Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
f6a6af94130683d2854611b9bca78610_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6a6af94130683d2854611b9bca78610_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f6a6af94130683d2854611b9bca78610_JaffaCakes118.html
-
Size
87KB
-
MD5
f6a6af94130683d2854611b9bca78610
-
SHA1
8657b0739083dfee06543695344ec8bbeb035c66
-
SHA256
89f8bcdf71abe37593b9e428d1ba176345ec3a135cc1480b36230e43904d4a27
-
SHA512
849749567b393eda3a564892d669c80a6098e78958d2001800acb18cb6cd8f876333dfe5e0911af1da78ee41be6cdf595c6517a764acc6298146ed7d11aed58a
-
SSDEEP
1536:S3t0l9GMsHyLpUNIoYLTnOxjznwuoe1yyAlGClPSoycOmz5ixI6Nl1tVjnrA6xvE:S3t69NRSN1Yn8jzwuoWyyAlGClPl2mz7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f0000000002000000000010660000000100002000000054beee1f331a8120ab948f9ce1a13dd432c61f5a4478a648645d200d6efe35ad000000000e800000000200002000000068734d36ea8e6fac64e85e1d58e7eb297033ae1ab282c422cb8010ec9da5d341900000003e2f5c834d9e7732e687dff8306702445170d276e8f232c778ea3e5bfc3dccc4ce88d84f7ae7f62abe727981a989bd360bd1f98ee4fcdca93f50b37ce21ff6e05e99745f79a56776652d7556626ebffa3edc35b60eb4f1dee7b0109acfbc40b04f8227e915aeb83c276dedc39ceacd343b86061c6cc5675a14d244bcd8473d4e50b0104e115363eaf8e9288166ee8a1e400000008baa75aff772471ef0e7027e7681c4df37a1d275dd7e89269df972d0401da1987bc6a8d41375d13bd6ad408e186b96d842280ac37774d4f5e2e1f3ca9a9111bc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30bbd8557c0fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000003cbb3dc3fc799543b9df04044ac1e7484b807cd30a90c58f75c617226f1d8207000000000e80000000020000200000009b1d2f5e626580fd1c7fcc7e5565c06dafc9296fd394810a8b2a0f97866e910b2000000008f78fe7b017ba7210192dcd14f76ed3aea96866713371e1194a9c586c8f9a55400000003431bf7bee0e7c1c08d9153e3bf308228264bd0a75dab8b48ea0f77c94fc0a9f4cb2f920e85f8b42583ce5638fabee8d264d629223177254a285fdd7b12f61ec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E500B41-7B6F-11EF-AA6E-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433452294" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3044 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3044 iexplore.exe 3044 iexplore.exe 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE 2576 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2576 3044 iexplore.exe 31 PID 3044 wrote to memory of 2576 3044 iexplore.exe 31 PID 3044 wrote to memory of 2576 3044 iexplore.exe 31 PID 3044 wrote to memory of 2576 3044 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f6a6af94130683d2854611b9bca78610_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3044 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb58a157f5847e04084cf915d8437f91
SHA10bb9b5d4109fea92572922fc85f1745734fa070a
SHA25655fb701ce6205962c61a70a317628463f9b686140425b2a9d1a1e06cacc5dc51
SHA51215563f4af4acc3a83c1c85e71c7e6f861736bf2e3a3d0dd9f574eddc38666d18443fa28359ed292245a7a12f80f3b052720985f1120c723081a936cf3ab848a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5494a3ba4c97e4417011f6a215878e15d
