Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:27
Static task
static1
Behavioral task
behavioral1
Sample
084079ffe99ae35a8d5d98299a414860_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
084079ffe99ae35a8d5d98299a414860_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
084079ffe99ae35a8d5d98299a414860_JaffaCakes118.html
-
Size
41KB
-
MD5
084079ffe99ae35a8d5d98299a414860
-
SHA1
39603124f98ac7ac13db70686482b61a9002c456
-
SHA256
96908c9dc020cd69c9f2ccd831f295da19f74ee122102d51e60ea2a881ea8c2e
-
SHA512
d0a44738f9500721cc4da239b8018d2ee7681c44d65fd300d71d9ad77dd8cabc4d7b60f8c0b07b74590990df5ceeca7db435ab61724eca1d33bb8311229de5e4
-
SSDEEP
768:OQ2TjswWwMwvBhsVNVY2TkQVdVsqTuZDjaTYi/u5BPc1AGoeuxRQA:OQ2TjFWRcB8NVY2TkQVdVsqTuZcu5BPb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20b7cb656a14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433994339" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8A59C6E1-805D-11EF-93CA-E62D5E492327} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000036be2f3f29ed172b21af647a9ec0a8ed15293d7d5e8978b995f413dd98b4413b000000000e8000000002000020000000a846f85cd1046680da82126efba9642abb97f5ff120bf878d0b2051b18da32e120000000bf6cee7fe7cd197dd451807667bab5628026300861733e3aacce217fe61d61db40000000c3af0a12d402189efd201488a3ed0ffdeec331a6bd6e3fa308a136b24f2eaff01cd98b1a45d9c3c06727a98600de3c9101c314d8fee086292b9da17a52aa479b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2280 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2280 iexplore.exe 2280 iexplore.exe 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2128 2280 iexplore.exe 28 PID 2280 wrote to memory of 2128 2280 iexplore.exe 28 PID 2280 wrote to memory of 2128 2280 iexplore.exe 28 PID 2280 wrote to memory of 2128 2280 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\084079ffe99ae35a8d5d98299a414860_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2280 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7fdcd14b09771404e15ff6c73dcc447
SHA1e86c3e238c0898a289787c907218246b61fccd41
SHA256e3466ebe47fb64911752c6a21213655962f08a10bfd306946e04665510cd65a0
SHA51273e4ddb255f1e3689a33b91a3cc6aeb2f953407652ba268369942df23566cf86440c6f5226fc500d82dc9418cad17a452fe0a49540aaae92c5b4753598599a83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fbe57357605c8c691ddc6d708d4a4b0
SHA1ca40a151a7c4eaa95ada53575eca5e6c9a54151e
SHA2569693f8852efa75b6d8db8a635c6d085d2c5635099317091b121a877ef0b7ac8e
SHA5128f4fa33a43884d6550a1e92f24162ca610cce207c3bae1b09c206b161b45b02d35a21f459b27952e3fbed90113d86022ad7dcc01fba11dfbceaf581586887af2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1f5971ffd03d8593e8599e40f4170f7
SHA167effe8aaa8b6ee129fde70a01dcfeab6257236d
SHA25695c01a5bb86cd8715d6984b557f248426bb18d8186c7899742993cc834ae7512
SHA5123bf36606a29f7b384a8eaa6526fe65108f5bf3783ed5743f063cebf97d4b1463164554f7619e8625bb56ef4b1211dc6fa0464d2a9a6ec5466c9b86bd55feb31a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2d41bb49f337179d9b2eb7f911c8878
SHA1e876b400bef511bbc86672561ddb2b8be4d83a30
SHA2564d59c65c3848712333115af9f7abd6a5b6db586cc0eb20e97b3c645c48294af1
SHA512db1778bae28386012b278cd254df33f93f349c298c63b99bce7cb1a7156781bc6c349042eb19052c8722bf64cdc7ad13a4ec5e9988603f62f3f61d56ff1dcc3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e717f82484f042b242629aa7d53d5038
SHA174456231371704c3851db404ced5af0d705df72a
SHA2568c379a2d624fc37f1befea899533044917ad4b13232c03210b3d072d3c363ea1
SHA512a13fea9ba4df15dcbe1106b1a933efa0932ca82d6ae2c4395b6ac76b2c4ac3a96dae4884edf258b29984481cf2360262c0fb3be814459b7e2dc6ff9021fab49c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af51478472e6c1b2674d81e4b6fab70c
SHA1f3f643a1e6bf4cc86379620e01d29704b8e0e6ee
SHA2565bff45469560e9c808578c59c86a50d67670957ad8b15761c4304f50ea77592e
SHA512f4028332abdbac4e27bdc24744c8788e10bf8bcfc339e96eb08bfab751fcbab9cd36cad8a5d1d96ad98df04a5a7ec2fea5c8f55b1a5e0b003cd7bf164c2b0de9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcefe7261f9824070130eb4517a91fad
SHA1b34fc7b4271d2182e642a0b2c7847c26a88e9d07
SHA25624044a7a5b1558a4eac85396d1f42f86a45b3914c790769e1e6d60ec5ff9200d
