Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 18:29
Static task
static1
Behavioral task
behavioral1
Sample
dccf6b430d639aad2fbc73c2eb0a608a_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dccf6b430d639aad2fbc73c2eb0a608a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dccf6b430d639aad2fbc73c2eb0a608a_JaffaCakes118.html
-
Size
175KB
-
MD5
dccf6b430d639aad2fbc73c2eb0a608a
-
SHA1
a6db298187aab02348cfe697f507d08608ac93c9
-
SHA256
4c13d28e23032535e55a0ae123b39be50bf48eaa0f14bdd37c8236ecda78c2d5
-
SHA512
c092f381cce7e9816b3bf12867e56c33be7a20db5e04a329b1193f2abdf02e650082c26c36509f873a3855dc442d5b6280446888fbfbb03604afffb245aa73f5
-
SSDEEP
3072:SSwyfkMY+BES09JXAnyrZalI+Y5N86QwUdedbFilfO5YFiM:SStsMYod+X3oI+Yn86/U9jFiM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432327645" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb90000000002000000000010660000000100002000000046da9246681d75a894cd2d6c5e37c98b6da2cd6703cdf180ce8c7732adfd6393000000000e8000000002000020000000957b05b7b855bb4b724e76ec9235aca1a52679eecd69c8de23b081efe50f137c200000006e42930b06fcb75643e95677422a9df69e3ae72050ae2d80fad8294ccc0dcbc1400000008dc7060d4bc4edb77ec15202db5e59457b6169d25c897390d012caee991eb653f9ba5048be30e56f3464c2222009dfcd1ff1d0b7a66affa532655d880ecf0c5f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f04471cc4105db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F7E21651-7134-11EF-A9B2-6AA32409C124} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2296 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2296 iexplore.exe 2296 iexplore.exe 484 IEXPLORE.EXE 484 IEXPLORE.EXE 484 IEXPLORE.EXE 484 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2296 wrote to memory of 484 2296 iexplore.exe 30 PID 2296 wrote to memory of 484 2296 iexplore.exe 30 PID 2296 wrote to memory of 484 2296 iexplore.exe 30 PID 2296 wrote to memory of 484 2296 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dccf6b430d639aad2fbc73c2eb0a608a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2296 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3f22305ea03c62a7494d4198c84102e
SHA149fc1da9eda0df4fe429ab1d57f11ea5130a45ea
SHA256d28fbf543c8be868b74322def533f6674e9fef62d1fad3a46787bd187935aa19
SHA512beb9d13a6b0187caacf841966097e7188c5e7a87ee358eae4b0bd777b7a629e87f9905fff86967d4190fcbf58565fd9fc854bd2463f4279d6e3f719425c7e4f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6498403e10cbc16d78743075c2cae6d
SHA156a79dc0caadbd3d273eee0e85de5b6301567022
SHA25685547f24dad13a19654b02691fc5a8e723d21db11995e8818b53b04ed23bf70f
SHA51265df212fde8327e0811e973ceb3fad2399bfb50af463dd7b0180df9e57df1ecbeec171d8f22fd74ce18249781638b3b17a4c818a1b6885f4d3fb15fdad297b59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9d9796712f4a857ef00812beeaad197
SHA1d0854a44b4e1cf09d7b688f62046caacbcf96e01
SHA2567938006f4d67894518817dd1787bf7eb4b8dc6f8ec5183acbfac64d95e1a6e18
SHA512a58803f5c6b7964d474a6d25b358eea25181b830d11256431c19ed1a7b5343f394e224cb2cb87e2d38eee27e13be306fdd06ad2375e10c90f45b9ea69aa4ae73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd75b1017127a1e7cec98b17d8da3abc
SHA12dd6100b7cc77b1ed07c53b4dda4372de93c1fea
SHA256db919b4cb15023e5d9dfa228387e51a35f4ff30008073701a0b6890a3cbf8255
SHA51251177aa0a50077b86aa629cd8e7f6e459832ff5839046af21bb834690baf584842baa6627877e08d2a25b7dbb00f4bde64e78aa85b84b6b81734b6aba6bb46f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b668c44ad8ae8978650f87b5f5572bba
SHA1f6d39507de45bad39e40437d90006bee6db7aed0
SHA25699e110054e2c5302e444f838b4a39be915dff22268831ff4777dfe8da78165ae
SHA512ec3d753f0f67e7bde172c81f0ac9b13958b9f1abb089b483f2e9d75259d207467313417ef0b633c8abf2e243f350b6a7df7a950444f59749c61ea99a8eaa9065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56898bd1445b5cf13bdebefe1be2c51a7
SHA147ee1c366e588e05661a4996e8312ee4413c356d
SHA256b249feb0f63146407003e8cad08de532ee275631e67e7fd6e0d257d256b91277
SHA51217b664b74199a77bae50c3c80843fe1487401b7145ccc717a7c1e39302a14b7f36dd7da91a991d7aaff3e9d7263928bb4ff68e59c47ccbabeb77248980e7b5b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1747f5bf874d2007bd8850fef5cacbc
SHA1a49376a1bccbd15abd057c13d89d23e5d2ab35ab
SHA25647f6c1549b5abb300386e659ba77bee4040a1de34cfa3c35797662377d98650e
