Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
a119b0246697222f7d25600a773e5699_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a119b0246697222f7d25600a773e5699_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a119b0246697222f7d25600a773e5699_JaffaCakes118.html
-
Size
461KB
-
MD5
a119b0246697222f7d25600a773e5699
-
SHA1
989977b600b7ae98dab7396807bd000ce372185b
-
SHA256
34f96f9c888bd70f52b83d3be72ac170e8c4cba1cdf6c48f3aeea58820da2c43
-
SHA512
865bafd1d27c4a5187cd82787368075e21e544cf3aa7b63bf7497caa9669b13a12e7cec8ed8d75d6f15a533d2545195012d68e4d2d6c592cc80d9bc9f1051d31
-
SSDEEP
6144:SbsMYod+X3oI+Y3sMYod+X3oI+YosMYod+X3oI+YLsMYod+X3oI+YQ:Q5d+X3R5d+X3c5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000479de66d0046cdef33693674a342813b56e976bd140e32bfbfedf1762358a6f4000000000e8000000002000020000000031e969413cd37d595dfc334f0e55986155d55cf1501cd12e75e903cb79acef120000000d4c38918b4779450432e19a260a121b55895de7dc1527b85c6b3d53ae722b8b7400000007537c78eecc02ce279bf104e9bbba0f23d1ae775323780fa30e1e91a5ce831213db67c964b307a34f66f1e813efd08629eb20458ec0658cefad89b558fb1025f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5035cc80dabcda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A7DB4AA1-28CD-11EF-AC4C-424EC277AA72} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424366792" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2140 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2140 iexplore.exe 2140 iexplore.exe 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2140 wrote to memory of 3036 2140 iexplore.exe 28 PID 2140 wrote to memory of 3036 2140 iexplore.exe 28 PID 2140 wrote to memory of 3036 2140 iexplore.exe 28 PID 2140 wrote to memory of 3036 2140 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a119b0246697222f7d25600a773e5699_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2140 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5384c314d0ea67ff9d2974dc4aaab791b
SHA1ac2a497852bc7c90a9e50bb3020711236eb5e105
SHA256bd8d61bdcfd583f340302ff5f1b8902aefd93feae9cd48dd6b707da598340fd9
SHA5120fcac4e7913d4e762c78902b115c8a35e60163dd50e8db12ee2f58ea35e288d3c40ed42522d260ed494a0588417ad25dae2170a57e9523c7f1cf4a53dff7398f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f3fbaae4671c33d7c5079b3f871d832
SHA14b39ea4a49c46ea0528d7c95840212b0644753e0
SHA25610823cc93bf51dea2d82559bd23b6cb87276f9b10474021bcd46ed78283c4332
SHA5126fd80c2b6b5a3fec30f414ab46352cc70d15153a776449783cb2c7c2207d07fa7e0af4e1eb9fa56d18d599e14c9161c4323af1b9137225640359f711862464f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d640a81f1f5d62a641d61fed710889e
SHA15e9103794bbc5f221ce227094e3d3faea5f3ed44
SHA25667f6cdaabe2601fbfdfb5d72ab2bc538ca9e438fc1b829a5fd9d9973b2b8c29a
SHA512f770def0e4af7fc89c8c995d07b3ab92b00a0b112193fd41fbbd01ce7b4b4229f1bed29a02519b853a19086bb8970f4c33f173c8b7c156f23f2dd696b8bdd824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6b2e9eaab4b7f822d5b423d8cde80f6
SHA12aeb2d53020e1e3e4b05a7539e83c136024fa314
