Analysis
-
max time kernel
70s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 21:03
Static task
static1
Behavioral task
behavioral1
Sample
107f41fbcd4a75819a621842c4bcf66d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
107f41fbcd4a75819a621842c4bcf66d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
107f41fbcd4a75819a621842c4bcf66d_JaffaCakes118.html
-
Size
26KB
-
MD5
107f41fbcd4a75819a621842c4bcf66d
-
SHA1
b412b5f458c37163f1b762fe6c4346e7dca4c317
-
SHA256
e1bb7598c2bf479ac0af9cc229dc83068752c299020bdd4bc5d3f7bc99c9232f
-
SHA512
a60414ff4e97fcee8abb30d457aec2704c95146c9df139d4724a009ea5f43e1915594e3d4303f56e6cb20f2d37c4bcf24b9ae94d4a4c8b21d93fdb59d01e2aa0
-
SSDEEP
768:SvTt22tgOkrymllUu3lsa/FtdnEMdUuIUvni:SvTt22tgO+ymllUu3lsa/FtdnEMdUuI/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b0000000002000000000010660000000100002000000013d1bc8cd385f3616652461e6e85a511e04c939e98479e370242ea472448e2a4000000000e80000000020000200000004749f5f51bf0ec08d30931264fba0810b1f76385116a8d7a131ebddc5e36626a20000000cd2ced046718bc4485f6755f8c41f034cf4f7419a668a2412d6eb9f97ef96d8140000000fba42e413522ff21068e7c39cb740b357a7b788fdb675d7d2cb856fb3ce307955c68e2aecb874f835e720609eca74a73b6cac012d2ca5f2cc973a3edefbe264c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0eb32cdd715db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F4F17B11-81CA-11EF-AD26-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434151287" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1656 iexplore.exe 1656 iexplore.exe 1908 IEXPLORE.EXE 1908 IEXPLORE.EXE 1908 IEXPLORE.EXE 1908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 1908 1656 iexplore.exe 29 PID 1656 wrote to memory of 1908 1656 iexplore.exe 29 PID 1656 wrote to memory of 1908 1656 iexplore.exe 29 PID 1656 wrote to memory of 1908 1656 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\107f41fbcd4a75819a621842c4bcf66d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5b4199f3f25ad4c3375e301b852db6104
SHA1947ee57fbaa580fcdf7558e925c9054f2e46f61b
SHA256de14610a90c06b6a2360a983048e57c1f8b84971f5f04f1f4cd5269e90f8eba2
SHA5122e77249557943b3ad96d27fd171111bbb0fb304891341aee2a641d41dcc46186670337e248d9dcf0236504cf24c62802d85067db28033e92c1a94077f1aa9ab4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a5ffd7c5ad3d591a6ef9a1ba97b892d
SHA1b3c3bdfbf8c5ad14e5626ae9f635a99b503804c9
SHA256a1d48ab9bac3ac90dc6b7b7da6ceefcff56983a60f846a3f518130e17bff5ea6
SHA512683fbab4ecd07437a23f8134fa65d60e2c94add71aa19b0535633f658ae39f3f72db6e67ef108bca8182fd84ec78d9690aecba1ec82f937622a2fca83e796e39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a139993d3e816f2199ff802e794b24cc
SHA18b729b86c47ceebe9ac31b1c0802449d5e1d244c
SHA25655443aefd32cf45606cab679ff26537a2266c2b89d8e8c5fc1484b6aa4d7c816
SHA51258e13807110ded517789e4968536622b2a5636df98acef35f9679a525faf9c6fa91b27b6e1e767a0b86e12a6dde76847496ef0478c9c01dc455c92de4356177b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51654f1cad8ca97535aa880f1ecd83e44
SHA16c0aa5487f25b4603cec2a3b983509bb78982ab7
SHA256cdb92d94e7bf1ab28255c799d82111fa0afee0dcb1aa2c7ee13ab5a9937ad61b
SHA512679fbd94925fc4240569c9f5903950aa48a1a96f73bd9b3405b34978a38c34df0e9a3aac5809cc3459209ad01850c1ff7f8fa9e60dd9bb8cb7d11587cf4402aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560af98ace2419ef8874aedfe72e557bb
SHA1699a59dfcb6f5d9366f781c9174518bdfda09b46
SHA2568cd203eefd8e0a4e91a80f99e1831bedd6af47fa6507908cbeff1a96335d2f9e
SHA51245c443bb28fca9fcc92db353918014efaf77f0a10e301b72125e6a4b8b33ca153f7872f6a5a67305750ac68b484ec6a66f901e38c28db5c1deb71ee0d14cccc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5399a59a921d5396cc6952ba1199b71cf
SHA15bc057310383a0e7353edcaa8cb7504f50cd7b16
SHA256aa9b2889908255a8662b31dfbf93cff6d6e47a081c3ee2643d709ed422b46a9c
