Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 18:41
Static task
static1
Behavioral task
behavioral1
Sample
14833013ecc1d9370d089bc8d500f758_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
14833013ecc1d9370d089bc8d500f758_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
14833013ecc1d9370d089bc8d500f758_JaffaCakes118.html
-
Size
18KB
-
MD5
14833013ecc1d9370d089bc8d500f758
-
SHA1
9c676a2476ef6cf8bd2ffbf072b7d22235426175
-
SHA256
92a6853c6991bce3785d9564aaef520b7baf5d01d455be5bfa5b88cb4ea284d3
-
SHA512
7b131361c648101be9de4fb5534d12045baadc847f4ce428af67a15f4ee438f5c8fd2d00e7f57d2b797c8280492645d2bc7aedbdd8f88920334cc24575487106
-
SSDEEP
192:SIveAd9uRbqaRYDFW/cvdxyo299sDeyE8SPaR0J3UTlkffkcVKE46f:S0Rd9uxq1EcvpSPC0JikffkcVKE4w
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434229146" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006de24bb99bf0004fac6f7088026c568b000000000200000000001066000000010000200000005f8847d44d89773462107fe43dcb2fce15eb70200de71375499c44729101c805000000000e80000000020000200000007823452957450ee3d462315af0d419d7ee387e2a9d7933863d6ea73e1d06ab5620000000ad32fad2473bfe598375219c0c46eaa5287f36e53a0e9e57252a9781b34f8ec84000000053819a6a9400792fa9984d00189ea798ebaea24f6d6704d86d922743039b07ddac125f63f98186f637907005feb0d9c7080e5b0b553f865ddba9e6cb3ca0ca8b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3E3C03C1-8280-11EF-BDFE-E649859EC46C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0082e3288d16db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006de24bb99bf0004fac6f7088026c568b00000000020000000000106600000001000020000000a46e0e22ebf3151e14cb2fd49e38e62d97df14fd98f7ed2faec2e90240566e1c000000000e8000000002000020000000d94a28c351f5bf3fbb01626c2c12be7f104feff4b3a35717beb8e853e03e5b9290000000abb7bd8b25cbd4a511d767491dda3c49387acbb0504ef3ffa932762ae14b66c6fd6680cb2f009172cab3d5f689d55c149ec91006c926b7e05d63d8c0f448845e242d4e34beb9f7155e7f9f2513e3dc8123f0cc03986d988e020580231e736c8539f597ecb6d5d9e6381a4381433dfa2064c75ce3fdc2e649fe0699c3da2d26481817efcb24571c6b806813a5d25711f740000000c894cbae0d32205e0400001f2e23e962ac233b8f21c7b74d2477ca76e8f63e3e4296314e413a46ed7816fffd7691404a0dee90564e5ff821ef570f587d41be56 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1564 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1564 iexplore.exe 1564 iexplore.exe 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE 2548 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1564 wrote to memory of 2548 1564 iexplore.exe 31 PID 1564 wrote to memory of 2548 1564 iexplore.exe 31 PID 1564 wrote to memory of 2548 1564 iexplore.exe 31 PID 1564 wrote to memory of 2548 1564 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\14833013ecc1d9370d089bc8d500f758_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1564 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5908d6c0c0e265abf469da87796ee5ec6
SHA139aa831aab402fa053b818c56e8102498e8da6c7
SHA2562757f1b8418b60167ae8b0ca9e7cc9948ee9bef7a03775eabe2d04e869a464f5
