Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
03/05/2024, 06:24
Static task
static1
Behavioral task
behavioral1
Sample
0fdeee2c90c8fb70bbef8165715742ce_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
0fdeee2c90c8fb70bbef8165715742ce_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
0fdeee2c90c8fb70bbef8165715742ce_JaffaCakes118.html
-
Size
24KB
-
MD5
0fdeee2c90c8fb70bbef8165715742ce
-
SHA1
52c7e2606d8c32971c55d821934c9be0d6d0a7ce
-
SHA256
c02aa0df43165f83a8bf061c66a0eabf44686a8250d5f0bca0db769ddc0b507c
-
SHA512
6cdb311abc30afb035e268786b6b3a2a5a5ddfdacb2121849edaa675ff89c749097cf04c973c3673da2bc436c47c8e521220c33ef9c2d1be1314de96278de105
-
SSDEEP
192:uwzUvb5nostnQjxn5Q/rnQieqNnfnQOkEntRNnQTbnRnQ+doI7dnXodUKMBKqnYG:KGQ/aBZ82B
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000014e46f3e77e94e53adccf1d237e34272b97bf0b989bdde380ab0e74f95ecd26f000000000e8000000002000020000000e9cf148dcf0cd47475fda5b4178794abf2aaa37770d52fd95a96d7b3f8e8637e20000000c1e8e7742875d4afd8fe881402620ec0e68889f231297818acf6e36384baaccf4000000061b96abe1010411066cde038a3cddc5ae2a444884864a4a1fd7225336ef7a5308c53553b129bd4e00ad356d8eae8b053a63273d94fc307906ea0307f08a0cae4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BE3F5701-0915-11EF-8840-6600925E2846} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d087f692229dda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c60000000002000000000010660000000100002000000091e6149720492db2720975d3f9ee85527211c347e1f73747ff8c914e401f2892000000000e80000000020000200000002fff471d3a70a5d300950329bab90d8562a770fb2d4b42dd8c05116546c071f590000000702da56bbcb4b78a4cfa248a1c060703da382e0f2be39d76efe34c7d46554428431d82c10819cfabda0ece8e8a1fd5f478e52c97ca3328771bba27951afe1616d10cc3e563f4b459b5a4c2a624caa908b02ca18a537efeef1679594a92a15a7ca3b5bce3a9c14678253957597addbf88cacfe42878737396f7c67e560e5e49c048df058dd4c97ab6de189d04a47f8004400000002723582e3228c145a4bfa85ec32ca3fa6166becb76c10763523b910614cfb2daa39a8a0bbdee80e3acedb09626a2e50ac53ac1221cd123e163d5615eb33216ac iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420879313" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2800 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2800 iexplore.exe 2800 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2800 wrote to memory of 2892 2800 iexplore.exe 28 PID 2800 wrote to memory of 2892 2800 iexplore.exe 28 PID 2800 wrote to memory of 2892 2800 iexplore.exe 28 PID 2800 wrote to memory of 2892 2800 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0fdeee2c90c8fb70bbef8165715742ce_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2800 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5916188d0fa15489c056e81b3e5a0e208
SHA13bc6141cf84a8af688f8cd9d175730d0778a9010
SHA256310f10e330c7e9219448fe1fe4d0e8f9817ea755882041c87be768ca1b0c32bf
SHA512fcb4c642cfa051cbc64beb3bc0d9be1612e4a36726df00ab4d0e399c27fa8beec06bb0e40583d2a4b7cb3da7aeae7a1546961452ff8f3411241af8a68918fd5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571d6bad889435597fae3520ff0cf96b9
SHA113f85fc2a88100c0162a6353ebe3e9f3e934ce76
SHA2567cd3a15a670f0bfe0d7a36da08cff9f366da3fa418be7d29995f39a91128c977
SHA5122367bff11f4fc78311a760911e76fe55604c7f215270c61244f6e8962b9099f1596be50b5c25d23f445d7ab80c9a2b030243a34fecc8585a5d50678d7b8a6455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c57e4130da4e9ec8a2d961a439eb3e0
SHA190c99599fd627cc557225779cdfa5edf9809902d
SHA2562a71074d3b044a647824b82d7f3762355a3da3d01d95492e6fc70b0ad507fad0
SHA51260cde6dfeb56aaecd25c68fe54ba90a506d278abe9c45507a3e0eeba9301e85d65b6c55fcdb71992b7eb66a46f6a2d2111853442a0de53d806aa2ad00af894de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bf39fd41c161e76a5f2b9af636435be
SHA14a24818e0077c9020fc01ee16f66ccad3ad1f2e3
SHA256e923d91a8e7db3a1c2f3449676d3dc99e3bb4c90334db131704c2bcfe5d819fa
SHA5128373c0bb0ac4ac9d82cf70d30571183080f8b1db228bb0b31fa95b781a0a4e49e7bebdb67b76df7cf4613d672a1c218312f2d91fdc73a73f810ed8b4d2422002
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591808bcbeba15b3beece64fec765eda4
SHA185693d595d5b0aaaffce0ba18caa62b17707f568
SHA25614d845f110ba001a9385250ed56ad9c7099358c8b74d93665f4247af5d2c1030