SHA104a8de4ee82b661b95cbea8e3452a9ec75547f20
SHA2561635ea781fab27ffeb4a00fbbc169b58d4fc7b8efe281a83330d1e586e3e0e01
SHA512c393ffc376af9cbe64866146a50de45907ad3437d9671e5a1f6930108ffc61ac5edea90402ef075266320b90618716c0711ea43bff8dfb0fe9abc8906951e316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5487051c57cadc9cded74dec1a8bb1383
SHA14b18a86bbad4ce95c4246784e0e5ba30e7744c06
SHA256d84bc3e3c301d03c263b8d6852ebe712965a3750122da3a15b9be8d573822f50
SHA51267f42bde0855d27bdbe44f05a3f17a4876cd1886678108896df6bb886a9ca7e3221b9aea5fbc6b887a58ec69aae924fd0617d2c084b6417a1b404a19481f7c36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2bee57f6e4f1ea66041d38f61f6065e
SHA1245932b7f9226975f785a9be12108d6ef9247bfc
SHA256da813ecfd984adc397f5df0d8989363bdbda815731cccfeb98633d624731080d
SHA5128aa84a2d94f6db525b3ac3a82aa369b38f9f6abe03db8152e4e9cbfcb268a55c93e8b30af817a3d059aea600304b5e6fd398c2895ee37ab1674fb5d2f85835fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d098943f923783b5ed9773401aed6729
SHA12a86e409ec2faa8bab4028e9007f4ac509203d3c
SHA256f4ab901bfe946061de2fc4d87ae47905c0d8643da8480b0669d6c1b67afa9417
SHA51271a4eab3f427681c0e502f15e1ab209abfc9a79c687380ff19ace6c9671f2bfc0b57c35f8aea166fdadef4feb628110925b6d649707599eaefce7bced6852cc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581773cc323fe618a77091daf785912a9
SHA152cef031896b4df7f0f75a6b7a40aed46310a257
SHA2563df69529097e18db14a951e0025cec3ef2b8aae18098d9b97860e6c42f13e57e
SHA512caa4052abcffdaa52bfa81dc4d9d43f7a052e21e48cadaa0799dc07606def1558fdc04851776e69d671fbe597973cdf6e47e6fdfa3c39976f82bbcc0f8889eca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc807a223467b7b913d9865a3608da4f
SHA1dad1037dfcedba42c182cb1e431513b55f8103d2
SHA2564e2899d94863eb30fa2559d2569b72b5a30a1c290eeddbade2241c8c9a0ed3b1
SHA5128646350fd0645e01e25c5b5c109359d949ef32f7c97a08d5954083b37d9d559f07d1abd9296cb32e8ce18a0885e555f49fd5858135dcd92dfdbc8dbd09eef6fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528d13eef3fe8dddb945e6f2e53a7ec75
SHA17b1de70407bcd176bb8314977981df80806c1904
SHA25644b3301b7f42b4483feb72df88835d8e5fd2d1e06ef1e029fd76db2b9480919c
SHA51261192b96bb16adf1d650c9c19d79c1df0162c54b33393748c02fc84aea42d2ad469bd1a2307bd1e9b484f5681347420611431007a605c1b227f3cfbef6c03013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588edfc87904b3c20a6634013e46fe1d8
SHA12c143a8c8e9cce827dd1ff4e26507f2f4081ad97
SHA25629878f2d9c7f9057a1c056a62b8285d7dd279e89c194a6b681b0562a52919808
SHA512b8fcca2bb637e800d40256411297df954d3dec2feab4fd524c246d9294c09798eb7b60a4d37f10ac3bb3d5db000c37175d3d9838d2c14a3cd564d4ffd47b0d33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c14bfb4e10e7c43c2ccb13a3cd5ecd6
SHA1040e3952989db98961769e3ec136f7eb08bc52ef
SHA2563a79145f9a832855f4a14511f202e85beb9a35a0c7fa3bff4b0bfd9a0165e63b
SHA512c1a5b5fb807e82f8ee30fcb9aeb97fcd176830358886ce928d4d46a468221e4b0d86f90a998ddb8b6036c0b76b44bc274c19fe10da3d608039e3c016fcbc8992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e96caef04775ea199d4b28676b84984
