Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 09:35
Static task
static1
Behavioral task
behavioral1
Sample
c07390ade011b684c69da84d7f8c4889_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c07390ade011b684c69da84d7f8c4889_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c07390ade011b684c69da84d7f8c4889_JaffaCakes118.html
-
Size
3KB
-
MD5
c07390ade011b684c69da84d7f8c4889
-
SHA1
1ffcd87dfcf2698c6e3a58e9f8b861d19ad35f0f
-
SHA256
8347fd36f6fba1db1b4b654639dd8ec598d6aabc5afe51fc79314196c01506eb
-
SHA512
66055bd80f89a0356706b0458cdf4cc0b32bfb3515f36b45604957694f9956be3bfa5ff7f5942ecb9207c49bb8b630ce07ab42a55a3e5f11be6c6818c90a6b14
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000044b6176cab511840e45a3176bc3be45c321fb8b39642d91ed5c4ce01d428753000000000e80000000020000200000002296d4492ca1095b85906235a733135d47f126e7422081eeb3f55f59253ad152200000002c1a9d1f9e9d6dd0357123f01b4fa6d45e6d08c0e5cc71dee0127483bb6200aa400000009734056f4af14e02a53b675f68d20316420d6552e738c4b2d2dbcfc963e150c65ba2b1f77294ac3448cc7e8ceffcca69c3a85c168acef33711abb07cb184cd70 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430740380" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{53A2BC21-62C5-11EF-A1CA-D22B03723C32} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10dd3f28d2f6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2152 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2152 iexplore.exe 2152 iexplore.exe 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE 2572 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2572 2152 iexplore.exe 28 PID 2152 wrote to memory of 2572 2152 iexplore.exe 28 PID 2152 wrote to memory of 2572 2152 iexplore.exe 28 PID 2152 wrote to memory of 2572 2152 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\c07390ade011b684c69da84d7f8c4889_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2152 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509594c170530b8122455385a3312029b
SHA155529de079bfb60c141c9f85dd1d0e9e82e32a2b
SHA256687ede1f06e78a36fdb2cb56dc5ed91835a0f9dbae146b70f97a067bdf66390f
SHA512f5b63318f024de203989676e2b5d1cf15c1e1a45070e1f0db3e6b2abb6ce6ba36df58af94055313baa8c07f26a472cb0306ad8826111cae001e2f0e80c5508d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59faa12aaaad4d93b1f0a16ce536ad0d3
SHA18e3b70d7630a60287c02db09100dbedec3983403
SHA256aac91fef51fa9059f3e2e0966c6a4afaf6418751ddc865e955d7a45cfa8b03fc
SHA5124fa992d8cc4636b2f6495e11f98440e17057d260315133ad570b6051b744966d1dffd60ac193091a25bb5fb58be4190b72eff27a761ab55962c12beffa996eca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5005b3743524df5bd692705f75ec8249f
SHA1627bda411463f6f4786c1b63358ebb3ce5c8786a
SHA2568eb8e0b08d8a0b97b10d66698deb82fea87b82f2883102c0c6c0d60408632a13
SHA51245f1c8248d410f4a7af573bead6438afebe9f2872f6c48308e9ef1e32d4d4c7e76c6e78a8eeb3dd59cf4435d34f98ed1f1ce0f814beb7bfb353cecdcf2d0f21a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d7383c8f2cebf62f52b0be6eec3df27
SHA115d5d80e88b3e3add4a7c800b453092ae7c189b4
SHA256f01c7f4b82b71c4ff9862e18d0292c07491b28f202fe7e26ebd19f7eaf7997fa
SHA5124463aedfcd6d5acedd721c69ab8cde091af38685e4c380a094d1b0b03297f399866744697b7a1fb5ba953fd90533aaafecc0948fd5cef19533bb92ae9f484e61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf7950440a481aaf1346f43b15644fd5
SHA1ea596dda989316c55cf4e60f2f2bd26e9c02d1dd
SHA256ccdc3584139c7753d331071707b1f239486dcda0ad439e3daeac1ea3bea0c9b5
SHA512626c0486ab12043f78da428cde72b2c6fee7f3b3b0423058a802f8558d5a369dcd15a30a8894bb06e994e701458e8a5af500f85c9a12c0e7fe910e12aba70719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa6f1f4de7193421f5f12294529d32be
SHA19507b5d649d438e7b76b5210c8da00b665e055fa
SHA25669ec997f15a14408f334233f271a9084ad5350d537d81e96c03b7d82d94a2a66
SHA5121cb140deca4ad048c4f488982ca88195225dbaee3db11c34a9d76f9ef6bedae4e06a9c157787fe30f99c3024e819b111a848c77434e19a0ed2afc35382e7ee3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8fa6b28feebc99a9694f0e3457331aa
SHA1b9a7c388b8deb1341c67a2516fb7cfb539a4fd92
SHA2568f83bb9d311a07212b5c4c8e4d02a211116359898de08a3b581b1692b87944de
