Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 06:06
Static task
static1
Behavioral task
behavioral1
Sample
49b9323a6418cf0a37c4723c5152897d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
49b9323a6418cf0a37c4723c5152897d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
49b9323a6418cf0a37c4723c5152897d_JaffaCakes118.html
-
Size
460KB
-
MD5
49b9323a6418cf0a37c4723c5152897d
-
SHA1
9bdcb8d8fbf1b6e56b9a9ab68bcfc7403acca681
-
SHA256
54a7c71000c08359efbecf620c98a9a8198abaf3ceed233f100cb509b2f0ec72
-
SHA512
6c8363daa8054445d249b11bb8b95bf35d79ba94373c85c9307fa89ba6f4a6219dc4189b0efba66b5abb9fa6b6d34429419818bb7dccf4357189998ade81cddf
-
SSDEEP
6144:S0sMYod+X3oI+YfsMYod+X3oI+Y+sMYod+X3oI+YLsMYod+X3oI+YQ:l5d+X3R5d+X3K5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 203aa53e57a7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422001440" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{661766A1-134A-11EF-8C93-DEECE6B0C1A4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000c35235b7d7067e64da7b1a876e9bc7671bfc297d6454f6445f05625cd05a4ccb000000000e80000000020000200000008fe550322d4143b066378324f64f6ffb23b8424e895835edbe522555a6cca60720000000395239ec297fa97cf1324fd722e957694a18772527181cf99b9da6ce4e7a64ad400000003a68fa9decdb916f65f49fb581ba8ec3efb98ea28456bd4b49ea46c377b2bb748a69189dd0fccaa7dfec74857dac0d7fc1703693381f1d494fb50ce04c1841df iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2976 iexplore.exe 2976 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2976 wrote to memory of 3024 2976 iexplore.exe 28 PID 2976 wrote to memory of 3024 2976 iexplore.exe 28 PID 2976 wrote to memory of 3024 2976 iexplore.exe 28 PID 2976 wrote to memory of 3024 2976 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\49b9323a6418cf0a37c4723c5152897d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bd65245ae2ad0fd0e09c61bcf6e60538
SHA1c224df6ac80d1fb5cfae86795f3cc1455555ebc4
SHA256a472266b5f5268abf90a21459015b5b4d83d52569139ce3c183e55870f998127
SHA51262ad61b34dd5a2b50e39995b465514377e4daacdeee7fa610478fd5effa008cc8abb99e29c418ea486c6cb479fac6f31f8d5c5e785f16a927b9b5f5857c6a4e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD550b4945b8857cc472b443179e33e0a32
SHA1791fc7a3e8db017aa274e09518913d7d967db856
SHA2568a1695d7a777214b5adcf88866c37ebd92a0dff7cf3afcffc76c5e4a781df2de
SHA5128eae0467113adae63a3925477b3dc1d31dabaa7eac7cb42ebff902411ad90603daa137ab22e0d2e8979668417a3a71b07586802e395178d522ebf2369060ac65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544c31721aadc288f2bbb0ee32d817b9b
SHA176ca498d3f528fb7b1c8a93c2268c3da170e8c80
SHA2566d60830e2840f98609235d84463d5c9ba5cac6b4e64985764a0f36bccedd001a
SHA5128a97f6864c7bf1b903a11742e8f2a9aaee88d235e3b8d19fd66a6ea9d2d0016b64da6ea8f1008dd53ce1842d1f69ff55bf9ae1c5709c5846523b8b0cadc84f10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf6f7c5726ce1951796f97ae7b3e4807
SHA1168538d7a454726678b581cc211fd5f8d41a3303
SHA256c437e5a9bfb0fb8ebb88a2d32a56626d6e2a6e30cbfd108062e1115c4eaa056d