SHA2560326ccf14a776feeac2cd71cf162cccd413364988f710f64777c272a4e4f5f49
SHA512091be292f75eb64f1030e37bf7c03eb8086914d6542db594bf9a34d559df883bd31fdac0e96d90ce8de924a9d72d4fa1ef6e663164a21f9a7bdf70b9f5a3da21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597c419cd7e152a4b77bde8df65df6a58
SHA1443454e43301ea2035c6fddd3881e70f8a60d6c6
SHA2567cb5caa7f5c767301dc8cd3d2be8d231d98ff6923e41a858778bd271f06ccc9b
SHA512f053da602c973cade5bbfef492d7dbef4960a31a081206a8e42c80caa74f658c7e6195fab7cbbfbf0647b1426553821fdc813d1ef6acf079cbb28bd94d057e01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f360f4957a0ade410cfabfb4dc994b4
SHA18bdc413a3172e4abfc50cb2c1bcd0d5a81f6bd3a
SHA25665eb814c5d8be0c47c1109acdb90566c4424c6dc45d3f8a66473e76f25ad060a
SHA5124dbbcdd40b7ab88d77cdf0fda082a3b0582a1d826dd85d8ae7683955e74533411237020dd66d40a62b22f121586b580233e3aa27ed9a094d18c988fc0a261470
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587a837e4f8076f8c2c339d63320bdef0
SHA13362694b4e89c5d6f593db179df9706bc83f38da
SHA2562b895b02136d3a715c760a66e7f1146986c0f46cc608dd582f96b7de4504c139
SHA512109ca5fda1904ef72e3ceac47a5042eba0222d317b4f3241a9dcc4fc48306cb8dc5419998d7f497889ba4bb090b747452197d4dee9cba42d7bfaa7842975eafa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0a1e4869f4fa27b0dfbafe59cc5846f
SHA1f36898ae94b357fb5bcccbc1c653c08795ef1d17
SHA256dae52d89d1036ee01ee1155fb556f899877ad46e6a5e8cb731c84773a8386b9f
SHA51222ff232a39f6e80161604dcba8ffcc604e42918f00992d690a11b42f8d2d7cd00f9ee79fcfec3e6b0bed0f9821e0ffa3036906271be70bb225cdc3ae2ea98eb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510755365d446367e56a3d188cc026571
SHA18f288665b6ad0dfe3dc5f17cff2c7c99b3b26e81
SHA25638f81b45d71d95b75bc0415fce9617c345e766a1e33e616d0c24d7b90d04e2e6
SHA512be390072e60ebeff4b6717c436b31357fb0e30fafb5b8cc793421b6e13fefc250d6c27c4bbb4b2110c4ee097d4122268ea7d752120e1adc0181bb1ad41013df5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59016aedaee8abe14280090df2b7fabe3
SHA112d57ff7e9e0a4efc73ca124792baecbe3daaf5a
SHA25638b02f9a50e0f0571bd1fa1954504d6f21ffa5d2691363136e913a384a57fcbd
SHA5129dd65301e985c654002cc3a2baaaef53f3c160411f7676b774b5a05b2429fed57c5c712907622e9d3a57322d1e524702291ad5ab62b1e0ba0a09249c9a396aaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566a06e7c83e917f1e2c92b56733cf1cb
SHA1a4c8d0b945bca0353debf93c4bf220b4f0071b33
SHA256845bfd6a04d120c18d33473125ed312bd4f95afc7e64fe551fae5250b4fb466f
SHA5129f375bb04727f442130f96ba79861c455dc734518215eb035e157dea745580d43f6022244f08ce5b72f85685333bc20983d5f33caaf063ca63f5d82d03837571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56aae48ae941b34709795c4e69f2345c6
SHA1a9db4c7686ddbce7be587bd7b7f8409243a4c2cd
SHA256221eec66219dc57b27a465083697130fa659d894a1c9d39ccc4fc2f2fe6fbf13
SHA5125f9dba6eb2688f53934f34215d5b336ca449ecfef8377082d90940beeb61e4eb2c9474917c119847786851a4522f3d5f28603ab329a6530615b9b5bfae7a3ee4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545a0acef107ebf59beec90e240af812d
