Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 07:39
Static task
static1
Behavioral task
behavioral1
Sample
40b6381dd5c2ab3f7950b8c37f05763d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
40b6381dd5c2ab3f7950b8c37f05763d_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
40b6381dd5c2ab3f7950b8c37f05763d_JaffaCakes118.html
-
Size
156KB
-
MD5
40b6381dd5c2ab3f7950b8c37f05763d
-
SHA1
1cc493ed18dae6b9fc50fcf54ecff9f427eca60b
-
SHA256
78d3e7e58fcc815ae7d152ccab3c19bbb123082732d198f82277fe906bd3db19
-
SHA512
76724cdc69c269cda378ea4d4d88f406209f1d77df86c935932936d569a524e840e36ca4e02c307f545b262e04b582bd31c0cc4dc7c57be92b43ef3dadea19a2
-
SSDEEP
3072:udvPg+rnyyfkMY+BES09JXAnyrZalI+YQ:udvPgI3sMYod+X3oI+YQ
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000a06e5bc454a8edd1d61d06dad1a686001a76a8806f5d434bb0c06c911b4c31dd000000000e8000000002000020000000433fae1b2ce2b3a7038405b37c2d0ec9cf672ed7526070ec753c68d1bcbf427020000000e0e539cf617e1434d4d60f47b08ff18ae0391a1f7ae13d6ec3e11c2cc7b078334000000055b69da9ec391666f4ddf798e8966a22d99b48c592c87a73e5849b26053e35bb58b7052b2cdfc37ded7fb0899d8f2254d6ed8d1b82425183fbb98f58b03bff3a iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421834256" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{24138801-11C5-11EF-8745-52ADCDCA366E} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0e376f8d1a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE 2504 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2504 2240 iexplore.exe 28 PID 2240 wrote to memory of 2504 2240 iexplore.exe 28 PID 2240 wrote to memory of 2504 2240 iexplore.exe 28 PID 2240 wrote to memory of 2504 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40b6381dd5c2ab3f7950b8c37f05763d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2504
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e95eedde17781454ea1c7e99d2d60379
SHA1fe46afa3e118b4545679ab4171b7d247928873f0
SHA256c48c5ed81abace0e7306e385a5db134f4e3a8befc06db5834955291b9f648917
SHA512581fe665bbfefd5c59f11d272d78514d25a84b4dac3d6fb54af1ba3921539424092b32375c7efa76698973f6453d8c929198f7381fdb9f953fb977308bc779f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599394cd2d8e6c7b3a0ccf6fc6f0e5061
SHA1a804702e934c6663e3a0be68eef57a2a7ec1ff44
SHA256067a67ad9e65de48781956e1399d236b16bbde44395c6bf45712a496c94ea915
SHA512e5ca78d17e5437fa1d5c2d6b50c15f1b19e811ba4b138fe5ea4e7332d32e1a07997232466128f3a0779b5369a76c108495aa50d099e0d16e76e0486fb152caec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52da42079a2ab1792fed7da22012536b5
SHA15884799821cfe191249d7cb0d5d5a6279be5d622
SHA256dc3233e2903576c666b7a97c69ed3b1f60e7fafa74963416ef23f522d6e3748a
SHA512e7ba98ed708fb23502eed49ca4586c71cea133a50b6031e369048f1f877a45194680fa70614130be6e6c76030e4b5b6a70ef5b1999d8f337fdb8aa14bd366365
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebd7711c884149f34f8378129dc3cb34
SHA1583b2f993b249f5abb7856175a7b7b309dd060c8
SHA256a21f8d56c6cb01cb23e9572ec829a2115e27f98ef44ebfd7d1bd5be65ab738a5
SHA512e447eb44691602a1c06a3f4c6db963fa1b87da61b6ed8424b457b41c3239fa7e785a2a702b171878139bcca369618e042d48fad91bd075d44363ffa42378c506
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ea6acae4d2df86fd89ad8a215a779c2
SHA14f08339428fce51a00091ce30fbddd343540fe17
SHA2569498cbf788174bafb30e9307b2031ea8d2d0b6e10fba8c116423b479255562d3
SHA51226f513ba9ed8191ddd67273dd27a7c4d04313fa530c1345c2de8fbb23e29f356ec2bf4130090f01fb054f242e8e7ffceaf8f74478a55c0b17e78da701ea03ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ef768092855fd3a97346206d97d8688f
SHA1c8fbbc92c042683d109428eba74f63db1e691bd6
SHA2561b7915c330e4a13f1baec80fed18d10e9cd0d23d1aeffc4ede2b4dfe3e178158
SHA512a957b963755494c69446af471d5fca1a8f43a77e0091a4f6d9a0b7de32a546997251d09306521792c6474a9dba8f1677c50357b7693abc8bc531438f5b4f4bb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5227ce98f6cf5e251010d917dd0db3a19
SHA1b601ee6879e74b2006d2432ab9e309ea520a3dc7
SHA256d2b4f384991ede09905754cac51a633bcc382fa51dcf8744a5a2a5ae4f77f479
SHA512ac5f9adb9f419830d9c951295cfd9871a4a18465cdfc3edc30f3b9de84deed9951c1214d4ad633ea92a39c27b4ec9e3082e47d16d16ee285c9597f0dfaf84769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5822d437c6789149d3a6c07a27427e721
SHA1b8fd2d109114b1263aa273fb005b0b72156cb1da
