Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 09:30
Static task
static1
Behavioral task
behavioral1
Sample
453d18bad5a88017736fe8b3ba7e4641_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
453d18bad5a88017736fe8b3ba7e4641_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
453d18bad5a88017736fe8b3ba7e4641_JaffaCakes118.html
-
Size
31KB
-
MD5
453d18bad5a88017736fe8b3ba7e4641
-
SHA1
ec5978072ee91c9da5ec9847dd6d2857112674c5
-
SHA256
18ba50d08b078de6c2caba2a66c479d48db47471532ba07e9733021441546454
-
SHA512
8b813c267306b1a5b5a89d7db9921e838581204c0dfce0ec27a4543f0320f0ccccb732903583963e501937aa1372df5e0d8f40cae9dcf5152fabea36d032df4e
-
SSDEEP
384:Jda4V/HkloMN9NznnnNvNyLfNvNyGn9RNvNy1nnrNvNyYnnDNvNysnnlNvNyAnnp:JtVo9NznOn9gnVnRnTnV9Kihg50vn
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{AD1C9371-41C3-11EF-880F-D61F2295B977} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 108ef584d0d5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427111284" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000e921005d509350acdc960cfe249a7e05538c9a84af521f2c39be0b9dc9450949000000000e80000000020000200000000900523a7f0cdc0bfbafafc205fdaed76c3d7934d852f8a7ce9cd9a15aa0653420000000434024b49d2dff90eb09936fa64ec9e46e9f04ff3633513f0f0435540cf4dc314000000000b3142dbf6acdeb971e689ac5dd9a7105eff65ea135a5bf63fa1a7773574278763f01fcfa5757d4ea7e3af7d5b0daeb1bd3e7a236714039504f5cdbf6d7284d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1292 iexplore.exe 1292 iexplore.exe 1248 IEXPLORE.EXE 1248 IEXPLORE.EXE 1248 IEXPLORE.EXE 1248 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1292 wrote to memory of 1248 1292 iexplore.exe 30 PID 1292 wrote to memory of 1248 1292 iexplore.exe 30 PID 1292 wrote to memory of 1248 1292 iexplore.exe 30 PID 1292 wrote to memory of 1248 1292 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\453d18bad5a88017736fe8b3ba7e4641_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1292 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b374f92d030d3473996e4b528210fee
SHA17af963c00c3df29edea5eff96276cc32d866a1c3
SHA256dba86bf2471631efd1a549735d4efa90052a70f1dd0799083f2ce9a283659466
SHA5126247ac228ec459464395f12485de7b5bf30c952deae819da7c6a65a95adba419780f58d69535e400dfed16b171df4285c2b47bacb81f43d9171b4eca58f0a5e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fe54d85396265b76db1b910e218468a
SHA16f9967902f052ca00c329a48667e0e7e5818203c
SHA256c08c8ea0ddc7a83dd74f3b7f201fac534f3de70fec5da1834e877a76de65fc83
SHA51228a1ecfdde17be0a8a4f5e208241c8446b626269a9c041d45655030ac8781b9e180c29b33534b6c247455ddf0c4b0cdca7b449eae38d40547670484c5d5b6e73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7f2bf0185db149ff857da742b00a1c2
SHA1efd66e011b8eead60b924c199c878aea58edb439
SHA2565da5cab9140798b8b62c78ce14b3c74c52a4d888c1ff9d3e30789164cbb384ac
SHA512e484d8d8d03c73ef4e6c4d6dee7505e6d0c00434415c243b22e03784eccdfa851318b1ea63df9f5877b32926e5e6d6d9787675590ac8091db04cc84b3fbd3395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5965ad3c3f4e2c15dd90d84fd831d2f02
