Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 02:33
Static task
static1
Behavioral task
behavioral1
Sample
65b498e79911794ab9267fb8ed46327f_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
65b498e79911794ab9267fb8ed46327f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65b498e79911794ab9267fb8ed46327f_JaffaCakes118.html
-
Size
24KB
-
MD5
65b498e79911794ab9267fb8ed46327f
-
SHA1
fe4977b1af91c8c2f2e26d208ebc4822ef28f2bb
-
SHA256
1aea22f1d44c6dff0621741a2e1655e20f0c42b27fe642f9991e467db34f61e7
-
SHA512
b91c98e1c270e358233798726bf3142d98b17f49a0fbda38227ad23db5f5add88772e142bf62be708da55609f2c5a9e8a914a7e4c54a03d4b599b3fedf9973ca
-
SSDEEP
768:09fA6dt54+leyLgRAviTwgd8yrDuBjHhXQeZvU/:04qa+LSObm8Iad9vZvo
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422507062" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002cebeac447120f4d9a58311d42eaa01500000000020000000000106600000001000020000000469e7d1cd4fa8e108f48831f3f7eda510be99cf09158782976ef5659f815eaf6000000000e800000000200002000000055587e8f4b7117f09883de19525a428f34641069bd0ff377fdef9a5b114fed16200000006ff38dcedf48c7090604185e35f979379220049ada161868573c55c8133638df40000000263a9455f2d0caa2dddfb84a4bfd1d71485a97c63c47c6194eb3653d98bb710d701b5ece3dd79959bd4fe8e74f5179a9603f498760bc8b46cf45d0a0c7d77188 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A3AEE591-17E3-11EF-A41C-62A1B34EBED1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0962378f0abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2084 iexplore.exe 2084 iexplore.exe 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE 2540 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2084 wrote to memory of 2540 2084 iexplore.exe IEXPLORE.EXE PID 2084 wrote to memory of 2540 2084 iexplore.exe IEXPLORE.EXE PID 2084 wrote to memory of 2540 2084 iexplore.exe IEXPLORE.EXE PID 2084 wrote to memory of 2540 2084 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65b498e79911794ab9267fb8ed46327f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5646e7b4011f5454bbd2e74ac533b7569
SHA13f9661f9c319779c51463c797cc5fb7ce5ed8433
SHA2563d0a94c5f00c81ba267e5929c7abb844dc046e5a460ae4f393d4c8e729bf906e
SHA51268ec7a64e5b50d91ad62e6e733f8418f89ff1a9d8918643e528f61eb296408260b35b1686edb4ba46361408d0ae3dcfa5a1008a01e34ea6a2f0717f440141cd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e18c1badd3afc82bab1dc37fe09c653f
SHA16630e9177ce201bfc5e45a35c861194bb0fc0b85
SHA25682b21d8ad9d051b59b214c8db11f68d8aedffdc80799cebaa892af7fe62f50d1
SHA5127e3ac0b8a13f77d4b446309bc473f1fe1342f986cde5429a7e54991410301e9bf426ea3dde304fcdc428e855931ce3416d2d5bfcb0cf4312b7cb965e276904d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59260ff292997c1388eb72a3e9d188892
SHA1d04f129a393faa731eaa789a70be235f51fea334
SHA2568f1a7a70430f83b9d59e6db99d1a8cd36403a9988903cb433160c80de31b9f0d
SHA512cca11870116277052a1fbd87ae07a728784785d9a6abee7eaa71ed40027e15ae0ef315185729bbca0397a9dad7603d67be1b1b38e894b626c002f78c2c1c0529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2cbdc1c7d276cfae3f203f91aafb442
SHA155f156dda55bcd0208c14642fc9ba7ee930bf3a0
SHA2565fccd6cb89a91f736086e9278d5e636aa00d92c74b1e99782b7a655222fbcde1
SHA512805f5451e9a965eba192a68dcea623b97872854afe8eed5550aa4a76d8f03e309e6e79afab0ef0cfc2710153bddd6c0cb88df3ad79ae2091668c5aa48583e9c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521a31705f62f6570d23b8b712d10c247
SHA19acbb776a119ae549e1344d0197e68a2a42e9413
SHA256ab5907364845a146a6cfc69c14dacb93587d6a78bb55ebe4f5262c69e3c66bf4
SHA512dc16ee8ef050f6f2533f012a386832fa30f0753af09fe916adf165de65a3356da8d8d800ccf0cd22211c0e0710a8dba536cdd52df72608aedd96edf2053552a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598cb2b2d7e0c723df653416def01a3ed
SHA1edbbd6ff842a653b9c88dc5b8c8486b8d6aefe6d
SHA2566f277350f17af7fa0b1eb1f990d529515432c1353b23eea2df6ac9193c598a91
SHA5123b988e9a94d8b30b4ba1d0e372e86b5353849d9fc750a1e34345bc411725724df62b2d84cedf2d576789cd89dbf6c7145600872c800253c01266788b6384317a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b5b86939fcb5fbca7710a5eea184d66
SHA19a3477994c7ccedb7a8c5c071b7a868afeacbbfd
SHA2565ddf12176ae4adf5c756f000183ce33855bb85edcac8f29ea9e7049a9a409ec1
SHA512e79837b71ac3e9d752426c4802ee8192e4b8b5f91958b04b3753a3f3fa567155d8b1bc488b465328126bfad148857e4444f7fe784491e56d3d77a5850566260c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502c3da166661da2374a9a16cf2f2b19d