SHA256a5499c492d8d6229def8603db3abb9ce88b8dfbd5ba9dd26bbff041166ac434a
SHA51244355038cb74f29561a918d6e792936ade20ecb7610cbf6b7cd7ceb4f49595d4ec21d9f8de77d4c376a254f7bc99d5c36d7379297948b6ed8475f29d6c4da59c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f6a40d739741bc5dc6658d6867fafad
SHA17a04355f4984c61e50e7260bbc6a293c2b613077
SHA256a1bbe39b361dae873735e32a5be530ae82af020c44485cc0271df63b16d4d139
SHA51234acd2c3c18148f222c012017346b84b752e2bf873a7da31fbcc200cc47f7c151d9a131f6549f7627a43ffb0fd1bd81eb0f4a8d5ce13702605fe46a29ed415dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f46c384ae588e58abb6c91a2b60357f5
SHA12241d5597d90daa68918217631e75c22e4d09bda
SHA256087185c7f3b914fbf4c3612bc019e6e0c0c25e5bfebd61248da449adb9cdc147
SHA51228a653dbfc6f7e59226e5ef00caffe730479d03148e931c018272a74fd73f25221c476ab21ca9cb20adc4d8471ed0ff6f2d4cd6566547c97b421879dc0ce5771
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c12de2601661914ac502bcb9eaca34c
SHA12c1888b6c3c0a14adaae6ce27cbfe69d69bf0f88
SHA25655f294a3e66add1e3df50a8887a7c9fe5fff813db5b3b28c547154830478aab1
SHA512c46951e5e2f9add8994b51494872e93524598aa419a14d97c0e5950ceb0c3d3cf11c71db8dd610043bd2f4d4445a685bdf325d004c360b1e0362946d933033f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b56ee112cb41f43844b55a2736097958
SHA17b6992b81955f1d1c75ac4cc6ea3921ce86d04b4
SHA256c78879bd737a73f2cd9a271f35299f021ffc0e2dc50aa8ad7133f6550c8bfdf6
SHA512ce94ac842ca1dd8ed562337a320fa6ee4b98f9610d38dfe0cad1ea3c9c4d0748ab03ca41a01eccd924bc7db3097953e6bf60ef6e2aed4806f06c1acd4457d891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d75d9450f35f9655705af02287fbdebe
SHA13b48d2ef74fee0ff5730a5a8af094807c87d189b
SHA256095f80febe1147a2e46ddf4f286bf075daa0bc70e129f796887cba999a0bd580
SHA512c26e77e590e651affc3f171d262e9cf6e6bea08c45db0cfcd07ce685f5a9789386a69b93198e6268fa2fcbe66475c429d3d0edb764ce464e696d26f2b29c473a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50107dfab27f118e1c814e27c16bcc332
SHA1026bfa10bcdc3f9f4c8aa4a33406eab69f9c9187
SHA256d5adbb6b61e798e22a7ee31e1e4c04e9594bc60fe349cd89d6399f73700dfcc5
SHA51270e30bac4153e7073b542a96eb013e8c8e87c87d37487b97a72b78dcf01d0f23d40bca7b0691046274705eb5e04b633d97f61956f0ad596de345e9749365c79a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ee993ab9a13aa2cd549993b2f438d54
SHA1dde611f6fad53c8a23b0d89fdf056d072ebe29c9
SHA25627285ce88a259514d9dd70c46997efc007faf0883f7e2a377356b49079023734
SHA51205017097bae7f836bcfc2931c9c66126f99c2eef88e0ce7494d0c26b988a9fecd9116af2ac9b86b4cdab2d6841d388475420099fb309b210b485ad00110bae2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f379d6bb13c7a9e471de9eab7bb4902
SHA1b54d5fac2726aa8132370d9307c8a00f5909f33c
SHA25668a8a0388a099065f52276ac471bedd9b3749e8adbf96182635fc991ea944d1e
SHA5122884bbdd69d9fa1138ca5e9fd5f8d367939ad52b035c98a804ba8fda884a4b6aae32bc054c6c894d093c37627c4d1f06c155b5312085925fcb3dedae4d126189
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5014a7c4a185c995ea9f1aba6204435ca
SHA134a45b33d1963c0e92aca9c3c9d85f626084eb28
SHA25612e5cc3acf3d09d2995d728b8c908943ca68b206965beda3bf4bb215ab72b3ea
SHA512c66cbabbdaddeb1da5b840fee42df9e7a8404dd34754179ad3e4e6160a4efa9f051b1da6cee87140660886b7bf990c66ec1a0b05dd896855958eddbf4eaeeacf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57fcd73b13f5aa15635b2f74636470acf
SHA1a30ec6ad448bc3c966606c76ed11fb81ed3513c7
SHA256197e2b6dcd5b1892bdd1a7a089a6475c3845bcfd54e9bbc5e158af9149f64e9d
SHA512c457bcc076a6520fcda14f7b08a3f2ca9eee2f36597e89ce15792d311d212e447bc92854e7dc98bc175e307ca02923a736b0f6cbb691c42cc5effc4aba6a86fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f289d1df7bdf5645ac85161da8e06ef
SHA131ee52a5bdd92da814cbac58b1320adaea3ebc1f
SHA25687917ba9d3c398dacbfd6de2a4a429c397a9f4396a1dc4d9ee2d26f9aaaf4ef3
SHA51276543bd689ee71ad02c01ba185119095960e41efca7ae5ffa98d0ac0d91b2076baff6e729f95078ab59ee7b35e18b68ead2463290f770510373194ae9000db1b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPR7YYBV\hot_head[1].htm
Filesize1KB
MD52d287b3334bbed7090d84a60fd9c6634
SHA18c660eaca037ff7f010b21d1ac3df617aa0d1b43
SHA25635da6cd8a7624a793e905747e0901e18b50f8fb7f899672eed54c9e3bdc5f14a
SHA51255602bfd264feecf8cedf6c15464d068bd620a739d44ec263bd6a8f48752af2bc6b0dd9dccc5cc5bd53c7b3fdddf351b381781ffc9d4455a0dbf6b78742ebcc9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a