Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 00:27
Static task
static1
Behavioral task
behavioral1
Sample
dd5213c22c675097f7abe8c73745ac8f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd5213c22c675097f7abe8c73745ac8f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd5213c22c675097f7abe8c73745ac8f_JaffaCakes118.html
-
Size
21KB
-
MD5
dd5213c22c675097f7abe8c73745ac8f
-
SHA1
a52d9a00e558cc5b6a61d72d48533f4cd674a64a
-
SHA256
d5d89c2eb749ee9767fa13f58c4e7c07cddbbfaadaec01e2e08a4af27b59430f
-
SHA512
0527b01f650f00179db3dd584f1ff73c2f701954c38996c030211ccb0ca36d923cfaf32300ceec7a50ee3abae5a72bddfbca5f312f9502fa71c4d761cd6f1d47
-
SSDEEP
192:DQRnJQeQNabYQwGNmCj0jgCZnc4KSVrQK48rosiXsj1jJFf1w3dadCVAK9QG7RIC:DEBUJSmCwjgyQSVO8rOX/3dadrK65Dvu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FC25FE71-7166-11EF-999E-E67A421F41DB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432349127" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0b95ed37305db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf600000000020000000000106600000001000020000000a3ad99cc6f712ed5d50b6b00e6a92d6ed85e4290014411d3dbb5aaeeac59ceec000000000e80000000020000200000004b8f62c663453fb1f49811ee0289f3314000c9ace9d7ecf731a5c0e34bc55c602000000067cbdb48fbaee08b6ceca1439115ab6240045f4dc7b84d5949f62c13f2b90166400000009d9866a69a48d63ddcf690fc0113539d0247cdb74973d5ecab904e581f3c5d9832114d61d6d0b042199e1119d4b73da61025a0e2d8e64a54e36bd4b6b457d316 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2436 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2436 iexplore.exe 2436 iexplore.exe 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE 2776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2776 2436 iexplore.exe 31 PID 2436 wrote to memory of 2776 2436 iexplore.exe 31 PID 2436 wrote to memory of 2776 2436 iexplore.exe 31 PID 2436 wrote to memory of 2776 2436 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd5213c22c675097f7abe8c73745ac8f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ef351dcf901a99bbf019bc85c47f8d6
SHA157d098071d24e8eedb6dc2b558bf7220ada0d3b4
SHA256f60884bee92d250592db39ad37fd3f7f6b3a7e7936b8a62d7b249f314d7a1df0
SHA51208f9bfc98a86dd749d51cee3cec8349aa7f371e642a90e80b9e1e4e1df03a4e8924dbf6f35593a427386a12bcb834416cd472234ed9faeca5e0409631b5be505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d71632fa56096e6a28194df97baf9129
SHA185303cdca7f45879646c64965188f550f98628bb
SHA2560df3c019e733b87abb6c6b48267cddc847d03ec282e250f2b674f882452c7d75
SHA512881ec56098c9f8998bbea17bec0998258e0ba156e81019186a3f56ef6b332eb3483b6967de2eb9602457b15affc79759bde06e36b3c8b89dd039becd349274dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d919a1175f29b6f589f5b4408513c7a8
SHA16efbf2dbbb2e90f135c18e1d797915e13dba0978
SHA256a408ad4c790598b467e8d586ff84ed03656d8911a645a46884434e2316b8306f
