Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 16:05
Static task
static1
Behavioral task
behavioral1
Sample
022f17cfe1cca395fb49b7522f9b4df8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
022f17cfe1cca395fb49b7522f9b4df8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
022f17cfe1cca395fb49b7522f9b4df8_JaffaCakes118.html
-
Size
3KB
-
MD5
022f17cfe1cca395fb49b7522f9b4df8
-
SHA1
0aa22744606f38c1089bde7d44aebfe8111c1ebb
-
SHA256
33d739067febdf7e5a2f0416ee8d28ca79d0148107d64e5c0d05a4a2c464e5e4
-
SHA512
6e6a9e3ae3a892c6f26947149f005d701abc4c0afc8348821063b8eaa958d9b24c42b5cfcfa48a63d74ddd6191586dee201bc9067a2c5616dd4bf5b212c22db7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C6941841-7F45-11EF-B439-523A95B0E536} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000005e345385dc93cb2d3e86a5fc151691c394b2cb35e4f343b36248d14b09988149000000000e8000000002000020000000771d55ef745bb3e31c8f7e8d376bab2220959249a057f75c140b2ab854724d6c2000000030f226a717b51c0dafdfc38864bb4ccc381d8038f7f24769597b74b3f4f2d74d4000000066105873d2563dada8457a0751c3561ba9e842dd616770da943b1f8d024c031626b3d7f74d4aa7aa55ca6eb0a07293d2cabf8550c63a7be0cc607e4d6c4f4cfa iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433874180" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000af03ddf3d4801393a90dbe037e502ef9a698e4e5cd24e8727043884c804e3ed0000000000e8000000002000020000000ae12d1b217680ed23490686241efd662ae31beafb9bbe2f4b9bda5ff41b0ef6a900000004db81be494ba30d9a59c0772c27c36e1df754cbd4c6df897f89e4a2952d0b97233a0067d908b11ed305e967c19ff280d2073d7a0f038661ce2c99ecc65ddb8acfda4bb017e759f7357e8d3b151caa18d0301e1f3aaaca4f3da4619d4bf782904b37d5cac10b81b20a6f5acc104fa0b852386f8ce52aa9829de36cbc5e531e253ed85ef5e1a77ef8e9674ac3d26527e1e400000003a6dec4acff5c13ea5dd717ce847cdb3c397fb0761f21f4e8c640e3665740c85c3ec63f7e433672422c43a42ba75907aadcf0a5352b156605626610d9b50d736 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0cd6a9d5213db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1744 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1744 iexplore.exe 1744 iexplore.exe 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE 1680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1680 1744 iexplore.exe 30 PID 1744 wrote to memory of 1680 1744 iexplore.exe 30 PID 1744 wrote to memory of 1680 1744 iexplore.exe 30 PID 1744 wrote to memory of 1680 1744 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\022f17cfe1cca395fb49b7522f9b4df8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1744 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553ab3dcbb470284fd976e12240019341
SHA121ea0d008f3356afda57045b6816fecbb9acfaf1
SHA2562706dae88d6b8d454f189128b55ff0f40ba2c8a81a27713c46b91a31c26b99ab
SHA512674127e3b0c56e061639d0092d28fbb1df8420248000cc6b2f995d70d3fda4a79573dc8c7cbc5236f4b96d0986bdacfcaf1b46ad2adde2fa1b43ce82fd2f8aad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b26c64776c42b9ff86164831f239413
SHA1f23f17943725c853c5d17971901b24ea00fc31a8
