Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 20:15
Static task
static1
Behavioral task
behavioral1
Sample
43fedae23c9307add7ba364eb77e1ef0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
43fedae23c9307add7ba364eb77e1ef0_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
43fedae23c9307add7ba364eb77e1ef0_JaffaCakes118.html
-
Size
52KB
-
MD5
43fedae23c9307add7ba364eb77e1ef0
-
SHA1
98459dde47eef016057004ea999e46251f0593a2
-
SHA256
f176a5ad1449308ec6c2f778315afb6c17d971728d0aa889b304b10e3aa6f9be
-
SHA512
87c7e11f9a4c4c0efae4c0dbeb660b0b89e4f354b0de8a45e47cba4bb506f39b833eeaa6313d53cabbc579b65adfb2f230360a9e0a94702aa71c044c2b0b09f0
-
SSDEEP
1536:OC587HCOdC9By2lOOKdj60cAzHOUsd769Pe1Uc5VK80HeLONtZ+jfSpfX/PjU3:OC587HCOdCPy2V
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{135A12A1-8A69-11EF-B1BD-EAF82BEC9AF0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000af4d6d2f6b4da0cfd629c5af125bfd337fdde6157ef05d22d49206439d775266000000000e8000000002000020000000001e909d58756dee450fea8e7194e21ce3734d1adca460392c2e15bcfab6d3fa9000000071c869ee05d373e3247d9c313084bc34b1382f7e8dce8cf995494cdef11a772f6148245f7a91ea97d8bc484f22430e38c122857f48d827e62e1093c101a1b99081f487ed871f7550448b7465b642d5e2cd1b62684846310e21eb71a8de4e9934d6f8ad86112f0ee0373509858c7a494e08729f86217b30adb69af497496e13fe75e5fc266ccb76fff9b9b81337173715400000007f69b76e7e2f6e835153c08fba561dec4b002b4f000dc55ddcbeb0e70b1c7c17f3350db917ddbdaeed8b1cbfa69e9417866467121cbc52aefd6dadca7f46d36b iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435098805" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000007e132d575e00c420d14910edb4eba85e55897df85a843852a246fef0e3d23350000000000e80000000020000200000003372e6027b3bf2721338355426c51f928e115a8b51de7213ca8b5b9fcf3bcae920000000137deb79fef0088a21cf28209267aafe54a1c343ba7cfbe630636b6f06341ad840000000f93e9a5c67a1ebc3fca83bc9afbb58b903a22721a46728a9b95373fd86d122cd91eb65d0f5b76e4ab13d8032cb7cbd1a5061fabf34874262b9437ed52a118708 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00576ce9751edb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2972 iexplore.exe 2972 iexplore.exe 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE 2492 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2492 2972 iexplore.exe 30 PID 2972 wrote to memory of 2492 2972 iexplore.exe 30 PID 2972 wrote to memory of 2492 2972 iexplore.exe 30 PID 2972 wrote to memory of 2492 2972 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\43fedae23c9307add7ba364eb77e1ef0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2972 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51959d5b0ba00520b464995b01eb0c2a0
SHA12e981452e9888536ec2ddf15e5a77ef18f4e6709
SHA2566edbf590b9793310a90d8c903ec11a20285d0bc40b8a5875b3a739cc3121ac30
SHA5126803c2522d43731c5678542ace66d3c22bc76534886ba3545d5f1c183c09a67bd4fe3a78179cbbf9198556ff75f0650d07ff5e969057a4244821f5e96e2ee834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5423627e6b628f82e1a521bf6584812f2
