Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 14:34
Static task
static1
Behavioral task
behavioral1
Sample
866eb49551ff4fd89c7b0b0a60dc628c_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
866eb49551ff4fd89c7b0b0a60dc628c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
866eb49551ff4fd89c7b0b0a60dc628c_JaffaCakes118.html
-
Size
252B
-
MD5
866eb49551ff4fd89c7b0b0a60dc628c
-
SHA1
3ce6d1723fd100864cab94a3140dd8656cf2aae1
-
SHA256
5e25f9bf976d4fa219a86e82d3e6ad0402f8fad6446c99e6dcf9a49df71715d5
-
SHA512
1cbed901f6a9fd06b6557eaba11d772a38877036db53c0cde06e936921fc7e92e432c76b2d65fb1752d0d82a5fda61ca4e2638aaa257739bad4d790de5ab4316
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000e702b25f8e58beb6c9b17b980c46c6bac202f627ed1feb5fd5767738cd6dfa22000000000e80000000020000200000006ad82d3808b8535fa92603a09c478d20ea01cc52e9890359d40e3ee806b17a4c200000003497de77268f6b494b3ea833988d0fa19afc1fc4e5682ea0fc527732a61c95b940000000d594fef0e8e8b45821078a20814a6ba8ee49a2c31eb5832cbbf02b7c6b4a6c9de892a90235a7d8681929401c68e6c3cf36b659630bf700e4ed468d0067bc15a1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10a91f7d32ebda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000dc8acb9beb247fbd21a8a54fb035941dc7da1106537441b017acb034b12be2a6000000000e80000000020000200000008bdf09d477693f1722a1fc1d8f8f6d75076c5323f3d617da97af6a7842b787a5900000006bf8daf2a7564ea265c292d59f5318f38bf6b3d268a7df68673725d4b6cb9bef37c436aec4ce53499a16c89eb15246e691899290c8e7a6569b97743a94fb41463f21aa382c3e5e6fa6b2a9e53641aa1621bb50cb68275138d59fb0cf8ec28669d25ca360844462dd7f0f4bbd9287db51b494d816179d891ba5ca0a02fdfa45257b3e3e2a0a83bc8945fdc9be7b517d42400000007eedfadcbb26ac346a557895cbb3ac12b5f196c7ebf0820278f03aac01a4560959fdacb870aadf14f51dbd9af914ff99c7e1858b0b3ad2b5e67af95f195fd4fe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A612A161-5725-11EF-AB78-F235D470040A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429462336" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2404 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2404 iexplore.exe 2404 iexplore.exe 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2036 2404 iexplore.exe 30 PID 2404 wrote to memory of 2036 2404 iexplore.exe 30 PID 2404 wrote to memory of 2036 2404 iexplore.exe 30 PID 2404 wrote to memory of 2036 2404 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\866eb49551ff4fd89c7b0b0a60dc628c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2404 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a5f0f5db877ce9eb502706b476a7334
SHA1d080495cccc206d0b87769164a8af72ecafc4873
SHA25630947d775b2370ad8d592965d6fcdb343a79cb77c03b96e1c084fc7e4099bd03
SHA512871e1fef2976a9ba0db8d6286ee88adf54869da4b9dc9a653544b5a67d2aa5929fff17143f72fbe2d5680faa5b368c84ec72c0752ab46938a4fbecb8aef706e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a82325d3ec9c7230232be9eb808e69c
SHA144a613e4a03a9afb04c6b46e98a60b1df3aaedc4
SHA2561bc954324c1e7db624335c9365d4106406540ed92fdf429a1c24ee22b5fafe15
