Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 09:04
Static task
static1
Behavioral task
behavioral1
Sample
fe330542c66a04472590188d7b8de5b2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe330542c66a04472590188d7b8de5b2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe330542c66a04472590188d7b8de5b2_JaffaCakes118.html
-
Size
6KB
-
MD5
fe330542c66a04472590188d7b8de5b2
-
SHA1
3dfb0ea7d2a0c3f8c04488c7e9c4e2a5a04328f9
-
SHA256
dee8dca8969e7077076d0a6f3454720921551a46c2994c561310d50fc189aef7
-
SHA512
1a51cec927fae75095bcc3e72e42a9b5ca4eecf53e3ce364d87b5777a33d3eb2156e5d4829727dc13d483b90b1fbc56fdc8a9c817e8155304f8f09210dae5a19
-
SSDEEP
96:uzVs+ux7blXLLY1k9o84d12ef7CSTU3wLcEZ7ru7f:csz7bFAYS/uab76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CA4C1AF1-7E41-11EF-B788-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd30000000002000000000010660000000100002000000008093ff681988e92331677d53e3dba2e8d46ad5fdec498163d9050e7c6569c55000000000e8000000002000020000000a32f7d1e6aa9b6ce525f0fd6de9eed109af851461ea7ed7b2f51f623ae38984e900000004c4ead6b7fcfb309db58b79a03ee4db6c5912b8c6914b0835bf23f644f2ec8965968978fa2be0c53d6a2ca053a2c85fb8f3164ab7eebb0319cf889756925fbdea5a30918b2b3e42f61ae2503cc4b9f275939df94c4a1d6e8fe6871f99aaae9196716921ee537e1559edc810fc611fea0e90393776526b262becd772f4b8dee6f395074977d84bad66e241981ac1b3ccf40000000082295621c9d7031cf5e8d29c372f20aa96e226f7f16175cc96f20aaf5d6a30eb7c449a2dff2412d45a3c6fb2a04723bd48cc6610b783c3c40987dc4b765a226 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000eed1908e1274d6db52c65eb6eb6e599b86fd791f4c5b37079c5f770b0d46ddd4000000000e80000000020000200000001b25f606201704356296e82343928832ed763eed7dde09327f64541c4ab7629a20000000a7e53d79670d9455a40c28d7fb78e719a8143afb9866c4f8477a15a1d0ee81fa400000004f6decd3df63a2f6b3362790c63d368cce9bbcebcae6b5f89b93ce16907f7e306603e0a11c2342a99c46e0e2ac79d64897787b466d05ba7e441c116dc24064a1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 805ec5a04e12db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433762517" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 iexplore.exe 2120 iexplore.exe 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2968 2120 iexplore.exe 31 PID 2120 wrote to memory of 2968 2120 iexplore.exe 31 PID 2120 wrote to memory of 2968 2120 iexplore.exe 31 PID 2120 wrote to memory of 2968 2120 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe330542c66a04472590188d7b8de5b2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfe30cd95683742d04a218d37bb55776
SHA15da9dab3cd941f5e7296ac24573d295ae1d642aa
SHA256e9d8cb0f49e3f8b40928c35563527ea98d57563740eb433a8632429e67e0d6cb
SHA51253f72ebb1db0c8628642c44c936369cdca3a81fd3104387fe54fcead98671685e98f7b8cac6d357b74c42f8bc0f8749e95bf1ebaee63fa0f472b7fef106074f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54889e2741d07e7cb7fd9840c30ea0bbc
SHA105b5fd3470c98a05facb727b07078c7a7c02519e
SHA25682d825a69c3d88fe568f1fc869ba445abd88b7e9d69a2dea1f7199e52b67a550
