Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 00:25
Static task
static1
Behavioral task
behavioral1
Sample
7eec1689ddaa05f0785ee6b878850c39_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7eec1689ddaa05f0785ee6b878850c39_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7eec1689ddaa05f0785ee6b878850c39_JaffaCakes118.html
-
Size
3KB
-
MD5
7eec1689ddaa05f0785ee6b878850c39
-
SHA1
f0947513309d41fcba0187ac7d5e5216f8891014
-
SHA256
1d19a38980d32f456cb6c22d7c45b4ab7353b8f93aa105dcbe714a910c8e48c8
-
SHA512
10b16bdcf8f56dd1969d3bd9e8841627b50bbe9a8d0e04216bd06dc00687d534ac88635e9627442ec9d5ff881bf518fa9f89d948ce74d4955736608af6a37a1b
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7fd6f63811242449e1bf528fdaf8512000000000200000000001066000000010000200000003e4815e44b84a6e0807ebb6f0b11bd68c5e4f5e958f2ad19fc5726c4ceb64c3e000000000e800000000200002000000037fb850362b375024de37be79d59b455d0a621e7f7c0f87bbd1908333d9b0a9120000000b26dadaf71a6b7c64d1930565c5bfc6fc60aecc8a0fa72c941d35a324f50250b400000004d791b71bcd9690634f84ec057d3b65fcc925e6a93f555837ed436d0dbb523054ae48d6367e44b9ccb31490c560e2beb98c487886115f2f356f4cf6740d7c341 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7fd6f63811242449e1bf528fdaf8512000000000200000000001066000000010000200000007069dede0651fb0788c229c9e353df31c1daa008e265289ebf5aec9f99d4a368000000000e8000000002000020000000835469567c17da6e9c342f3f47ffbe8c0701916bbde474a8508e200551adc86a9000000025eb56a6e566af32de9a9e80d2dcdb839f674afbd88994efe3ddd39f5aa86e951447f418839f9cb8d72d9ff35617b679054fb724c4d9b9065c33d18bbb8fa2c5fd485ccea41090d0992247229f518bbfeba27026a6f109a0a2112547f354d1462b0b5d2ce0f0804f50002d18113e25d3db89f8cf87706381537605b7d91d742e86c06ef1fe7345aa32350d003324ee2f40000000d8c151e8f9b5200cdff508145af7794566dc7f61dbb2fa89cc3ae0a96b5352835c1182ffe3c9190719824461a17acc98367607f9964d36ca8f5cf9a23baa5634 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF5183E1-1D51-11EF-989B-729E5AF85804} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423104190" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0af46c45eb1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2888 iexplore.exe 2888 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 3012 2888 iexplore.exe 28 PID 2888 wrote to memory of 3012 2888 iexplore.exe 28 PID 2888 wrote to memory of 3012 2888 iexplore.exe 28 PID 2888 wrote to memory of 3012 2888 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7eec1689ddaa05f0785ee6b878850c39_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d00ade4d93abfa95d2cb7f3262526191
SHA193f5293289c5eb05764c609387a14a762ca47bd4
SHA256dc0ebcb66e2b04133993c46e14ede6ecf7f7bad0b6efc5109401acc513324afb
SHA5129d1606f7f2cfef34a775a1f56c5e7b3df74d45f5a9f7372a02b436dfea4753a7b7a5ca800551107bfb03515e1d5e065cd5f1cfef06c6fab924a9d6135c9389a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e477d1743c3a8b16dfeb3121f681d80
SHA1b99148974c05f6681399fa5217b47f90aecdc9d8
