Analysis
-
max time kernel
146s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 23:12
Static task
static1
Behavioral task
behavioral1
Sample
542cdbb80a067920b9eec2805bb4d215_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
542cdbb80a067920b9eec2805bb4d215_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
542cdbb80a067920b9eec2805bb4d215_JaffaCakes118.html
-
Size
139KB
-
MD5
542cdbb80a067920b9eec2805bb4d215
-
SHA1
0a89b5e5c4214be7bd1cf893138eec65118a3639
-
SHA256
a5c878377c897e04ba917a838377b48aeaf70ef178f177436f55fbc36eb722fc
-
SHA512
d7cf07b633acca9ef2839522e00fc1124bd08a110aa3bce92d01bedb52c0077e7c4c2a2bbccc087e3b62b40c05704341c3e2363dc9b2f357ada624355fd6d93a
-
SSDEEP
1536:S6pxnjjM5XDc9Vy4CzFlLynyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP06:S6YzDynyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80a13971ea20db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000234c4922bb9e942a489ee3f5ffd7c8017c1fb6019918b0af3ce0ab1be05ad7f7000000000e8000000002000020000000ccbfb50cf9205498e686fa866ea9e644e886312ecb12e8d6a0ee6488bdb4660920000000e77926c5b073a314346b459f567d60b8ce608b14b2fffd8c06279fdfd0a491704000000094906d9d7894c7a15377032759a5e2521f4164e0d0b14581b06351fded46b0d3c27177a5a572cbf49ca861abcfa45165afdf1e1b036df92e467a28f780bd780b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57C98B71-8CDD-11EF-B666-DEF96DC0BBD1} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435368645" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2060 iexplore.exe 2060 iexplore.exe 1104 IEXPLORE.EXE 1104 IEXPLORE.EXE 1104 IEXPLORE.EXE 1104 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 1104 2060 iexplore.exe 30 PID 2060 wrote to memory of 1104 2060 iexplore.exe 30 PID 2060 wrote to memory of 1104 2060 iexplore.exe 30 PID 2060 wrote to memory of 1104 2060 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\542cdbb80a067920b9eec2805bb4d215_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6f0f2d2fab1d578984aa6518fc9d4d1
SHA160acfec0d5c2c4267f12b2fbdba6400ccf880f14
SHA256641290df06faeb2706d89eec51da7bfbde515d5a8f54e5c30066893749e176d5
SHA5126e87476f4db83264f22529944defa41a03c91580b25ab6115eae25cd1b5fa2a33b4d86fb755b1912e32d3a07eae16b13390b46f31729ea31530c408a58632cd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b12219be3382ad2842688122bac2277
SHA11d242789857052c2f559ecba61f3bd5bef432f0f
SHA256603c0592cba51f0920ba3102946bc1a0c10f259c3c7a2828aa7be8a48aed9dc0
SHA512359ff8c5d65484742dbf8d840f86e72740f47864c6a9643bcb3223afe36f4e628305ad1c7c3e0a89ad437021f0750875d81e6802f899b19867f6e2b8b5a72042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573f1e9f288635c85263ff57ea633a673
SHA1207e5c15abfddeb4fb1dcb0f1fc1903aa77f8480
SHA2562b57c4be30a0796319c521ff869aa780480b7a666377d75e19d165311a0d40d7
SHA512cc94651e3b6c1bd543a152515dddd4cd7c7f868e9fa1d606e5c646fcaefa348f2dad6e4e7dd831986ff2b0ce35c50b8ad604cd2b901391daa9b31d0f2f3b277c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbe5338b9cea2727c365675c64cf2d21
SHA17bca3b8e2197da768073a1fbb7fcaa8a02e9be3b
SHA25681eebe68e584d9f9dd529a5412396460b051692583e2cbf24e46fa44023b1615
SHA512abd572ffeb1040a7d67f9e182fe48c7c5755e91c06ccf4868257b28ee0ac4a5ba4734e9f310f05db199ae868a9d099c7dc47c5153c1f6aba011047b43119d218
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f2ca459bd09e65e0b93daa89ee9df97
SHA18a335fae37ab2333cf165390780882b9fcf7e4c6
SHA256dde1d8747743613661bfe15f6f257287c7de3e28ecd16b4b5316705e3b92bf46
SHA5127e8d264db23743607fc1c7b0f9c55eed34d0575f1487b3564a7965169aa23886a2000322a45e67cb63888758336e65894d4e4339d41abb4f3412a0c8e534c224
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1fd55021cc864c38c22e300f7acbe78
SHA1508ef0ef6e836b3da7208da724bbe7e7a9273804
SHA2563083f1d9e0c5f9a134c50cc2ea8b885fa14334b00311b0bf3cf825eac9145aad
SHA512c52deb9fbebb18a1b76dab3aa3abf28f92dbf907907e199cda4ed234766019cdb5fef90df2944da415224c6695555412fde86a8d23a550c6ea47a0083e554912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563c02cf73cec5c8604662c5ad37e19ef
SHA140a4a96393e44edbbd6bbccfd722943f3e619359
SHA256a1838bc64760759c7d1536c5d34da1e9cf82761c3cca1c39054e6941520304e5
