Analysis
-
max time kernel
136s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 23:18
Static task
static1
Behavioral task
behavioral1
Sample
fb155044398a6da90023ef879d75df99_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fb155044398a6da90023ef879d75df99_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fb155044398a6da90023ef879d75df99_JaffaCakes118.html
-
Size
214KB
-
MD5
fb155044398a6da90023ef879d75df99
-
SHA1
7a8dd21012e5dbcd9001d7a2804fdc833b6756a2
-
SHA256
b067abb6033e4ecc6029cb6bea0f9a5f3e35affebff7c5c6a30a8ccf523b8ad2
-
SHA512
001727351986b455c44fa69b042342ac4ecdd4e1421e9b7813468071db6a1bddce6205d8b72cdfe36e5b7c40e2bc705ef8d37e1a4f9a2d85015914001219fd31
-
SSDEEP
3072:CrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJqy:Kz9VxLY7iAVLTBQJlqy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CAA3FA21-7D26-11EF-916E-DECC44E0FF92} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 103cfadd3311db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000054989cd070348f0c51a9e4e3d3161055436b25e525040b94731a05f99a88307000000000e8000000002000020000000a36e787dd7023ead83924261a82ce175b6e89beda3e97b837a05d428905ea16020000000a32b4287ee8672fdcccf0ffe016c0c0084dbf6cb5057d307f6faa867fb24b2b240000000187f90c6426f763b2050a94cd9209bd33ecc6e986322ba1005bdd82afcfdbb0dc974a375a015a04e6088fe1f4b6d4bea149072d4032013807a0129b27cc25b27 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433640971" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1620 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1620 iexplore.exe 1620 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2852 1620 iexplore.exe 30 PID 1620 wrote to memory of 2852 1620 iexplore.exe 30 PID 1620 wrote to memory of 2852 1620 iexplore.exe 30 PID 1620 wrote to memory of 2852 1620 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fb155044398a6da90023ef879d75df99_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1620 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5056bb0bc045260b9f28ee33ef1b54d5b
SHA167338455d505d5804bf6e4649ea13f6a29e20fd8
SHA25699800973e611e73fca95a9e67bd0044d729206a702507a4a3c52034de282057b
SHA512960985fe492d6e38eb2919beacf56dd54aea0f87240caefe69fa0bc3110ff4981a7050926a2792c524b83915dde440f3525528084dcb1b778ac5d8367280fa85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d11c6f3fefba6171749d1965a6c9680
SHA10b3bf999760f020879746df4163d350c059b6561
SHA25622007e3fabffdd4b16f5b2af86164227123b276877484653fdd311797c8be3ce
SHA5120f3df438ffcb3867ec14bb921b16e3757dc1293954b0697415b72d31c4dd78554a30db17efec4e63360edd45c7e3a4d71dea417add8fc3f54b5c7bce650769bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ff1cc468d74ed9242696da16913582d
SHA130c7c79e7da83d3c48f5c45d25a311c7be8c7457
SHA2568fee55758e210cc1b57e43ce5995ddfbaf1aa15c89c3d55dcb9c9ed9e6249c0a
SHA512e511f4b9d25de94b624f76f1f67769e5f174ecb642c352341c4453135edd345b11ab5b2b4fa0e2f13aebc230ce8e3ca4dab21d851dac6002ef95cfc3898a72c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5835fb47a7054781a52c9899dbe0a5015
SHA171de8fd63075357ce69626443003fbb6b177ff77
SHA2560f3de5909d0586fabdab7888c7c6898523a662af6e9c2fbbeb10994d3433fa3b
SHA5125a461c871038810acdcf394f90bfbb002a9a53fbaadb8c65567d9bb0f9b6ad216d4a578c2d73725283cfe9dfb1de89b9f5759e401c12a34a5aa3330dd70c1094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b65d13527053d9608bbbd550b3738aec
SHA138fe14d755057014b3f35b93acf64c115ad61814
SHA256470cd617d3d78fea0f6e749d8c063e62430b13f58df7df0cbdfb8d72c65f9d37
SHA512e6c62c68311b2a30bda09aea9d079af2eea9a4083d35543b0083c9d5c1b0897c118334660dee49ae9fa1b4b37ec6af8ff03308ddc6c01fe3802917aaf92201e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577f4763c319035f3f315c8b3f901615c
SHA1c78a633cc257373cf3a5a7c7167688ed0a82584a
SHA256e0476662ad71c2918ec8f6427ca4982a84f065d7ae204a916a299a3a863c3e28
SHA51205ba1e30e6ef19f57841f4173c711fd23ab92ffdfe5b9a8bdae1c0dae6d87e5421a5d028144183baa16bea50b02050b2515b3540457341d20beba51b4f63ce6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ab90bd79e1c18ccbb60100f84e53273
SHA1f2be3ac94327785d548f1ee21bc95637c473f8fc
SHA25625ad5bb9209d1c289a7ba2c16942bdb41af63437c87443a8be9f5d9650509922
