Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-04-2024 22:50
Static task
static1
Behavioral task
behavioral1
Sample
03ce3829b7695f026bc8691d2d3626ed_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03ce3829b7695f026bc8691d2d3626ed_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
03ce3829b7695f026bc8691d2d3626ed_JaffaCakes118.html
-
Size
17KB
-
MD5
03ce3829b7695f026bc8691d2d3626ed
-
SHA1
08d009d01f24590c09830c0554c1e18ccff8cd28
-
SHA256
2f9e130e7f71b61adfb623cd13e55509818cd0b8a0153eaa1484ffd26b204413
-
SHA512
6aee3637b560223572556d16f54d3b43fad886cf614e1981fb059ff492a4391e80e8138291d3171459c296a1e63e2c999be087f4b559be056df688f9ef3b4e04
-
SSDEEP
384:Srxj+i3jz74l1bqrOxHKvtF4bzCfeJxHeFQp7:Srxjfzz74lcrOsEzCfeHeFQp7
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{873D1611-04E8-11EF-AFF6-E61A8C993A67} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c042b85cf598da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000007347fd3b698bdb32558fd8a8df137f4e5c3ee1c5674da62c54a14167e64ee504000000000e800000000200002000000006f910afe57ec13e6105679bd056dcd8dfb21dc12297b3df3b7fdb5a9e9e7b162000000055ed549f51fa6fdfb374c1edd9361bf81193bde3092940ab7c8118075098586840000000538261924c693e7b1025e4d53afbc2d9b4030004fa15fdbc2531918aa9c756c0cda6c206baf72d16eee32add654f9fe7ae483142bc658b481deb204e2d7957ff iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420420100" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2292 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2292 iexplore.exe 2292 iexplore.exe 1404 IEXPLORE.EXE 1404 IEXPLORE.EXE 1404 IEXPLORE.EXE 1404 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2292 wrote to memory of 1404 2292 iexplore.exe IEXPLORE.EXE PID 2292 wrote to memory of 1404 2292 iexplore.exe IEXPLORE.EXE PID 2292 wrote to memory of 1404 2292 iexplore.exe IEXPLORE.EXE PID 2292 wrote to memory of 1404 2292 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\03ce3829b7695f026bc8691d2d3626ed_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2292 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3ab79ca7fc99272624c7f8c9a6fd4f4
SHA193a32beb9e7cc798a448d4b788d8721a7571a27a
SHA2567058b5fdded919af025d6426c0650c8c1908b98f3283253c21702dca05acaaba
SHA5129b6cfd6f46a257ca3ca6acdb123d90591250504c44b5a20b302f18e070a2f7709a3bcb2edaa3543aac35385ae845da08692bcdc3fa1cc835c1b5577036c17cda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa6c87f988142e15b2f0926dbddb2bd4
SHA1f886f68eefa5d58cc941adaeb864df344c695e6e
SHA256c8a1a65f471f7940029a1c8944d48bcba024774d8fbaeb50f98586bdefa6e31f
SHA512507ef5d73b8f339faff30a401bf2e91c6f6cf30eae0fd8fc579b4d5a12f4cf875663be5cea963a0b30d0ad7309343b335eece6bbee0b93d9d497f303388d6dcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b13c1b868971b5b350058f3fbaebe45b
SHA154a313197e08e8fb9df2152a5688cc3d7c07b4f4
SHA2566a10ed3275308eed1f754fa7a76637496a6ff5bfb7b3df8a2cca51b12aab03b2
