Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 01:06
Static task
static1
Behavioral task
behavioral1
Sample
3720ed285e9e8f8030a60917ab52f9a4_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3720ed285e9e8f8030a60917ab52f9a4_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3720ed285e9e8f8030a60917ab52f9a4_JaffaCakes118.html
-
Size
14KB
-
MD5
3720ed285e9e8f8030a60917ab52f9a4
-
SHA1
8735af6e7b6186acab12b03179578f3c3d65bc10
-
SHA256
d4deea6a4f5ae1aa99acf4c744f433aacc9e7665c50af438c3e8a72265432528
-
SHA512
9159383cbc0b2e06411cc7bc87adbcc9ca5323898ac48fc7fee274ffbd59435fabe1f1838f2c804b6c7d0a5ed967778780fe4e15d24d2c69ad9fa025b2244730
-
SSDEEP
384:7QcZdzQ9ce36QZYOwHThaXlyryI8YuZHR:UcZdM9/KQZYOiaXEuI8Yu3
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05b0caf2ed3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D9FDDB51-3F21-11EF-9629-7667FF076EE4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426821878" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000013b6cb6fd5aa97d13085360e9272ee4c6b7c66a9ebb6b0bdcd466ab0eaeaf990000000000e8000000002000020000000c442f0f1d8dc266456634bc7c1c740eb4a2a894f85fbc8deeb0ebf5c3b80e59b20000000c302b1b964b6704ffb4d7160cf203fcfb7bc81fa77d22ba5e4dfb5dd5971cca04000000043e869160d2c8a39adebe75eca839438cf415b8f79d7a81c149e3c58eb30687d08027cab3d1c55e41455293107af5b84b44e3b84d604868099177af00d94e421 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2376 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2376 iexplore.exe 2376 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2376 wrote to memory of 3024 2376 iexplore.exe 30 PID 2376 wrote to memory of 3024 2376 iexplore.exe 30 PID 2376 wrote to memory of 3024 2376 iexplore.exe 30 PID 2376 wrote to memory of 3024 2376 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3720ed285e9e8f8030a60917ab52f9a4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2376 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59791b06f9bb14d5657c601a42eeb346d
SHA1aa2c0441131ae80946a19e66eeebf51f676a9f55
SHA25621a9bd2399cb113967d5337ccda113b644bf6d0c62c117ba1ce8ed0ab1d486ae
SHA51210be688350025341d19f389ec62ef56a97b2d2e416e3d2f08607dc4e22ce7ba5cf888b506d91134874b68cf447dab4961fed504592fb8384c63bf03b17b307e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5958c5ef718ebff475748b3f5de74f7a6
SHA17e838d637721e99d775f39aa25e8c43ae4f469be
SHA25683836fe92499ac5884cf32b725ad327d29a24173b495688973de8d1765472eb6
SHA512eb44e12e697055bb13e126a5fb03313de8f2234f4033aac9529f275a5e436eec8468a539eb0c17046b0ee2d1a6f35ca353efaf6b356e512a3df88197508c86a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593d4d4d7721ce4a1d2548e304750cbca
SHA1ae4a905cae4cca927ea18067c18c4944d5faf3ca
SHA256e9456d16c8957e6f403a4d49b19e1d9bddc2858a223eb08a33437134355f6e88
SHA512b9f244b53ae318882fb63b03ab83bdb465247f15fa934737399a185decade15f5d5b795cb165a1d421585780ce8cd49807d5fea026b7a9aa345ef6b84c522146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a224014229327e6d7df8b61f31f5be6
