Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 02:49
Static task
static1
Behavioral task
behavioral1
Sample
ea72e009d1ea041a40a9af06ec047b00_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea72e009d1ea041a40a9af06ec047b00_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea72e009d1ea041a40a9af06ec047b00_JaffaCakes118.html
-
Size
460KB
-
MD5
ea72e009d1ea041a40a9af06ec047b00
-
SHA1
460b76d888868c7235e7bf973910b7983413a9a6
-
SHA256
3bdc5099b6b98cf1342703247d71d1ce71970d6eee21fd6aa02b07cc03352c92
-
SHA512
c9ef3d5034200161326705650188bf7c75d0c8579570fad7b060c19a93caa27e3986223927c24e1012bfa68c461da343237e753d6a0f88822e7334131ab80606
-
SSDEEP
6144:SDsMYod+X3oI+YHsMYod+X3oI+YxsMYod+X3oI+YLsMYod+X3oI+YQ:A5d+X3J5d+X3D5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000feb4b7ec89e150801b9f3c5c484c426771323ea1897e7ca9ee93fec77c2b341d000000000e8000000002000020000000801845043ee6e0750d3df04bc392193774255198378694be75cedd45164773d820000000e0f6d688911e51901f11ed14a837399f7ec89c3e0fc76c839f906b17a9f0319640000000e2df0e125d9d2908ac8d531a2d908209462bc45080729d65386effec081793434a66e063cb96c19f1e54fef4291bcfb8225e3d5935095aa07ec59d4310fcd674 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BC225B51-7631-11EF-B4D5-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc500000000002000000000010660000000100002000000022648d70ad830661ab1bb7c31451a85b004fee2a4912a6b67f63942eac065b4d000000000e8000000002000020000000b3e427de520025bc8b583ac0bc208b8047620b1d629652ec56c3cf420b48ddfb900000004326e217d2d0a804f939cccb40aa4f417883db959385316be996e80c44b691d186cb00519a2f779e23c3974e41744168da328ba5348d4abf80828f6d6e1ec7f1909e306fb7484542cd9f6d45eb8c74d0623ef79459b9397e2116d0e292b333e5abb4c8ed5a21e28f8fb3432795c41209b79fcb35d4f7630202c110a5aa313c3a794aab87e730a692384c5cdbdbc6179a40000000f781ded38367457a051bfb57d090db04f01859ef8a4b0111ca843ac1ad7ba2cf5cf4d6502f55d8030fcb0cc83749d65ab504915eadaccab688affbeec83ee269 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10473d963e0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432876013" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2172 iexplore.exe 2172 iexplore.exe 268 IEXPLORE.EXE 268 IEXPLORE.EXE 268 IEXPLORE.EXE 268 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 268 2172 iexplore.exe 31 PID 2172 wrote to memory of 268 2172 iexplore.exe 31 PID 2172 wrote to memory of 268 2172 iexplore.exe 31 PID 2172 wrote to memory of 268 2172 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea72e009d1ea041a40a9af06ec047b00_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2172 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da1b34ee1fcaaa13af117172b59266a5
SHA1561609571c04b7f3a86125f4ac145f9db1d405d5
SHA2568faa126189002dca28f36c5dfd391e00726af5d660edd1d5ddc5658b2c55baa1
SHA512bb6bcf02b165a3c5f4ac6fac488773068b4675b7f6b78bc7c685bfb8f342f88e968b6a6705920c1cfb2d7ddb0e26d96027eff4859a3ee4101efe8cdbabe40bfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bd6307ad8483fa66e39032ae77eee2d