SHA51234273e884ac5b923c4c1ef4c8cdbfb39560f04a62bcf2c8aea10d06206ab2e88e97763137b2e33d4199142946547f91bc872b223f1fd1f7d36c6f0bc47899b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae7fa0184e215a0fdfc24ef1eb2a9267
SHA19f76e414247765ecd0f76a076bfbaefe430f52f0
SHA25635250e5c7374e51183d62d3d7c207f864815c676dd17b42253b18d493845f11e
SHA5121ecac439089c7bc9b7a27a413e59fcedff6f6a04b7824c5bf21ee72e6bf9135d41d811a903b5660f997a58971b74f6db80155e7dc27d98a10dbbd69e4efaeab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d87c402c9fbfbcfa9716570faa06652
SHA1532b17a201ac659e5580506128cacec3f1164e70
SHA256c8752ed0592680f69ad9eb6882c7ce8fdc61749f0b0e5a6fc6e6b159cb1efc51
SHA5120e8ed07169574d9d10277b668cb69639084db87f1a2c9a0a4a9c824273eed1806b60bbd5c3f23b9147cd4597a0aeafdd86c26f993ece4f1adb55d10fac0072be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54950291c8872602fb25d74a2c792e637
SHA176babc1986bd00d3b17c83715f03515ed1dcb7d0
SHA25681c0676ce2212462ba2e4a4a58c71ad5b9a8303b62546d23add0b2122ff282e9
SHA51256f380b40fccfc342384bd8d30994c2b82782efcdc463d020e6543579c2a59e382635834a156e5abe70e1e488f08e0c3669160a0f3700420d0512f3c760174da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e778fd68793ee72634ac0f88bf3928d
SHA12bef7bb3301819b893e0a9bc86c9ff4942d86b4c
SHA2560cab252769541d9056f1da9d9d15df05b1d08e79603c2ede1c229a6de3982693
SHA5126ee078361d1d763096ada302d63e5311bfe7764b07dc4f428442bbc0b7b7bdbf2dfa6a6bd77f9197748e500f90d1bff85b1bf67cf0cfffdce928041000a1c8ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5648234b59365285de4031b50eb0453c6
SHA1dabcabc583354cbed23e6539ef71914861ff2a5b
SHA25646282434eddb874fe55fc9aa92ad32bd9514ef43f5f7c846ca26b87c785b821f
SHA512a461ecb9f268ac4ae26072dd2887d87bd19d6905900b94417be5e485bc3802923f8a2486e8ceb149c63d67fc9ab4db94558999ad25cc19a005a262c380853d98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9de530ed5ec1061e667558a08d9bed1
SHA19fa8751f5ea878ce549dc74f4536fc57ab69e055
SHA256c6ec231544a41855edaa9883dc0870678f9eb56d4170e515df323fcdce885b6a
SHA512ca4d8a329bea89004b0ca4c9f895ae8bff0f9aa68d2730f1054cf8ae79fdc523d181e7b4ec3aa80086f5e1fb2936b99a2fe8dbe916e5cff05021e5ae078824e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f23051e1f90f6d8c81b00c63fb5457b
SHA11bc5710f2e22494885d45fa834733ec65145d331
SHA256cad1844969dedfbf61a090ed09e40864a74a346c8dcae9c49dce885cbe455ce3
SHA51212cd2385d533063c101b6f980f8d8a7b79b584bec492bf0f8c224bcd7b8b1609f78db8bda7a0699b3726a9f534d1ee5d662eb37a4ec90c2ecdd72e17790146ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f2d064217bc0e70eef7a001b76e7f01
SHA1220a53f210a049619fa80ce34b0226f3a4ef3823
SHA25632b3351ae8d0edcee3afdb2a205a6626d45da687412a0036280652b6ebdba0f5
SHA5121d0a35ed3a3afb099b41d9638de36aae24417bf4d5fd043f8ca29fb43a25f253546635681bd9ad6961d819c83348da9b9f0d35939ca7b4ee4d5164836425edaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0d74b62434698dd6b1e878d51bd780c
SHA1f9252e697ef47e7f2ca48300ffcca7faf5b603c8