SHA256254b54a525082a67cdefbe7155c15aff5996924870a4b3d26eec3d47b55741f2
SHA512ecd24328847cd6808f837624eada3f5463aed621bd430cbb2ba6494615d855474d006a623aa1e36c8d074139d4f9c71e05611814ccedf0e61fdd37084680af61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592cb90b1f3c70a4ea7cd97b121483e26
SHA1f283fa412ad9c71c4313bf2e8eacff9b722ac4e5
SHA256cc595af30a0b5e288f4be5422a0a1fb06f9666847ae8f4806ba021fac4ac738c
SHA51228c4a7e94c75a2c8ac361253bf11619d7cacf3409126096ab5b463683a3b6e92177d97bef8cf6a5e4ae2f40dbc18d93c8b848469ae548875c50e8722c8f98673
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50328fd2dbf7565345a4302043b8e4fe2
SHA1b4da8f9950d2872bc2b1e9be7454c9696a7b431b
SHA256d75b46bb5a12a5c6c9b29fd4660bcfb3b7b0087f556cdf1d111b2de8d11bdec7
SHA5127758b66759324836614eeda547666314cc2bb3adec70ccd41bbe811a3d4fd47451a8a4e310fb8c8a45bac1dcc0ddf8ee57ca8f28f7e4492b2e0a6f109a9ee41c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5166734702aadd7ddf47f6497ced9b4b5
SHA1e36082e4a85709aac26081950dd7e548b1fb7675
SHA256703a541497eb081f5f491d706259b30dbe4b41034463e0a98f4a22330a33ccc6
SHA51243fe2c5fe82ac64b99a0cb953db578fcebac5fe8274d234af239a6b0b9a510e7ae9ff59d78980d51b7c8408aa7e49c1de2893bd05f126f18d947b2436206e191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f41ae5011ac693931f5524850d326473
SHA1a8c308a742f731df53de811c59f8fa7558408aec
SHA256a23c194038a81475d02962efa9726137577446c458e7e43e59fc73a463bacbf5
SHA51276a1c22669c8175876e882d6c6b5557c4b86061b77339bccc63e8fd27e5e89a97b2824a6c0819235cf9e47c19665197f154c1f8c52a09a3370d53a8f569e8f0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54520008859880e47545a7536a44b8028
SHA10e9906005a5498f0b67979a1ce6d337f89647feb
SHA25649caede2f9536dc23622d4959a574a2039232b220dfea85ca701655c9924dd3c
SHA512347be6acd3ea9e8ff7605334fd394287f35ea81b6eb3576a121277d8d72636082bd6ae5f29f63cebce16bb274d5ebdd049aeca0e55a6e37e5bdda5bb3720a1ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ad4ec0fe33a673f04f4cbdea5728a54
SHA1f9a85ca861c3accb5789852346abfafcbc2c4431
SHA256b064cef774f3d1fa02314502ccd57469bf200832f07b5900becc41c6bb15d71a
SHA5120b6f340d92640f1f1189c69c6d7a396c5fbddd59d53e44c8cff848f4ef82aded9915e5e0dde4b2f0ac356bc82df51500ea2b0ffb37d94c188262c8e74305563d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5c14b71c595158a46fbfd48f9f6fea1
SHA19fec123c72a86d1ce03131777adb8699c4bfca06
SHA256afe77589686f79884a1720cfff15b326c1444663cd3ee8e05e394e33cf456275
SHA512575b67d4226368e9cee0e2a867c9c12f9e11243836d4031b45541b000bb158bc6f6230cc6bcf83a2bff80731a1ddaa98b61457fee32234f6ed571b27f1187270
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d71470e4ec6cb3362638c5cfed595d3e
SHA132095b3484001acb1632cf0d12d3b01d93c2e804
SHA2563b67abcfc938c81587bc5b39551c27f8ccec0f67eeeb0ee8df24dbdb463ba222
SHA5124583686eb29ac3dffd360ba0e5912444b4bc71bf662834e9218373ef575dc88f3255d0c7c7647f814cb7461ab128a135af1915c580b5aebf7cc0939dbe87e303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588d84a5bf0832c7e4087d37af092e16d