SHA51277032c0752f0a88c4816d13c91db252c47d17c3ef0b804853a9f14d7a54f20c4df722373ca897988179d2015c59c6ba9afd9a6323adedb8afd18e6afd9d4799f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f05196cfc5b18ec17f6df86f03d47802
SHA1631bc86ea243d3f012f79141742a2e50fae43cf0
SHA256ae1efae15f4bb523ffcb2751818d7ffb1e5693d7cd4deddfd4dcc1c2418e5ff4
SHA5128fa800c8f7cd36b8cb8b289e82cc552df42a8074660d460187a5b7809c2d44ee812dbc95dd90780f7146cd4d92c9217f998fc2de4a4ff0dd17c47884e5cc4c34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59689f6f7702e2b99d6328119df4c6886
SHA1703065ade274492184b38bbf60b468646c3bcf2d
SHA256876529fa20badefc9b5c44b1a3b5ff5f440b10c7b1802e5455d03b074a0a7a15
SHA512a013cd28302cd8127fc62fc62ed1becef973126498c9070b9c223b70827f49be6abc8d661058b2a679c38dd98c3ba6f257535e4db6283e7f2e45ac6e15fe89d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1b2ca0d7fa75a7425384dcb0d382e26
SHA1abd6c63d6c3cecce6b18ef4e87887a67bc766364
SHA256f600c503b6ca494126e8dfe18c2682c73ce75fd1104c59e8b45b07257f2fa8b4
SHA512d0ea4aeb4eedd8dd29e8b8d05ad38afaa9076c7599b5cfe4e044592df5f28449e354fdee1985e800e50697e82bc9fd5345daf8dbf56f4364e0148a25a1477df8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52341919a2d158c89fe0814868ac0f672
SHA12f85a09b692eba03debc90fd1414bc535f802b46
SHA256b8a378d612bd6b36b8cb8f2399b03a3616327c2380bbfd12ff82ccc35e0014da
SHA512167e4ba0967cb3ee23559c0bd2cce929be363cec5c6974eba24036d5eae8715c8223afc7c7bd628559ed17b71ce161653215870832c32d621ad431775a21303a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a7b0672a7a11790ff6576940624a4f7
SHA114fe0dd9c5971087c4bb5007b23f11d52bf33a78
SHA256c159ad2efbeaa7931488757020075b2df5c272dacc4d6e47470fb9c487b412a7
SHA512ddea111ae4e51bc05e2e5e2a22821ac8fd57eddbe402a9a777b3c5917c383732e5d7386f39f835377d4f5cccb2f4455117ce9e8ecf3afca6ff1d7a609a55044d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7f97bacb640882cec10a966ae2763e8
SHA1c671b84e4e5055440426658b99bba4fac3fc0396
SHA256b05079c67583af1a529811159577f43dade6d76b801c60a0903cf89f5d33e3c9
SHA5125d70fe63a0b9a1206c10c57adabd788b873d1edf7cff998a9eeaba5bd57fa41fd1f74beea3fd9d2d65e937bcc90b1f46a1a1a3415d08ff995dd7b7addab670db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3682820d71b4c6ab161df55988c1784
SHA1611effad86b76b05a22d220c4850eac1cb06dd53
SHA2568f6a99034b06836427eef946c613a2cf601964be93b321d6d4cbc38add95e44e
SHA51263095dd29621c210ff03b951a7d793d08ed71a8c2cc68c5765b0a7abf55ed01cca18bc2c18f93dcaebc418685f66d970b6bcf0dc2d6590dcdbbe82e7d2261f98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571f5cb96a9f86584df239d04970c7c21
SHA1f0e2c98567ce913bff3de8902cfa327edbf750eb
SHA256478a08273e0ccaa106d83c30168d43288d97527ca245c0d898f4a6225398bd28
SHA5121fd7ea21768a5c2179273d482e428e9861238211d7b88ece45ebd7de58b6416e6da0383a86f3a5bb0f9ee0e3bcf1d6068cd481b5f5cd7e0ad4c54b6229781c26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503a8ff24664ce1acb496502ba11f0347
SHA15abb795f424be866d20e51cf6ff99312f32c3972
SHA25608e37d8149a7573b13b034944da88a3281892065109b09f0744e0b3630bb2d6b