SHA512105f4301121db1bb53ed566ce236b36a55d6bfd0377f364908cfcc0cece264f4cf37a4411686e07faa8c8f4e71dc339f6ac473420120ddc63db1ab93a59dc807
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502c096b2ea5c36add07c77ba2a091525
SHA10dbf25c51da8a6f9897c77238a24e118d8461bc4
SHA256f9cd2dbb4c9a99184ad153397a447ecfabbee02e40c0115586f6f41536fcd88f
SHA5129e346d1941039febc75c49a736967eabe10b4b16d937298bb658f0019bc096a872b7f51c9b715b319de630605e9794f35836fa0ca7314a01362f339b5576abc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ca74126c071285bc6442302f29fa29d
SHA1dbf8c1535c48805abeb4ac821e29540fa4fd748f
SHA256c5359c52159db7f78994651393f580adc17532feb6aae1446c02eb663b3a8a10
SHA51284e85e0bb733df3956846512e41cf4db7db967ee92eee2f1c00d0e7b6e2e89feee8512eae28dfdfe9066b28332a397fa172bc0c308db8ce8ee74ff662d0ae37a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504ab2356d38d630a1a29060a49b6a47b
SHA1a59b2d4ed0d7de88bd019deb0a815640cea05126
SHA256130c2b5b5d7002b3d9c2fa5c69224cce6905bcf154a7fe0f111c635a5b4c42dd
SHA5128c2ea9447dc1caa5cdb0bd538adc8423f2e6306b0a6158d938fa2e85a860a1c20592035243c7779ae65c4594b6a743bb6bfe179370c23be5cb1f5f0a5e7b6ede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56acca21e893de647318f388bae4eb6a6
SHA12410c8de4a1dd2eeafd0692c3d2786f248587f48
SHA256d7d537ad213fecf3b5501095b5e7fc8c4d4c909bfb134d963da22493787fe65d
SHA512de11da1641b8d493b1107769efb373e72c75d608c6f518a654980e6fe4c0a0df3c7faa13bdb629a1b0566250a7235f9ca244acec4aa6e74695bb5b8969350459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a76ce245aba05dab2a6f28da6add1962
SHA1a2c9a20bcc669df3dfe5db3f5d00176990bb0d86
SHA256b9af0447c7e7f8699d6f056a7cb735431dbff828e634ee48f4cb16c70407a4b0
SHA512cc6105c1e0bd177a333d27b00c3450bd6c6c474bec9d052325212deafe571c5280ae49056443e44202031a310b2f6b34ac497a8ad54c468181232469cd334611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57801c3b5d31137f74ba4df63b0c059c5
SHA1f70b2cdf04d34154b840dab2beb8d9ce3999a10e
SHA256953d3b01b019646444f15ebca6e49565bdec96db8f54433d0a7fadabc071674e
SHA5128a3f5059460c9c09cc1e789d0a0515cba1207f7767608f3869a353d4157d6312909358d7772fa59f4fb22671f461492463e12283773cd4202379439b6780575a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed774d4a296853600337484a418f192a
SHA1ad0a6a53481e1183acc6eebc369427f0fd79639b
SHA2560f78d451922f9a18d6de2223c003566cf7656518e49456c6f1436590a0626dbf
SHA5124ba5fa334cd50b392e064b24e910847a8e290f334d92d1cbe265e10831a820edf39f704e70eca2306400f45f5777a0ea17d3f1ef8a5b9fb7695ef28fa64529e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fd720d362de8176232d5f323ad5ea5c
SHA15e8ff76f7dbe76fc16b02f26e74261118c5ca680
SHA256dac178cac27c30bff1d08f6a80abe744983582881d203e73d8993bdcd83f022f
SHA5120c9f8363c173f1298f48332e868102a7681531722df2fa84aba70eb3fe1aa05a7132a2da98881a6c0bcdd2fbc1c85ce21f2014257c3f9414cea5041f24dd29e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5675c085463aa387d9e8d34802cdc5b2e
SHA1d352ce9bfedffcce8f6f5a331fb7eda6ea44f8d5
SHA256af1a4187ec4ce806f94448ee72c15bf159b6ee0c7269f58a302359aa0e8a7dab
SHA512f500f78131058c9b1e608a7b632c9ec1424c078b331fb53fe3c4e41624e8ea53b68edb865274b9a6371988ac15349442010f63a277d6fae6281f0563b29f6d5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b5dd51e8801de0b032174a4a6d159e4
SHA1490fc58edc7bdeefcb2aac78f08160df82153478
SHA256c3d609c93ae002cf311fb6d4b5ad121d28501749f4e9ce7733c526e00da597cb
SHA512d9d3b4f8683bb067297df96ad5413b0125f5319c39e0ba691a51e5580d78d9be2f8fd4bc2a134ddfb437bafeb58d10efd8d697e5a22ba5e9e65250dd944dd594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58773f70bb239dd3dd5b0a90e247850da
SHA13318afce334ee77aedcd031fe008fa046ba6b728
SHA256e530469f06b6355d93a6dc6ae47929ef3aa44f2d6665388c2d7a32131a58ba87
SHA512c8c389f774f10eebb246f0314f02e23bbbd84ad2577f13fa57a698087775cfd984e4163ce5845c24d2bac6385e1518a7a4e20ca1b8d163f8dd09b2c27f3a63ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59570305219f8ffc7538b25fcbbc28c91
SHA1b55926774b04a52ffbd870c4d1dbac13509d15c2
SHA25680740b04908b90ab8d0fd948be7d24d8185cd1b2e00339a2294b988ff87d3c91
SHA5124fcbf69a071a84ca009fbe00bb3009a85996b4b4fa02df8e221df6904d24e598c08b0e522ecfd350b51ca3aeda9f923ee6ef7e998452581dd6235d7758043657
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b