Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 03:05
Static task
static1
Behavioral task
behavioral1
Sample
29b358d032a5e91678e615003cae6081_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
29b358d032a5e91678e615003cae6081_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
29b358d032a5e91678e615003cae6081_JaffaCakes118.html
-
Size
6KB
-
MD5
29b358d032a5e91678e615003cae6081
-
SHA1
7cd4a3fdb9f72a3502138692d9ba8f6e8d732a8f
-
SHA256
abd1e57d8f272e7717a953790d5fb5718ca29f586573ffa49b9418f9622e1c3c
-
SHA512
d10b3a4d7745addeb6e71fa112f20a3ad1e0e685f36309798cbef330f33526607f847e1e28d82af66d0393576299c16cf75893eb923de268b0a0c0af799fbdc0
-
SSDEEP
96:uzVs+ux7djLLY1k9o84d12ef7CSTUJ9ecEZ7ru7f:csz7djAYS/Rb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000005bc31dcf629a4b3c942c6e29358304f94e373e5738d3a4606c4e0d30538291c6000000000e800000000200002000000082e78b6d0c2aeea9bebbdc2e056cb5058285719835c5fa88baaff5b2ad225b6690000000971d74a6cb6abbcf43856fbd3e8bd726f049ba4892bc5333334698d8434fe524d09e6fedd87adcaee8a9fbdece66e4fc85c9e80ce4a7f0250569dc0cfe59d4fd66fc52537d86f294b48ad323c679131ade26f39a7015046358aca86f7ce62edea7c7520df1980a240d813f59329ed05cf1f13232ada315306e93a7efcc1fc09532ed6db7e0c72a7079a490af91e245f440000000638c58f7fa99bea938c4e17ab0e68ead855d32ce170fa897735e2516b59a7dae28d6162d4771a89f9a23213c451b30cdb3a5cc7f7d666feb3b382749978c7045 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434635015" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3B9C76E1-8631-11EF-BF61-EAF933E40231} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000937818ead975d4dabb77bf5837f190655d95993d91e0ed2202ddec150c6f8bf4000000000e8000000002000020000000bbfba51f78cd5a6d89219c8e839f9ec95c65e25ad724395e35f59d017b37946120000000c6178259768e093b691481ea8818c832501275c61f57df1bfd4205efcd8e0817400000000386a4082d2a37f645590377616c403e8bde55a51b77ef3a25e007a630a33e81122455a713ee1e3dac449cd44c083479a44caf235a68afa8ee40eeeef553089a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05616123e1adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2236 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2236 iexplore.exe 2236 iexplore.exe 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE 2912 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2912 2236 iexplore.exe 31 PID 2236 wrote to memory of 2912 2236 iexplore.exe 31 PID 2236 wrote to memory of 2912 2236 iexplore.exe 31 PID 2236 wrote to memory of 2912 2236 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\29b358d032a5e91678e615003cae6081_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2236 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f59167f4b37e1cb1411450044896830
SHA1cbb318c329902daaaec77646cd170e4248500ded
SHA256a48eb2f6c8344a5efa5bb6d705a863329f0374ec6e25b57c16a907eb24cc7a1c
SHA512beb47b2c0c6fe6567ce74202cc2d40de7f6a12c2f17106a0e8c8072c063be8bbf90374940ee90c385cacd962fb7b01358ee3b0e0557baec02b25c995f4d98478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d37ed53bc84a3bcee40ae51541f9e28