SHA1db4e0dd6597ddd0d5bac6049a1562760e7cc4e21
SHA256700ff2ccb87058f1d941088f4da693cd76ec51c322acc56b1be4249f997ffdc6
SHA5121f63beda5392098da57afb7e20784bbaa20dc9564294dc5ec300270eda5542dea869fa84a08ad5547a4d47f57aa4f2858a6fc7b3283e5f77a9bff30ae00cc483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8a75a7143450ca2a6e856db648fa540
SHA1349051becf878548689bddfa94e134bbf8adc03e
SHA256e0f6460a04156d7bbaaf457246df9ff70bd13cd242dd234d43e5dd99ee8cfaa7
SHA512421940c34ac67ea475a814eed516b08be746589de7becf7814357bd11f08b98a1c03ef068e32a58c6b1ae3157e502ef0e99e71a032c622cacb4e8d252acef520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd9452f2f7f2ac1914eeb2f3c89c3493
SHA12a0f15011a5c16a0c7848b60aacb260358485e17
SHA256c7b1502b299d1751595342bb833f2ee61072479a19414cc5cb6ac1846430a44b
SHA51273cdaae021ad3e4057757a6cec0331933d04d2edb610d2e965b4acfde340c7a6f2b373705539c6c6840f97f20979af0154aa8f798f0d7c9c13a560904608ede3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fcda2cf4fb35f040630daa788968d17
SHA1ac9981c834c5ae05aabd29fe35bca1a50afbe72c
SHA2568d5c2aaa81d6c954c69cdd52d7beb15222695dca0908ab3ed6331b588e19cf69
SHA5123d6efae17fce3763da3e6599c7abe80ed1bbdf44beaedb6b1033902cd26513fd74aba439ebe0b1b7ed0bed8743b2a7832a64eb5c2dc766f5d522b342161ae333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cde5b456fdaf97c0fca316d886b68dac
SHA122a6b20e1d1cbaf00ede4817d150e06f7bbcc215
SHA2561cf1e84e3d4fc9214724267065a863658a813591f9b68be89cb60c97dd488757
SHA5126f7848d3495cb18963ecbe87a401eda69026b9921afe9a5145d888700c2d7ccd5b21be381764f64ba2e6c136c2f2645b6b984e4380ed9b76a7e1036c765cee71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f5fc1a8d17b8be35f5e856bb00c0197
SHA12972a93fe41fe085556a03b2866f933bdc149b8b
SHA2568bca0753669d4770a5c0f930037a5f087266b4be7aa9c66cd75a73e5e98590b2
SHA51201a82b57f5bc3a96fd505d7aa5637ffa7dd10ac324f3891bb940010fa6c387f699c944fd8bbd7ea905868bf743325f9c6ea291e042aff8a8be5ce3e884c68592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7703bf100c44b8c76b729d0bf4d7741
SHA174629b50ba5afd1cb7872ca1b7a99cf13fc2de07
SHA25641f50d6db3fcb86e28fa1aab1948e59601a6812988c6f575605ac42962448da4
SHA512248ffaa17fde3b701706823d415d488ba0808391c1e12830de33c59f780666c532b5c4d8eca90f4b2ba906acb1718f71333474ea1fc98e2f0882474a32e1b89d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5168c29ed3ff3f36c200f5aa626e33f43
SHA1c1c9530293a4cf03ab4b66dcd541369bb5f0df26
SHA256e3775cf2f6b08850638520bb0a24c4f2be8b35513f2cb4e8b13e7699e5057cda
SHA5129a4616eb885eafc25fad603adcf36683d29a9105d0b3d14b9b12417a8792f4c76b10f386c9f389eb368862cbd2a7e0d00955a2366a64436a1859f114ee6c7938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5009136eca8be4484d39a947f6ace757a
SHA107b4054c8fec09a5e97e7cb88cba893138bc7b49
SHA2560439eaf53034e774a8f7d7b521d12576aa8d9114bce2a3fe63083f7730f9a81c
SHA512e4b52a3186e4c699e81dbb8925d6cc96779f53e129e346b968cf9c42058b7e547286139ae789cd341a38f7f36a20f8c1e4a3fff3a55d0f44d1108fbaf2869ee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a54a0ec6d6345cf5fde56eb15721ef9d
