Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 19:43
Static task
static1
Behavioral task
behavioral1
Sample
3bc0cd278d4913702397d7af950b7a45_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3bc0cd278d4913702397d7af950b7a45_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3bc0cd278d4913702397d7af950b7a45_JaffaCakes118.html
-
Size
6KB
-
MD5
3bc0cd278d4913702397d7af950b7a45
-
SHA1
94d4bac7ff4ac28930595595be5a76cd03de939a
-
SHA256
b653acd2a038e32b85253f2199825ead7c5eeedead03454518b83fca29ad9fe5
-
SHA512
7dd252c13398022a0da082b9afe339622f1a93624e6ee06da98330a255dce48d113e1024a3e167777fc67b316484737c25011a002b64ad7c21d06229c6b460ca
-
SSDEEP
96:uzVs+ux7U+LLY1k9o84d12ef7CSTUEbolcEZ7ru7f:csz7U+AYS/polb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{387349A1-88D2-11EF-A8AB-EA7747D117E6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f5420000000002000000000010660000000100002000000031761481c21c1df0a54a4fc2d796be6cb4dd965ac3b21a13dfed0ffb7c630477000000000e80000000020000200000009ad60de58167d19bb808f2b8bc36de48bce928f31b12255dfe57c331a305ac0e2000000053d07ba571707bd8891bcfa3db81c051deb4a2710e4728367f609157f7f0cb5c40000000e7ef152bff1083b53d2ae9f33e87e66b2d1940e972738fa6d0296e3826104a5660d5625b77545000ac2e81ad8ee5dcca60ede9b37d7d73012967bd96ab55e91c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434924062" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c056060fdf1cdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000078a0cc6b0b830b4fbbc12dd3fac6f542000000000200000000001066000000010000200000001746d97d43a8304fade4252e9321831d972c5aa8191344a341e69f1a99de61d9000000000e8000000002000020000000692084932a09a6a769d6f63286c7fec11f5253d46185ee8eb1c6d64867ce75a390000000345f94edce9f19c554caff54673e3cabec03f159591ad55853c208004f5eb250a8bb1ca51c0e090b0559e398b40eee52c8d0f9c7470767cb50d96e027718fe7455066a2ac1e7aefa8730b11e14d02b564ce79f68fb85521e9a7a741e238fd8199d46c87b5605ec9776a3b539053a18835b773444b731651a4cdbac0e470ff62958d722fa8b9d4bc6ef8a9b9890fe500340000000c82802de84ef797287f96c5b59a0f926896b88cfc2ffb65102f36f870b784638fdf7a3ab7649c9ac5e430538997445a3949e21a50a8aabdeca668ad8c40320f8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2860 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2860 iexplore.exe 2860 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2092 2860 iexplore.exe 30 PID 2860 wrote to memory of 2092 2860 iexplore.exe 30 PID 2860 wrote to memory of 2092 2860 iexplore.exe 30 PID 2860 wrote to memory of 2092 2860 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3bc0cd278d4913702397d7af950b7a45_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5b5dc9bead333f9f517a2ec3ba88572
SHA1d58a9c4493ce215b8334960da10a5e8bd8fed1f0
SHA2562250e4afce79168254bbf9ec17661f61e4a2df286eb9f4b5656e4a3b5d29164e
SHA5128f8e3668851a00a6ce1b5d2f800f672271dd68c9c9b08c3b170639a3cc40ae20dce32ad1577ce3cdf884dea663078544614bd54c8c07dde0a9da4f3d8a8eb1b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539567fa4dc03707a0cf405cf6e306272