SHA512a327ba92155d6b8968e79fa483ce42c020f0a0eb26b4801dd8016776f885012c8b6f363082607e41094e857c84b18e95d4b283de33b722215923325f99047b20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5655af8460a9d6173e195fe1684817c8e
SHA10daa3cbca150445089d3b0f4e4e7e79b92b8917e
SHA256addbbe1551a7409f2cf14a8e7123eebb4749aaba0faf6314c22ba09692bbd38b
SHA5120b099c1a576df19adfa4086da18a38378a63731925d4809595baa9f7ce94e2913c407a8fa26ba8d2f62748a0ccb7d82353b2257bdbf55d305f792f33e2982f6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594c296eaead73c43f477cae44e75feff
SHA119c2afdb17c17aefce44b58414d66e23fb5a8e2b
SHA25682dc38a119ee7878de20f272fd96675cfe3f89b6d0309cf9c4dbfcb35d12cba9
SHA5121771a7bfb421318461ff20fbe026ac34f5483538c91217879bc563750e804dc505de809a86a4a7aec0d433971c84c837f1c1a86c0f4d04710d79208bc8e76a6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2ac32112eb0c4494fb57b7cc201c751
SHA1e4b2404612c317f27b154b3c3c4396fd1ee5e3b8
SHA256ce0c37759f61c8dc99645bc089f735d81027e8c3cae0db0494a0c2ddcfdc85ac
SHA512629e22eb031deb7a5a37da87cf084fb934e0f74c4da928eaa3f116b05b61f41de4a28be4010dfb4e3a2d6ac7bdac379c2c9b3916b8789904dab03e40bb967a30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d66e9da6055ac8a0258bb2192b154c69
SHA1127538c0f73338ee4281035021d3caef9fb6cb77
SHA25684c687123b4de4c417544b970728b11dd63a71b8b328d4462fd4249ce3dc5243
SHA51266c7739838444c7cfab917541736768e3388ff6bb2f2c9d2bdd350d9bd300666664dd7e13738b4c6ca33a021d83c39d6c80ef40489445142527c319c5656a5cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caf2745a76ddbef36bddd82e2d28148f
SHA1c4a38c55c0b70de337aa67f4669b264fa6375db9
SHA25679fe005bff707b0b754f2b6edaee6ded60a9fd3bab00f437afa51fe86832c394
SHA51269d54f7ee22b9829f8c78bfa2b1ab2a2f25486b25f316221eefbf199b62f2af15d7eedbfdc0fbf48ccfc0c8f565ff28042ce204c25e1f48a52aff3d5a9f4a60f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a292d5f3614f83f4a69abd1816bf645
SHA199f81f2e6fa5efba826de2e8d9d964e9160ea173
SHA256b88442f9ec2e09b3b481f1a5c9b3b4643ccecfc485f43bc109acee5a933e0f72
SHA512131f3b3482815fd1c9cf1303c58ffb87b0f78700db7827b1a9fe123357c9faeae35357d277c7d40bbcbc16368c45ee8568a59a644bdc7194ba4af68cfd1f3692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e02f0ab72c9829d739addbbd1e77adc4
SHA1684f155ac0c87147e023e375d93cc49fac8557df
SHA25600b8379dd3da33858d7f736e9038cbbebf2d3215207058b088d72f36be166745
SHA51285a06a5522cb6796f5dbb9da62bf23f1470e90138a86ad12e31fe15995a45fa7d13dce726be00cbb4c99bad5dd32d1c49f2858b7095a66ff727837c95c2d45ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e8aa4e7978c2e506e4c55f1e3c24be7
SHA1424ed9ffa3616efe5ae31de15eaa1a61b26b16c3
SHA2566f68320740759a2b49345389979d1a78c88d5100f183e8bc3aa9adaa13ace89b
SHA512a78cab50b2b54490b0c6b584f33127a2c919d740d3cdbe9131576472f8417b155c0671fe767ac45cd263ddf8ac1b36a30100de7e803fc2645421f660b9473569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de814c07ae515c0ea5d02550c6740524
SHA1ccd4cdd4ce7a9d05607d0386a101f194c779181f
SHA2563e084ec14ec606ee592332297bc903f29c8214b967c6145df7c3ebf2b12232c9
SHA512dcd0b805faea143291046c12a55fefd25e4c6cbcf3c83b0662c78b6150b1e875139e55aea7bb68f8a1d7760501608dc97479f34c5f39e6c58d4c98ebaa347e86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d86ef03c5a4068ea18a103f4b48d927
SHA17a096e70cada8d7fb2c059e6344ded13410429dc
SHA2566b5e0aefb2d300848b823ef3ab0f80ad4b63c8c3cc3cb7ce03e3c5066fe4d0d9
SHA512f4690d3ddee72454a69cc9f20fdfacff8373f5b816f578a29651681d9cc1a3835cd237b88dc7d7e56676fb84b6ca76caf5615c0908d169f48f7410ba4fb71225
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f116fe7af6d95cda691633d717d24fe5
SHA178dbad8bda03f351ab26c0b4836059dd36906ada
SHA25670b6d4c9832b0f5c0325a56dbc652192196dfe77258a8d65095c239b59f68c08
SHA512e308c94316664ed684997ebf51300f28b32e73381bb6da3b532d9ca801a1d25cb74050724047495582c0f8b698a2e205572927e1d4e7482ac22429b22cff8d66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7b4d3c816ab3191d3d9b2dc9bcef62f
SHA1d744177daf7e49af4b12f5e9db2159dc1bec8de7
SHA256a2f87bd7795fe281b177125416fae547fafd4ef5a66dfb0a8010a618760c1eab
SHA512bacb89fb6b62e03075579715d766aafdebd1f4888901ef3d38697b52450b1efe6756b16d2cdb4f19bb744131ec5f9f9f3cf0f074523bb48f4d0dcc18ee293225
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b