Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 05:55
Static task
static1
Behavioral task
behavioral1
Sample
ef2f4cec415c3de41699bc0fa159ea69_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef2f4cec415c3de41699bc0fa159ea69_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef2f4cec415c3de41699bc0fa159ea69_JaffaCakes118.html
-
Size
21KB
-
MD5
ef2f4cec415c3de41699bc0fa159ea69
-
SHA1
998b0c63f46cac758861b314f629d834d9066433
-
SHA256
6cc454cc31d11b09f4f5f63d5f961797bff1a0c0b59fc916d1b06fdbf7e0ab24
-
SHA512
893e8684690cd9af7f342da5bc6bf17fdca193702bd6d93c35d8968797ad465888218e9bec85755d2f985b39fd9e5ad45df6224159af242dc01b6a7234f2af1d
-
SSDEEP
384:SyiLU0fAq8lHGJea8D+Rt6e3GgapGgYidgs+ibFRyBtcRylvj0uHi7WyEOMzX1La:SyiLHfArHGJeacwtGpGbidgshbFcBth2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 107fef11eb0bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1FDC6021-77DE-11EF-8250-E62D5E492327} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000041d70f3a8ea793321e55c5e3c230b09a05b73be9f08d89e71f8b9ede3ee8ef18000000000e8000000002000020000000f2db906f54fc8b2d5b59b46dab43eb082d51138adddaeca1a291cd8d80d0091690000000fd176b3d95859a3824b20beb88e683f519965349f6907478d836530beb2dfbcbded01cd7511b02aaf599e74a5b7b93da1a19e364fec5af303da7ff367ecd5edaa915cb390e55b05d0897acc0dd4098ed5404a8bdf154aa46fc779cd9f85c7a6fdf28bb779f975fffaf3bf0a02382a3e4357414b41cf25cc1b775d1eda4df646ebce3d6d146b5f9c3a80726e28dc004094000000088d76136f5afabad0af0de0e9374dbde1c4838ed24f16d739ed8d59ec927c337fdf959a1e78531e28f61da2dcb360b38c467518a221a990974e46f048d11840b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000005dc2e7ab9e439308c36500f25390233be0e8f0c608ab87133f3eb39cda28026e000000000e8000000002000020000000d33ed5ab0cd93fc351b522589e4821b5c69f3dba5d65a812cbd8cb5f2d2f0aa62000000001ff9652c1f127e1011f890e15b196a46e5114be229caaf5ad0596f858927a68400000009796c3d5253e30811ece4a9277387b80bd81345a4b5a0da2deefc609e05c31c3e4ae791e61b95c24e774f98407b99443ed1e7e73ed80ba0c4baed8c1409dca10 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433060004" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2348 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2348 iexplore.exe 2348 iexplore.exe 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE 2336 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2336 2348 iexplore.exe 30 PID 2348 wrote to memory of 2336 2348 iexplore.exe 30 PID 2348 wrote to memory of 2336 2348 iexplore.exe 30 PID 2348 wrote to memory of 2336 2348 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef2f4cec415c3de41699bc0fa159ea69_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2348 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597f2725cb6b803f5df3733d3e6af0ed9
SHA174d5fff09c78d292e31d613ef8bdd19e2e20c92b
SHA2560f7febf4ce56cbc0568b8fb78fc10aa1e82bec1e766336327675dbab1af309aa
SHA51278223bdbb60799342c338fc10a02b099b4a1e74107c96dc5767cd6b9408c87d06a604480c476d1bcd7aa3bfee44a124f0520cda74dcd6a2c56eb223886f660c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5725c06d64a77c635c1be8c8285c78023