SHA512a2a4f9df5aa58c64152041825fe3506d352f1f111e84bd9e892e57a4cf590c607c1f32316b2d6159654e51566622bf4b8922d27028782c1ceb0c1d5e3dcbf094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5428a32af9adb48986ebe25d2a2b5ef7d
SHA143ce103f591231ca075fa01f85261d973153c887
SHA2569a3ede620c0db15ff0e98523c6fb8e260e74c49a7b6bea14219b58de2521e65b
SHA51289c6251e18973878bedbbc0a42efa5ff34e359c15414b7364460bc4194d163c912fe977b5b929494bb01aa07d2646ea0d01ac4c5bcd4afd0090c26733bff935e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e67539a1018b46768404b7fb63ac0ec4
SHA14d73d49ca95aeaa95e78b27ceed37d2250e865f1
SHA2561eebc0fb90ffdcf48ea579def0a3eb396fa59cf6a8e242ecadbd518c174b3617
SHA512f5b3634b1ceae2cc230390514d2869ce5cd46cbfabf5419e71d8a410974705f22e80b8439bd335c8c81f5f300a7d185d00f238ddd7c9a609880e8f86379baf05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54156288ceda26f0f48d00332cd7050bf
SHA1e910fe1ad080cb71561e8b9dc4d79aa0b74c95af
SHA25642b04e1ac2ede6a505623249cff154b80b550126774e46adf19724d7c885397b
SHA51274b572a0393fad5dd6e68988569748f91e447f10ed60cd1a8f23e906559e3124018b7b6a72db0f97ad35bc31d695764386cc35ee7e7a2348dd2a4393e18dbaec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bd046dba1120b5dfada6515e3681814
SHA1948e87dc3c345b4f47007e05de56e6634913a720
SHA256c25b631b5d37a0c240252e240c2a493faf101c0b5d73b049794dfc358997a580
SHA512c1af61622393f4cb1ad0fc444b1970acc1cfd402db31e2ace0a8ce2885d04cf7eb06f6032d36bacf5d595cb365ee780fa792e9aafe505824e149fa1afbed951d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c809fbbeb5ad2598cabcf3da6b57b04c
SHA1117f52f940a8ecc922216cee45ebc995532592a0
SHA256a8076488181eddb75d3a3e6c505c2b91eb1c66581513a0e1fe6ab9a1d8f2acee
SHA5127a287ad015fe264230d16c90938597f794addaa3a1ec0b07783e3cb5dc82b95fd6f2dab9885f8a85ea4fbe2fb8f6de3c96d68228eaee4a390a3a206917eb765b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf01b79bf17f3c216a52d1721e96b2c2
SHA106a68b88ce3752b83268942fbc4095f731ebf327
SHA256149908b621b6c02f543a3d66da9fccb81aca6fec4a5abea43fefb29de71973ad
SHA512bbf86286615bcd869af9e186233fb2417844790c3b3e59eda1a695688539adb17b7866c02f1d2a69286c8b8564a55b6f95fa409473fdc05e0680a55e2fa97ab6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b7257b3564a049573db3cf5e2d0c056
SHA1215f413fa7052135c9e57356ba5fe76e7413ce48
SHA2560534dd790b099bf10486718b4f952c01a26be1d28fe4e05792382785a1b375a7
SHA512f9adb310e713f69378ff1c70418af62763647398f33483cc4a9d8ac139204522d8d0c95eb421ee46cdcaf231fd83e27a7eabfd36cce3e06c4656f833b2d1dd1c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5DKX8QD5\style[1].css
Filesize5B
MD5fda44910deb1a460be4ac5d56d61d837
SHA1f6d0c643351580307b2eaa6a7560e76965496bc7
SHA256933b971c6388d594a23fa1559825db5bec8ade2db1240aa8fc9d0c684949e8c9
SHA51257dda9aa7c29f960cd7948a4e4567844d3289fa729e9e388e7f4edcbdf16bf6a94536598b4f9ff8942849f1f96bd3c00bc24a75e748a36fbf2a145f63bf904c1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a