SHA19cb9b786f88b161c0306e451584cf9872e3d97ed
SHA256b4ea33ce24ec5f84971c83e4d9afcd309b654e163bd52d1db54bbe523d4b239b
SHA5129d26f3259990772632e5797dd58d96d92fe12aee64cfff4ccdd2143b59e82521c6e6eeb508d422e14ad85c91d0d850bbf5783f30969726b2a39b25ef08580830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f36b2e262a30c28d3c5fa73281d8a353
SHA19081aacf794aef186cbd3b7df4b1e94974764bc2
SHA256be722418982832f4c8ceb3acd837ccee55263998b164cf1a674aa004b38ceefa
SHA51216f479c13268404a83a865f6bc76cb9f641ed868d0fb798ef4aaa6fb3873e3d3c32b2737546179c0d64794dd1f17d2a5300e2c2e5ac167f0bf0c3dd5e7c9e27b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab08b5259d79cbb76872b5360eb539e7
SHA1b5854290be0554660e60034c3981ddf0c8b7c9ee
SHA256882d2a5aad5e8face707f7d1047a90bc766f90b72f15267eb9339c9f344e8c36
SHA5126a23abf5b3f76a14596833ce299e5c33835dc4b4905090f3c51d457297db141c3c1012386d27379200838f69d047244730c6cd0ebdb232ebc72bf82892c2e383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5739956e0ce2e0b61ddaad9ce3aa4cede
SHA1ea76c4562b737faa4541dd17e6d87deaa68c8b20
SHA256c24ee510b6b4eb3c4a4e55bf694005659352eb7da4408c681cb360269b76691f
SHA5121675cf75e3b527134cbf16ba02d9e8c2cabf5686a8bc83fe56ff5479fd525e8b9c76b63634918a29c20864868436c1e57626f8830025889a8d44557a7dfb0b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592ece966e55c27ff6f884865a6790ed0
SHA1051f88788c69e77d95fb5c7986fd27ce2224e148
SHA2561fe1effcb0708e32517db916a27f449b143be9b6f655e886d6c48be43d4512a2
SHA51230b8f5ca794622bcf25873c731118b4238b2daacb91ed4e7bcfeef014d38f13f8f76eb9961ecfd96cbdaa49d444f0aef3a744038db52bbe5d24a946227a42e3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572d9e9e20848e19e9921bebb0db59bcc
SHA14580dd5ebb53b85d420ab2693ccd70c09b41f5b3
SHA256e206bff9b365215a5fc66f8bdf5f67efd7733cd92e25f0c465a588d398ae1d0c
SHA5122a900b2b303d6bef88dd3010b3e4ee4dd8d881cf444593d57fdbb8195c61e6cc8b2af61ceeda5f53e636175e21f5da36d00f82ef2b1798f488791da78bcdbc15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53dfd57badb53550bea68830b703626f7
SHA1d3c5364a2fc2da13ddd4f6e444bdcf67757ab9ea
SHA2560535f3efd744e26847cbc68fb536bd55d7e18b3e20e475bb693a00e254405e3e
SHA5122d89f107619528ec038c448dbaee4bed3c6a9d40a6b85c08e08c54d42bdf3625028d346c4f0856f27425ec174c7c3d97ba5f14b59a8ea6b47a27bad1192efab2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a2ab5b6a00ee271ce2a66302a1bfa98
SHA1f29ae2748c61a97cecc5b20e978d33ad3c41f235
SHA25668be0721b78b938b3ed592a7ededb19c66ae1e0283fc490ed0241e1ab0e5cccc
SHA512aa2272c5ca181e207f418796c06abf9150fcba31395530acc1992bb2efb0f2dcb467125ff6074360678dc93c9a4179e00f309a824464cc8e17ca37362b9d7756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515d1dd1b1189496a8570d77e84c25472
SHA1e503b429d98862137809dcd5df797f9cd91887bd
SHA256ad748ab85056a700745662222cad56369583784d7ae2c66c9b9ef4ff986fc0d5
SHA512225f8369e474ab5903aff49ebd342a7da4d8bcf9475b94cdf9d87787d83523b45db301609563ea35e81eb8601b3d41dcbc395c1b4ca282bc7e638c6b3672b4b6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b