SHA16d4b2ab1075fe236ca4720d2b7982cee6a07856f
SHA2560899e8e0ee929b2612c19324e132dc7d7bfca93c7294d869bf68c5046113de86
SHA5123a6c6b9a1ae8da6ebd87d3eef57dc2e0156d13d3a9edfa0051553b7cb233aca9ad4e1ac80cdbef149b7cb16b3f70f87728e6b2bbe92b0cceb20779273f63f9c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529e3a77200c4d5336f8d195cf40d3f5b
SHA1689dd5fbca2c89eb6956fcfcc5e7fde8a519aa7a
SHA256aaf71431f63065bc2fa31b3b05e6ea58d2ae844ab16d3a89f6d2ce7f3a0c42b3
SHA5123a9c65bfdb40b2c9f6494dd4646d0c94813759e5bd1ec304c9bea995014d477eec001ee09b828b0d8c0bf62698b8099ab1facc15dcc575b0aa06818fb223e46c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522322ebe94c2f3c22180dd09599506cf
SHA1ecc81cd7c54c959f416053be75232767619235fc
SHA2564ae9ccde638967dde55aa33133445e7ea22e51830f939a5fac7c2fe4ac85c391
SHA512636dd8ecd0a227a223514dd1590f55bf6f5a6d67d8ecf7969c6f888a40dfae2d7c5493e6754d20b3424aae4a3297b87b4f3419c2f290e94010369a9ba621e11b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a147d2ec2bad66e05e95536e46033cf
SHA17f6387d9a8bbd39afb30c4f0370de04ec2897d14
SHA25644397e4b2c7ec1e1dbf06034b73a181ee8beb03cc801d4b3f905d4a33ff8e00a
SHA512b5118ed9db9380cfe98bfcf4cd0e9abc3c5a48e4dbe4f46ca188e6ccb281aa50e0dfd97f3d47d318098f39f0769a633b1003addc56b379349fa19ffa4ea11b96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a25a17f180d87ae0ecd14d8d2095e38
SHA145441299463b93f98f638643bc39f3d0611d34a9
SHA25627ea0b68c923646276d8686f522d4f248b8f71ff35c851ea7839775fbc0447b9
SHA512663c452025d52de286a3e493bda1db2623b6d00798a515267627a2dee5c38ae2d50c9e2fffb88f34a289080ede653b71efdd663d2cf19e39a8fb9c477dd35603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a70a7e5357a18f10ef7fd03a5b6a75b
SHA1508a5435bc20b3cda5e4ec6920e1a5c5225e8021
SHA256dcb94e1788076e2d940d36d0c0cc3cd2cd362fcd9ba4059587794905e3efafcb
SHA512d3da43dcd581c83e519bae110fcbf659ababaf12091e29fb16211c9f4f35437e8788f5e5a0c7c8bd2924d4027b92aaa9934cf9ce06f7879291d57e0275632f6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5930e44c1357dfd2447ae0a9610ab1773
SHA140ae7cee003be2c4413a6eba90dd677db5197404
SHA25604ab8a90c5a51d0b61d2169d9a49a051c47556c0f6fa65e08b6b8285a5086602
SHA512dcf9f1fe8b05bebabf8d3025ac08d86dce0aa739935995a912cbe34a2ecab9652e54c3961ddafa53f280a850a9fa3eadf3b4b0cc0fc9646c05c75998e02881ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b0b8b0cc89b58b55b1122babe539ab2
SHA1f106f075a150125970f93df256b67a5bd6489280
SHA25628ec178695174805d19913791cbb658554a6a37cc161a1b1c99ab7bc2b2c3d82
SHA512da1138fd4c3f9ae9ba6bc04d85f61cf9f18f97f5009a14938cdda61e0be606a550a181c2b56aff1d5f749920ff2de82684941f137ae56ec6f223687ea6d169a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5590db81043f18f220745690081d5fc1e
SHA1afd1a365317d5d94756fe4aa9f863236f382bb5d
SHA2563850da0ea670ff19871fd1413b6562be9e8ad40ad4b193bc1db28c8ed4053f35
SHA5125681ffa2a4f538a99a9a879ce0811140ab9bcc99efb757efc6de8da1d9a757d66609c10ca92f933e51c39ab2e33670f81350cc7553566632266e6fbd3e5d79e0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b