SHA1b5c4aa208e29241e1d9999e0c7fefca5dc273727
SHA2564818f5e885ff81d31535582e45c6c15af198880de14b826665457c9517392187
SHA512dd41bc44befe08c6bdfba910ba3ea39566313535f61ac9d2b359c8e04438f8d82aab8e81380ef023cadac3aab38fdb7b66971e4e04f696aeed3ebd160781ba7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dc32d33f60eb99bf45bdb8c799b2a86
SHA119a888ada9ac648f7380b1aa5e3b26548b1ac0fe
SHA256f39f988b43f9fb0b306e2a8b36077f0d86616e01bde206c8d5324b0190734e00
SHA5121b89ddb4255c4430e97b3b1dd382e26537d1f6347301e58c939d0cae32b7aaad490e0f08696f4f925179ef19164da83308490025855a84e9353a3ff525b81901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab8fcd1fd4e7bde8fca8bd3d25dca7e0
SHA1b2ea6a6870a4efc25e7368c0bc615dbe89cdef8d
SHA2563751d77b9d7271d27f45ad58003aa2c90bdb481acc544734b7d894bdba6ee25b
SHA512ee674f42f5beeab9c767f759f43576410e08e9d0178959cc2eff15f3fb19d293f3f728e2e8b8c748ff8c3fff5894fa52c46782306d745f234998201f12288934
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5068913a0d619a5f4aaf9f13263af8302
SHA1f26e5ee0e55946a2311917dd2f1f070c7e272e15
SHA25608ac7db16b2ece2836325e26df2b9e120e4d94109073b173383a76d387cad423
SHA51233e673de1897499152215435f71d460efab974da2fea69612f182e88846d7534294ba8fc8b797d714c17c462b04e392abbf1564e7c7387dba86745db1a23d36a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554b65062e5b1fe0ff66c25352d52afbc
SHA12d9efb1538b48f7abf832510f61fec3f36f31b02
SHA256c1f0e69b1061f86debbc0ad5ca9a854b096e59b506f65b6cd5df8bc6ac6d10dd
SHA51206926a18cc9472a12e127c79b7a56af01e992cd1812bba3d65ef189a460128299abf9306961ce85e0dfe409d9adc7ef8e49f0b4276be1d57b8fd15fec71b2278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eded36c382ed1a1650c05632c7aa02e
SHA1850bd21c379cb9696169948b14117e3e650400eb
SHA256be4b8dd7856533e03124e7181ad3ab02c65c39f5742eb23523b9b6210f42b402
SHA5123347bbafa94ab94c2c818ba0f93776d6a52fe69071bdc4126c3963c80cf18c0bd11962b00dbb15e661a67136021a81384bd2dcc426249a14d8a1342b2dabfddc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a95e2fc7372e4db5952f7d6f95e93950
SHA1f7e85a42fd94c360ba0100716c273801b25dc2a6
SHA2568321f98a5fbbbedb06dc991a1469d6ed42ac3bb94ed41d6880ce235c5c259297
SHA51298aef97e895d368f7c556e963ba19f8123af186a4cf4dbe8995966497f9ae70ff067753ec42e2091ae3c64ed2c6d435bbe8bbdafa62d16395f148a7502146578
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0bb1affbfe3c821fa0199332da63905
SHA1706279abc9050b802c3ae40d5ae5f0de0d50d3e5
SHA256e65da323c9a905f132959096d40fa28ed952020b9f91b0acd5459700477089b9
SHA51266f08e8d24ebeb21205d152368abbd383a4cd6d2679755a8a14eabe2344ea454325892d1dd6b86a1fbba690f2600720e49258cb3e45f75e6dfa7cc7550f865ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52823e19ea00607e8f42f29bcc0bc9e38
SHA11fd1514fb71ac0c852d71c85e842a5fea0542930
SHA256425284ab82e992d392c5beb44f4357436e3efaa8e5b47ba0c02792c38b89f124
SHA512662e19f351246ff484e13d8a583bf7b120ace9fdcaf267593913556bf757cd6fab658ed795a2c56653ee0c367c937d5b0a4b98a4401e05ccf6c848e90c4bbdce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ebf3d5dc0c19f57be942d4ced5ff0b9