SHA13c6617f92ca66c694ec7b0911a2dff9ecc594915
SHA256d2a58035d55d4b46eeec8dc677bc85963b31c7ef2de731458b33c521c27b9c94
SHA512a29b32ccd8edecdad7c84667f79bc11792e516928d606f94536960e7f94f61a05761c4dffd8d14548b725f9bb5a94bae2b6dcf7f19323dd8d5b4800515cffcf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a858679e696a9e417dd1c1eb5f11da9
SHA1469f489974ec30e9cdf50867bcf107a349c908ff
SHA256f738af904f4d00679924478a2f5872a4fff660ad0bb8ac6bf139d2acaa1fc55f
SHA512dc10bde4eaf286c86ef5578a795c7e43426763f203d3fd06b76453d592b752d666daa658ac9d7b13cc972da9189cea82578b9610ebaf558e486781a16532f648
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5888359d6b46784c3bc0395f2c67cd3db
SHA138406d2405ba9c9c95a1ae0477753f67ef9af7b5
SHA256a56ded389512fede74c256a2df4845a785a45817794051f84c5e46abc419e773
SHA512adb2f2eae236e3e178d4876fb9534a5d16320cbb87fac3a5ebd1e754ff57a75c6c252515bb9bd519c0a47b6587ba4864dcc1a0635250259126d40cd07c646156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe9634327b8ded11c7f7c69be81e40c1
SHA1828d225ac3c6a8948f2b4a9ff6a7ddca47d3dcc6
SHA2563af1426eeef6562bf122ad00c617c416bcaddffeec91041a888612bb66411212
SHA512182fc97c705be551b357616b2eaa50a05b92d556abc3a9cbd8c890ecb70f141c433f161f8774e72ecd22895443a8df94c11e6ccc4fbfedccc985c9e4671f7713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0f666df6e8f6735b361069e3737d57d
SHA130d996c41166672119af33a4f2d91f689185ab5a
SHA2560ff2ddb2cd815dcf2a5a82c1052eb962a648f35204d002fcbb7c1786ca3b6a26
SHA512912af3192c0f4823fc5e527962401ec45328b9eb0e22d0a526d8a6114e0c6bc6eb9726b4ffee0d6ce43496a83bab1be5992c1bbedc697d66141abb46aacdd093
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599aa5210706c44590ce21544c3cf03b7
SHA1cf6f583adf771026261cc720429533a453972c50
SHA2565a64bd7b5b211301438d3222da449fdcd160607e58b562b72a4e3c373869466b
SHA51203a23e4686bcfb32ceecff1bf5990427fbf53c4f58337099c571b63c06fbd45aaecda2f40bac80a958bd1630b51d533a4f3a76b6f4892fa50a569c8b6783845e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7ba8d4193eb20572b95072bb694079a
SHA1b74079e3d60fb0e22cc5f1a0fb45259c86478eb1
SHA25657155a88f4182eed1543f9f5d8418bfd3b3d9da6af931d65b5a06c53f335e1eb
SHA512d49134ea2e8eeae11d1e10ecc907cc8af953fdccac01539dd4ca671da2ec0eab27eeac7b8c8ac6866378e537868598a7493715581881521f8351d335f55d7273
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfb08040327add8ea92ccf955211d574
SHA16b36eed07c7cd162cea4f9347783524778ef443b
SHA256ed65cfc39e987db39ec090127806978072e5b9d21057b7bd87911f97c3fff27b
SHA512b5cb27cb12434ca57ca4fcbc9f865bff7966c31ad0672b4fdc191b10c5dda98866451715f83585eb55d8e0a6335e8128df30f29b7cd0e0c6e2d18242afe4d512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af4bb9f64324b35cc92b92ffd405b281
SHA15d43e063a1d6f9343ce89c4fbfa62831b77da352
SHA2567fc88e178973ce23c37df6a0961300da58611414f5275c0fed64a44fcf02fab7
SHA5126afef5ce45fffd2a9f2ea64af9a7c8537e787d9fd7851c0e546303009db0bfd8d1d665ab6156ced77da5ccce3efd5cbbdcdb064a9e285815fad5bfe85d329c8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a551179f5d1c3474a58763078196a9df