SHA512d8df7c0d00fc28e684162308cd77fa485a8b96745b7cb2fa731b26e8cf6d6179b9634aa183256ce69ceb10bdbb1021151b18f628669723a3fca8c39da40b6864
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a3610cfc3dea816bf685bd4aaa86e66
SHA1a5c6dc42339b7d52d7b1a170713c0c692b3d9a2c
SHA256edf08266a8e4e19851530c9161d3365a36f9375ddb995c47e9f243b1c361c9e7
SHA5122934283ee8598711f813fad376bee50cd1e707893110e4680f62e18582013b86178292176d131490f0670e7cd8110a33b9d97ce81f13676f14c64f448efefd9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfa7910c177cd9588274ca08b206d118
SHA1adb34474d972d26b56de71049f3d96964c8f20d9
SHA2567061c2c076bbd4d189443850766334205aeb7654608a735e3dcc37b033ab8822
SHA512a19ffe1c3f3aacc1f3547995b82d7ef05bcd863466bc602652904ad3dab46094648573a90c245f4028663553e32a786c590ad6300681e810374af7f3a121688b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b6bd0e08500e04af5117d6181e1b19a
SHA1bbb77709b047671e9966c07429498efe50a573f5
SHA2563038b3add0d0952df68abebb1735b87bf9c73f609fbce730c92ffd6ddf19f05e
SHA5121fa2bba136bed0b7a4beeafa0a595bd670ba596b1c80dd26208c1872587e234d4ff6c2a27a48f3b8978766c2584370ef2f102bc83659cc521714d523febdf97c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ebb6ffeb03b098945e3321fe22bfdcd
SHA11e008125a74fdf0f27492e9a0acb4a9ae01aafe9
SHA256b66c0f2c699c6800f5492b2d48c7d120e7fd7b97f8a4f08c832da78389585abf
SHA512f2d9bbcb2d799abd105cb92a21a533ea8fce693d742f17fde1a7a90c0d7f2ed99610fea1bb5f295bfff30f48fe0fd6926e06d063c12a98e7dda88c6e35e2d565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546a10115d9a68256f0a81762062794b9
SHA1ee65f30eda89d13c76757d0df4ada8dbca06aae4
SHA2569aaa2a22959d1e9c2e9d8d91b20bf16afae4a7e34de1ad4c53c077105b4fccdb
SHA5126cc4eea39de1424b80f0669a3c718e4f21043a790879e25e6b021611e88c4032d3ed3f092cbfdb1dab418abec27867bdae09602bd7243bcacf368c156f5956d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bae02174661772a94d854f8f4b302bb
SHA1b7dab4c4fd9d7e2b3485725f6169077af1c0e662
SHA25656c37a25620fae5599348e7f39f75e804e30f8fc47087eda64fb68c379c252c7
SHA5121c5c315b5466d8bf3d333b2060353bd29568b7e83e712e8b4efce0e67118311c5bef8b5d84ebe545047619399c437e1b55eb890d1091b1ad7005df83e41f071e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0f6bbfe670e19f8d8ad5db6ded74639
SHA1d75de7e003e31fe0da504a6379261f16e10a0514
SHA25622403852cf0550f9f99f1861163f1d192aa75998c581ac9d77720be13e0235ed
SHA512e4a7be50a3c4ac5921c204dc0c6942bd85f4b8fdb4e4c86bee1b38a21abea73886ec71e2e7508fe014e3aa5b39c259f8dd3de4756afe4a9cce406cc9cc48b323
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515026ac04fe894c6bea562bfce5d26d2
SHA18c47b32e3934349f1fcf12affc2adc71db949e9e
SHA2567be045be5fbc2d91b4c9d9ce412330aa4ab8ff9885814aee082e7d4db636427e
SHA512436ce0b46ef63374e9e487e365537c6740d1f7008426539e5757bb214d9581ec4aca1dd229ad8871da53212dcd218bc1c40936ab5fae332ee04f3f6f85c763bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5403bba300b5ba0bfeb880f8e5f05205b
SHA1133b805042370a202650f5a5d73dfc71f1301231
