA15558f3abc56237d34d643a8f13667155f9d477de
SHA256df13ee66af496c516acaaf25b8566dcb72b40e1f03c8fdc8576a7972a071186f
SHA512a477466448498d694bcc49e460ee7def30f206b4a2bfca5e770cfa08884f6376501c5ca78edcb848ee673f0cdf00fc4b768ab8a736b9f14c3f5bf0633aa69b8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53669c4dcdea15f229bce8d0a9dc382b4
SHA1a3acc95297cf1e4c810240989d8cd296cfabf7a2
SHA25621fc114b00a9a8ef67bd56b422081a7d38346dead756e0e0344b4dccbecafff8
SHA512f479a754541ffcb176cb43ceae3c69e1f64d449e01a5b3ab32bb040840d9ba6390635a366b745ab6f07d7627f1d732fbc0923cb87da0ef1c51f71ec2ce58d293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522b500d8239a5741edf0abced462b17f
SHA1ae70cfbebd739cb05cbf0c1b6dbfd687ac413d16
SHA256e0f2c4728392e2ec9feed44cae456bffc8bec824f1ac770755f70eff10b3dc68
SHA512df3e245bb6ffafeba68aaf52ed03ba993e748dda5d75675506361577b79725fa82809822c68fda26e220541a0517329442cee5b685396cee5994498b0918c4d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e58c1b9104e5dbb28f3ea9fe08f825cf
SHA15dec6d917c1aabf611b00f9722338445d594da84
SHA2567b0d24062cfb92f14b2a9cefca980944b6eab542d91ae2c0e2a5397c34ca66a0
SHA512dd156961ad2344fab860936a545d4a8f0b3651148a354199950809afee696b46b711dff88673d9f154d2fc5a90c052215a23845bf85ef2195c734bfa94c58f08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550ccc6401b60001e8dd82beda0af2378
SHA1b8584154ed62631acedaa52f6a70c892d2dbcfce
SHA25698b9e528179ee0990d87dadb3ecc303ca3e317eaa19aab13a9b213229aa52fb6
SHA51217c447b56d1877a7cf492cf7e16052116e8c39a3864b6196db09b97a909f68463c2ee954a2cc2dafcbdca374ccd4b9101ed2c340dd99dfaf8a7f0289b073bf2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4b7699d8c497cd076e784fe7f567594
SHA1dc0050438c4a3c27a3b21859dcfc5d640aede2d7
SHA2565c13915859b21c57114bcc2ae62fd77f189d62acacd5d62e4defd975ab9edd4b
SHA5122ed43366f22e70594d56aa0419099426a19998efee31ce227ff079f89502f4879d5255cd00d8cfdae0e4373de4cf65e9d934ecad5f73752520b6ed4ef3250ebd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b