SHA1b73a75100d3e9c148bad8ea86c4867260dcaed67
SHA256d332c54fda6f44277f05d6e7527484b0ef265fe2374d59524210649fca86e9c7
SHA512ab76b1c4c71c98020146d0364c60a35f40e79dc41f59d1165ed2abb5625f4e615d4ff3c7539f14e05ee143f5dd57e40b6be63689bbdb2c16fe1dd99555557e34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbaeb0971382f5dbb7185a943fefa14a
SHA1ce7cf91dbc1a1cc54d55c72097f9eebfde084c01
SHA2563ef405df17d4293e37a0aca42f98f1510feceffabb176512568504d5baf23a16
SHA512f3cfb6a147bc8daeeb32b4c45cb815f469936fc89dc81293efe4d86a4ab7bb6001ec102b2d631d2ef8e513c34846ab4a409a06e6cbc3a40c3217345dec1dd922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5625b9eae38ef9f4f0255a4a2571f2f8d
SHA19aaf54caad72c258fb6c8ff9408f90dfe313126d
SHA256dd04cfcd690cd6be84dc815a683b664dd553cc94db23ae2ed3b68b725c19c191
SHA512d5c583046d3de709f5184ae41e55f32ab8db9156f9978dc7608567fd89e79956162fddf612cfe1a37332b632ed3202645a6c851088c107b36171aae040ed75a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f3d7fe11329ba2318f4ec8de45a31a4
SHA14ac3d57b746a55a64110a5650196c4d8860fa7d3
SHA256b47932285e867cfdb436dde78edeace91835a20cbddba0c26808df5878873ede
SHA512d3cca8b743bc23d11f61c76768a648e398a48be6fa04cbf381dcbf3a2f3647aaa7d898ecfca897411b4e8c08f16bcd426d9090d75b83fe0755767917149c486a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a606c5552493f506e571490c09c0b820
SHA191e0d27e787a576e563671175b7048f364597be7
SHA25697d450962d4d81ac5baca1b4b70656c670e241adabad5939007d503228285533
SHA512c1656a4e0e0b2733d09435ba6ec4d653455b4bc9662554708c39f82ed2b8f4af680cc77f7bc56d87d758f21c25e2aa95e62702c46988ef38337b39c02d1f84a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514492d925dc2f1704bd8a471ee4eb7a2
SHA1127fa1287bc1c63bdabcac2ac7491f66e92c3f18
SHA256323583d1ac0a152e1c0f1179d4ff0e0d9d60a76b32db1edddac62e0324e9e7c0
SHA512d45aa9f8a24faf2d3bdd252b089f2fcd907bdbd3bea198950883a87bb52d08f41559b0e035c4d18c312ab61565c9c6d9174d5754582f3918e642a4dcce691de2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc7c298c72ed99815072a46802dcdd43
SHA12ee90b5d06afe48f004e7a837a4e2d148b4ec4c3
SHA2563bbc779d1249bb3b2680387811a0171c461ae715b29f7fd9dd075dd77e69ce7b
SHA512b87272cc64fbff1184d6666e1ac2c23719f066ab47884cd835c478f5075a3f072e9be351dd7118bb724654edf50839793fdc163cef326a55854c204b2c32f52c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd54d74d1e3c0594bf79c25c64149f10
SHA116733d2564f4672c0336bd7c163595c4a161cdd3
SHA25674a4037c277e414a746a9f47959bd1cb4f71cab2865f788ccb58e9722e06e7b4
SHA5121de6e6925cdc258058e4937d9a28f188acc8ebf1b81dfcdace4ef2362b9ea0f58f78a702de765834b99a4216cc518fe842543650284209df010d0c3453e5b7eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50deea1aafa6d6325e76d70ed73cb880b
SHA1066f2e4f2da715c507d37d547d8e6e5fef4e07a0
SHA2560a9938c0d7c76d7e0262c29c7b85cf5204f23ab5591eadf0b73aa2669db44097
SHA5123226b72f77f59ea25f960c782dd60d3496e1d6c5459746c89cedbd07385bd9de083c4a7038675ad82f4092fa3efb4d42505e441c1537a320edf4142d65e45b81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf9921ac335cc2377198299216027db6