SHA256187578381c6af2af48c0f6e62a27d07ee1097d475a7e080d8af3f791cc1b9914
SHA51273b02874b7dfde9f8574ba55a94d71f2ec3a1a93fb87e05d4a1f6bed2f19887423be6ff1600543058a11a50ca7a161d9e9542bf8ea7e2e7e48cf84e4426e77ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593f3ff62423e2344fa378916540908b0
SHA101a6d9a2c4ead8e156c5291079db6229177c51c5
SHA2562b515d197265fa9cc6801ed12fabb42f018225e3bbca123a346d25a4454752f1
SHA512fc937e1aba474953a470a97ab202376695d35850dc305bb7ee75868996082c3bcebdb6c9c60e71bd5cc7bff10000fdff16e0ad90a683b832be64813d8466b0b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55204b38f3e57c3d2d557ed8d24fd2998
SHA1fe00f745588e172157938a10df12879d47f5ba3c
SHA256d58a40177c4853c664269d73bac5578ffbb6bbd6810b821d10c73f7fc08ca365
SHA512ee19a169bf0bda4857ebb761dc30416a8ed7493ea407ecb3c30db8733c87d41a5c80af8caedfe62df554d24092884fcf5d4a4308c878e1200691b6ce6f7e65fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c045ead2d5e49259359de53a48bc2c6
SHA1203b414b6eb1a865ef7de2d3511dca4092299353
SHA25616f3ee523c863b8c70bd1a74120d61641f6ca440ae6f8ef3ab310b9f75b238fa
SHA512980696fda55558255ce590ca8d7aabe79b82ac38dbc26bde3e945e862390bbd164f356624f1f599a54ea9662c2b3e66df518e588d9b9896cdcb39f62a7ca6cf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0d6be5a176506ad1a4f863cee62481f
SHA1c00b29821cda6928890f1d2b25d54fe48e9bf4b3
SHA25684476198b5f956a453ccbed46de822121639920111719153cc1d7f0e37728e39
SHA512459d7455979152cc3a2e835b2711268b44135a019521ebd02c12f291a7af0285ed5a90140fde26c204163e1c0fa5e4aef7df87d12a18c5e460da8401cf46e137
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb0c50a9765ee9e7e689e856a6a851a6
SHA1a55283bde51397e4a70ecfcb267802dba0038f7c
SHA25653efdf13751ab2a1321cbd4ae2cf7aca8505640d8ad6066efa12cb8cd47c1c33
SHA5125d5a162a890331c2fa1bfe7ebd52e31bb3c5bed6190f0aee81e98fa841d5834fe33b03cc3c2d2d1917fff34b6c2edcc5618853e1ab88bd609623020b20c9e51f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c2a341934b1423b28c8863e4cd4caf3
SHA12a456a43aa348111d87d0f21e67916837d8a4f80
SHA2563ca5754f30b9434e0e0fd5097d14e6e35a2fce149bd51845342d083b2e021a92
SHA5123af8db5a1e3c899c96de73310539948d9f8cb0be6b4e794a55b226a603b0bf7954c0fafe8e1be306b84c36202f12b14f7c29a5225461288fc6990cebbf975ca8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9fa90664d68aa5c24fd26712dbe00ad
SHA148f7ef43576b7a786e26e4b4c26607cd1a23d37e
SHA256b573842a11621c28cdd932fc76c67b4f103ae18978d1ade097b97e37aeddeea4
SHA512968319b27be2cbbdf6fb256f151da4237156ce3d436175ada7e8f0db730985384375662a4de439efbcecb75c53ca083dc1998a8b08b3500435f59289a9ff1823
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2152d447c4bcf7ed128ec9d00b9d750
SHA1421d3dcd245b7f3f73c185d209bc6a9fbab328da
SHA2565e017faf5fe68cb24a8991c277e8a89616ce315331d4d33f05932386df42002b
SHA512d415abf82c84a9872aef0e5a008927441337bbee0d48f65e29cb7513e55c868a40527ada94481da4ed4b3beb035fed11a93cad66460aef89a2957393523ef51a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b