SHA51291b2612a1531ac1c5a6b77dfb7b8d2974abf2f37b0e744820b8e514171b2b7c28762f56b6935146d1219c78890c65ea89840c231382b6d15a6536e197a25891b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bc0e73e9e729bc3a2fba2140b875741
SHA197f776887191814db742b8dccc21900f4b6cf027
SHA2568ad9fc2e6e1f87c36f63c068796349a8dc43d877d7b59881b9f160bf4aaf23e6
SHA512fb5a0c3b1ad3ba80f4d673264c7d2190af1d1e644b15f6a94e597388e28b8986f1b95399b1d5816c64f3a8ce97e7a0872a9a2a9140ff48048ba0ec09b78e69f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531b28ce3692ae63fbae8d7441402b2d1
SHA1cfb08dc49f60dde5449648f4f1b8b70af013f9f4
SHA256235e26151432e14d23cfe452ef444172c6746a5ae12675be703d0f619e385a2c
SHA5125b0cbe22c76abb669f476bc2c88b870eabe8841e55b6f18a0450c19aa51079dea54166cc598bd8d085518bd6b16a022c02026a7f6256e64eb45bdb4b6360fdb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e4d8c6a5e01a72d6229dcbbf0bdfe02
SHA18b221f4a63173fa05adb25dd10d5c2ddd4066791
SHA2565a30265d59dad73c9ad3439edd7db2508317c285c1d6f36f42a97a89d9dfc668
SHA512d66dd706474f1cef4b7184fdfc7391aef353b9120829c0f1cbb4703a889d10d6f722da0032e2cc7b4576cd9c790209ed34030c1488b8ff9e7b144ad95ba06a3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5614f42214e4866654268135f69e7b7d4
SHA102cfc894749ed7e751cc04fce066bd674567e076
SHA256ca4ea7bc36da2b93ebb4f80d370b8c8113f184aec3c6b79f0d5befb571f38033
SHA5128efee45247d34b44f785ddea1d0648eeb42cde1c15edcc17233fc4d98181a231131ddc5a66ebd945db9ce070d4b2ef48b9235075445d43df84cac38373c5b867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51227a3a4032f89f20260112b97be0887
SHA1502897cec478562cef6a0059d72efbc3bc83a696
SHA2564bb8bd347e7118e98abaacd8c77a86c7190763d7ea23c05d1bcc004696c55f90
SHA512676983a00d906117ca52ff654b6e814391cedf2613c2b3ffce3d2c4b700aa137df118adc7de4ac7b1b48176e9d5f082b38390018cbd04010dff3abae3396d1fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59255a60163c94c387bc77b26d5cbc786
SHA10022a781ec1514e95c6f75687187c0592cb739c4
SHA2561ad61ad19b6b8de1c99cbd0971c05495d32521d4cb63c49f7029bb6e6eb0007a
SHA51244c5f66a8016c48733b7642eb6431146c68aca02f4c5266ae5c89e8474167b5a213d12474008e77f95b812323fed1ab0593c1fd2ad542681943db538d9e17504
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4fb01992c2204b37474e9c344869036
SHA1f1c1400acc51762cba23ee3b9bca5e5f23291acd
SHA256edb89d1520ad41d68f5bb9f5ccc06bd66c86693bdd19c8d950c5849f50578cf4
SHA51231f95a34178271ebcd608bfd9087a0cbf089cabe98a81db96b8235a11d631083a19a87a8212a55f0bddd16b613f356a1225a360efba256f4743b7de790508517
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa19b93bc7687500adfcfb7cfe719d63
SHA17dd75c6dbe7ae1baa416254eaf75fd31d5cf9388
SHA2567cc09af0bcf0143a704fbca1b54075c8276da3c8cf5a64f3206b82c3b598eaa5
SHA5125640b378358721e314c42b0d699d08c81c9c055800950ec157a971b97f5104b03819c617e9290e22a36a84575b4a316a7c58257d3a8a7dcce491847ba86a9dfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c694e1321b94b85d8df137e997cb5822
SHA143329714dcb01c5ad2f3818e919e2f97339d6502