SHA1d234c8c712b293ab11412d6cdb9139bfddafc52e
SHA2563b3f7dda842b85ffa46bd0e72b86abab1fcf6f3a1a2e8febf04fc65d4c6b7224
SHA5121c15bbc23532a4fb71199b6e934bcbd78e8c1d0377dd1229cd3685dd7d114e8afcdb6e68b5ee2a0230ef652f6cd2cd581229cff12a655833daf972f1dcb5009d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b5fb4328786292ed785bc0920659c7f
SHA1a9bdabe43bb5f87bf5981b80d50fbaf5d1524da0
SHA25649d1efe00b1ef8dc2894ed5cd216edb125c9aa066250510f436c5dac6d07b482
SHA512f974b5f64a7470ea25c87314a68cf5d504f1d522a82b67d2769249c589ce8cd0d80075d4e4043a1f8a1e23171a8209a90252bc7ddfb9522ab4ed4f9176587b98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf9f4e97d7b1a0e96c0991262bee8a37
SHA1be206ef44d98ecf5c3f35c29a6ec447bf89eecab
SHA25636885bd3d13c5bf8da1ec38c2f55f326b0d3b9bd951f7c20dc7ce1e5147cd15e
SHA5121a01dc8d190ef94f6d86e1fe7bf84a3ace697b7baaf3623061c73e07d86002a9625dcacb38c62f212b38f37428b93f9105abbc61375f33679f1eb90341267f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5205b1ce6d5bb12fce785d75e715e49e5
SHA14dc9d4cdd4985f453d16f4e4627bc02fecac2d50
SHA256aeb2a7a1e8e939d66df4edc6b460037ff40b1e7e15745b85d63db323c70ca84b
SHA51266d3abc813ebec7ec210e29308962fbe570e324f12c8e99d68bfca065aa3b993725c8baece9c9c22c8093d9856a214bd20d34b3cb2a74dacc638c28e9459f880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54750ffe69c59c09e6b3cf724596b0ab7
SHA1a49381a799d202cd74199436d634c9edfcd1395c
SHA256c858487f2c73e44019ba5fb688ba6471974065acce4fac949519d7613dae306f
SHA5127eb6419332fca5cf4be4d711a1b5460a467ba5714df9da99a40e766b1139cd72e40e10422483aa25ce9e49320d84a81565904d902d2ba9c4a6292749d7d6bd88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ad97c1dfe8543a2872d631f36e406ac
SHA1fd0573c3f0fb1385c38a2ef8c0f979a85d8cff54
SHA256caa7aa8fd0e79d96c3f155d6b21a0174a3153f8cbb2cf4df1df56961670f819a
SHA5125f47ca5b19890034f93201dab4bb0a9b742e99dc29161824f7d7f2622eeac115833e430dddb8fa5b8edf562ee4cbf594ce8b2566cc6d4382f1e6db6693074fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c29c5cdab1f313354331d8a27053270
SHA158f6d51c50a73e6607033b414131ccf20ec9a789
SHA2560d1b3697421a6827b743faa19c1f277d0c6f1cb584dba678818362925042b3c9
SHA512694c60a6aa7d6763c095b68b5268ccf1bca0113536f349cbc49abccc40e3faa559e88779823c70a683168ccac3dd019b62b96c71f67eff378eaa833aa51262c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567ab443415c79aa57bffed2f4b805f1b
SHA1a65932de9fffcf54942931a3f705ff12bda64971
SHA25661d013a4e4ea0391322b9b22f31a6dbac122a7fb5dc5f471ec0cd320f232b139
SHA5129edd8a8f5c99e2aadd88afb0ea54a678067553c397989ae46411918d2b92fbe3d5b180b5d5fa81a67b916d2674887cd2fb45fe80a6d09c95b1e727c7e52e6c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cabd74295bdb5ea06a2759ba32bdb82f
SHA1a82f0f129bdae20afe417c4608a475195578ca7a
SHA2563fbca00cdc5fbf00162c4e22414e78b04030e9dc20916cab0ef821ce3cff554d
SHA5129bd5fe787162a4e877bccb4b02751460e817cdf03823e12585221fcada81c94b079f2ab2a1098cd3f7772a6b61bb90072900b4280de24bbfdf40421917a2c3a9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b