Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 17:12
Static task
static1
Behavioral task
behavioral1
Sample
dad560e9f5d6420b4ed6a6e494f25979_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dad560e9f5d6420b4ed6a6e494f25979_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dad560e9f5d6420b4ed6a6e494f25979_JaffaCakes118.html
-
Size
49KB
-
MD5
dad560e9f5d6420b4ed6a6e494f25979
-
SHA1
4b25fe40039a0bc21efaa10d1613dad6a8c7148e
-
SHA256
d4f85dd6a94fb9c49d1f5b25b89b0f5314d8fe2fdc91c6cfab6097058f3d5343
-
SHA512
fff08cca5161d651b24da608b6a257c3d12d78e9deaa81857b6f0b291922f048871a35bd1d55673eabff0c8f9d7adc1d26f0747e0961ac672af082c0411e598a
-
SSDEEP
768:SE4SSrjby2i7WX3CywauiPP8NLVT1VHQfBTJ5sKe2:SE4SSby2i7WX3VuWPwbVHkBTJ5so
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000a052f5df502d54930c47f0c06958eb89d5c7d83a2c3440d468e11af06f91ca27000000000e800000000200002000000032031e71140c1010159af2caabde463cbc06a0f63cd3cf5391af4da5014bd62020000000e768da2bfc373b16dde7e71580940dedb012a18068a20e3e7b30f0bfc757dd4e40000000a097631e887c03f3301392685bd401cc5e10f4769eb8ee5ad79eb7fca081540c524ee078ac9f217fb546f5a203e06c208f2935e77522f509593568a284121354 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{006D04D1-7061-11EF-8F1B-EAF933E40231} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 107caed56d04db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432236608" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000089d35d8bcdd6ceafbd65c6f85564b474f92b1869aa8ea37e4a0ea5d7707654c000000000e800000000200002000000015862964f331ebb13e07a6f9e9c51e14ceaef94a884e0f90d62408486c8fd0f7900000002deb59fea27bf363dbe5410ca2e1a7a0ef90e95fc193353b98982e986bc3acbec97851a53b87b098250f773f598c029e97d080c7ed00009f8bf43cd426721e49bb9d155bcd5cfd2a301f633c7eca1071d1b5b00ebd3843f6e8381574c22018f51f148da47047582f140390c400b9208cd122a8dddaa56b20377ea285bcc0e947a7034c18f33bec1b1e109c1c4f65071840000000994172cd958ff44632d49a14b2301e30ca590ad85744bf660fe0dab066ebde214b0aceb1c0981d85b843e5c43277865ce7374b414282f27ce506bc72bb523d1c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2616 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2616 iexplore.exe 2616 iexplore.exe 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE 2752 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2752 2616 iexplore.exe 30 PID 2616 wrote to memory of 2752 2616 iexplore.exe 30 PID 2616 wrote to memory of 2752 2616 iexplore.exe 30 PID 2616 wrote to memory of 2752 2616 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dad560e9f5d6420b4ed6a6e494f25979_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2616 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591ca04df89072702c2d71ab494993c63
SHA1c92daf80d36b593b00a30afbd25175d1cf601ab2
SHA2566ac00fce82d2182d42105d13b8ea279b839c8c69989eafac48e1e6ca30b223cc
SHA512dca73d794f3341e2e42f07d462f2aa11f8e69fccc3234b12a37907233dcd68a120b739b0057ab975331f72ea87901c8830a25782d243b694e44d1ec35af4f7f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc5cbaee5ce35e1d33bd2852e1099cfc
