Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 00:43
Static task
static1
Behavioral task
behavioral1
Sample
db83bb90e6af828f92ef9e1bbccc2fea_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db83bb90e6af828f92ef9e1bbccc2fea_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db83bb90e6af828f92ef9e1bbccc2fea_JaffaCakes118.html
-
Size
9KB
-
MD5
db83bb90e6af828f92ef9e1bbccc2fea
-
SHA1
3298436999131b2a138d77007814cc1f00568a48
-
SHA256
971c1ece14d1d3be1cd1eaae099fde7433f50d22360e57bfd9d4e450dbe3142d
-
SHA512
af633055d36f4c2a81fb4fffbee156cca338e7823a7ff03d203f24bed14ce1d0da2b10b2941b2211a1098078da1abf407983ecd631babf2632ff3f61e7da993c
-
SSDEEP
96:uzVs+ux7zKKLLY1k9o84d12ef7CSTUAGT/kPs2pUlVHcEZ7ru7f:csz7OKAYS/BjUPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432263685" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20b63ce1ac04db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000c47ffabb92876710ef9f68e43f284c524b179f8a5cbc00d5d0ceb7b9e4927985000000000e80000000020000200000006cf1c185f9f2d6db88e179a14a8765c51ea0d60cb3a3e025a08698c69d01bd32200000009f31694fd6fcb3ebc681b6499ee13bc15480a5769beafb6da93d22b6d084cacf40000000fb5f386a5bcd8de102f7c71db0a1b24c6bf307cec465b96de14464274cc83b49200c83b08482cec0192f8ed3a4bf879e32eb42f7d2a80cebce5294409d1dc111 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000a5f972aa68a15ea100a11145c0832efb8035c97dcffa37b020ea4f2088423cb7000000000e8000000002000020000000e5647ab223fa6dc32d6bafa7f89a15ce4b36738a7a57dc9e516a5ee5d83182b7900000005afc887fc4fc56e6a1293f574bcb1ab3d0f3bee33ce22167f6e623f372c3495df72734d7ca5ea8125996fe4597fbc5d2c484333397fa70b4982b25a3fc2e586283b224eb6ed7a4eab16717d8e73ebc4109bcf2728bfd74d9c6620fe4946a5834deda395801cdf2b4040ac65916bcfc035368c3b477338ec771c7b0216b42dd51cffa0b39575e4017c3b3d5e49f750b7c4000000039c41cbaa52caa7d67cf55256f86ae53153c8a21757897e3fe0adf58685f3f785a0cfbb2ddcc2cb0cb6188352a7104dc2aa9390fe35fbb5a8ac730b309dc6668 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0C28A011-70A0-11EF-B267-4A174794FC88} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1608 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1608 iexplore.exe 1608 iexplore.exe 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE 2988 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1608 wrote to memory of 2988 1608 iexplore.exe 28 PID 1608 wrote to memory of 2988 1608 iexplore.exe 28 PID 1608 wrote to memory of 2988 1608 iexplore.exe 28 PID 1608 wrote to memory of 2988 1608 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\db83bb90e6af828f92ef9e1bbccc2fea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1608 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b730696a02a44dd2cc74b040239ac7e1
SHA11afd7e97a4fc08e7fa4b19e36a6dafdc0d6d9f24
SHA256f1b73e26b744b29902c0c9d6723f40283ed533984f4687fdffe916d4935475e2
SHA512ff7cfb952a29fe347f87960d2d69a4a17dbe126f9daa10458851e146dd3df116787da5960addb49ba920fc359f5bef0f966c9131b4d9f2b256a94468a8c947ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d31595c298ec6bf6bb6e77572ea8e7e6
