Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:21
Static task
static1
Behavioral task
behavioral1
Sample
68808b820c801754d26d7ee540918f6f_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
68808b820c801754d26d7ee540918f6f_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68808b820c801754d26d7ee540918f6f_JaffaCakes118.html
-
Size
128KB
-
MD5
68808b820c801754d26d7ee540918f6f
-
SHA1
9c5d14b887346f90a23fd6dca985c9dbb6abc7d2
-
SHA256
04554f9aae3ca5242645b460f74e41b24b1aa7a7959c2e9047edbff7afb14114
-
SHA512
163c40f4fbae99b095733ed3d23480064146473c5a12d141d942c55dbe87da5b514c5d836c80b7062de675a77f132a6ed3c450c9e4b6c94f1e949ef439dbc865
-
SSDEEP
3072:ndM1sDuHI0YW+Mkq5JaPRwM1sDuHI0YW+MR7rfHe/qISsLjf9Yg78:aMtrPe/M
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EECB74E1-1878-11EF-9907-E698D2733004} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007af6e72331d7a443ae98f6db9d9af85200000000020000000000106600000001000020000000db6bf4fe9f9e841f4a519464c996208e15150be1f9d792922e76ea43f9d842ad000000000e8000000002000020000000c26a9a48238e37241b35c095287e91683333a81ff79ff748d29127564016a28c90000000c2ab0fa6604226ec19a82ee7ec96700607aa6d7d072f2f8a66725607fceb4ee1e968a950c9e8d6c67121a14e2ebb67d5bc6a8556ff7cb27ad309ac36b3ee92eec00c7ca0ea276979adc3fef1ddf25727b5fd2c97c0ff76d1b83f649a86efee6e9eb23e0798b68c5ab5f2843e8f79d3c85ad0d55c3b74a82f2905fc3f3eb4fad03c8c4b44376c1fd9f1b762c63a125e694000000066e9535d26f1ec57d69c7271f20eb5b28570b68f15909b9ff537790ba11c960f2739924e482c78bf0ad99014294bb056093b9b032df5393e44e57ee242b3f67e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422571196" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007af6e72331d7a443ae98f6db9d9af85200000000020000000000106600000001000020000000480dee223b6098ab24d5a16e075db009cfaf2ab9bea7e476bf9834d00cacb5da000000000e800000000200002000000053c6d087e8616c265c11b0edc02c606fd4f8ffc00b62f8edff0a0f74c691d7e3200000005bda39e26284e64b24c57a3682fc2464eb289dcefc73289493af512c0091b79d400000005dda6da3d9bc8ffb1d9d02b33dc866c235a4a16f132aa2387bece928b6c1448ac9facd6c5201e654d942a3e7aa93ea4c36c05034301796346809b8fc9eeff1aa iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0fc3dc685acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1624 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1624 iexplore.exe 1624 iexplore.exe 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1624 wrote to memory of 2448 1624 iexplore.exe IEXPLORE.EXE PID 1624 wrote to memory of 2448 1624 iexplore.exe IEXPLORE.EXE PID 1624 wrote to memory of 2448 1624 iexplore.exe IEXPLORE.EXE PID 1624 wrote to memory of 2448 1624 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68808b820c801754d26d7ee540918f6f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1624 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD561d08d48d23a0b84c2f23ef308326376
SHA1f6949e58481ce8b9134119ac620548f0d9440a77
SHA256f2e8c5cbd4312a970c8b4edcafe38ed76c2730065c37fa06714fd64fd958bfe7
SHA51210c3cc0c43caa68218331a2853e2672644a6a29f099f1a0f3eaf82dee01c54e21a4c00b3a5bf4c649fcdf29fed5cd8765bad589ede96d2a74ce6549dcadd085f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD54db89ecb87d161fb7625dccf950f3ae4
SHA19735dfc0a2e959b605f8d69946440ba8c97b8c34
SHA256b335ed5be031a3c7c83538be17025dcdfd989f81c7afccaed6210bc559f869ad
SHA5125c435ccaac9739d3d36a2d0b2b586350de8d9c3610619979cf38a10cbcc775719555f1533e39601db9f6b16859c095df5e1baafae22bafdd82d1d18f54858755
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567e677dcddb7cc81688d6960843094b3
SHA12e99aac04a2735fe97b98566c8c0ca7fc77b6f79
SHA25608a8cbf9a1388c70b807599eadb3ff18e68bd0e137547b9cc819611844bbe04d
SHA512cea0ec0a6ed144e724437fe48843ab089e0c1737cb322f18c9b2fec3f4635fbb47901aa10742b67de51b719ed5f73f25b9420100b04207d13f7f8307b0392d89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524d767ab075e78cfd5f4bb8055b1431f
SHA12cb126ade8e36c7ca42a6c96697aeec75e189e65
SHA2564dff5b13650e79b910ef28e2f4ba04bb0980c415ca08a4b15da619f08c96819a