SHA256b97c51d29c0bd302c247b4282ffff270224d0b28447d96337597e14256f28bf6
SHA5127ef06f82bb2d45248cd0a51579501d6f02c126c0324fdf6c8b3b779753a7d108664773526609beb4420a317c55feb131d2bb1c228d4802c7d8a6c2cbf290f607
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592949fe37a1de4c43cf9006b1a944cdc
SHA1bd496d1d850aea0fe2d3e4d65a56dc7950782ff2
SHA2560cbd2a683144513442558a49ee16b5ab3bb0171357084d318f76f5d11a560e3e
SHA512044ffe118e7f0d27bb8681064522c93de15bce4d6c97fd132840f6a5015ba027d1b05aa5603f83a6c63806db43c0fa60efbbddb38c06608c9e44cc673d4293ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588a8a488e568cdb7cf07a05ec0ff51bc
SHA1303c7f67f3af9e6e9e348a3c9a1033ac0acde8cc
SHA256793019da461dd14d3eac0ff1c4aae52c339066251b921ce38e331ab31ecca806
SHA512054987940e986109a0d6229b416fd4616d3add40363d24d81ebbd27a6c4896f434e056cf301a230917de08f9671df0590d4164f649e8c9791c58a974532a9eaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD589d0a6ee3f03e6f4d71dc65610461ce2
SHA1a0c0a36c5c52e199cce1adfbc9a6f57721028a6c
SHA256b51305d31580ed5b9819c8c06c1c8b91bc26b31d138759307e6980c1f5d638c8
SHA51206229d89b70a537e0615c3f896610a57424f6a24eed15c371deaf073d15cf79cf85ca7ecb3f835057097435568577c68a8089f008f4b2422ae81e69edc0623fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56119a6995be4d3d88618a4dbec0cfa71
SHA1ae7630fa945c16c648951bf2262df639ddc6bcd6
SHA2566f4bb93f1303f066b545d4cb6007ae944e727960c7c5814540878fe7a1598b22
SHA5125be7d6c008c94b52fb1b78fc9dcb3e18b140540f13038ecc1dd388fe7c7c7b4c4bd53b4f0446246f8cdf26ba602214f16f285ab4846636a290ed9dd832aa2197
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5695650e5236a39adc1ac3a9fa3c536a6
SHA193a2a2ab12be01fa5584ffcfbcc7a168ac40ace2
SHA256841deec1ed8a6e5fbb0fb01e43e3a66d5f4d38c0c646ebe5099c44396ffd0e60
SHA51239194586b9a0024c417d929b32409c22db5a70a43f4e10f5f8ac20ed51d48493678871b542efda5fc72da2e8c6834ed9a6629c085a3c4b664677b3b4aeef086f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0bd4f853e7300503009ce911292a937
SHA19d6cb2823ed1adf92dd3cd42991b26b42b4f4702
SHA25697a1eade2fffb6a452345a597ceea6ecff8189d737d67d3ddda5a64d3108fb14
SHA512730c25731c92402a32ab25136943bfe601ddc6c1469dab2fc09a28e9cacefe3b2df11b6a2f3041746a9384292511e177e9c63001238600fedf597746397b90c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0c5add6fb720accf0f7e3668b93aabe
SHA1e4703fb5012f953c79cf56d5bdc8175c8d261b3b
SHA256eac3304bde76c94ef98894fc25e9ac1c55c5bcbb18a3c7035e84aec5598412b9
SHA512f42ecd3d27315922ddc7345e87e54a143512264f1cfc184e318d5df9b68a3759b08387ef7d2aab750ce6a0bf7ab13ab0c45edd0cdd3a05418cb07146e4374dff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD569d518200b69dbef44d1fb7056b6c976
SHA1a79053996fa708a78e99ec27f3c1afeeb69e6848
SHA256da49333f275ffc97caaaf0da7841273ced4b0420f416edbd8a431e4c47687c30
SHA5123468b7a8884a61d0279556f296dbdfbb2d4e318f1438010954ff45933e1d9e8810295311267c3d087d386541b48d16f3dde22d5733f42a908dc1c2e404c06703
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a