Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 05:47
Static task
static1
Behavioral task
behavioral1
Sample
092ce239d799c9f5de2210dc00898b0f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
092ce239d799c9f5de2210dc00898b0f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
092ce239d799c9f5de2210dc00898b0f_JaffaCakes118.html
-
Size
53KB
-
MD5
092ce239d799c9f5de2210dc00898b0f
-
SHA1
c703de675e07e66fe2be6393cf9077e2ac568434
-
SHA256
ad2e2b3b0d83df4ecc8f60d9b4eb1b95aaf78aeee9eaf4e5c5db106a250c66d7
-
SHA512
be1646de1a1c5ae2a0ccfbf92306250e343273e83591dfcde2091189b09edb81c8a8054ee5790c8f77c342fe85643b13e4c1dc00e37cbf9cf84a0de70cd33cc3
-
SSDEEP
1536:CkgUiIakTqGivi+PyUCrunlY963Nj+q5VyvR0w2AzTICbb7ou/t9M/dNwIUTDmDC:CkgUiIakTqGivi+PyUCrunlY963Nj+qa
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DF9F5381-8081-11EF-854E-7ED3796B1EC0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000004e5e78c9567d950191c9fdd0c8d3e580e0252b6bc5659966005364a1e2d1d15e000000000e80000000020000200000000440e40d1055f33618ad6a755c87dcd515f2052428516c63621ffc1c89f1c78190000000180902d0d1cc50409b6a89a0f0ed386a657d85b113e228c40e6762ae7b6c51e606fc979383c5382a643232424ae9b57da66d60df73e4398cf4b043e92c207503270e9077632591b4e6a2c5050d2722c8e3d68fd34d2eeb167cc9a7729dbb074c800f21bb7136cbe9d6aeb534bc2e84ab45f80d12e92f43292bf8fd6dcea3f194d70508202c48b0938ec8b6e4a6c1c7ab400000002dedc35ae8abbcc8c7cda373b3e2d8ee784528305ea36e864c058aed5fb6aa671da91dbeb3fbb02431920a676ffd7bd2fe0a60d3a966f17ffec085e06082cc6a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90caffb68e14db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434009944" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000002e1e09692af1cc1c8ef6a4667eaa7fc491d2bcf3b5f8e98bca67729eb79aa66f000000000e8000000002000020000000450f892dccd2f5a6d4ad2ee2f395477f5493fab4d0549b10c19785738e50dc5020000000af3b402d6525a3dd7d0a339f983e5a9f3fbacb090f428386a23a3fc14140882740000000bc8fde345e6c6739550a6a3d98381f2a2aa6c2b30869cbb378bce121d023c6141151dc5aba368ae1a3b364c17b078c990d4033a8a7259ecb9949ec47aad2f283 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2512 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2512 iexplore.exe 2512 iexplore.exe 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2344 2512 iexplore.exe 31 PID 2512 wrote to memory of 2344 2512 iexplore.exe 31 PID 2512 wrote to memory of 2344 2512 iexplore.exe 31 PID 2512 wrote to memory of 2344 2512 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\092ce239d799c9f5de2210dc00898b0f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2512 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f98349242a9e6d68c2e108e3fc4c9ee
SHA1c0abf76272df4e50f245de0cda9a8e2760bfa27a
SHA256df78004b49e6e608ded6759ba2aeedff5f581808d01e072c693aedf8f1900985
SHA51231da8fe0001cf6f9f357ad0ab4f6ca753341e01a0c0ab63e4b149471fa932c4fa90e2243b1242224dc07c27c1247005540be71f985bdc887375ec4e2c9325f72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5fa872c090ad4a3aec804a75761856f
SHA1fc40bdab17b8418f57a8b3bf7f9f34b73541a6a3
SHA256b2d7aad725918a9e66f3b17c656d2e80abc1fbd24f70dca59f295718a703e25f
SHA51225eb92dcd463ce4dd91544a3f29965e2e194e050daddfe9d22d8b25cc8e74e42b23f55a0c5ac3c0a5cf50af701510efb0931b409270f000624c0df4edd4ffe21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556f1e33f11a3ddba387a17e539447568
SHA186f777764d6da5a47b64db9dabd84a7803afdf17
SHA256ab1247added76c7d6c640d6b98621c5ff619184b4f4642e97095033ef1613efa
SHA512e28885db91c83656f76e728cf40f17bd156db9143617920e1d9e781e5f24778618ed4aec18416d2132b174969b0b08da4e36c630516826a8fd867cf6b5486e5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb0c168df58e7b412362fc312c94388d
SHA18d84fe91f2527b0d7944eeef476fe07f783034d6
SHA256d89a37547c6bdfc5f542a630289077c0263f0582e978133a5aa7691256ca3de1
SHA512372410163f21aca84c5249512ee6fab0fdea548c84ebf416639ecddc71098dd18956f3f43a383d0eecc669653761bfd3526e1e7df7af8f239fa308f995fdd84d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4b144d39c7b2a45b8fa19f39d857b64
SHA15f07cb86a6972246c725678f9e87d35e0c365b89
SHA2568b90003ac3392aa9b3426d7061d806b6d4ba999dfbc6dc20f8222d708cb21478
SHA512cd2b8ebec5bd402eeb873d2f8e9fd1dada15c85ddd4cf49aaca6909ab53e37f002bf21a5748662dfe69fe6d83ddd44909ad4512d563e92e2a86653a842210c3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1e16a8f8e9a809ed76e72e9fd10c58d
SHA14c59c50ead1f84131b26a2fb5f9e8163ab66955a