SHA154fe2c5841e16b56d08cea17784b64df28571148
SHA2562beacd1679a7420bdef534ce27548ad4f82f4cc942be8f825334f3649b2f4dec
SHA5125800d087a659d373a0d4a98c3dfb069e73db3c9f43fbf837624dd7ac4d4d2ec5632b969ca3bd455d418151ea6a0aac1dab8fad11d1030c02a583d2645c196f1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593173ba157690da744473c73cc652248
SHA132e962732296c92fe294bdfed935638275fc8bf3
SHA2563b8b0ef3946287fc540d4f98005aeeee684a23fcc32e0fc363559500f91636b2
SHA51257ac4c174e0409a1bb1a9f4b2fb4cfa65a83f44ec84a32d0d02c1ee0b38f6dc53cc923089ecee0ce9f0e0de3febaf5de2ec944741349ba569bce7088a4fee7b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51791101dc0af4ca6361479f03df16c41
SHA1de175b12ee3f37e2be484a9e3d2680bad5864bfb
SHA256684a7287d347ba30be43c07d93ae073241a05f2a9daccc99377b1426f4d56144
SHA51253caf003474b44bfaf51a9797396363a95d31f448538f6763eea0f4ec710ec9697fd1c8cfdf36caef6768dfe1f7950bedb76a2de23164b2ae2b993045092e27d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd5898d381c71d7fcd4856034337bfdd
SHA13812e25f0658f314312d768143c3ae3f453527fa
SHA2568793cebd1108f2c7c332d286ddcdceb3f77bc3391f233bb37b229f6e71638d49
SHA5121af62f64c9f3523a659e605b67c567428cf0e92ca0010fb0c42e76241f0b844955867258658ec18e2173052111dfa1f27fcccf34e52bfb25c8700c99dccbc3c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e332e1c54ab78b1d3f512b23a497425b
SHA1e27083bae0ddc4cccb09b6b3ec7e9fa83b7d5d94
SHA25690abc25297b62cfc973da4e04aa72a2f1ee8e43754e191cb375c6a5960fc7b77
SHA51251a9f07ef4ba57a96784f66e699a5ff1b463f4a97ac25f411355a8ca5c9c718729b9868285b3845786f04dcdad250f7eb2757201b22b1e362bb73e340758224f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5422229792f587eff03f825253d63b51f
SHA11a1da3c6b8c7912ddd402c7e11070510606ec787
SHA25675843fa2e4ea97fb1bc6935b98efebc498c71417c3bd287025ced465651a9fb1
SHA512c42a9cd4ed7141732b52af2002f9a5ddf76c089285fcc8e9eb75859de4ec37141f31f987f9bb05a96fc83f84470a701207cbf8e31b25a956aaffb26f4cf20f8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51985e047ee258dbafcd1eea717e3856c
SHA175ed270eb9996d6bfdc88989639c1c3c61fe2935
SHA2562b486260bd93e3255170e4d5e1577e359cfc2cf229c439a44f3a99f7cce52e85
SHA512b19f91c36872dd51d9d22e24ea9e22fcc14236ff865286029604adf455dd6c162a548252cdf8df628b31ef23cce69a5bb41a914f4ff698978a28589e4868fd9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee87018d1166d9856de7f483a9734c63
SHA1a380f21f3cda058f32ecd661d4ef6dc0ab48d91b
SHA25664d842298845de4befe35ed89fa7d6eb553d5a80a9e5d8b45cca97563d556d74
SHA5122dd019eb49784a0af30cf379c88ff29ce02ee5754a46c325edb6a41a57a810467a81ac468140874530b2f87fa902b687e45a1f03fd78050064eb7b0209df0438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e65f22ce358a71a8d0ec7f87f9a7b67
SHA1d67edd84cb24860c2f0e79864fb69cc1c0d03392
SHA25646ae4f3970971cb26ce89fa4573e6bfdcef5af7cb35563bcd0dc1ef5c8dfa41b
SHA512024b6aa3df0046f17558b3117155e03b6a1a355110226681841b5d9a7ecc1ce868f49b47fc3b740914bff7132525e8f8334df7a1d0f81976f58ff7cf6bedff76
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b