SHA5128da1cc30666d6bb21e6d6c1a39688027132f3e04531dc978d7c4047dca222ecae5868060fd1a272a673b9c3dc173de874cb2084a3694a48f8ef3e91835ad2d8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5076890498f7d057faaa369f4c9f919d1
SHA14b7f7642eda094f6f6adceececf68bd3c124381d
SHA2566e9d01efea9bf624c2ad0bbb807ebe3b943e35553ceed67d02bdd48b505b219c
SHA5123584525128b308d45b9372592ad0f5167eea8e711dbb15b464d38cd17896751fb8bbb53410ca5d2e0ccc5d416265874556324e49fe8b350f792e521f0aab2640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5607f2744155d7f2ea195dc570cbb49d0
SHA1c518c5debae5cbeb671c7ae5653a77fe2963a576
SHA2561b14380385d3505315b4fc918a010c00834ad728651a0c5214b58eea8f31e899
SHA512bcb22374698d8c20ec6e78906fde45f3ce13ac041c2979391fb86d14526462d56c274795fce390007e0784989218c888eb2ea1194c9799b96cab01ecb4a3ab71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54373e89566f8796a3f9d41576a2d1da7
SHA149533eb2a2cef80bf77781350a7874cc685624bf
SHA25671b9cd0b18813eceea82588782fab8a378b1cb5fa6c8520aeeb44bf259567226
SHA512ff148b99ee4d81bfc66a2a3e6fd1970f3dce4fb9806a96c9964799380fed3227e981cda646d6ba88fe0f76b968553fd4107045f11a3eeab8ecde00e7090efc0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e87bcfb0317a24d64e10979a3ba3ade1
SHA1f40da4e5507e3e1d70c31e50c807d2bf09e48cc1
SHA256d01df094c4332ac6ead366a6552724beb5782594010ab79bf7cd0df8270d23ab
SHA51259126c43be326e8e2e298f1862c843ec60df1097b2549afc6ff7c0063d4f2a44cdb3250577c57f9f0f5fb81b5605a11eb4e645553f3bcfac56783d01e9fe9001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5678de71dba0ffb06f88b4023499d113d
SHA177bf944d61ad935a001ef0918fb96b0f9cb4be3a
SHA2567daa302eff6d2b318659247910dec429099a6c27f6e131b24aa07dec7e21f9dd
SHA512433a29afb6ce4181e2621fe78ed2110c741c5245aded1feedf905623ced77cd9468017ec1e83da3043435d70bd636cdb3612a84fc19f0c1b9d8b8c08829dc791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae708c305e73eb7d22d5593ed1e28215
SHA1ef789b3d3cffec51eb8b8f664fb92980c4f870df
SHA256d0ed5b9c23f828f5bf2cdfced758cdb41696b8c96bce4e453597457b20993597
SHA5123045069cf5a48b323044bdc8c30b3e0dfa4d88237d19f98a4c1e1b7421abf3bcb3e277c0e6578830594fad43b0bb2554aa634d9ab6a5b662b5e1b763f4c50dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a299ef824b8ccf626b44d14e25878c0b
SHA1d7e05b27a6d732287ef15eaa4b67781943a10537
SHA2560f05b0f4a7c32b511fd0916dd5fde031e1275c65765297c506dc6725717e3176
SHA512610c33c3a10327f7f2dbb4dc3117dc61c6a635d7415c5b1dcaa2ad253385d23a718395b984a8a18f198d8f023c748bec42ba9343f7563d98d4163349131e6e75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a97e0af27aa14ea3fc8948c2078e839
SHA17a35c7d9b33b152244d13c7c53b6e9b46d2a34c8
SHA256c2564dadb52b12c46c95ed1b3ed53d7944ea619a30872990d61844a40b9fd437
SHA51233495002856439bce219346845ea1e27919eb244a2d83ed98de14bd784fced1cf73b9318d9a0d8332be547e9e61a1369289f08060b94a1bbc563aaaa5d28249b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f85c20d3a88e190186d02ed138c6543b
SHA15c589a5dc04b721bb94265d768d0fdaed344d21e
SHA25623c8cfa0f0e9392ae43a9c497b42431702c30b564e5c7b1081eb8d91380fea6d
SHA5123e676a35b739e2e42138671f9da39e5374412bedbc647f44f3492b0d8d35be3d1269b5c6781500d3a9bed34e4c3d5a95e73c53c00403a10b17ba2a31bfea2f02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb1b86d37dc2e5b0802fde677df50e6c