SHA1e198a042a898e7a7f5cc5de78cebd6a8c4791554
SHA2560f0235d67b9d9f2747bc5fb48ee8dbe059a42158202449197940d4109bb206ed
SHA512b853f8b85216f127a052617c34d9e9e63f42b8dc946c127b9c9b2c57837d6665e6688ce03f7fec54e7b73d902cd5fec4f7658a199dd0bbcc3f76cb88d2e6909f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be09d2d7194feed4c46b2f01bce60147
SHA11d5fb6a21982525c18a3e7afd66fb406d1d35d7a
SHA2560d5e37e4ff6c9684741349fe2c46e5509299c6afed6ca6ff30a257035cd5be88
SHA512abd6f7b186e183b234bbd2446b358fe9b44e5615de010c879ae7c871e4f36a8457f620601391ec172aa3633ae137e14b2296a12aa023a3e14fe33bac40d55e18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d256a5057777b54066d6a4b2119baee2
SHA18b50af6955e774cacd908069a34d779a9a5b72d3
SHA25654049ed44b10a9236e755c0d13a1e192455d0c0fd09c040d9ff7b320051c258b
SHA51216f11adc7ece2039cf508e77be87f9a1b489d694ec83fb9705a115df756e336b763d7ab326256b88bbe41857385bb51bb6a6a9bd5475d4554c12ebd752e3ed86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdbe031200db4bf81bf03f37ef9e4a04
SHA140f546f09975248fab2fae8d804732def174161a
SHA2569133841218e22bf10f2bacc9e253ba6c8a1f03e43855b47c2f547b8502127e15
SHA51249eb04b55e8b36134693489ea997acf98dcd46dd76dbc61db953fa85954b05cf277b3dd75c50ca2ba420a30ba36a658b381ce6b15538c644f914b38e56976c99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d6e7f86b38acd0ce8112d6c8239cc2c
SHA19822cdfd33c372a33b89aced7e8e6d6346159f0d
SHA256867585019a13a790a59fa970026fb6d64bc18f6c2d33cb81fb4600647c1d1626
SHA5129ada1b37ce5a219a32a0ca035e83a05265f807b444e1c98512ad4b2d9561f99a4a3197164026be4f79a58bdf876537542820a36918460fe643442701e447d9f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a463760298cdc2ca6636e6348194a7b
SHA16400841fab166fcd4ed0e173a5f0b36932543038
SHA25658f290d2d359a62c45c7fb5f0d1c6503c86f7e643517e8dd4f049166fe677b9f
SHA512e2dbd32c22e7d2d18c285cd679a48458251beca6cd644ed6b8add71af67f2b8c9b0c91e1b4ab77d1b4357e3c9ba80be64c2238ef06ad4484ce5e4c791e30eb23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529fa79df94da2571c160062e4dbb6f32
SHA110c2d1b749702484f116d4504a2a407e1ac02993
SHA2564d24e653d7ee338aa5e1460fdf1eb7e7ce8983865e9aecefe7079df1e0815683
SHA512f164e56daae5442e559093138fb3fad918e12e9c8a3a948a11898051c4a11e5c820ca8ca2bdc3bbad70297817bf9f7889f4c009d0ea5caae4be82f76b85bb947
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561f211e8729b6e9238ba958e7ac5e080
SHA12b650f8c789ba00120d87c9c8412c129486d7a11
SHA256a08845f87a80b534dea477e3538d3e8dc750fcdfd14e75e15dcae472161b5473
SHA512a374a1cf233369cb572512c6eb16c89a4695f0b45b66ae1805a02dbf67ddc034426c2630fdf8c1babed5671abd62e0e899094b0bfa7c665b51ce115210ccd119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce0d3d44d4326df5246299edee240f2b
SHA1c3720814eb17508e70cee1fe0915a1a6a062d5dd
SHA2564bde98e50f856fac760052c7bd2e1d6a6b723a0a1dca03361adfbf1f44dce4b6
SHA51218c78dab443bd932e744d33e505ab0888bb8161f1a41acb6e652468ed76ec2849dee9598b5b4c7f307d6c3bc9c0f979017a0edda761466f6a68ff19db55caf42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e3912b9aef0db4bf101f188217e1914