SHA1023928da8cf3aa4b297c43906a76669e2a3ddd8f
SHA256472ddd6e6fc87d991b83a5f7c7095ae261743772e946fc2a899119cc2b490616
SHA512c82c432f41af39a5a6ea9d39b358bc9ce10097dcbe54cedb5dd5cd9f8973a03a37b377d312c6970a5d9d6e9fee7e3813140e0c23a4d52b36bae2ec8583a51ae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffae832aa14584aa987005f656e06429
SHA10332b1f0c9f6b6cf945d1b37cca5f58f8c15e2d8
SHA2568aec452a3b74d4ce8a649745a541d1fd3ed386edcd451558bd316cfd7cec4a6a
SHA5125a4d4a3321e77fa62c6eec93a5d6a2ef9821f8f0da0795057478597b84b2e8c62f2a0cc88349e7fda392bc10688190ee613a5fe20c83f8908fedaa83048c5ada
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571954bcd3bf72782887f4abd972bf3c4
SHA1ccf7a36dba6942d017d1ff428f6cbc35c1cc85d1
SHA256b5ea1dca2e44ab962824d4e791df8fe84d296b066f6900d680fcb345dcae9bb3
SHA5129f5e7a8df166b7d19db983f875e91f340ace3076e11b936d132b98122a3e5cae015adffb6e688d24fdfa61c1beda9aa3597a8b619d99ec25e8be494e29242ca9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d5da10fbfda3295df5ba8d4526d6599
SHA1e808cfc0ad429d72db15f7bd43f335153b966a17
SHA2564b7ef7511f486045dfef1b0db1124156034371a042219ca1cfcb92bee8a528d1
SHA5122ea4495a51afdfa5beea6d5dd52ed0bdf457bae50dd6cdaa9388b2d176a78ebb567fc09efccc3f4fdc6297e3811a8e61fd277169c6f7929dbc8781701b669a56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d97dc3a5d289c6080f5bf8dd14f0afc2
SHA1d3d24dda04cdd8663dbd3cccb47fbcc6880aa2b7
SHA256e5d0c64a7870d71fdd276e25489a4ad992a21cd63e0b941fa533d4fa39dc933f
SHA512ab1f49f4e83d138837193716d5312aeed4f02704337fdd9ee36ab61f61ebb0c8a5907ff7ec308c76b3bdb27f793121dc970305c8256e1acb74015439bf5a4980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d8ad1ecb361f887600c1b161c7c45e8
SHA1a37cb5cbc0c5759685eb6c7b14728258d4903b8d
SHA256ca52ca228a1428735578df8f284a8b4dffc40636566f5b8a9f13c9d46857f379
SHA5121121d46b89c2c06609510eff54b96a1f18a427796088fc73e621a61fe4c3e895f537cf3f5125d0db4e98b35c09ae685762067a9f228490758c0e9d1620001cba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ef0993fa3921b315214ec101c00b0dd
SHA1922bfcb7368d2bcf7708e8119478fedaeaa99304
SHA25627f9a8eac1aa48fad4f04d5b0f0ef6e3341202ff91bcc15d15757898cb03c2f3
SHA5120af176e70d171570ae5f2c7d0014785b046fc7b3d9c11e5b99c73d7dcca62196710a9755d84c7e89984c80c044536f8e80cb0f7be5ce79809f468530376e4e8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512334ec8cd126397d4df61c8ea0a96e8
SHA12d86db2b3d6672d8cc9ec0de0e960d4994c6d820
SHA256fe446299bad91f108c5ba754a335e13d60606d05eb4234ab447ad61bd8533f59
SHA5123429fc87489b8a566ee65e5ef5f22af2fb085e7d7fd733c67989656a493a23762dbe3142f5ba677fd5dc039bdb888b379ca9d97e04f72857be79a4c1a3c82bc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568896136505c636612e67fd90f3c9fda
SHA18d725c18c4bd9e5d62cb8f900f56e3f9f2f04719
SHA2569a0949fada140be6a384c7372a1eaa502dff8de353f0deaa2ff7b3f808a84979
SHA512b5e34aac22f3c5fd16264657f5701b544e44713b82f6345dfbf840eae87b96751056e28e1160f04fdd485a17f1a8283ec435b019ccdbb4bbe713e2344efcc95f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b