SHA1340381961df87ea8a926de118ba477fac7a46a57
SHA256dfad3cd93f855006b404acea92f87c35dc01c2f3f005ec8124fc0872a089d859
SHA5123ed959d373b7a2b66a5ab7db8e2336846395f308995e5b29a1e57fe6826c6d09954c6f7ea0d48a1aeb09124b76c12a4bbb68d01ec3442a05b4477a48bbaef02d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5140269cf87b1e1e7d80c955826188b3b
SHA1ad4ada6e43ca3758c0e2f1d7686f1720c6e04848
SHA256ec26980ff6ad792c01dd93911a9a2da5b65fe76f5f8c4f39423dd79070aae175
SHA512aa4f85121a23c6c9ecfb17e665102d5d7377a0e941b2ade0e590f04f66c8a3b9f00d4908593592328db7d5ff738a0b7959df72e6304a7511cb3eb0dc145e4634
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a1577a59a98146ae17f411ebf0eb352
SHA15b57e36e9f9939a6a09d4917d9f934d6e7af6aab
SHA2564f0f7afb30aba479a21c64413d11b03c3e99efd7db7f8de0114697b43280353e
SHA512d77e558cd8dcd5c0d1f3c96df5cc5dd2aa44c2d3e575fd83e620de8ba42d69dfd36bee7dc6a028f5f7b089fb934fcd6101a1567f04241c8506d196cfc2b1959c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f94980cc9e8d2d784b0c496938177759
SHA1d760aa7265778ecd8982edabff7d00fc2d48c628
SHA256a75b1aa48774fdff3b65619e43d68d2bc2129a0452cc224c100bab77fed36b76
SHA512f9561bb17f22e0953d53d3d79a857a2462fecd9a78604efb70a894a0de488ee9d8c3d0b81d7f1c677e115a02a39d77f09de767dea732384883c7a29e0d8e833f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559ca651be39ed557fe1ace4e5f63c61a
SHA1a2075e20e19669153aa4a44ca298c7bb72bf7ddb
SHA256d66216c602154bf34c0a6643c59ca3a79cb56adfff649164c17fb39b1f3c492a
SHA51247e79d0fb223ce89db459ade428b7a5ce521c01551abfa27ee2829b6d0a5a7078083318e9b91400fc6ce054dd73755b862a37f37515b8ffb66bd74c56c61c182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5992c64e102180b1fc608003d6864925d
SHA1099e2c7207903e62f458061b67125d3a88cb2cae
SHA25604c04f5da2829f0644f0f1486c03ff39dc9360279cb6a5456eb7f9dc7957cbbc
SHA5128bd3d0d551dbef51279ae4e2ff0668fb51963f86c320d7b3e7a88bbfc1db91c39600936db4bb397ba9e747932d15296ac704d1c7842a9fa38760bf33a137a1c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53179acfa9c84b506f4d9ea21c43136e6
SHA1842b54a56087cec3c152836465ff73e7775827b5
SHA256e9a4feb01cb709ec67ce4ef38ff548cf788c2305c33a107b9488729d003624bd
SHA512c762dd0e3b88d6e7a10609c782540a45ac05a1f9a3582280585f35d783988eab4a2ef9ad0d8a584436bb9a927672562224859d48d24d09d66b6f6bccf816dcfe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cb93b0374b4d95f0d80884254254112
SHA12c615b11e1da4a8551e2945dc0e81ea06294e2f9
SHA256f7b11469638bcd19c4ece20c26482a4de056b17350b97d001f9e5135a09e2c39
SHA5123de6f0596185f5a81e816cea5a58b8ab7e0b6ad5fbabecb45e47fb0816e7d5a2f52e9e793664d2bb316015be601b1f1a018aa8113c8f9dbdcfc45d42d060fb8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6ad69c39537297246bb744273e1f30d
SHA19e6e1464227d0faac9f5add391097875f083aefd
SHA256fd55d99134ae7386ad6ea301b779e478e18fbc5e080329b781b6aec30ac7c428
SHA512b25ff8190ddad82de5a1a6cc30e8caf5fd65635441c114024c972c95cd17988adec220f6ac0b1b6e42b956bc1b00e605af770d1c2f4b695cc00c8f4565d39bf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ccab26c3ec86b16a08aebe9f636b711