SHA19ed2ce465002bf1c2de646a621664cc3a85a4703
SHA256ed8bb82cf0fdd4ae6539e1bd986db44dd1d40e3945212afc7cda3ccf3bf842fa
SHA5129be89a2e5fb1c66d4d372a036f2daade676bc0e6d4c198600be86a43c8053cc3a9215ad197abda0adf09b317bc4a9538c36960542642bd6018ea72e813a2b326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5377c163d748392248c6bcd7d83f70eb8
SHA164579d48d471c651c63ba1724fa12ec3153377c8
SHA256eaf59cb658b5f99c828947a06285e6e23d4e08093f367e0ed3cf9722dd997281
SHA512ddac0c10afa01f62d1d11372fb04ef4f0c7f21c0201a49d278dee4293c88731118a6425e716173585a14a9ebdfb37412ba68c715ffcf3b5da1623c3144b96f06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df66bdead599d7fd2582e7810d22c753
SHA19639f9a1d2302c4010ff51cc33513044b8583a8d
SHA2561e65f60ac0b6f587a5f3e7305ff98db17b82703e2a8b2c921cd48361ab595c26
SHA512238dd189a3405909e6f0bc197cd46e35ff7eff1f3958988f6ab66aca484f72793e74b23017c81a977138910014005a6b2b570007db419b6a91e467dda7b9d63e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c04cf06864b3047a2d7f7ed0f7164cc8
SHA160b11b753d72652e97df93713a85892752296e9b
SHA2560ab82e713d9bff8cce8ca290e6c734c3528f525f8606315ba014aca3241a2466
SHA512db09c768895de9225eb16f991ea388ba88b6d8d0d1071e663bda78bfb86bfd10e4cb78010d4fb3317cc2ca0c9471102b1547722f365248d70a56d03f3ce5c7a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552e99d022461750bc8cc7c6b80cf5120
SHA1e09993e70a7e40f1116b5e45a962093c6f894761
SHA25689ba7d5284a31c07931b7a00493030452640860a4d447f070e08e1e716959f4f
SHA5120c8e73b62551ff7c6a5c940620b4ebfc92cd70c4e5502b42aff176bcc2919351509c6cd475c60b75e459695ad0b03fd31105a52ec0b20270f9e6c153a535812b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fed1ecb6d57b3c6689365d2b63a2f503
SHA171c9cf43ef9f4beb33e56dce8044ae0aec3581d0
SHA2563e7b0240647b45a0c9672f3220f44d1136a6eb2c05b56770aea7ea8abbe75e16
SHA51269a3d2898f1c53f90b50e2e3eca366d1370e300ae459fd944c911eae496886cba4c177a8065a5c3e5faea83f6065025a5747cf1e087159b9fbf6d746508cff57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aa4ca6f3a3ff2896e0758adcc12c541
SHA17a495e140b7a939ac174ee84d4edbbdfec6a091a
SHA2560d0446c3ee2c5940230198b3fde5dbc5194f0c584718ab1649b0b5f0f88ef24f
SHA512453c5f15fab321fc54c06a786bf31a6170c564623d39862f02a059330a700f64d5d3abe8156c164a10532738cf7ad511c6cb26ce6e8e51a437ec624d7c34900d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5402ace89bd08971d64e750748d9be125
SHA149c475343d74ebae6837b9b8f756342079695f5f
SHA256ff4e941a3a14a76939f75856130ac8fcab25e31d0fe0b988d9b61132f73ba361
SHA512cdbd30a0317e90a2abeb5dbad63c531604ab097592539cb9992bf2ebc2e365038a50b77b16eb5abfd27d5d6d6a471492e81d076af05ab64121b4acdbb604e857
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fdbad79bf505c63dfdb7b6357371404
SHA1a175f9210c12c73e9c00dc3ec43c2a252d88cf3d
SHA2563d5372dad8d50b4e2c550d1eab4036ab7ff33ff21543fc4f6568a40930b1e84d
SHA51299bcbfbee03dca276c15986bb8edd36f3aa46ffab81d2c5349ede139eb8d48070cd891ea51dbb7f702a23a137e0e4d3e8fe14b52364f5ba1c0219b8a402f48e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553f08bae4a46c9e571034d846932aebc