SHA2563e1e272d6a27b7437d57570f5dce230911c5fa90728f95e7f5fcaedf67a47d04
SHA512a872daa60304dff9dd43fa25b3ee0de89058e9c1d4054f02c14790e4f989f8a5d180ec95e622e2cd23cfedde11406b569b2400b53fd3685afbf5fadf2b049a71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567817973e092f094860bd2459be9aa8f
SHA10efad77a70dd4ff60ef30842848a54a5fafd6ba1
SHA256d5d807e54c54af7a6dc464fbbd27f7416104958452dce5080136a3ad37432555
SHA51212295d1a8bfc954b8e25b9b6723d36f3165d6d3b56356ff10110aa9c1f8a90db377d4bbf775db13e1ba9d58ff7df2704c4aae7d945fe031441853f95ff6611f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ed0b1e4df40b7c11233a52b9afcc87d
SHA10efe2be788e8e093a5b5e2b598ea8caab85c2ad4
SHA25608d16ed38ee0bff7c6616faf3161b323ead31187593a8f56f69e088f359564db
SHA512ce816041d1d59595c91d8a09ac4f70689c327b275f20fc4efa4bf33824ed01112d261c0b04244aaa8174708c1f6403a6e3e5f85805b31112240a993823564be2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537abe6a11fee38ad79f06ca0f7504459
SHA15b30787c343c7cc92a4d9efd4fe518c9b2b69e7d
SHA25654bc6e48c0247d0c298177e25ece028474a5f21b9fe2e2efb0a0583039a060dd
SHA5124a1ab0d3bd6fd35e836dca92897222f3d519d21843b4d2f20740f22995af63650cf2b899e9dfebde4a32ee8ae44dad27ec64eb06452da813b417c3790dc113e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a17367f1dc85032a230662b383d23250
SHA1a813da1e1bbc4a1958188e948d9c6d863fb9184c
SHA2565c41b6ad7bf7440ec633102c43c6c31f7504baec02a25b7118f5c5b2717de0d3
SHA512318d8dd4a851e5194b0e1dbf88f5527da4f06ca97d3a7a69a5ce4a27b385f824c6ed80ed5376293b1340f9eb062d1b4d1198994a46bc203cf978d10b6a2143d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feb5d13ddddb6b1db38c16f5d2c45809
SHA1e45103ec1163f809c8bef7eafc433a789b18494f
SHA256fa9cebded4179197f4e87f990e59e4da8a82e08d0c2c57036913611796baf097
SHA512d254d6f4c1623220b5a21c37da68d6e789b3f1ab4e3941e13e043b27358adb193bff6ee4f20e9a724428032e8561639d08a42a5b395ae236ff552f818011e567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523467831b53f257c676461f2765fe398
SHA17aa802aa64f1a439206172a87340ab701b32199e
SHA256900293d4fae0876c7fd6634529bc8c4173a9f5d29c20cb67b1f5fd7d98ca94da
SHA512e2f78c854cbc177db9c3198333ff79dd7090a34900cc2ded5cf20e19625e332c9805aca5a781d0803c6ccfda5e5019ae74dfd0513481b1d89016dd9eba51ab7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502a3d666a183de1532e9d14dd04eff8f
SHA1558c4cc12c112777b66d81677640325bb1376289
SHA2568e1dfcca48fb5fd2266150a3ad019067976f3b66e08c6c2e2de7dbbfdde0911e
SHA51254300bfc4bd46a5ebd9f9ad502bbdf8516b9150af58c0b31fce0b6580ef6b1135944ddca2c0765aa74a3f0d64db2bd77e8e886e912456cfe77280907c22eb1c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a349b8dcfe5847cb529d1342f6801baf
SHA157022e40738606d21220ac772d92563e8bec53ca
SHA2567e059b13c5f1452ec1d3f7e986fb43582452a361947456a6cb66e363d645399f
SHA512d0879727ab3f2a74bae2a3318f27e13a0279e6d4332acf3ceab8da6e181d71f9b56b7785a882f51f4f57e2045790d7bd71efb5aed14dc2947a79b25524ec1b68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573861015b0afa84323f7b39540f13b88