SHA256cb9311c36ba106110a8bfbf29d11776d06a9b5a14bdb98625f64c6ff92b7ffd3
SHA512124be07774afd40326596f4b2f518d9df7b10fc5d9f57d5263d371752ec636f9d751841e46d3cce199d2f877660b3b9874ab777feac32912109dd4be5c8e96bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c81215a88787554e772bc7703588c5c2
SHA11ddf56096fd2c927cab18520522cf8fcf228364e
SHA256b509e2d209e1ddbb4c3356755868584c6eaa6a9f25ea36487b1299e3eb5d3dfc
SHA512cdedc362d655afc9fa316a0ca215b15ee7da0a1f1f8c3f24808cee9db828db258d242ab95f7a0e81c21817c8ee77f325c50d3681ee2c520ccedb3998aee4a191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590ae4253fd96dd720207abdf7578b877
SHA195aa01c5ca140190eb3408e23f1c47db4b61a3f8
SHA25699cb643e253b63976934194e9912cac730f3a4b5a3998826bf2d6848aea12a64
SHA512c681cf7be60e0e2fdfe1e2124134464dc193840898a02a6a535c9c46ed7230d577b3ebf369b870d361e76026da7a87f61ebc33470110894db7fd6556c600c91c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5664ce731050e5db55d59645ba0e38cce
SHA1680bb3cf79aa1449e96fb96ff8f6b07238adad14
SHA2569731da62b0b9d3877105dc16d1202f5179e663ce201fae8e78f9a431eafcbdf8
SHA512c9ad3272866b333c3b21d9e7a7e068b53a4f60ee9408a27d7592708a6fad65174f44f48d13f81155284bb6337b04e3515af22309e607ad3bd0d0ff25a65eac44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfccd728566f25a49db7f94016e1fa0b
SHA1d0984a79ad19f55f8f3be679ca9ad987489d9fa2
SHA256b87a0586f7acd064f7aa033a74a1d8eb29f55fb9ff695e8f82946f57953dfee8
SHA51215b78a4f6389a7f347d85de3785dea5e9b0f173658dbbe501134ea967ba6fecea9b05898745e4d0a7da9f0a4befb230e2bfe05557f829cb95c3e58d08fbc34f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d1bafe4daa75e95334bca90f13db185
SHA1bd9352e8eeca9d9d944402bc740fa843229bf89c
SHA25641c114334d097724636aa9769be972dd7559db3b5a458b0a92bcd83be8042030
SHA512cd34d24ec70008c899420f14a494c5fa7ceea0e5ea82bbc1cd9af3841a8b34e500dfa49c4a943f08657e9130d940ec57c03523a135d4406e986818e292bd20e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5379f481717606044b46016bbcef637c6
SHA1ad49c782abb1bb64abd0f0a40546de67ce16b97f
SHA25664b6e730c5aa4e08ceca38cf96e43e6f4be12e7a14ed9de33882ac161f376f08
SHA5124f704f387030a8421abdaf62a7687c3ac6d6d959111402b3cd39bbe278b344d63f3673067678c8279c5898d8f0b8ce23386edf90c96cc0960945a1ff6d1687a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582bf63dc1cdfa3da3598c3c41144ac59
SHA1d6e5faebe2aaa1c46b369dc0af5988b71d93851a
SHA25690dccb04e95aa9aac10757c62e18edb0cb72132ad8f0733c9229e8a9b5d9eaa0
SHA5126f31d92d67e36bb316b4f2973c3962b67ce3608ee821f6227e560f66b6071ee4e5693a63e8daa0dd7ac72fc24db941c8a6b3b2cecefa0ecc0adf3c38a6dd4f11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588b0a7da0caa4a6d2b0b03a9fdc1901a
SHA12269b787654d44b5c33597bd56b342fb7980fd6b
SHA256bbac9c63cc445964ec685f8cadd1c68fd85bb472810777f84385402e46614da1
SHA5121bbadb58aa132addcddb336eeb44971dedfc0b0106c566f5a5014b9f477a638bba187137d07e5071f56b1196dfb5524bd20e0fac2731021ecc74058251c48ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dc0e9e695aeb87691b1cebc317f816b
SHA18dfa62c5076df0595ee8a199137daa3552d402e3
SHA256bcdc2fd53f2b0e423c9bba4f6ae4226e94a8cddd462625eabf52deed24502bd6
SHA512fd9d5974faaccf484feeca953d254d458973810f7166f0b1372ca93f315c3ed43d8bea24c5f92b8dba41b101760c13624c2a486f4591ee8a24878abe3e6add2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da903a977afe5bf893e68c7c608f4ca8
SHA147fff28d96d85631118043d00d0f5c4eb7e7e675
SHA256435c55c9c7e0f4e0111c7eeeec9539a304876175f68998f85283d9782bfed0ca
SHA5127b86f4881b31e730649b62f098b00af700e1839a169b566ac626228862773ce524a9523aa0338384e115ba546d6e21f0abbc3d00570639fb12dd68cae085f1d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57dfbbf7e9694bda3ee247607c6054a93
SHA1ee338549e1c56dab74b72828e7805416e54a8388
SHA256dc4f16ab2919da530b8b6aae867ee495956423ef652cd27d7d986a80ccd50470
SHA512021616a9d36b9e61ea57a0025b6cb4b6ccf142ef940eda540aab33b58356fc559a0f99d3c5184c42d63a34cfa281c605b0401cea72ad4b2d8ce70b7421d3f130
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51568afdefcb343dddcde2815a003f220
SHA1612544c93203638dabdc2f8665524509db486bcb
SHA2564e6fe9fe541f58f17d8131d9c7ef62672c79d410e22544134420384ddee2424d
SHA512213484b5495883db135c98528c86a23d95d07fa37eb7cca1a6a61b043e7b15cb74d5e677398610ca6da1eed83a9f9fcefaeea5dd57df8557382dafadf9d52a74
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Y8UFEBH5\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b