Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 16:11
Static task
static1
Behavioral task
behavioral1
Sample
3aec1e5262d5782eb949e874f8df911a_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3aec1e5262d5782eb949e874f8df911a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3aec1e5262d5782eb949e874f8df911a_JaffaCakes118.html
-
Size
53KB
-
MD5
3aec1e5262d5782eb949e874f8df911a
-
SHA1
2a7518bba39f84798b5d08a57248be28b52e0ea5
-
SHA256
6e2a6b6b6637c61e6e4dec2d5d5f17df2d3e97cc2ea2973cd420eb0a213232b6
-
SHA512
9f0c0890d111cad7434ca5589c65cebcb68e88f3bbc62ecf7de517a72e613e6e3c5b9a4b84ff3be5afe3f6d6c92a4f25257c80cccf4d1c6a3df261463f48152f
-
SSDEEP
1536:CkgUiIakTqGivi+PyUTrunlYE63Nj+q5Vy0R0w2AzTICbbLo9/t9M/dNwIUTDmDx:CkgUiIakTqGivi+PyUTrunlYE63Nj+q1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0b9dc74c11cdb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b96000000000200000000001066000000010000200000001dba1f88053e229d5ceec4799cf05ed7312b881e098215ba16bba0ceb1964004000000000e8000000002000020000000c9c3fee29eebe4763b6c825eafaf947fe69fdee6f6b1f212e1b763891482212f900000002829f7e9f4a830df5feb3e0956b8d83ca4f7638654dd62141ac6f493cb9415f3920c47ebaed5958915b430b402a187a73cf32a1717e0b2671979fc574cafb5fc3bcf7e37b870325d95252ff91fd9ba4b21211c4ca546c4a43123550beab0d91f4fa6bc3ed655d5ef81b24b5934a293cac636fcecd86a3d714658259955c9dbca3d8f75920b88f32c66c96d9d027f0ab3400000000c304715002b96bcfb996ed1c23d0a9853fd7faf5dbbf7da5b5a7b11a862361f20f57919033d8373c41a1af30208071004f2fe553f72c15b5bb85d3cb228de98 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434911346" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e78a69453f00554b9c7935775bae7b9600000000020000000000106600000001000020000000c85dc3103dcb065e2a00c34a7880db4a12c8bb9760357c67c001974bc19c0af3000000000e80000000020000200000002316166a16d53bed0f078ad9854e05579b64ff48664105ca23e3323131b7b96620000000727fd31e194ec1e40f4814b3220b40707c9ad03814eea8b931a335a1dcb9501c400000008e02e3f7ac07809dd1d951c51dcea82ab375dc46df9dc2ac56686b0c49705a6df9c00073db88e40414f031aaf9a4e1c969d68228e2bcd2b2405eca53da27778b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9D1B1F91-88B4-11EF-A2DC-6AD5CEAA988B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1944 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1944 iexplore.exe 1944 iexplore.exe 1472 IEXPLORE.EXE 1472 IEXPLORE.EXE 1472 IEXPLORE.EXE 1472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1472 1944 iexplore.exe 30 PID 1944 wrote to memory of 1472 1944 iexplore.exe 30 PID 1944 wrote to memory of 1472 1944 iexplore.exe 30 PID 1944 wrote to memory of 1472 1944 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3aec1e5262d5782eb949e874f8df911a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1944 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5387c3c5bb330ecfc94fe32bcb97836c2
SHA186431bd82fee29c17d6f36894b4ace38aef86ca4
SHA256183c641023f7b504f67f95b21e0522503eb293a0def29003816a3a440e46a0f0