SHA1545e1ec0534d5776215650c681b12e888bb82f22
SHA256bf72c23a129d9c1d594ab3983bfaefdbf7648d785011f62f116622b14a0f3f3c
SHA512639a38f1fcc6ff5f4afebd64a4371c5c4178cbedfb7ec2a2e72e9d3d5f58fc26f1392fb5d45a319b1c1c82b185e58067201b4ce177fbc558cf98a5efada8b0c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57015b49bc739bc580d7cd5e1f2be8891
SHA1e87249772d1c32d7c1b696aa68db98f3b6cca191
SHA256f9efa7414f63b1a4fc343abcbc8d6b4b74cdd519f0e9d1431500192d53a3fc0d
SHA512fd5979235f13a16a19c29e8fb00b87850d34d099f8513dbd45b0617aff0087c3e73667a4d58492c64ffb4cf23d86ce47f0ee799d89a40002a2da96334f87e074
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541e6c543df45c67013c397686277a29b
SHA12d257936d3e32bcf71cb4262ab0fce99face8601
SHA25638b7a4b58db75b36e2da7c6c29a906fda08927e19ce2b3d49898a2877e7f5a15
SHA5123823175066e39ddebeabe91ff89bcefdf50d7087cd485fd8706f61d11a877fb773d28568e91be0759b72e247cc8ccefb6c160fe69378043863db7ed8ea66b359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53997d495070de59e6c3988ce410f88e8
SHA1d9aa2332483b2e167d76d04e54a9dd54dd19ea8a
SHA2568485fb122705a06a2856a89e36cead11795e6ca7f88ad4f28f24332b52cd4355
SHA5120b071196e06bbcdc96a37914d92a6c012757d7f88a1745ff74ccab76e5e1bfb64a695121da72d38a6c509d5ba3a6e06f9e7bf9aad6f4413fd5a7d2195e702050
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cca883f28f8be3925f7fe91f437bd734
SHA13f3ddbb5e0245a6047b395e2e3609f4f25af2daa
SHA25655748783e36b1e9e996318f1c6fe293e626e87c3fc76505d803d1df7d1fe5dcd
SHA512661c3c5678e8d65bd30d8a8440c5d4706359295b6964df0d8bf49269a9c7f1157487dac10a95e8ca028d1080258777b666450070ec84999597b806b5f98606fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58569cf93531236b071cd3c3abc1c9c33
SHA171cc131c31da31d05a106c2b2f8e5e4158847986
SHA2568d5c2ca32dffcf170ce6768017ff9cf7b4fbd61c2c9e5a40ceed12ba0d0883f8
SHA512b9600db3debe7c2c0b8cf70f7748633f974bb707b9ec83682c41eb94b6082c6b8807b38889cbdb4ff877ff347dde05dc3cd89d8170c34f115a3196be0cc5cec4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a09f1bfbbc936101ce8046ac1e16dc34
SHA144ae4aab5010a09370ae71d286c1448ef8f8dbfa
SHA25665c93365ffc381e66f4fbd96fe1f39959decfe735f1c96983c720ed4faa4c85c
SHA5128adcffbe683652a91251f6ec590f1cc235daa60151b31b191f36a3498b1155fd767d428e37189701e63a7b437e69e282319ed6e3306f92df616ee12b6e750cac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5259a47dfd1febf28fa0fcb130c700189
SHA117c68aa1c3d35ffb607a0d9d8b901fd0b4ee0134
SHA256466e7f292bf1d4cd5e33f632aac18ff50b747f882627c975bfce3c031de00cf9
SHA512f924fdf4a3d4ba2c7ab8d05841247b441a63cce4f23f0a5d8024672fae1b8f40cb51a223d66d7ec2aad299ae337554ede6b745b298722a23b8efd3ca373d9c49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565c447a4ec6a6344936d3728e7523a3c
SHA1968515bdbc5b6f0c29e2769310a9bb60d32b42b3
SHA256a0c04022f01f5cb65146550db2d1bbf7505403c0f18d278b669c71e429bec382
SHA51207c6e32258d7f6738e9642bc0898252cf85fe7525f2481b01228403478a0ae456a6f60f8ff480ae4c26ee5c7cff1b8ca895b87fdba932608c4cafe87fca5c93f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b