SHA1a4c0f29372c8f4bf52150a41a189f68594809df4
SHA256e88f1be32d90e1fae80333b2b7c861982bd252b4ec4617b778e98a324b555700
SHA512a31db08f9115af133bac8ab07b224df7d14a431c94b4b4809bb743b79e9fb25d933d0475cc83dc68e58259d5535cc22638a0abb7cd0bbb64c6a42cc4e0ad939c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c2b4cfefe1d3363a7a55d4c36c7293c
SHA172ba79a21157db128eb7fda578b580a087bc5a53
SHA2560c15d1b9dd34bc2bee8bb2b669ee6641de4ad46e617eb8e1d77d55b9d49c2046
SHA5128a8edfe8a889693e999804dafab8ad052b3206a9fc565cdf19e8c572c3e7f26bb4d39cc073a9e95a978683428b017bde56a8ffb88cd4603b2dbd53d11eb8464c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c50ece6a34ac3c6f19fb62c3e2fbc90b
SHA172513ac1207e593aa8f7b6b9df0aec267236d6ec
SHA2561db87965529cba2f60f4a7d0175c730d3b2ba36a41287d4548e55552867dbac3
SHA512e8952340a5ea8b0168054988af618e9b60965535ec7b93c61f1a3d2e2fe547a038c0f7e03a29c3fdf73161443fe1c7643c36be895a24a30d2973af6c8c52edf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587516689102cbe418faf7b5f82913f86
SHA1abc229fa2552629899dec8bdd2fab3103712c64b
SHA256ac1ab991069fda664dac80939473e813550fe63fdfd27eddf3fc18a96e33ac99
SHA51204a1e5e0de57b7e1713c24d9c4d363169fe667a511bcb12507817bed37617af63659e785227d9c3cd96fde0d88b0a34924322a6a159a689c8cbe801f004a2d15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5c86f2aaf04ae7fcf09db04abf9145a
SHA10818c242fea5604a6c2934ff95f3b8e9a2853e55
SHA256dcf26ea6678be2080678887478f9e11c35b0a2be86c402bab76d5c0c6e53cde7
SHA512090ba12f219e74743b54ef528940832f5798fb769f75c631978240b0113018a9eb428808b1e8df3a3b3d87ef2fdd8a011aede4131f31f0a977492a115986602b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566cdd657bfb41e2be2d672aabef0b79b
SHA171848ed2e10c0ef60b5150ac5f7aa3a381b6de8a
SHA25610566c62223594d09adc6f0b0e9c461fc6b13611e1aa3f7b92b6a3cf599a50fe
SHA512009802e8a2cc2bb5ac9499aa19f887c12b9ba3fc7ade796a9d45fa3e2229fe4294ae7e27c452d54bf7bb5ba1407bd868dd12d9bc644905a133bf9973959a124b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0e8c26788ff989e1c05bebd374bf03b
SHA1e5966f54e99fb801abb7e300c063671784c6e0a2
SHA256bc8138f255db299c8bce069b28099a02a3488d0364531eed4590136335100aed
SHA512e8aacfa4158042a1be3896408e90c10386aa9587ebfea12e08239df1b73860c19ca49e996f41a12a9e5334aad7867f2abb6f46d22f240e655e665cb3ea81e458
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b771e278d9af9fd81cd5a579545f22e8
SHA1f01044f59fb2a11f6a2be3405691102ac7eaed68
SHA256ee3d15295ef3727a434f32999946091818783ce2e8d91f0c69e0814e0a393e49
SHA51293bc920fcccc6a60e49b3cf1b72446bfb7e002624e02f26a601cb6d3de8485774bfc455f88bcfb18f5a3b1779ee6136dc8a3f56d630170c7adf5aefb4fd2583c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4dfd4cece62f72a83c7de0313a9ff02
SHA100fc4bc045e316cd3933bd1dc6baeaad54248483
SHA2563bb6fe34ce672070b0a0bb633ec929a740e80846c49ad197dd94a39ac7d8d2d5
SHA512f30064e4bf406a3cb95edb41fbbe5490c0127158062156701f3dbf4d3956df33c64516d95921ef353144f6469efb38003e0f9dc2a7616cf0d958150566974c7c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b