SHA5122e847790af02c61db617c66ffa118f57a74bdd55b790c3cba807dc5d5e2be9aaf96d328f0f731d8cd13db82e3021a6b2bac2ee5efe347605a64c351cbdd276b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502de4919fe542625ba9cb16c4d827580
SHA1350a2baf83b2d8896b94742823beaeb3659a19fc
SHA256ba23a15c519d356fa6b23fe025efa17fe0a2c506daaf3def168c2036d67c9197
SHA512b01af8ae2fab79e745204fa6706a6ad342604f4c67fe0bb6801bda00c280a309da91e114ebc15e5b876fbe6bfdd143bb26b46d1c6c9a578fb8d28ee43778c824
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54eb926879b8f014c6ec3e57b3477ed0b
SHA12c16eda17e232dfeefbe195c9cb7a91932f573ac
SHA256744199981e03a5524a27efc49a5315f8a903ffd3a5e37931ff3e859e2dcf0c31
SHA512b8277de80c440469f7a592c672b3806ec81f8a70f78b022fd30496b42869bf213c427ced7af2a50c1ec4ae7e24d1b2cf4ef6992f3b45889fce5317ccf614f146
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0db18d2cdd05270edd6a3d0714dd7d7
SHA1fb55c50a1e064a094ac44750df75b880c9a2be38
SHA25652f0bb6d5f1bfade6438dcbb6c97d7848cecfdac535337c8088da2af560b80cb
SHA51281660eb679492caf3c6324f6d8a0e46afb99608792909871e5a84d88b123fd851275394178c540a441f69286d65bef8975764bf5b7f92ae000dc471d2e580908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fee0ab05377564862e4ad42a16896fa
SHA1fe4ae93de18ff376a56a96e041c31ec6067b2fb6
SHA256349fbf96bdbea0a159ac509e70f5c38f13929eb2659c0f87cf2a4acbdc539601
SHA5128eb4d5c445c13a8107064278a691974e3bb249fa00b2a618250b8a05c51ac5f624368fd7bf44bc0d0a8fba8100332ef2f56fe7d33f810720dc5819e6a25e1da8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cd7936c1213db3b9d55a69e295bf015
SHA18ec88efd78e354cedd04a0539a928077e65698f0
SHA2568811efbd24051e31a3d61293f78ac3c91d141a381ab281bcae8abb9f01345a96
SHA51265b647a8067c00413cb9f2a62c65c8b0fc935f07defdcccc45ff0ae1fa72484a33353b352347c96b270fe3459b4ef34510ef0ea8a569263e73f30a32002894a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b67e2b786f5099a6e6030c2ff3eeeb7f
SHA1ba04ff143b603aa511907032d2def089d60f3ae4
SHA2567e5dcb05b3ea264232ac936189a8dfa5f5960b39ad1b53b5869d637091220e1a
SHA512df78e4682bb61ec1b98bdcc21c48070f497516fd7efe6ca28b08e684409cc5a564fbcc7101c8610acd904e55444cbe3997125cecd086b17bd58d711fa5dd6973
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551bcb7f5dcd301e80048f8db95e8bc9e
SHA1beb7e3172778faf5733f17bb2c182adb00f55649
SHA256b20f11bddf6e74aa042598b912b3a84b2dbfec2c36d59d9dcc1c0e810503ed59
SHA512b012f32c68a5e2cc2cb829d819b3ad844298214ed90112d6e1835b6c6c9614c026779d23f0e92e9d7bda4bb7cc9e7259d04985e63b83675fba4850d26ca27ff8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554295f200a55239cb9055d1822ec12ee
SHA1a01132ddcbc10892288f24429da3cd7e719e647c
SHA256e34aa747d70273354d21cee8518a7ae7079b1a18a17bf711e42c9045cf76318e
SHA51230c0230a728ae2a61fabfca289002ed5b37b7dba30749556b9fd019fbab15f9287f9c40f0ff711e055219ebce3bf5dc73238323cb2a9b15caa3fa29d57895dd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541c590f94b5dd1ddb9543c682cebd729
SHA1254ca42a2da576bfbe91a45e0676a445db8038a5
SHA256e37a7fc08fea96406dcb330795b12dcf109c9ca102d4d2a9b8ff76bb210d6d84