SHA11d94bad6c59279160c484dbcb7f8962e50d3d23d
SHA256fde716cf94487e40f00786ee9985574f59018d8b4c7bdd636ef32b1e81e914b9
SHA512f9218ca5fef5b51221681d3cead350e5f0872215db60c72598f4043b88619104c755fcb25b82872f4022947b6e77c4363aab3e81fed62700e33e63d780e4da10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57cc57166d2f4a3476ef66b961c324a6a
SHA1493e32e500e17d348c3fa5a0aae75e6d4f0a7490
SHA256b636b4bd637542823f41e0408533149134de6dfa4e052d872b8f869038935100
SHA512465ee503bd839b99eb82f7f19d538f6b90f00a361f02a206f1e4248be716b8e78702403770bfa80acc989b25e1e90f9c5c13ce5399a0cd44d41063db875625a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e0f5abb0eac80a08aea2264a395bfe8
SHA168b0310f774b5462f8d1487a1b77833222e9cb01
SHA2569a713d769acd12335a443d6ea7f9b9d4a86328388c578f1147ff230f4db1ff52
SHA512941b68f36ca34e36ffbcb6b6b5657da6385c3d7fa52d69ff48325ceb7a014c47b1686e8933734cb93b657c371a8675eb07174a463d1788dda5cc6bbf5d608e5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574ba945a33b9bd539b25809f307c1454
SHA1f21f7fd97646866929aab972be0822a7f89623a9
SHA25662b57bcd4d7808eab8791e03ec33b121d2a4d39d1ed72b13b0af98bb615bc4fa
SHA512905eec9b3c2b772b0440dc2bab2c7872d7caeb446dc7b3453bb54922e72ca4a46c79f0eb2619f84341a5d3561d39efe447dd55cbdba4d220743b4d334857b966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5758f358fd1eef2c158bc810e90b76751
SHA191226a143f1d9522b240d2bdeaabaa2989820fb3
SHA256081de972b3944773c7764f136a9ede31ba9cd9cecbb1e068a96ef4bbda2320ea
SHA5122f93119150dd212604ec41f00e6911f271ad53374ac625c2f4f95889dff95b3af76b4198c9b2aca1adfc348cce322ba790ec2ccf6f087cd9f4f71362d011c7fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c0d8dded6de5de4385696ef5dd50923
SHA1123b997f12b36df05c0ab4fdf1aae37db5eee65b
SHA256239e04d393f5e15faa4017741665d2a3752ba18295921c0baf1c950f08dad07e
SHA51208628a7865dad671ba271b3baf10b857efde9b1306bd2eb58e6269cd25c218bdd629b37feada608625668c2b764f01840ba3b316810bd58ee1a771f63392f7c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580b522033c3941b0117efa0e5cf0c273
SHA1730e70f189b5f4ad29e9e281084ca1376c915247
SHA2564fb5bc58716a1e4726d150b4ecca97ac8299f197128e55cafeff6518ca7fd57a
SHA5124eb57a7df44125ee5ef7cbe29e4584d75d4bb706b72aec1c0f417f7f894d83c2be0ce8f32b9ceb680ef3a27639a16340d4ce35b546ab9ab2050f7455647cc57b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a23017d95d9c218bb5649116d129bc6c
SHA1d544f91a4d2dd6848eba0a3aa4333a110c1e6fc6
SHA256c7fdef3ee112d1aa1723f990583f6f602848d0f8760dcc6159d05febce432f98
SHA5121e8d6a60b2d222aa30bcc2b37c0a924e895d5cd0819f1f1fd78476bbd698f4ee7a4e49c84ba9a57384b1e6c8dd524fb7443cbb1083c672c88e607da4c85a1567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c20efd9a28b42960be138c5408f544fc
SHA16d6690ef89e5fee03e33ed0d377c100e9e576bdc
SHA2562f64a5c164d0b234f1989d16fe63817fcd8b2083a9fa64e4348d5b7b2f8da710
SHA512017fde748063fbc4ec8a3802dec571d38426a46abc326550cc9304fafc2dc3f5dfb198c38ff00ed4fbf831e90301240428b9d61e863d5f3d7bb6f9afcc9b839f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5810ee8fca0f49e437a184173edfe05fa
SHA122d2bb2002810eb8b6f2b1adfdf06029d1f2b3b7
SHA25688c02f5d1409213ee2952438624232f719e2808bec03b7f5d48f5b97068ca7ce
SHA512221e6afd28570687302b74eedb8f8833357fc6e0d0be31324f63411f4e2e3359661bcf15f76040baa3d8a36b84869bc6fcce7ab8990def6f37656574f416180e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dae27cb86a6e7ebac45c483258d867e
SHA16c83f521da3b63044694e55d77fce3a1f1446199
SHA256a091fcf2ae60b436d0ccc88dbbb4213ca82d3624d57ce1000d510d61ee36eda4
SHA512e2d898c62cb72495c7fd1a030a58e00e8cd86590c4057c5bfb2261419e9767e47de1a409da7de7b624d4d9b1b01775a8200f4bb7b1f240a24ef4627a3444a52f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d41d8f581e537e5f9ac0be92f86fc383
SHA1804984f266afefcf2b35a91e9edf72cb5520f063
SHA25605f2b8e9dba65c1772b561e464b6566bfd418dc43db4777591cab7a5ea3ddb0c
SHA512380efb888d5d702e4da96e9fc0201040d74c47abcb5bd2716a4004e5076a29335979781fa49e1f2e1298c71ca2f8c6f43bc3be8253906fcc161b58291718643d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bdb311503000bfbc9d2f8740f111453
SHA1e94d3bc0be7cad0c5864349d46cef42122d7d374
SHA256f23c877c7d957eb438b4dc38173330892088cd6d826c6e0b8ca7f6d764c6e9c1
SHA512a53ab5b07d486ea45f2cfd2fc5cdfce75cec2c6372293970e26c4dd8f4476b81a732af01bff936018cf90d86515b232e4c48f6c99952121e42f86148015aa135
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a