SHA51281bbab6a873704e5afbe88a4097a7da434098abb760a1e23fbd0b2548e1a2d82ec3ecb7f98306f8c51a69538e3d41c5cb27531fe077c203f796247c552a47494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51021fe7c43eb0a9053a76df5e1edee75
SHA1ad7023f7d2779b49d04908024c8db8a3524ebf51
SHA256dacb417144b95a84b445c27baf5af0c8136c0368073fd95b81422066af6ced3e
SHA512e91349173356648cde89ff2e78c8cde725c95ddff98e812aed905da2bc51a8babc9e902b9d1488f0ea57727d6334875fa219ed8c89b6196f4935341826b51640
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539f7df93c1213e40bd3855a6b7c988f1
SHA1d42d2ea8ddfbacded287f8a8ab1a490e98d50104
SHA256bc0390540dec3b349ce7bd73ecdf1386e601307899596dd5c6d8b71a49cdf571
SHA5120a820dac8dd8f6373cd7d87e7e601d9a1bec21fc0c6d11af35f14ab6c3763ab9934a99ba272809749d8ae9d6dfe4e3dc78861c80ba0ff6d46d66e6315b3994ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fcac54f6311ccddd90cd3940aa6abf2
SHA17038fe29eda82adb993083b93d157f6d0a6ead19
SHA256436ce4f4c18f42deddc6aef94c91613f95403f9986b38a6a9134a0de23f7497d
SHA512ac94e9c7f16f0556bbeb01f3507d72feadd9c383cb4f62c8f1b6945389c326f480476a9d80f5288fac9767dff4c993e0d88d33c5b3bda83c33a837710b319a5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9d08aedbefb0cb9d652b47613f1ca7d
SHA1ad3b7ecc2109ab3cd028f744e03b390dc21522ea
SHA2562c1bf48fb9b11483094e2237f4ce3a40108f5baaaa44966fb69c3a7f3e9bc7e8
SHA51265adf5f7db691c2976ebc94972f6864a48eab3398e5ca8efea66a1b1c9082ec7b95de5ae8c9d5ffbf8f75d0444ef03b43e01b397d0eef2739b464a86692fcb5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b811354986227e76f553fa4c3fe52b56
SHA1932f14a56257f49c4e3f7754c01c4c25be2d36e5
SHA256d765e2deb1271ae7057fc77f73da6f847ee928ec513260af62bc0d8585343ab8
SHA512c4a7c6bbaa96affdd596c9a88c6af31b6f53375afd05141b8b26dc2ab58890a89b32483762e6e5ed2a3762043ab78abdcfd8aea3025d6d153ae8ffc92aecd684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d25ee9f5c0f0e20c578ce27bf4d83728
SHA129280cd974b7a099328e60093b72ef94ba95c6b2
SHA256fc3ec110d0821ae93b39d88ada3c979fdf1233eec6a6bde696963271cdf26fde
SHA512038a1cc0894b4d1d3f67c4b8906782f8597b22d591d8dfa26eef893bf1bfcf409f6d53dad1775e728afe4b41f8efa25eb3baacbaf519cb4aa3fd404619e5b77f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5691f8db86f343198e985229ffa56b2f6
SHA1b7eee1047f10ed19afcd24c7396a6ac036300214
SHA256dbf9cd6ab871d2e7c8da342d89f191788fa1df66f2cc0ce07afd84b9b1384640
SHA5126c86b55d6c9bd10fb33900c49b2bf46836cd35aa0c415a073b025d160c7d57ed83f28b3bf970431b18fca1ab7fadc8e9c2dd4ebce0907224db9dd80d19d33f05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523364192ebc3e7f17fde9a6a8c45a854
SHA1eb26feb6db25a300577a84a61467d1364d686b3e
SHA2562879ec3bd18af97cbfd05701b1139bac55daccb8d5482a88bb1b4d00f10de9ea
SHA512cab88ecb96167961328e8e249cea1aa6de8dba4883ec27bd7a9bcdbb834ab4667fc07b17d2cc7da6f9a0d8a23fffc78798eb4a03ad969058f2a772dccadf91f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59224cbc3a53ebbcc0dacca97d20975bc
SHA1344d1beafcff44f3f2db62c5cc5ab7838c8be2c4