SHA512d42fba8fad2e5cb2b8fec635f20aec8b68e80d88d9d0fffc44219be5f28c5213173a6b1b0d247f7dbd2fcd07ef625e6c855558fa3f7c12003a2c89fcf0a6f111
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505c9918cc9de45561b2b1dc98509b1d2
SHA180b800a279d1be9d5c8a8861c0d702e4e3b9ac4c
SHA2568f29f060244984c027455ea64a329eea4148d2a23b8a30cb2b5a8aae0acb139b
SHA5121d5159be673a6084ea4cb8909e1bd2b3bdbf4a0f96ff75a0ac3ea53ba8ab48c935fd466ee666cf0f082451b19d6fb72e55f79e52a8bdfa28e3a0f4719bc52191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a295a8ad5975fffabc264c503eab9f1a
SHA1574f8095f588f6b20917ebb8abb7ed899c1f109f
SHA256823584e0766302b33eab041edbe17d5f1daaaa58d1f5363f9645489a6a90fce4
SHA512729e3116e804406f8b1f2e732e2f6de414df17ae0c06454c20629f3eff6b8df865e570066163058b487b726c05222d84844cd77b853e3ece70979e9469792ab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510b30f039f1da77c48bae545de0bb123
SHA194db8353aedf39957c6550c03b1d74b812ad28c8
SHA25615d813832b0ac496edc78e91810a017090bed50523660348c6d55589a6ff3667
SHA51267c9c088427e5285ab81482b7a3d8fcdc8b8ba098d175430962e063616804d5088f728077fcffa90f4fb2e621c48763a676b68e530dd9af82b19b5bebd8e24c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7884286f52c924b1c9c24113242ae9c
SHA1e1a9ac91de239b8e2e384071edc0668eb008a523
SHA256620c5cb93ecfe1906932b355829d1045cc5af986b6031d2c230bb7e3ba58ddf3
SHA512d1e5e16d23ea6bea5b24c77af821463a2b4e0544fc086aedd74043de87135454671a1a29e7e40dd00ff226208e5ab6b93d60d99353c5351a52685c89d487f837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534eda166abd0eef969c7e83683546f4e
SHA1ecc777751d986155a7346fe6d0a908b4894ba822
SHA256e1769771162cb0156df21c9d4481ea503e7b173d081a6a04cd090b458c478fb2
SHA512e3dbb7106a361f04c7d900b4a18e67e966b36d3b0c62f6db61d70f8b757b40e452b74887bb0da73205c6ae341597b2f4727b5da84dfbd7badc2a3470fe583ce1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b9f093793f938c87bf6ef053b4f79cb
SHA12bc2d4a39a6fc9939b7f32c9fc86044b08bf85c6
SHA256bbda76f6e35569b06e405c2f918290b47ec69106dcb4d3b0984da40c260a990f
SHA51229f7ff6cdc6dd2fc0504729cf6303fe19317fd1022df4202e55200456edf78b2f949c25fec323f708ab9151933ee749827b3d7ca6e2158bcd2ab71c546fd6702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533bb7ca06f47e2b0904aaa2b7fe463c3
SHA1693fe067c3de351654cc6cd834fd9766ae7d2d73
SHA256ba40bdda4ded1df9dd416a5d374349b3e68b9be2d0d200627322d03660a14ddc
SHA512edcb370bbfa279cac16743709c76f111309d1026dd162a5476c7d6f6d83334cb2d1cf567912f159017ba770dfe8860ecaa83642b83c50651d1ffcc176f697322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d41dce99255856380b825fe34313f44d
SHA149d8a7540270ea60e9f8d6a7ef3431210ef8223f
SHA256ea7818666fb91241a8990fc199ee3de719fbceedf899388a55b30db816a0d62e
SHA5122f8520e383b642cb3231be2fb3e84ee24dff6f2d940cbbf88ee5109984a348d98f3b5f97928e6144ea519baf9cd39e5c3efc1ba27a7e2edf08bc2c801e182c61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba1c97184f63fe4eb476c688e3e31089
SHA1aea936d7205376a89c9350f5b0f615a4adfed0d5
SHA2566e9eb95c3fd56068db72a536f4e0283d15686615dcfd995dba239b1f6996eac2
SHA512b82759b4f8938fada2fecb6ce006ae22269528dc245ce9768b096affed52df68e63bb90ffdcdb8061a41ce840b6ca7746052841c7bf0bfd15d0381152c633ed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5197865301c659213d57ac8d1cdce7ae0
SHA1f54ab526bb2c99cc73626d135e3c4f550c8f7a9f
SHA25611e970c6973fb76a1665cc67be0e9d1c7a369d952654f0a93806ea7a7de32886
SHA512c280ee24335475d49f2700d65f4c68b979dcf2b9a4bc49474e4312731c34a8ac3c9a1a4eebde4766dca465e9420ee16b8d223a908820979a6aa13294e9c19545
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52243ac0a2b509cce5055db4acf346af5
SHA18a2f9b9049197175139c3c4fdf0b135c497a1600
SHA256e3329a8c49bdc3936894422cfecf09c22940285dbf6d5ce45ac08f05c2168494
SHA512006f5f5de061efefd7f234bec4beb172648138df1d8c7629ca4928c296df1c28e82ad26073baac0b093c8c2e4f118cf719191ff835670c474488baa81381d30b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa3b2d575dfbcd2f26bd5f3a40f5dc40
SHA1e59213a46bd90babbf625a7a4e42e0d6de5e5439
SHA2562e290f17c4d5a450ce98de3117312f9fa6fdc5902b27029b025f26ecc40eccbc
SHA512566bdaf0a1273c2f32f5f5192d4b5ed6d5fb281ea2d2cf3fabdb3184652d6daed86d2f2e4d3ba2950f751cefdbfbb9fee5e03da909ad67baad9679f7e20d066f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b