SHA1662563c07f343c5b8f9209f51f320f3a1fd0c62e
SHA256246d790688128e19be664e21dc2438b67997ad5d9e08c592b98ab347386fd5b3
SHA512d530c86749e0b5258d2383efc1c8237cb173572e799a985c3463c3e3fd4231cf21bbfb660d70ecac5487a4d4625ba32d41d6465b714578b4966c3357652d95b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567a50946815c838a7f97afa5368fbaf7
SHA11f8f4026d7dcb8cc71b4f92f13867f283129dc53
SHA256cedc9fdbf91d4db122b19cc8c62bf8e72a568f7c8fe6b5548985e0f82115cf8a
SHA51286bbe7948b2dddeb6983bf8b61d956af3e69cf7df26275b35e8e626a5b015ea3b000465bd2cc41af1ed8f557f5c635a0d04abce10c42026c63f6a6a486ec93fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555e70dad562af4fd3d300c1a10f6b7f0
SHA1c92cf2b78f59b906f4cf37e340a10d94e3e5c7b1
SHA256815554183d6e86228358e8fa03040364e88bafcaa735891245250e0aa698a830
SHA51256c8d1ca0366e4e485677c4024336be9f2fc43db02cd30f4ddc4a2ad261ee1f2dc6a05b7371645b597a7f26523ba7f8918df843be56123ed7f8dec692954e579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce3d7de1f48fb1fc81dcd153736417c3
SHA1acea88612201b471e66cf171b817b405fe87a903
SHA2562241666875749e4244f985a74098aa3bfd61b07e51c27d2018566e546d488f50
SHA512a4ff18a001ac0704c9db7571d3892ae68220546f7d630703e0bae6d75d96743865d498720411df2ae509324b08b23e1067cc78b8d5571beeb90c1bd690844174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53caca724f8755db410b180ad61cd39a8
SHA1af70f93f49b4ff25d83bc27ad7e7bc828dc7bd6c
SHA2563997e1404d0feb0bacdcd1ae2b6a60ffdf91293be74972dabe2b8b8ce974ac7d
SHA5126b653ecf540ca32e4a7c345e679a6a5c488aa94960ecf213f95877b3b5cd7bfef91f862a93f322f8322769f526f86ead1a219b8f7caae470d723e641b0c97a62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565077ce36c0074f1fff6f2926baab988
SHA1a7c4a64e0e90998add0fe54859f74beb8efb39cd
SHA25616de4c93216ac5a1e2115d3905cc2299ec55891a0ae66e7472d84f8dc162c6c7
SHA51268ad30738433e1fc3f7b1aec7b6354e85e81de7745f8430c205a595af720b8556b9048c3491941df991ac8ddeede67d9385eef4f4ae6ee4f14598e12f53970b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adc64ad0893f015057c595b053f40c0f
SHA13f05ddc9c59739c9016b5c82705d48055ff3561e
SHA2560fc7393cd2bf629f91b9499b7aeed7a373e4546096d88c26aa4c00d685960e4d
SHA51215d3d2c28b6792d4d0b07092f19c4fa431e98a3825d2f6621d4409d7f0ccb7ad7e4c867c960f916e35c52cbf673782ff4d88449615551d83f7fcb6fa062fb13f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a017dcc7344035241f0be83de63b9ee
SHA16bd1e7881206b7bcf183ab92d73ce284768c7502
SHA2565b685010a7796ce9577d223e437e71bba30989c9fc62e7e2390f6140aba6b86f
SHA512d7f37fb1c4a8254ef47c514f0b47c21b58be894e9abe90f10c500c2467fdb56ddda1e1da9dbed169f164253e8d3db3e3d321c93c032780f9b615ff0d73291860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0f7a20cc7ab9f0de7660a3a479ff5c8
SHA18cad428e23b5c77ee3fe468c59eaf15ccda0d20f
SHA256fb877538524114d90528fe709bab2033e24d623ad64db1fb67c20787652c8328
SHA5126896bc4f3598861993bb5c62a401c6239bc768595803336603fba2096c0148b051be69e7cbd38c135c73581012f21fbcadf41b87caad330d927cf5c85f559630
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504de7a7fb1e2bbc30129449b84fd0c99
