Analysis
-
max time kernel
136s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 07:04
Static task
static1
Behavioral task
behavioral1
Sample
ead047c16d1d3f45e3da2175d5c73d9d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ead047c16d1d3f45e3da2175d5c73d9d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ead047c16d1d3f45e3da2175d5c73d9d_JaffaCakes118.html
-
Size
158KB
-
MD5
ead047c16d1d3f45e3da2175d5c73d9d
-
SHA1
67731c4663449ca170f0dcfb42bbc85a7b7f83d5
-
SHA256
8820609a0b4ecc4c387061253c4eba9d53c39597457470ef3882810d6d4ac46e
-
SHA512
0b0194d20767d35c60d908937fc613d572df1ffd925099ee43a2ad78ddb42485363ab694eca4cbc60e80439da8db6acb126610a13b065c3296493cb4a305f34f
-
SSDEEP
1536:ShXM+XVgUldOEyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:ShJFgkOEyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000c54af151fa9df2cc7cbe077f05956b04f24d3f9d9677a3f42b928ee59c01bc44000000000e8000000002000020000000101ac5afba8c8a17bdc236c333de24144ebdf26067d08e4432bfe4a8454dc19e200000002efe6782abbee56687f7a458d6ef7e6884d3ee1ba2d8679e6f5ef5671708b55d400000002b30ed0ad2113c5f3462d144c6655336d5bb3fc51466cccb0044847f07bf67dbc569b13af39499e4f4df03105478f063861f677d7aa34d85c4f875d7610e196f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000000793e7f29f8ed3e502521b50d13bbe6d5d723e21baa749f0ef655906148033f000000000e8000000002000020000000830f07ea13dea67d970ec12d9a6b0e67c65d798590225fb983573900eb42f71e900000003a9f8f324fb3d50823dd8e3ac08a81c1fb039a45ca663ac82ad5b647b0f34f2ee852188782a92d5e87b1d90988b3b08ceb537c496623268dce9b8e95de68fedf5483d058cb5edc5a03d18996f48b80ff4ab3777bd542de897e7a938ad3a1b0f4225992bd919cf4956bd61adc51d0a0aa059a185d3e0c3f14e8c8fb7480c4503dca1fe1d2521448ac94e2d6666b78b1ae40000000a4438bd06bbea5b39caf751da26560104238173ed49728c769dc2237c4b2cfdb08d745e3b3c0d2e0cf6599bbf72d01bb78c2867c26b5409f1b85e98f7016c55f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432891336" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6948FF01-7655-11EF-9CBD-4625F4E6DDF6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20b2f37c620adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2116 iexplore.exe 2116 iexplore.exe 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2564 2116 iexplore.exe 30 PID 2116 wrote to memory of 2564 2116 iexplore.exe 30 PID 2116 wrote to memory of 2564 2116 iexplore.exe 30 PID 2116 wrote to memory of 2564 2116 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ead047c16d1d3f45e3da2175d5c73d9d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3dafa0327be82ea4905f1ffe32ab6dd
SHA114eb6359d64164e99928904db072cc878e9a4a56
SHA256299ae878611c4bec9a7c049329c0b7cbe26fc6483593c00e0afb16193aee4078
SHA5129a2a9ccec64d62dde96c4c5107a8fa1e151a06aa6bdbfd6f366fdf35c2b215a2626a7a9ff3bbc112c329e2b5c9434b34be78009a3a7c6c35d600e92e743554ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4fb81abf72551634b29d602a9365b3a
SHA12d066f5339c99d5885d6d1ad44f32098a2a3b394
SHA25673c8d7e2b62e34510ecf54e4e4eeac7ddf0b96b160c5b71b24b0669ffdcd7408
SHA512d0032563e0286be9c445ad72f2d9ed7d690f5a23d6073f9c9b0881fa2aba4b0f5bb808620d1c11f0b7af8c7a1b69186d020a4d4f3006f548f7ae7c0c62f29c33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9d74309189fdb7b067e3236bb90fc2d
SHA1bc1c24e82df7c547f4ecd67d519a8799de8b2f3e
SHA25627b569f5e537eae5ad92c114fabb0027612c77ec13e8afed16ffe3d8e1bebbf4
SHA5127c563c6d8f1c0c8eb3f074e8a9636f3f147b419b232ab4497ac618a42a8b41d56018df341acb97825e328b81a637265daf2a40d24cfc7a440fa0525dc4da0bff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532c2b44324fb3ec00655ac9be5ef320a
SHA165928c7d0bf6edb6ca23344aa00135df0c8d8573
SHA25698278534057ffa603a789820384583474e17c510ff5b9066ba7ab311902a07ed
SHA5125a610d6a1655a462a21b4ae857c2b5d71486cc8f2139f418e054769154e221468efda0732428592754ff3f1dcce167418fbd8e4f84df05dea8be35d62c17f52e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9087c93e69c7f8aac1ed4eaec431801
SHA1c962d4d0ff91fd6f177d82c3ca829d7c44c5ba2e
SHA2560145928cdfd5a96bf0589b0bbe293acd08179fe83e7642b821b0ee7eee7af2c9