SHA512ae72fb5f671bf9a7bcc3559efdc8a9b96971714abecf8a8e73323546752180f9a2181a952a9385628b6602ef967a34c1d2a321d07ae550eb34961f8bc29326a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcd4c3a92b1397e2cf0b7526d247e92b
SHA1d4a6d320ec565fb193956fe59f81d81218b4cecd
SHA256d1e087062b75ffc8d6fcf3a889e44269db0f51263b039973bb2464edde95ab07
SHA5123225223472b544854a2e38aa206901c2d9bd091dbd4c5b5702fec5e4652e76fb37d9cce38096a145c656882f13ca47596b84804a1b0afaf3a643b05946910cf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c86cc2451b43fec08229e57c02999e16
SHA1cd34e63b946ff3e6e17ccbb03aeecbbd2592affc
SHA256359ceceb69f2d484ced8ef5898447bf77a13e5f8c79fdaaf0469aa5382068a21
SHA51278b7456389f1d8f902f204c18992b6c70160be4f6cae943e6c18e818be1238bd4ea670d3c62001531e56933da8609dd0744abb7a27aed5834643d0bf1aae0185
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff7323587b2df72f408263f59f4c6fd7
SHA11d049e1b764ed555d1402d59427933d0a4f5a29b
SHA256a29126ccb11d8092128076d1ccdf4a62db3611103eaff4177c0097e10a030eeb
SHA5128ae5e328df25401923f13096187d11395d22d4cf9b9396ed1a71e9389ff1954961dc69faafe7948a8620230ade67013be20147b3863efb8dd681781d623750cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587fd9c17cf11942c1c6380ec7a696c89
SHA1d4b7dc27379d8fa7ae1ab45d092d23e933f6d18f
SHA256435b44229e2fd2f0dd808c809b0dfbf38214278e3bc8a89b526b9aeeca3eb9f2
SHA5120abaf67794cc8edd906516f9afa9e87290c12b3fe26b4eadf317cba1ab1bd78abc3b23f8fbb7140bae196c4b0552eb6d635f1e59d51f8ad13b7d17c110838132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c519008e624bd6d909336ffe67ae8132
SHA12a45f28107597386a3b6f1bb18e483a29c4cf376
SHA256cfa173986f5fbd095cf6140eb29dec936bb7612aa1d6a5502d3aefc5c6b44d39
SHA512c4f1647e04bbc1c20e35bd6ffeed747cf3e3e83a1587079052193ef801680f28e97a1da06ad2074e4ce1ab8ccdf9115c616ce2c90b84f0128c49da143babffc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ea064dc7e4261e6358ad97bd20a6f60
SHA15c30d48a9ac03df6d4d7f01a4f37d19cf0fce99c
SHA25687c1b8325c44d54b96676d2833c19b611ee2c5659bcf0588c5c4ec420d7df6e6
SHA512ee8a2b55b9c27d58968794fa5f34d4a507607698802cc7c3861c67f6fc708abfb9841ffda66bb433754e2a3a9cfa7d132ced01ac5413ce13a39fb0f00d80b6b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fc6cb2c225a0540263b250644176066
SHA11762e789638e6be6f2625fec3b1a02873b12c695
SHA256cea654e3c2ee0625efc4d1037c3cddea2eda3ffb7da91cbcc440b5f241c521e4
SHA512219d42ca29ea3dfd14b321e1ab09c1defb964e57cb0b84c623fcb8263e927c2af4d745aae51a8c6725abedfc4192836944555824ed7d088197d9224784a43774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5066f440712bd527c72fde897d5f0dbda
SHA1f60636ee4b8065c7d0080cbc4c9ad9e222477cea
SHA256c112eb03971861f869fb120ccaff6be82a4df0a45a5022c3e3f88319b88f3627
SHA512859bfd2dd9099e6dad1c81141aa40ccf1bce342fa0700cde0d5f464bd1bf03d4071268325b976298f031edb0c04e4a03e00f9ccbed191269337acf7afc13ab28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3aa41c0e1e35220a29ce2f648b19131
SHA127126e224d2bdce7ab61a8bcb46c320a105e2a52
SHA256a204b48e1764890fb0fc276320d803d2eeec1132624652fa0d282cfa563bf79b
SHA512bbff9f16e69c74529bae03c4e0d3d31b157ec7561f911d761885c9d4543ee3d551384453ab97866523cb014ede4418e323361e8ef3e23f1df66a3ef7707f7737
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d30954445c68dc6e92b7f4d011b01a0a
SHA1b961a6b2cdd5ea07a5a3411609bb4b159626e4e5
SHA2564bc19d50e3c78619d4da20ec7edc6556b937649fa1dcddea7937af52e2844aa4
SHA51260e7e55302d07885c054b057fd2a75afcbb90a6faa47253968d07135b49dabc463d9e03b3c17446ed633b569be62e42189c180f1c41e8672b2171a8227660899
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe75b50d6039e0331a15ba3d5c8ce632
SHA178e25ae436081c337abb4d1e3f63d1919560ffb7
SHA256a7a4336be55b46667afd780a4cb95c1b1e1cbef66e53888120c78697c54be91b
SHA512fa728346831426967647770e7fd0a165947cb7009456212ff662e480f8af34258d8669ad97e1f98d14a0bc7ae166965bdaa24dfe2f75d29690ebe0733dba068d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505abdb9dc241ea9c8718f967251eead9
SHA138998cf2fd162cf641de12945a165934d7562a46
SHA2567974ff5eabeba978df83adc27813df86436e94610143d72749d3d122f7787bd3
SHA5120d5fbee4b00dce07798fb86ac1ac6039e6ac1505718adb69eb9fcfb4d31959d8586d3bd67428799065d8b7a55d6db424d8b6c2bad49e283d4636135b389a2b00
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b