SHA1b6391665fee5c3111f223cd40128f55c6546a186
SHA2569176b9507425c8b336e24f3eb0aa40395808addbb09e287dd48718a8a57e1c59
SHA5129535e46af05b6eaf50cf84b0967d685d459e0a7a775d4f8e07bd3a8cc28adfc954ed43d0e0c359ace5a72c52f894e7307fbc530e32468e8cc2532b65af86de22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5453d01f08ec8003ad48b9a002968b484
SHA146c8d47c3b506f4226d19ba50bdd005dc309ebab
SHA256d7dcaaa41bb9b6ea4807b9ca95a31d017fcbb0ed5788bdc7c7a034c13a3f8612
SHA512b8eba7d053a9c43b2dd53862ae0ede60eefb149ff8c65c2bf21a64a055266d3a2b45bbd1debfc4a1dc5084a19a1871c1293cdfdc162b558e5a9d3786566ce264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eaa7526ad8b1d8419844ed5398ae786
SHA191cca87fdd7e320232f840833f7da721c98adb12
SHA256acd283e008003f728065d5808d846e0040171c177fe58ed9977fbfbb9a0eb4c5
SHA512f4548cc7959f2a8464ec15783ed1faa49cb1b87fbe5799ac4d2f547da5918cf93b75c69a27e21bac0abdb57376f7be5fda0dd4c21e2434b31d0ba1d73dc6270d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b7d86c356d95f4166df81d6bfe9b6bd
SHA1e92db196fd8a31307e66c9b383925042b007fcff
SHA256556ad49f8ac56a60fdce98ac69c28c0ca3f853702e076daf3334729322345d35
SHA5123b3becd6698b936d826a89dcc00829343b940f5572085adab1fa69a9b17ae9bad9543b687c266b7d68786180e142c6199ac47ae4b96099ca14e87574e9454a1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5847b91f9a62015244f05ceb7015ab092
SHA1fa071f803ae5af9d205d40de681fca2a9cca6c99
SHA256a13b1d93ffcfbf27cbc03c60d9671b888007a7f90096d4c0a04b43bc5c23dbe3
SHA512db9574489a36449db4780d07efde22905f86af46b0d5121151f268463116fa38bdec62380dbb7f6cdeb06fecce6ae569fe015e593afa4070f8a3abd1bb8b8816
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549dfb5d0f4305d4f30968c14247d4838
SHA1f76cea758851e16a89ea20905fdf733a788fe880
SHA25610269a6dddbd4d6979131fdddbdb6fb9f9cec646c08a0bc432820e23aa2482e3
SHA512d2a2ed8670207bcb1b2af5fe150263bb7517004954565521fca8d063d76bd0656f85a10b44673516c640173c1d01b6ec6446ea3fc10357287b1fb8c949811c30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7b6094b52d3d04f8d7f93f2280c53c5
SHA156d1e04ffa4b22ac54ec5298cd8e4be824d14f5c
SHA2566fd54677ef9215a69d24e26a6ffa0d12b7e0a3139ed5b777db6bc856352a49ec
SHA51293f037bd74f0fe14416f2f533c913166aafe6ffa798b032c8d25fa79aaa64519561a259339d1ba3096de8c3d8f6e79dbb10e9da723bc49d91ca70bc3a6783368
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50678da3e22d790fb48086e219539bff6
SHA122ae20ab3e2742f6e4b22b2f318e4b1ecce18d14
SHA2569d8dc57fc272cbd3c154ac17273bd21ebd5f52c74591d74b43afb7a4f41f5144
SHA512e207d0e5a585c8e5358540861b4f3f526e811f62b890c70ceda1f4a6ae34727658ae0d5008e3b3c379b134da6d352975fe1c06dc46a0a6f9faa511a9a2f7db77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536f2d51a7633567029806ab192645042
SHA1763e1393d4240ece6f52025a4e44b54e9839ece5
SHA2562ec82336fe20d81f47ba7e80e181fc45a4fed00ec9785e08548367ed2b7386b7
SHA512a80f8acc89ab3c7332d63942c543a72971e3b7464afea2ad025a0cf77f936c03669d4899bdc6a30e478a03ba1f241ce6babe22af275f12dba19fdbcd857a7318
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b