SHA512110353ab8c79fb4be7abbc9aada7058a7e05dbfa1154d7801bc1a5313ef20484003f73822025fd5f5788f3e8b6abf1fe4798a141388bcf70d4432b26463dac15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad195667ba9af86369528cd901c66932
SHA17a68f74cbb3ce8cb8b6a6be5ed692581ea285f56
SHA256215d0e689a0ff212433b5babe3e6b0c5bb0142e635a3092f6def4842e9005a5a
SHA5121ee3d48114d44aa47b8293aa4fb1d57991d1aa1f0386806ea38bdc18373bd3461f3965c2a96617a918aa589c37ce4ee5b450177cb2d719344295699ec610f734
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521e3b2f9a660ab74fe586790c967aa2b
SHA1dc22ed32705f3a34ddf882dc3c685eae4a46f26d
SHA2561545c0cfeafa2106c49c0da61a89dc24e1545674d781464a5b91c71076497105
SHA51258d9685b482501bbdcbf46f0bc6a4b8ef5a450968355dae237f787b85e0b8c1ef27b08bba604ec819b9bf990c7d86991daee7784b6805f3010d2c11571eb7c83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538e7c4e4c9f12a2b9e91b408c4a6b9ee
SHA1cfee161844803ba0ad3df3596c327ae295349604
SHA256c19eec614df9b51ac47a70020d43717276e6dbc22eaa9a380b42aa21c5552caa
SHA512efe0765ef1e17d8a867c464110fe758d952006061d9c146523f13779a8a3d187f66f26a48dfb5d0b556820f93946373501e663b62792277c16f65848a7dbc2f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a48564d8dbdac99a9ef3317ab185a593
SHA1279c91733d6a71eed0df487e84c96eae5fb42279
SHA256c771cfdbfa268c5bb67ff850c72169ffcda5576a38f98bc8c8483dfc32995f67
SHA5128afb125c4aa5406939fc767aff10b46ba3de68b98a0d608a4c784a73040362c9d56d21c15f8b664ca10a1b7d49515fafb100dc6e8a7689188e00874456ea332d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e9f80a1bdc2eae8adffff575d7c529b
SHA1a0d24d6a00eb67e25484ed308b18e9d7cad44143
SHA2569e1d02cb821a9917d07da82cecffb75d21808938be949b71f53d5c4b94145576
SHA5128a1b5d681315bc8bb36499a46aabedb2485fc5a6ccdc61bd8826cc4aaa64324460b47d864f7c2ea12e0ecf22b908c4a86c609362f9453d6813a43f0508d7c492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5daee085a603b4ab1da31737af15aa3
SHA1cfe6de9833eb143b0aab07fee0e8db6475c9dd33
SHA256f9ff1c79a207e10b88141cdf203d33463cc8c90b40753789efeed1c7dbad9f69
SHA512c28d194737d07b93a5c491ac4b624587767c48f451e763a282cbcf7465a715b96b268a6be6a6fea2bc5a0865821afd34582a05e04d8b30fefc035651cf46995c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a067928f8d578032b2727c9344472962
SHA1609efb4e8e969073106df882096c71daa6841006
SHA256732da570e86121f8ab676ce924b74590e6bb76305f59e3b46f38fa729d5baf81
SHA51202dceb3bd03f29dd4f2e63fa61a40e8abb4729d1367a2929afbb1b8dd7548b31069abe2822f02d38bb0fc0a5638e6e8abae1c7726bd56426ea21c03ddd84b302
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fc277f9da07fd6dcd53f8ed1447bb09
SHA1da408f3e4840203189cf3b3b8f638efddd723a62
SHA2563122c5848c60b56681e3376c2b3ac39d3f9e59854bf3ee95c0990ab2338473dc
SHA5124a4b349aba36a1a9cf87a9119b3ea9bef8040d6b8ba353239bfcdcb6069827cbd83dbb685bd17bf91913923e243c6b5d45b18ec3737bd6ef376a82f87f98d378
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2bfecd6d051f34dc343d0bcfc95dbc4
SHA1434e408d3af24ee0ec01b6967cf884c01ba66035
SHA256d92e01b1fdd4401b060629d3566390b9005b796aea281f52247fe1cbe8540d3a
SHA5126467cb844931ac5eba24cc2bfcc7234079df376845c6d543d1aec02d9673a677677008ba44a0673677aa6ccddcf60f9366c090190ab92210afa208fd4d2e0227
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50876e469a3df9174656b3a3c0255aa0c
SHA1937cd719cf35f0ca008c83d1b04f066db63ba795
SHA256102abf2040dd129246fdac5c511845d8c9342b9aaf44dab6b671483cb8d62ea8
SHA51201b2fcb456fea764595d0f16587201f262d638245bcb0959117fd8e5aefa238be697ec15301d919de277bae6cc517b5cbc720e464ed1705a90831e4d2b7c952c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57af386299aab336d9cfc7b40db342715
SHA1b9ffbb4e75e3f100d191ecb0ee2cde7395f1acc5
SHA256803db6e44ae088e61b678e8f01afb6516efbdf65a0b69983774667e14bf65809
SHA5123b3213263558598cb71eadec0664a7d10978ecfcc5a7ecf658ab775ecd9129fe04ee8a50e5cb59262155f12e26ba9e86106a34130e327b41587d9efb1beae757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52400443d2eb1e29cd09c23557def2c78
SHA19dbea5bdfc0855df9c0172abf65d55be579b717d
SHA256b9e342419e23cf755c5ce72ce37280f4c1178410227c3c894fe001bd3e4c7942
SHA5120aa14a257d89ed16aac89fb5918c2b6f0daa86528bd3ec58005e7f4c280e8258e1e06598a724be67b85fee769ee49da26846ed0a1a0937dd9c0132179515f18f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b