SHA25640c5f7d8b0f7fc359ec218e62463283f184e942464c693166bac6cbc0fcd83df
SHA512014d2aff464c5b37d711520bdaba0e352df565376d07f520cc3aad8900dcee0bb4e8a9bed53fbe5ef35b6f9e9c50acb02bd63f22037522f7f7245cdfd474e28f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c0fa6f7f67060eb3f7ade021e04253e
SHA1f11542d062794ddc134c43c82cc0ea81bb8007f8
SHA25643a308b350aab988418c43909be9ed55257b0d518ab3af81728abbba2129462c
SHA51238950dff8e780a57073ce7f401b6941c4fc02b5fedad1cf36208df27114e2f91ff9b801d68de76e43f04431d8be5eac32a63dd7d1ce4c8f47f8d21bec5f174ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9b32ae9c527f27a0fb3aa41964de564
SHA1bacda75c13adf2e6593770570924335a12fbd892
SHA256e79cbab57759905cb5db1ca854eb3a1e44d5ed69fe0a853bb535b2027f15f369
SHA512202e3214b38cb1d8a1f619c4ccd55ecaeaf7a62da01a15e1c42bfb34d67eb5f296bea963f5fe777da54772123b8a30568aa8a4db26b2466b020416c28c8eda11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f620d1302758114a19623a75a243f2e6
SHA1bd805426c335df5ea9caaf03778697a5abce546f
SHA256742c4267dac272331ca55f2e7c01d4395395a9c8de6842fe31f1199f088e0a6a
SHA512e7fcb6b73d9c538681b1314c2e2f869bf783a51a20a6729607479243f78e2041f145b6c0953cf2898ca95918def79aae7265e63e2875b57bc52e4b7a09c51549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2dad3b4a55027fc4825548583ae48f8
SHA1c027a4674e199de171c5104514109f5df48e3f11
SHA2562a55d8207002ab3b2ec8fd38296a6a9e335090a00933442e55117769b2434c5d
SHA512dc887846a2e8dc046d7590f632261d10aba763363d02d89cff028398a97e808c0520ecfa2f707cd4d928cf90b41f7cea8f8c765fb07c1aca97f45863e953c439
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecc6ddd2f26043768da3f914bff31fe9
SHA19242ffaf24d962e7fce580ded9b8ed1c5c97fb79
SHA256c7f70850670cafd11240cdaf28a4bf6c451c18a310f03a7d5ab23ada0027cfa9
SHA512c8ad64e71cbe8a05792d9baecf3f476505f0a1e44ca1f63942144c66543c5e801dcb66f5502f289a8a8bf9b86e071c44a71e684ae6e1605e2b2ea2b811df970a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd3e3cfaefc8a7733834ebc732770573
SHA113accdd7273e195309726562e722204c3fe061b1
SHA256882a6a332dd60d41ee179febcea633b6903b78a6700c1bb2a444dca88bac9624
SHA51253a5306c071cb9a9b9c7283aff9cd28a1daee13e9dee94641d96555966f80939067966cde346c0cab260d2d3fc7a112b42da5a2b772b521a43cf1b4dc349d789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b085514578971ebc3358cd2de738f934
SHA17ab1f99d442445ee8b41b550ae472085f0ef29ad
SHA25633bf2d1bf85c2884262eac312cf708b7530023007da1f6a92691d19ac8dfbac2
SHA5127cc8272b58b4f17365054e34245a3ce66c386a322fd2d2305acda4393a137a809352086b72e1879327c1b1fe80d2c4d1d985b27770d131e5b74340ede6d9c2a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ba42795ef4789d86142feea972932bc
SHA1b7111102e78c43f16cbfcc577d8d23285c0f40ac
SHA256b1e9e010191177eacfe597aed2d3d56cde11aab05778d8e854c12eae3d693bc6
SHA51280bfe8e09e47c31d3cba6af0682ba5302cb2dd41fadf53df68a2f1cb7ba094be0ee2f1b535ce0b1fc5e070b176f26784b484a61eca51cef429620d0ab5cd72b1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b