SHA512e64dcf4258fddd5fdf396b09274de540521575df6f9c95508a1474d76215dda9e4b026c41e3bd8bf8c1eaecfad1de8d7a66b9ebd35809f9959ff021fc29573fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553c3ab9765f2aca2b0b4023dbb2a9d41
SHA1b85d34b15b8e631b1cfd8746a011b769e59d2fc7
SHA256cafdf0a53fbc7bad8f4b6d3728eb5c8fc1c360de5afa04d75bf011f154ded28a
SHA5129268539f7351ded5f5d8c325ece235c50303fcfd3dc0232a9d9d38fb7a8d481cc2a7f51666719e9ad53092ff044122c3ea32851f67f5e7d56aca5eafb124715e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a24ca4a9087da682c60e0ce6c9234c14
SHA14970939ae9e5332f6338b59a17e2812d47b6c7a4
SHA25624a7b288b19afc39b2fd40473864bf75c37929b1f7a16b9eeaad2c64d34b4d80
SHA5120b0387abc9786cae484bad06b2dd5a7bb19896f3c2b8d493154c0c4dd246f3ccc7e80dfd76f1f87c31f7b392fd2c4c326338a64e9dd856f22a0b819953f873b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530ccc04d507217dd43f1d8ca6f6799b3
SHA1c67dedd046535e97630213d620dfd8542b6745e9
SHA2562a995ae6a4ae4f937bec5da60a0229e43732641c88b8772dd399e3fba8061101
SHA5122046df665931850ba6e50af5fefbfcd407599b75f9e2820b4f82f69722840cfabe08a87aff31a9316e1902ad7a373469901e6bcd0a289f5d26f8a96826f3fc8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a37b27702e6959a4e7c778d4763e96d
SHA1d40c8a016a6280212171dc2b96cae6a5f6e016da
SHA256d9a6058055cc1512148c58c0189d6945e07ead8f8dbdb645fbac801386351773
SHA51258034017803cccda12ec74b8dac7b8dbbcb7d5a5a427f43241aea4db73efecf049577e10cead1bc3556c1d3e9b033a13243a932646086acf49e6a5cafe176a03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc09cd032c9359f0449f199c4011e5b3
SHA1d87dc9b7bf3eec2609ff398f86b84fc99dc346be
SHA256c1cc0fa086ba2ee9420bcf85787672f1b83e59e8e4eb9cd82c64b0d3f258d094
SHA5128508d575f60f1ac469b75fba1b2ef8637f95243c00b6a3a90ec15acc89d6b0b24c69068e8d1efb5b43314be58aa7d9b12763f2831c95783800ebf124eead6d82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5694bb56ad979f9c400bfeb383dbf7195
SHA10cb209f116cfd348897a9d5f59f22cb1269dc07c
SHA256864511f35a7b280813b8d5f02209df7bf6b80167a987bcf445881cc75e57fe49
SHA51279f562b7e147e46ee338fd3e7c592f579493e36a2be15da6c7907b6d14108886e95a1dbb8ffa257ba7f61976387d30bc2c5ed93acaeacf2e5117013e1a403d3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50245b3849e33abc547f1f69fb8e0b188
SHA1ed92c272fa3b2e56e839b63b4c2acf0de0d3d09f
SHA256c9ba67848568d94fb9800d2d8316adf31ce358b5483cbdb71687cc6c2bbe4974
SHA512fa63a63a00f58cdda88ad8191bead1043a97e4c7d22dd3a5dfc43d7c1f256ed688c9db33e2be5e13ea956009760fd487f97a3fc9cf96f1706bdaaf8be394f79b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519fa36a4b3e42f1248f2f8979bc039b1
SHA1962db142bef88cce9c34b8d13ab191208f0d5ded
SHA256d3e2444cbaa62065166803cd3a88a1f50665afdfee2be35da8eb5c78fc6b5d37
SHA512b6ffea63e595adedf55bf980cdcb3bb29741df558d6c25e5b45111af0cda08fbd4db9e22d04679b516ee1278202fae668e4fca61d8196ff5a6d7cd280910f51f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7175dcc93d319e1e5a86c287b92bdf4
SHA1cb0bb3470eca5764f2c88351e1f4fea644bf2e8f
SHA256bd490029120a28086bc34358d5ad5711adb960fdd4ee5c92b6926cc46a6d37c4
SHA51240724c7a5ac4f3080a0d027be9b97c0f542e70098688fd274ba9bd950d04e575ee3253b48636a98231c009b09cf8a85976e0f2f3f7e74a0ccf6afb3ba73eb0d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e2cdb9697192e98e7e3e40d1400daf1
SHA1e0b5f9a060d376cec24e0f298c610a0074035fd1
SHA256173ca6eb7b2297b14672da5268aa59a6b127e46ad398eea0ed51d04faa7539c9
SHA512af11b727a6be8f10d44f2ed059dbf7f2f3f9d67009b00191412d486843f26ef55b81493c25eeb07e9394fed136dec0ac9131474f43225b5b6ea64580a83634de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5898180a09a88ebb6e736ed3531f29558
SHA10c0c4144f2b62eab4019d9cbfdf0d0550c74a510
SHA2565b3a79ddcdcd84be7fbe5ba216b23768896d06796fb923bb23df37590345aae0
SHA512daa83a932809a089f7ae8ad0f94d75ab6533c63c887fd2d5185998b037946f5b305fd35daade7e503acdde400b462ec4bb60dd2acf6fc08c81f79e39c7c0f1fe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b