SHA512812e36d16ffcbb5320bca872967d620e8d3e7a5d5634821a5e4057d01e22397b2e7c178b0c87492049a22aeb75b364b6127a058fcb537a077573d6806bdf4836
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b423918c8fc7a40d3171732e28d3833e
SHA1bf5a890d89c7a47a50c845e61c8e61579addf51e
SHA256d9e27ae98c9dcccbf96b5cfbc69d5ebfdf6e46fa4fb137b6ef82aedb97c00431
SHA512b4a4edcefece25546a1fdc9238b48809a22b0b201b2867c4cf1b2b058067c5a5bd093d31d5ef2f13449989fa52c8e42ba328c4c0e9ffe03117a7f1e58ec61485
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fd6897fda4a7baccba4c3d8d975aab4
SHA1f5ce73e2e7adc53d6ac70a572d86cc070f7fd3fb
SHA256379e40e122cd7677994417c49a90876f211893c0e3511771a24b9ae628b0a137
SHA51284315eff25dd1580ba1c2705bccdaad197e6679e47b76eb6081529f0f23e6a6e11d1d148fe1bca21a9bb2b5c77d65fda99d42248c8ac90c5bd7fde154ab88cf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2577ff6aa63469534dbd6907c85c1d8
SHA1ad7181565b01c79ca8ab1c31f82ebe25f0453aef
SHA2564f43e76c819a838f63127807de0b2a638b0586938f18ed3822f5e196c7452a48
SHA512b8b5f656391ffd7bbddae31766a06a67b439ade874b937ec9c7e18f8925d520c7657d85c30c83d0b487e6f51e27c6d562fe30246916364ef78e58a586703d879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2ce4b5230fc56f5fbb5d7ab261c1eb4
SHA1291cad600b7739998f13ef6198eb62a024abb436
SHA256a53fa9c90421153cf260b86ba88be73ff67cf32dc5785784ae1b856b0262cb4a
SHA512ac8abf8a7be5ee2c7c431216f50326173e63f71354de9f96e1b79cfd2b579ef0e2d92ce3c6412db41dc7df80a44398e3cb6bcd0257a0851f7c70a37f6f05eb23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD547e52174bf4a3b9ec78c5ae04533d0b7
SHA18021915c734f409b910f11371993983d00564fd0
SHA256d31ab6e49687c191ee590fc89d07aa9129a00e49094a5c0649c06b2bb0d539be
SHA512441db0131d0989799720d4388b6bc5ec22bb24a48c6be4bf11c23e85f282ce04c002382ca10adb3b8969ac38fa41ff04616ac6c195366dbc8257face5fdc3e17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55889a7822dc22c28856654f2c3f097e0
SHA1814a4126dd7f2a3de3c22b785938c25ee43b5ab2
SHA2568b19f0a5abbf15d6354bb1855fe01ab68b14603130246f58c772be4afbcf6189
SHA5125500b3d84ff875378857fe21e7af1d1de6c2ce120621606fbe8061bd5db9fe15326657e0ba747ab7ec641ab5242a4f1bfb53400bac1969dd12f9e482b18194b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531c1ded9b062181ec8479c477015bd5e
SHA1f3fc1538e5d36564396b5aae1ef9c8905aa882a6
SHA256f6f5f79355bc96fb95479c7cbecf4ec13af782357b980bad0061ea257ee48f21
SHA512c281344e3019ef2158e827aa9e1f4d36debda71dc002c9f7bfede2059d9e5c3897bff3f16a0f90b3d7aff8e16de07b4b41809b59354e37047b46b3789278261b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53936be87e596ec26f90e96dcf4538ce0
SHA105a0893f700401450695b5c8c35af9940ba27df0
SHA256baf10adab42eb93c305daec05ce5e2aa361623c3ad0ab748ea9c8602e0251c55
SHA512af5c271154e22c7b1ac97176a61aa4d736f8e7a6e7512ab43275a2c45c32f9088243a46b1b461dd78f143bdcf6f6af16e070476987c44820c288be6ec8f001a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544b78e333c18818c47dbdbeabb71c74a
SHA166add7f94aff6cd689919eabaca19e0b50f7c32c
SHA2565384f924329babe40513684b06cf0a546c479cab8ced5a6216e893ceb9364e7d
SHA5127eb5320c22c03a76a7bbeed3afaf071a8c09ac91433e1062125f4d0178ff70723085c383e5aa9c9c9290f64a0f86a14b9d5c5f75b8bf619e1eb13c07171071d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cae6147df690aa98e843127043cc95d
SHA14b2891998a6712ff4b9a6e2ae2ea523c3e5c76e8
SHA256eb374c0539ddeb6a8ec9fc26cd198cab7976c5fb51b3f4ae3b3d4bc80e9bd29d
SHA5126b05cdb7238e0458d6d3c40732fdac5af4182e5ec7bd36fc0e6ae7eea1b0edb61f3212b7e0793625869804f953e2a993e0577442fad70c400129879d3f393508
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d4128c44aeffc075527439dab62bb1a
SHA15c42dc8d0626778b18e64ef56f368ecbba51f595
SHA2566321f5698a64a275d377dd0b94c9eef9602682ee3565296f013ac8051447a756
SHA5128017e227f6af0620db4a7d1a42e39f4062af8a13243ca7b1ce480f752c539e4ba455be1479bfff9dabc87ef7ee88a25bb18170b7519eb3cb509971eca8854d3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502fd2e3730bc7af297ce429d879386b6
SHA10844826834cd9e551aa9ae0dd6f6791c8243c367
SHA256967becaf3867d70356ab44b75b9635890cadbc856f3539adb72caa1737f68f9e
SHA512a826f6071fa8f519f647228ec8b58a3581d7809c8daebc5031817ac05ab5699c12fb2890801f81714004ce10ed550fcc47d27777899cd2472127d8feae1f223b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a