SHA19700e6893dccf15edf58926b20db50994ff2728e
SHA2569517d361d39d775ebc4ba35c3ff0c2ae93f4721d6ace38588b367d48d1adc824
SHA512149943ac353152dfd04d1c05b79204db05db239d57a58454de4c2288a0166156bc18b3aa1f6f908309dbdba30e1808f49e7fed2688d50e4b6ae0466d61efdcc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e021b7ef256dee849d60ca5b521e061
SHA12eaa698c012469c109a15485da74c3ba8d9f498d
SHA2561b86a531dd2b4c2e43260a48f788673aa8a92e0d91b9f0d81490505642501a3e
SHA512a4da0cba2639cb434af75ed81ec65bf127995b1c00ee626cc59dcf2299f847c5e66fbc8d4a79b12032ae96194064d714345d9016c9676952e9f9dd2115355d8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51251ca5f79a956a868331d4806aaf26a
SHA1bd575ad0e928acab2942b5e0e28182d492b5cc8f
SHA256965958a8c61f4eb73c7fc6369df6f25851baf45c9f9504d2986ab09ae35f9d42
SHA51270742fdce1d2ee7fefb12c58a82cd0ef190d0ed4e1e31439bacc21a65ed985938f0fba030aed32bbbaf3cede34242e454114b70b32bf2d8d5f5972afa1fa48c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514f2ded9bd7ddf72659e70f30e380637
SHA1c9c9f8bc5791af6da7ac813c5dee91477e0b0652
SHA256d473fb6a2f9c60cf718ad1a89e1895050c6a2bb7bd934e277010d2f5c41b4f76
SHA51236fa6b5e4a59aad694e079d800e0626e6c5741c8cb75785345d18e0f21d3d3c6dc3f7425791b92c8eddb65639cdacc90b96f45c6541db30baaf7b44d130d1f34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adfb00596fb353ca0d0426d5f50a312f
SHA1c8f38209f0ecc7660433471dc798c8abb8cfb39c
SHA2563da55d322824feaf1f690c6e1a1a8b087adfefa101831e14ebfd6c8a12040182
SHA512f939384dc3e078011afea49a1c5ad304b33bc69edb0c10d653bfd6a3145cc88a36994eb26b09167fa2948b737f773768c5af8b7fe2727e75211d5ea6589d2b22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aac3f4f7cc2ee341d3fe9184e4ae8508
SHA1c45d6e319388aa49fd09ed0d9db707ba75992c3a
SHA25673afa82f685c3054972a2e274a8d57db7e473fc99534f1f8e8f2cf0bbbedc723
SHA512541ac0e143de82c3bbf90dd18eabb2d389a53a418e7821d598dcd5cdcba0213e5e723a27f40805a2bb2b13db1957a8f22190ce6c533d535dd8134ae070c76e15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5591a25a151a90a505f1246d529a8e78e
SHA13f20fb1a030eb38ff56cf86a674b4b56bb3496bc
SHA2564525ff45f2ee16b56961ac77869607acc07fbfa5bf7e5b5662d8b9f699fd5516
SHA5129ea51ac4f217adbb4e6d5065a8cb4b85e2d322043bd7736b63ce91c413f133bbf7dc60782ec39661155a06b4c57b6cd233ceb50dc45fa5e8431ed5590fb42e40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f8692bbddfb4fad582343a86eacf7bd
SHA1995f89fc8c40104ab20a1749e9425a804ee0e21f
SHA2565aa4d2777d655c37900c818566d67527045ac2568ba8a11fe7ab7e9a71dcb97d
SHA51278a4f594f95708cb098e9f2f09afa5546d7fd988ef257c54342cb053d05a29dbbb0dad78511ed8104af55c4616228ba81ee16fe37c7a341912df35e06ed07d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba899fd5936cc99385e2a446ec23a062
SHA1cad598dd572ecc4ad0dd1fd595ed42bdb7873d8c
SHA256cbb74727a79bd27b2e4a7844bf201dfd390aca2bdaf2abdb9ee18b4fd09a20a1
SHA512aaf47708f4c6ac64b9958edc302a04e49d214ae67f7cda8310fe3293226944b4537bb4b34762550eb4d2ac5a03cc1f953cc2bea412213be38f0be8eb537ecabd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b