SHA256686cabf5e319843d3bf2f17292cd740d0203342a1ca7beef94122cebd2d8c931
SHA5126eef32e20758c33c4e6ae49184d599a1f49b1476326800511d3f7f31f42616a0c0332de607cf3fa587d7f00417e0918e20a3dc05337225b0fce32b629d04bc58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f190abcf60e0b65f53e1161c6d975025
SHA14457477d13fe64da6399bada083c0da2edb0cc9b
SHA256ca03bb01c18116315b1c2382a55d3428721da2bea1f0060182b767d9194310d6
SHA512d7ddd191b6cfeb1bd50054c221dc3d3a12d3d32e303fc0c000d2756f14af15a5a662de923583400a3424b0a66b966fdb64eabe27bbcf24d434256ae8e32bde65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d2a9b45e8e6f3a4863eb566cde08b33
SHA148a1ac0711e95cafbd1507b6b9659158f557e6f9
SHA256b25fd90e12511a38816cc7c08953cbf8c1747ae23a3b87e8f1a3bcd3ef6bdb15
SHA5129847544a0e5eb9bd11eec43b8ba9297911db60502994ce3c25e68be34674a07e2f520a6a10c34e5e9166bd1eab5eb14ec75fc3c1df88cfb7f266abf5f7a32fe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592e385cd9d63c836ada432ace70bf513
SHA1ccc819cf0d042a66dda616be786cae4a61648eb4
SHA2564100f7e2891494b6090b58f63eeea3b46865b74fe5cfb02af98947a14da2d564
SHA512f387b2d5876a6370105bdae5ba5c8ea3f914bb13cbce25b24d4db35e71769cc9702ab0ba7c96dbff6546783795e4d227020e78a879dc910bb64c83f74b6ec04d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5133c58ea19528b7f4f008437c3c290cd
SHA1d597a706e1f6f2c43be878442b8f9afcfaf82504
SHA2564df340a13186807a0ffc2138a09e070ca7313a33e4df109a233d28e70182134f
SHA512976f9e34dff46caa6019cb046fb708583deb7e1260aa3ac50fd9496d249a8745b0e41867371fd7edfe8444130b1a47998672b6a21204c2b0dae67ec8c674ed3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d034ca8707a49976d721ff8f0617b07a
SHA182b4293d5533d38e5ef1d3a95bd0de9aa0bb9a6d
SHA2566e45073fe5e2cdac15b38d760fb5c1330fcfcea1d497c60eeca41af9afe0488d
SHA5126f6c6921fd68fedda25cea0867ccf45b6af860012f7f99f152615c1ab7d2d26b6d684062df8b672845c3778c2914b3406fb95f295d19f0b828cf53fe63d55998
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee4e42afbb39b3609dd67e909200a70d
SHA12b76b136cff9fa855ccb5b979312e97af14b510c
SHA256d8868d4f75376d885950e30e372d11c7bd2472fe9032f3dc7687cfbb40e30f90
SHA512ad2d3cab77a77e0f4f52ee9dd2ef51841def937c22267535696cc831fc032b09f39d697845abf51e3f5cd38ad9fe7b40f35d41de0683032952f077ae18210197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519c79ab42a54ae69570c8573aa4b802c
SHA169d061e4e2694d871d49c932edf7b8004944ed80
SHA2565bbbffcde81c04cd75949432b073be0971443d58b5034db95a875ed0109ae9a4
SHA512dab67bd3d2fa0bb478a1695c89fc64c5e829789a9dbef9e0cec58055ac9a775eda25f26c75b99022077724d53621b891dbba223190660590ea963474b0bef699
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afc479f425a1a816e929b77cd32352b7
SHA1c6f0de459cfc0a5da9953d5b2045cecc9b7cc97e
SHA256f05f0787ce23d4155f7a4e6bf091ea82f61b62366b932cf62f877e14a8aefcf3
SHA512c2ff50072d25a6a759111c561522a2dd9d0ffb717d2ea632d7ecf933a95ebd03a82f4c7a2aaa4946c0b677dfd970b1d3b58fc0e178064baf04a1e37100243821
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b