SHA1ebc12ab5624fdf8cf6c10915d03677fb2342ce82
SHA256c83e51598470ce5f6b30c79d22b63174d173e88b439a6cd3c796bbd0fb6335d4
SHA5125b0f134540b5b9c0ac578afea4c71366e2f0293b028d258c0a45e0c841c22530c0c123eda003e2de50fb49b5b6f942bdc6da8e9c5a4d8096eb2926392517b8f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5175d110279e52e8009af5d9681f83ca7
SHA1623ff316153dee22337298f8365ac6560695919d
SHA2564481a95d388ca964573f99d36ab16fe1cfb9fe761672b509015d2fe69d51d412
SHA5120a764900170297784f3ac06bc4d01fb0e5ccfb990fa7368f4d4c6681ff9935bc57076bd8f36dfdd35d598ee97632b5e9120c17ad39c264b9a91240a84eca1c41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512bbb200095542a340753bd891638b62
SHA131792a4f81a4618441746a3d6bab909194e5ed5b
SHA25618369b87ebfcc405576c3b54f7e9f47a8127500996781e120c4491c31a540269
SHA512c3eed2ddae049f6f11ba438417759c6915045fb7c69937233958c9d6647cf8b65ff027192c7adffb07aba1007d1db49df2bab1fc2b0fe24f2ab1e5a2644c038e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565765e8c972e8b049780adf938dee336
SHA1ee401c048e02105a9a37a6cca5e3a8be185ef27c
SHA2568a454659b8989a7b4214dcc3b78ecda10433875d9abd28b4354cca327de1819a
SHA5127a93eddc2fc174cadaf673f4e9848c8b16911cceb357a8d428084d701f7f6c34a51a4bc0e8be3176666d0dbb476bb4226bf99f448b2b5e3915a087c3a988d0a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bf61682d302f5de6ebce8cedd5201c9
SHA1826c46e2853dfdda3127908d0d4d27393aa92629
SHA256a13382c1400a37dc5f4348407ef8d89c8da4d237da9eb22a33f2d25038d266e8
SHA51262e004e3cd0def78c3806360bdbaf3baff80637c87cfe254401384e823d45a24dba4551fd7e7ed2d7253f5e2ff5b29814300a489521de148b3b9d77de04db2ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a57af88dea5a5b88162edcb89f4e453
SHA1f6aba5fe6acc89c3eeedbb1c7bf96c0c7e975406
SHA2562ea5266b404c1f3bcf0307a39abefea3d7ec35e20c7f6223a6bd7c391df60102
SHA512f35595484afe600cae332ee360dee2b9b150690d7b5e4feb53f3e577ff76bbcb2905803584ffadaadb3c032835d08e1f8a7ff0a12adb26cf0c1b47521624d32f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5382ef41c4429f4272325ae5c8c8ca830
SHA1bec9828be2b2049501b892d2b4a8b0f59c7f0181
SHA256630bd2c175fd7fe2155a8527929561e736d6939010ef8cd68af61bf1d62529bf
SHA512dc8d837020318e264d3c660702d53c14d24dedfb0d3b11c7d3759ac2d079894337083a9c89e60162528d34a4ae277cbe1dcf0e5e9f162c0abe33b0521f443079
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af0c2ff8746e635a45fa1068da2ea7ab
SHA163e1e0f056dc21ce730493a665460ff7c3560b61
SHA256212443180c85f0fdc701e72c6a954710f7aea7efae0e769ddf25e7b851863667
SHA51231358e227bf6aae33bae572d4cc6f91ff2442d6cc5ecd7c646c869489a8ed325d82290d3dbe55b83d585a39aecbfd937897002bcf29a3f1f8a5b2e0b930f10b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505b3594763106de80391d492bb8b4e00
SHA1440a18a05ddeef78a83c78c6adf9388d577f0429
SHA25690bbce407b93ea04eed468021dd909d67a35db4ee060ca950700d6715f455974
SHA512a5e75718f519d1afaaaf7f7facb1425cc10f966a934236ca5f47a4d15e8c4fefdc803c86ab9157828ba7ffae4e3e4292e5dfe225335345feaede47f7775a96df
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b