SHA1e830e5b430b6dcd554328597308dc44a600133ac
SHA256b9937deacd06d59538b2fb17f9799cf3510a43c17dd2fec2dc0f3de3702e6459
SHA5123d080427321b38372a915c3c8f28c20baf48dc572a6a76197c892c43388814aa1e543e2b3f55c19aea9219d59b770ab5e8d715ea15577631b07a490d3cc17655
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5822562c2ac2ed605325e52a4d4506aae
SHA1599757996a0ef9d4c0b4f505ce752848e319a9ba
SHA2562447557b13a925b8abd61b455876c3fb4082d07aa5d3edcff920d5e301b485c3
SHA512e9af253b42360beff82f5a606e7e1f56767c0eaddee5fd1a14bd2c56623521d73eaa6e3a28ae4847ba08416ecf392ceb04470253993726e5ba27a1fcfdb730f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585fa25cf5ecdd6137462ab7a827481b9
SHA126ecae2142289190edccd64b4ee741ff8cedcfe1
SHA256260f13a153e8741bb6f23af72e82dc66b4265453f31967a745ea6f7df1297223
SHA51200c563fb45ae14d18ff161703ee6179cb8d9736bbeb6591412938380aacbaa208c656f8062cd4fe120a00a56820acd1d472cde30efd5ca08b20012e57da2910f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb96de4e90b510974621f5b2b3d07733
SHA17c04182f86a075dcc75b8ffaa266d30fddc88c1a
SHA256a388954cf8cce16b328cfae443a5b6833d25d904cd92ad66a198d8035cc71e72
SHA5122a540221e0c580530bc2855e13579fa4f1bce9522a5c25b816bbcf43752fe4df96cdf974946f04be76b6ccee3add0c98bf72cc82d2b4b0d2c796e6e85115307e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52355f2989f9502746a64508d3ef6a284
SHA11fb77c4bd036d30ef88f5e520106de30e3d03aaf
SHA256b959b19c11b5d804cf10f8e04fc6a7a777144a6a67ae604f27ce5bc0e1900222
SHA51260d8b685807d8b2cb1de753be35bb54674bed2173ca6314b4772f6f9878a2c9491bd3d75f626aa36d4d03e8b34bbf927664107fb7760f54f6fd79fd5e13c4586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533303c3d2f05dab43357c7298a3ca38c
SHA1e459d333084fad262577ad4cf91424ec1dc1a826
SHA256e2d254777b7ffad57fde42303aa4ed4560a610a2d1255ca6eaf7da7bef84d022
SHA5123f1744175b538dc432697b4f1bb9f3b7420d409656ca6c9c547e508be4cf7084e17bf6886178d383d2109ff1c86b6e58f19c396a95d3a886af4184b2ba8fe5a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b7d881cae41b47ebbe85d8a415d810b
SHA14c08d12aac531cb93230432506060313652f2679
SHA256a7a7c84189931f3caaa71040480d11b6369da79636d72ff202289c1f3129a3d3
SHA512a2343fbd7f30bee028a5e2db719fdd422c2a75c98f131ca57511ead5107c5c32d45c7a71e2ee78d20a7eca5dd025f3efaefb740da70d949e99a968b6600b0ad0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585e89284447daffeea361a9b93ad67e3
SHA14616af11d81d13b2ab31049806f9df3c83fe9fc0
SHA256fdf8411757cfd99e097e75b6a39799f8c49646cddf04431885b165be15fb73e5
SHA51260f563a278ee9b7285b68f40b2696f7327edc19acb679c0bdd51d8857860287563ed7f8f0510a7ef0815bf810d86cbdc63d812e916c7ff6c3e29181492eea75e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c9fa0d53b88e8a460ccdb33e6a7d70d
SHA137b930e51819c89fea83954e2d101da45995ceea
SHA2564f863c97b12f1f439a089cb65102faf710f9077b820ebf27503ba444bb642234
SHA51266088913b2ea2e2bca3239eb5cd651f65b5d5bfcc64fea12b9da901734112b98b0baa01835e166961298e11554fc0b3c107ca8c05e4a48d7ef22b0aadf3aa787
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c98530580c2d25fad9f6037f7d49305