SHA512e363fbe4469bb062b430af8e9280f9b3ea6d46d949fda7fc4b9562b3e68e5c2aca151573b76451806c37caf6075a3df1cc558456f53e5f16dbfe87dd4bf43a91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56088f3e01d7b16a331716c3761057512
SHA15701426420ed5f0ba308db08cf0ce3a2e76a768d
SHA256eb8577013f3b6e532abdc48e077b8d3a8cd47925c6f9d8cf4a752a57c09bfdb5
SHA512cb15689588ead00683857f25344c2c1390a770cff7b2ab63392e59dc35cc919c1ab584699f96ffeac0d72b03de026d22210947b3c235bdf16f10a747b2a98618
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a03fd652676c32be51b9e5ac8dc10161
SHA1060ebf3004d8c33ad1e0d66e49e972015b576f82
SHA256decc8371b2804bea4dc29c4026073cf96d464daed52633995f1e0713a287e860
SHA5121a014f6eda17d92eca44389e3a829323b9e1a92bbe5f8d6061d4d77b2156bbbbaf6e12ff054cfd309ea1430779ea28e6f4b9d764bf766afdf714195570ff4789
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549677220b13a5eb4e075748d7baa3f1a
SHA13da6ac00a9498eb8664111f170eeb11b6a7b520d
SHA25635a855d95e87237cbbace1437cdbcee3abc1198dc6466e2ca1e0b1cc435ac17d
SHA5129c7ad86837bc87f7f05a2c1dccedc3505c4bb26d4e1cdcb45815b54f1b164ad31786a9c8f71d83e3dc044d3c67759a714d390b894c4bc24bbb9082f4cfdcc85c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d831445fc736106d11af4f71c9493467
SHA1515ca2286136ebfd720c8b0662b13af2697e3199
SHA256d2a11bb801e98eae82c3596096ec797f44d744cc38d5b2921d4e0fa42e3a6166
SHA5122257cd2a014a920300e030f5adc7972fb54cb530b0e01978d5bec0ccd8c30cf98a7563a4cae782d770eb948ecbb513cfedf3d3e545f73daf108663cd06fd40bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557d5360b8e94e4720424ba6fbd00bf6e
SHA1f8fce197a0b54c277fdd68f99e37ecfdf9451b95
SHA2563b7d693a397726de5544192daa04e153d2f0e4d2bf18519ca1f2b9cf086e5d0a
SHA512101516f26cd2d8b2979372748429e170ceed787ff6084939380926c534797eb2fc040d1e94cbe9eefecc7eeca5ee2385afed89a41543497e9dd47b0c488ca435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6560ef0f507e60ca555f6977d61ace3
SHA1259eba269437e7d15f91554ba7301609291f4695
SHA2565c0cb59d389d348022467a43c2d614a3befb08a93e402dadc8d624efa51a11fb
SHA5121c0d33350581afd733140f863afa433757ffacd25ca609bfe729ecbf42fdf8f76a3b49614d16ecdff36db51d3a3a518069705151ea9a8a5d5aae17fb6206560c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526ff5c1bb705cea5269ae3731154e741
SHA1509daf1fa92c70850d2ba6fdcc771bfa04702aeb
SHA25670331f308bc7c18db7338eedf2e9e7425853d1679babd80b9771243120c35ed5
SHA512ff9294fd1ce981489b9ec1e1b15455ff94dfda292b8ec6a46d7c781c152c8a30a0d938425385de8160488cefdbd71aef8cf7b6e18f8b282344992fa9fce9d778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cde109b8ae32c3732099a1e1ce58bbf
SHA1ab31f093a4b40e9ad9b95831aa661e0201e2d413
SHA256c382f159106568021808437f84f97c8d91e543e6e44ee760da5a8b0b421c38df
SHA512fe759f6e9743ee4d114876404fc2e99ffd3da07b2c19ae7587d173ded5f7d9b8360ccc04f4488424cf11856e82a007ca39bf680b61686973441ecec2f5bedefc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5GWW47WY\normal_post[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b