SHA11614f66d507f727cf53f8e0b05fe6f2ea49a0889
SHA2562cdcdb47eef879f8f17c8dd210663028f9fd60a10b604c64f15654a2929eb3dc
SHA512ae086c2e8d9c79eee90b38ea6685419782c1b9ffab778caf2afb9142e10c510419e7852c4d9b383062977f0011dccddce929eb50712e9bc3b64bc4f3e8437d4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52601331267a7e866d38d1a3f5fb429ce
SHA1f5dd97fdaf56a9dcc2511fc57c7a287fee34b79b
SHA2564c95be38266a58720d0b69272eb097322419026130b97fee41b72785038956d9
SHA51260c4ef89849585af976cfd51aec04df58b09c04b3739e49bbab534daba503b76f52931d876509d88a5d4f31a010a7a031bc7e68a714e9935def0bcb62afeb2f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5849fb5e370cdf7cdb290b466d33ce6e2
SHA1b289403f8f1dcca5ffa1162db8ca9c80cd519742
SHA256ee3d6083d9c90c269e5a22dde77fe72c4982bdbb9ab553c468a29dcc93ea19ae
SHA512a52afb0566a1643a0e611e66b2a1365505e146b08982647299a2533f260ea19bf4f53c70e2aee75e7f3b19dc5ce9c6430708b4cb1a1a1c03bab9834848344d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5fd15d0fcb11df80a5a00e021509167
SHA1c9fec74e229100e39d54a2e6783606fe4dad1cd6
SHA25660edce3475b369a70e8291888cc019f481b087a25441b764dbb10d0fd42a111a
SHA51278952fa734f00cdd02bbdc1d8a63cdb6d3dc68fab7db88f091a7db2c4d78dc4818868f972c71d94d2ecb2ae4ef1753127af50b54b27b6b9bfbb934431c9eeb5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5275c96de7eac01a2f6ec5498c972c3e0
SHA102c658e92df91eef24dcd65e349da28b3b9592d3
SHA25695cb44ae2d81fd8521c1b80b88535916161f77165212e975e6186ea9c0bf97cc
SHA512d2fda43253068791e490811b14e167bdfa424c568ac8f80f168d1364292b0f74ce72ee668498250553fa5b171f23addfb7511ac34bd13d03731fe146a367f095
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b8b28f92cd7abf898f7ca8de4080aba
SHA111a86eca673471d36a28845f0db8b788e64c97e0
SHA25613d279b614f77e9667838bd28970696ac565d532ae62635777b4d539f8068cc8
SHA5121b42f8ee3c2a30ee1e03f279e1381083471f5bc04151567fd6b5cf3050737d925cf74c5d61b2f161004ab2c92884a10aa371521c790d2e4d6c47de8f4eb55c84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501b8943638569007294e3c293cd28588
SHA10b9afb0e8080384ca51f1d7478305c7ea4943513
SHA2568b7d4662f4efa7424b6cf3497c21c89387d9cb8c60571fc81a592506c4f5669b
SHA512888bc696587ed9733eb12ded84e2eee81772cd8801998a4d364bd65ba69568c8199c0e84c4a57098cf97701b974451a926b4e90b58804864fd87968fdb97d719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f08cc1e86b961b39a8e1cdb92355cd03
SHA134507945d651fa5e78051a87bf8291509d62a708
SHA2561e4cf4fb4253d23009bb073b0e1d0afa7278035020abf14808614c1d5ab747a2
SHA512fae3101ded37b281ecdf4217cffc6748a04470cc98ba747fc42c816a57222b2a854d99fdbd3dfda205f040f05ef2b35e6372c7c37f44d8ef0fa79dfcdf18d67f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5199655ccc4357d760d0312196263cacd
SHA1e247c01bcadbcebaa5dc33f276c46b19b1384a09
SHA256f98637e05294731a35affcae7c75ba4fa5bd0c103906dc029424e66d09a21dce
SHA51205068ee39c74f5ad77e8418522ff93202ba2d5f2fecca72da29abc3e212ce8af5a5b41e2678df963922be7f8f94c516c9c4b587967afeabb37610e934a35af86
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b