SHA1dc5c69892d721bddb3bd3cbf0870c30dff2b6666
SHA256ef2237d3a2b2014caac7fcdeb9b800ee77d54d482df8e2255a4e74996b22100f
SHA512cd8618ae74465b7a3bd908d7c13757864f7ea8c69a089dd85d6b18e0630d09e08b8553aaeea4f254466a8e1aecf669b0fc6f21655db72db498cbb5caeec96ab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511158542be999fdf74e97724618af632
SHA17c23d6faacfcf30bb3657994a63bddf91796696c
SHA2568b6565ef440315b684f4d20d5b160d566eae9ac8ebdc84f60bba94151dbfaa52
SHA5121e0b7ed1272f2a76dda58e2ffab69ed723b4d1387ce547e6b1f93433213072bd26878f0e6e5b07f1b2c82672a889fbe6447c18c717172f8d879a1f6bb16d090d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57818642b282b24182d197ac8b4e4f84b
SHA13470c45064112194a24d151100faeb3097cfaccd
SHA256c255a505a3ccbfe86b23341868a3f1c4f5f212dd239283d241730e5136f903ba
SHA5125948626e17eaa3e956de33ad4250b0257852c9f55291c26b8bd6a99f247a2886656fac852b91285b07890070bd5f540419abf30ba5ab5d73d848e3ff32d53e7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59edcf889fb5f35c5e82960d0e88e958d
SHA18f77bd7f6bc80d355a6f2106a404bf4df5bbe74a
SHA256e476196e6e6c3c98f06cfc68c6e78efb2111b844db2ce8f02f848824ae235d16
SHA512e3712956b4438656769eddcbc929f7bf8f0e0efb305bfb3fa9f6cb5ee3c45e16d97c5dc5d63240d9e20449445a34e9c317de56f61c8f641044b9ff1a95f05b72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bffad2da5056e4c8bec66d0523183045
SHA18fc3201c0bd4988a95949605a18374df96c1a744
SHA2569e30cdd6d0409f52df449f410c4f4c8f098354d6793c4cd4d74d8133eb72131f
SHA512c339909b1cdf4685a561d464ac1963b59ccf09ca31c82d6065d3d99cc6337e93ec37d86ab689cb58e942180554a102f1ac8919fb6ca19fbee27c92567c92f7b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deb60cb66cd329d3272f47e0de27350e
SHA108fee7d60920edc992f487da6ab3f157b9bfcade
SHA256d4444712bafd0384659b7dcf8db1e7714459155b0116476a827e8917be31b89e
SHA512d94b4d51d668a0150d568eaefbb2f9a1581a3c5972de9b1b860043fa7d20a5ba06b514b6bfe5cb1192e3a1975431c334a202b3ff90c850d96fb086910dd7b253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c2251cddf5efb3d9fdf7e79e008110e
SHA178f6b5b89a23f3f77b9278d08ab17258ed65d969
SHA25677c6307bacac6ba0a1de456418c5af728f5bf6c1ebeb898155f3c705bdfa22b8
SHA5121f3784ec29b5b18d57cce186f3aeba211caec922a0427ed265e17415d832f49dfe23eacb90f1c85d91407701ce63a3dd8f60805bab8711be19609c5ce2645212
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c97ff8ad3b92827cb90dadaf416ab5d
SHA1fd4cbe8f42b874786c732675a3b8500b846c5d06
SHA25618b35e35fdaba35ee98b58951039a802438276fd9b70d7551db9624ae1c4202b
SHA5122a403c59518684d1ce4c38189d1fffc756a4ae755c495afca359818312e723a061ec9e9b52e458528e92e8e21129a23e701faa984e455a76d1c1de7dbb139e0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf76dcaae31e16c2cbc599dca614b8cb
SHA1a25b2682b11b68c6fca9621483a1e409cb6fb19b
SHA2565e22a26dc1492a8275d7f8d2e6f45629977e63817d2339280282425717e63058
SHA512548ce8ff9b7dd7975cfd6722f74cd09efac39a6660f1884346a1b294fff454a482d8140aebc5f8a70e0d737595797b5a3fb733a80c0d21966b9d465e7ddd0478
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b