SHA1201f9d1dfd853771790ec62c3d0b5ac79fb95481
SHA256ac8a9025d7ccecd8f5d6d77396fdddcac0b7c9ee0756e5fc6abfa66489bff610
SHA5124e270f7340d40a1e1b05e84b033c7a28511d42b581049858b96a3685348fa7e2d0de5156249975615cf3ae7481086a14cdb0e8fb767df57d802ad45654193046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba3e522ff75597f76b19c1d17b40fa50
SHA16ad544594092be27caff29e4f63890067be467ef
SHA2562c51c158b514d6277c104399e0397a831f82e0755ca15ce7c3232060cb9888c3
SHA5127b867b49574bab55f9c79bfba60fc2a407f72ea4d2e37e2e8de61a802b75ae6c61aaa32c4097990675ab6193556a6485c49a55e1527da224203e1d4c43e73198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512cc5419bec1793126df00e3e84f29f8
SHA162396db431d56125eba75d0710ff35b158dd7123
SHA256ec9a8b4e0a2c260c6a6ab02309f339558cf1de6e38bef994247cc673ae57e381
SHA5126afc6e6380b42c9e881b5d3226aa6a9d86c995476dd09e298bbf978270557ccfa84bf97c401f025786d6ca601c0562a8ea1d667e24fb4fa83740661cb91745bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527a5164518603b7584a18f2d8c280449
SHA10e12172f57584bf696a97f54b795f3b77d88342b
SHA256284f4465bf6eb000d207601c73fe9c522b160d96c52aabf519014e802cf0d2a2
SHA5127a64a943587f6d89425a722aee65f3d4220aa798403739c422d85c2fa7b3c6663980ef1b7166d27afe2a7ecd4ab2716cd01dd3c521aa94707632e8e052513723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54934e772222092d74fe78144a5d4dde4
SHA1d42d05f625fd58b6ed3a52608bc15d88e34cec09
SHA25636e003a7b04f3724c9baaa3945f5d2e52562d96adb6562f50e7566b47ed35fef
SHA512772b43033eabac29335ed796dc05a3082506591eeb48897a8de3fdadf64180ccdc49eae96d5042a0853131223d29ab10e9cd0e2df0f87d9a55a604f2877b5c2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55da41d92b1ba6079442e228384d2c494
SHA13d124895d70b321a09ce2bc3ae5d7b32d64c14aa
SHA256870d0d6695cb4f7daf4512018349910ebedb6d49ddb613084f5d5392eafd617f
SHA512382815a1bbca699631ee788f255e04beffe55b9de39b7e47263322a307693770497f32afacb8e4bc2a30a51d34b47d49281a122937e0dbbfc4975ec4c2ac1c65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f8a94c44a1d465f13ed7b2dee029add
SHA12ebaa95024e0fc9db4936c930d4148604c820dee
SHA256187f48949de5f0af7056319c27592ddf23a32d93f03d6c62d260cf415fcf9303
SHA5125be992dd549451042d05bf22b0609780b39d7929d5b8a0edd5cc23b89487a2bf75ac3cbf057115e1d15013264b297c06e5e6d41f96a899ff68ebd62738bb45fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba7e49e6fe19b14901a7154dae3c30cb
SHA1638229d042345387a9b23a303f5eb43ea8f28332
SHA256fdc0a89acbecb95b22876e88e8cda5dc53b5b642a3794e83636478cc2263a142
SHA51211814cdb4793847ab0167bfe8f5829133f5bc7c9fcdad35c06d7cd2130d981528e3814b0d513663bd18cda9a6468d14ec7015cb17fd1c070cc2d1986cefdf6e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc2451f900a2c927085427dec98a0eb6
SHA1530fbdba21879f9cac7218c829086f5508ac26d2
SHA256b91543914925fcd500df03b2655ce1cb717b459a0bdbf933b3022f23299b6108
SHA512913829ec7f2789c24c539d83a52d479c859869504241263c72732f4745ed7f878e0f0c2a90abb1df79f2f3ffa73fb812d72abe43ebce43ff873060f05a1b9b7a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b