SHA1074c56280e26a4846b409150fbb0aabeb54477ec
SHA256481d94610366d6f73b5ed7c9097ccad09d39d4e8e45f13e7416a65051297e5d3
SHA5129ce68eb53abb5097d17923d71aaa50dfb6856e5267951bc2d3a9e4d8e45be606fe9d714f5a362846fee751dd1531b35a018ceffd2d6052cd5f410cdae352a321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537e52e55c520dd1d6894aef5579509c7
SHA14b3a6df7c26a434446164dbd65edd365b1e4b900
SHA2564ef661171c033a10dacac77392ef7bb04df20527ca842645216445619dc950d4
SHA512028aea859d289c67c6bd44c6f7e5c548e0365fe2aadfa3dcb906116b972e4c73a50caa410b9f7d98e9875b80ddf1b0f786272e9ccd731a5577a57d5a018bf204
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c7fe2fe1acdbf32c6ba789065bf7d7b
SHA1209894c4eaa2963c1ccfea55f7aa0fb51f5a2169
SHA2565d4359bc677762b894073d59a58cb966fed28fa5f45c79a132b4cdd3a36ee06e
SHA5122c5da01dbe86b2c487a73cef44137bf588c615bff06a1441d365f44560c220445b6052ea209f3b056d491235d95a1fef032afb6403a049c4960783077ca11ebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb4fad63bec71b0a83cfc81142a8b2a6
SHA183d475197fc65deb3079363266c7d9051c03a356
SHA256b490e3714adb3866e304df740f87292612763df27440490c31c9d55a496ad8f4
SHA5127ac68b80db97e6810ff2b4d94d3f7e37ac258fccc33065af6e4abfdb40755bed69cfc258f165ca423c39764c697ad298e7580b24e760e7774da3e6eaaa677c2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526069ab6d3ef091beef0f29c2fa7821a
SHA1b3836e31135c0fd0795f06f1aae5bd07a069b4d6
SHA256efb12fd7a8b348db53466c4f45238e395c3ce03a966dc0c50bbd877045fa5bb1
SHA51264b71ea5b8c0f74d8a0345b4b29dbdb6861f290827746b04ec2afa9d690ae428bb4b75e3e353d4a3e4a6af7760aea52bb278dcbb1ab996c19e1a169499c741a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2c7a356482dd5885b4bf55c95b4bfd8
SHA11c2b82c73726e0f370a112ab5317693af88e9194
SHA25607d6e42241c70f8e43b501967f669310964d949cf8cc8b6eaeaaeaf4ba0a98ba
SHA5127fbb5c54812216aa705f9d35f76fdee66d420665bec2a328389d9a1de6666e6e1b12d77a4d811d5c36e8e3aa3ab5bdd36ffa891bf7439809784660bb63948a45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4478bdc4bb446f0937c4676788e2e87
SHA1ee4a7812444a81c4e335d6e1be89ec2ab224f984
SHA256a33009ca13d82e088102388c4a69075f12dfbf69b6ced6ab3d4c72347605901b
SHA512a3ed7734f8e5491a9b08c478b6899582feb368ab1d17c8dac578575fca6796ed2212363a447de33e1658e051f508f0cc44bfaf99553db45cd3d604344f7990ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58532d13fae626294daec3dfbd91b09a5
SHA16e7973be2e925e59b244185928836c1000228399
SHA256b804b8e66d2e7fc546e1dec7edef12f632491e2ba73ebdaa7a00dbaebdc2499e
SHA512410cfb4858dcd4bfcb4ee88a36fff309528b4976b52e6f6f782a483361b66b07632de953de2f3c36edbabc81efd425e8e3fab397511f638f2f13abea4382922f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59db209976d3d791c894ba9b568749c03
SHA1ae1cc6b9b3930a5692eab6dc5cd344682ab5f127
SHA2564f602a306f60de37b1c7d1f59861d955742069f0b206c6932a722b74ef27f6f2
SHA5124aa85077270afcc35db6139010b67ded7cc869e5a71e774a07137b5697913baa3a8753607814172c6b3cc56d86ad0ec155d08c14998797195dd078faf80854a2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b