SHA512608e6566ce3f0872baef175548814c875603120d885e5af06fbcee010a08614a797e1100c54ab28f0d2a02f775b3e4f0e19928b2c64e16eeb6c5b8863837560d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac1f6f1c187e8ec2b2053b5db78c6246
SHA10333a74bfb5ed230ed39678cf4443019c9ea5f27
SHA256b525359b7317b32bcb5ad8ae87930fc0db43ef62f452899c250cabc37851e79e
SHA512f424fa6958af1d4f6ee8c822c9c5b2837558f8414ac83c5b0006fb9465a3779a10315138393e5622c0f16b4bc7b6252861945757a50e2af80391aad242c88128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51112a4e75d70f2a53d094f250d21286a
SHA13265047ce93aea10eb88a1bba9a53552a761d36a
SHA256ac49f448fcf0aabda97b0bec4f0ec389e99f87ac4dfcf5d1d04ba01e37cdff3d
SHA512259a1ffc5c8dd8a7b6a0c9885498eabaa069de25a5892f6b2ba42a5603dce81e4c322eb02b90410dbb7eb4c6c33b8e72389c3ac872057e4d87bd7a8e6c6714e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7490addf296e88f31ebc0fb740b4929
SHA194e1bd280a627479eef2115c18dd85eb23bc4b52
SHA25688f8526e9b857c45a391ce42e234f88b2fadcb2b8a99ef0b0015c1e9a8237f05
SHA512b656be1d444f265b0e3d4f7c5c0ffaa7979abb8e3741f65f578a5acba0862415c94629b12c3cd12a9ddba0ed86c733f6413c720abf24e12953504034e9d57600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570152cfc3b662d3a983b398e9e50aef7
SHA1848d1ae88b382596f98a162242fa3ec40179eaf8
SHA2562d5e788d6bec203dd255763507b84de0d317574b327c53a67ea82c7421158b03
SHA512259aa3ae3f5839c0946109f04452210d98139561c8b66d351e6884d82ac55ea897800b131c49e35fc621bbf3e8972ca7bb6f3273dd42b7d6e93a60def607eebb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e99ab0d3f75b50c30571322a2804c2b
SHA1094e60ff34e784769c3763037159b6fea02bd5e1
SHA256a619748b85a2fc0d9bf0f6055038c2d2b91f0bdb8cb01e01c0b7cc6f2fd9829d
SHA5128c4914bff3757a971f1e86b214d66b925d19a0189fdd2119b3b21a09ca7877e53a5af832195117f1b9939a9d2a64f19259fca91b56b51c8c059ed031d9e6cdd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abb8a85763709910f91541cc537f5d8c
SHA125205755a604be86bb97283576e2c5acccde5b98
SHA2562142e3333dd7a0ec5832fe8e0d0c707a283db6cec3f1d88f3f61d136c14fd9c6
SHA5126452893c00a429b4c509b3dbf3398f05aa38666276f192d8dcca5e930acc824c70d55800e5e158555dd23c42a194855cb34518ac7d385d178083036df58f545c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525038bcf672ddbdbad16a333ba64b1f5
SHA195dca55b6b90a94e28c2ee25e90e1c38f5211100
SHA256779b3b57d5b36a6f054a1dd3ccdaad6c92302ffcf94a02b03e43f6690c50fc59
SHA512958d2aa76e8e5fdbea8c9e33b5e3cbed7c3c971254d761a79f1a5295243a9a580a519d222b8338a676000f50367f97acca2a7aa884c4e96ad39f885e3c006ad4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533cb64613089f54420b619c4f71c85fd
SHA11b3b65d891ee5d6baec93ae985168450c9971632
SHA2566bbae8a4df01366b831c78a18e15f0da1cbe52f5cd5ebcdbe186e2b3fbde2278
SHA51245fd2cd851be2900c740a48c54284a541c1c82c7ece80e2e429edfa97f6cb0248a2b8f19ba548f4dd3ebdb2a69c430450fbdf55e8fdf24ad9395c2f547413fff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b6b8844ba389a8ef240d9b53b2c7ac4
SHA189f811d5beb79d793fe29f907ee4b34aac8605f3
SHA2566c91785853bbc5b6f31a8e0526ed3a2855230e75bf8187e72c0a745c37458248
SHA512eb8d7a91f24d2c57473a608ef9780e61897bcec86188fd3733a239664acc1b7f564f0453ff217fa2da5701bdb094db28bc72a6b5cd2aa047d9b003a243b4e1ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cecd39eed4c32ba380d39d8c66e14b1
SHA11cd827a20dca8a817b34a62a024974b53b6a9279
SHA25615a65617d5492e1bb40be87a786534d7a18eee4d85a6dda4c849f05d1b9c9f2f
SHA512fc0138379d72cbafe2a5bfe621146fe3b47d7fe82716ee64e723448e93e80a27e61d9e9b3cfdc357f251e1f1af46829d772fdea5eb53d06cfc887bc96be941b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f8efadfd87321c2728d543088b68ef0
SHA1723eb787e19c34befe0790b7d17f7fb4f3cd432c
SHA256a4ed3044e457cb5debc7b0731eaa01ed3cce3e6825dcc38888348377315c376a
SHA5120d9571bb37d786e16ecf52e637a9c173c74b47ba17777ca10965fb844eb5644e509b907bf842532d682856de2093e53350e7fa5d9696b49618f27ca8b593b2ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f103feeec6d59e472da7420a126d8e55
SHA1856966a87680725e1919305453e06bab28b4efa4
SHA256994f918fb03f31bc49518a92a925d78bfc9014dd08307b89eae93f1839f18069
SHA5127d52520335f0817ddc83fa5aecf4d0eca21801ae14f126d3d0f20b5fa0e0620a825cfa89c879c783786e96f196162b52923e85e1ec6ea2d69c18fd3f941e65c9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b