SHA512fd6f037c721360285f21fd7fa8cc6be8ce3f1d0cb1fe9d18e1c5290af408e6ca21d537202530df96543555d00cad5118c9188435b60b88be7ac8a44b1cbe4c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51872733bba5900e349ad1416864cde41
SHA16a0ee8cc82f85d0a84c62f8fd2dbb91cd45bfadf
SHA2567f037f03160b86daf8d3fad6d55c62437df81dd29bb48bf953cfb38fc26c19a8
SHA512fcaf634950971ac792334a0c53f490a39327a45688019a4de9137cb7e93c57e3993e2eaad906174891d321dba73dac10a03acbe66dc78ce43658b505343ad05b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501d0970d11faf09802152aa0da21e6b8
SHA18ff6fd208804e44d9bf0f3ac86e9ff693af55999
SHA256c6b1da41d7f61a99d26e4371eaefffecc9a71f6b70cf7e4f76cee9dcf0ecc019
SHA512af89be559d018a7c5127d955eb37b8163d9b99d6d5ffba8f3b412be3ed809579be77be3bb20fc99de893ebc081bd6a5094bdf0acaa8dda6000b85397dac86282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f38a1b1d5e4d64bb8e0b6889b5c7d64
SHA15ec46f728e947245ed1c36e3a2b253b27a5e87fb
SHA256a7825fa64a8b428191d55330f8b5b4c0cfdeeedc7a86da6c878868744e2a21bb
SHA512caf07888656e0d02da3f4a1eb5699786e9f69b9e51656da647bb3513ab99303af4e198052b15d304fc5dfa5b21fb7b6bf4d717180ea399a1af5ed94497a66949
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55db7e34c88d2dedf7d00c0bb129453ae
SHA15c68b3d1b565ab2e95a0362b01dbb0b94f6b23a5
SHA256ad5c56ad52bf9142cdb6399a2c3a54157b8c8b429b8cf3daa49f9470f82d4d76
SHA512c1983fca53e143dc6e6a63166082313fe179082f74811f70e22e6a6c7b96cf5cfe1bc83016a8984bece6a24ce085e52dcba1bc4a1c4a3fe33e124307fbd45518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca1e36e080b0ba7c87b511cc52511951
SHA16a5f47ad0a4a27b63420601f99f3384b08ab6835
SHA256b9972b2a4b9437d4dd00e99928b1f338e89c7fcc23fced7ba8b03c3b71c1cde6
SHA51263c5a6f84ee8d085bd557d3e0a07dbebec8f03c84dcf7758ac78442a1c67356928e6eb15f5cda671c501f851beab42df9818457ee12c4a3d933eb29d7ec2645c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b8fc3b676b095dfc41c54a9b9865619
SHA1a9d3143aa9cb5326087f205a3f2ee171c0efda1b
SHA2566acdf0064e7b6d166b81c56b2642b748b6830b1cd62a1b796edb7b533fac29e2
SHA512fa5eb586478ec285839585c621a3e7e650c22a7698ecbf314a9b44bf0e8bddc8a1eab89a9be9ee80c80b94da052791bb7744ea64443f861adb354c3278cc375d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a235f70dea052d61c0a5a317c3596fde
SHA18e0393594904dafa47c3642d6244de3b8c646167
SHA25634c88d9cb97bd2ea9d6b7be89f94846f5c3f0ce2f867d2ea98db3c4774b38f82
SHA5121b784bf8d5b0240f6aecc87ebec3849f3709bbf25c8ffb10d39fd3bc447a40ddf493b4ae6d1d7a67ac61ac99240480bf647a52d11fe07f5896c115bb7f0d996a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5a3faef6421eaebb7b1f522274bc73f12
SHA17bd4cb517c3b0a97c67cde76b7384254d74d6c47
SHA256807df6e1e4b2342ad6fdbbbbbe6e3860e7fbe68608f4401d913b8acf99c1fdb2
SHA51284cb22d930f9a8b1a949d9f0e2ead350167f81c2f07c33592f93fbcad84f5167e152a0dee5ca891abbee7e6b267611ec24c5f7335e0d5a2fcb386f3f11b8d9a6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\673IEUYT\style.min[1].css
Filesize28KB
MD5375bd65d60ff3c8723fccc343afb1b9b
SHA1b06ba18a307bdf4821dded9ebffd2489f7b01d6a
SHA2564b8fe5c3d0e5ef7a6582185cbf5c535b5d369c8df1da98c03ed69833e55f474d
SHA512938011c747f4f036d7662907b388c5985d1c3200145303e646437b143a9dafcad9f5f7431492bbeccb755916e0a8843c0a2f49a3599be8ff51bc5eb2c648426a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\902LKC6A\online[1].js
Filesize53B
MD587c0cf0cb04d6020f668576baee6bc13
SHA126c797eeab291dd8314ce3d861c595cb42456b38
SHA25636ad7a1a095a91cb9ecd87caae5f7b323c73a889f9621f6d42a56f6d1aa001c3
SHA512f132f5859b29b7991986b7e1439f4ae5e9eeb598bfd757c1fed9dadc0c3eccb866fabc99f713462d7fae7e621774d4ceb76138103e0cf9ae58474ad061cb4559
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IFGNZ1XG\styles[1].css
Filesize1KB
MD55ad1cfa3f5175f627385651790ed0bbd
SHA17a06ac744a748ce4c315c798614d6d0068596cc4
SHA2563ad2fcb328295f1199d593adaba909f3eea790f695554ac3c1da7aa009fc0e0d
SHA512f0c71bf18544fbb076b8c23fc147d824a2f7455241a2844e6acf215a95759d98f70a73241d46734aa7c06500e962657ceda392e7d5c7338b5c610f110c6c7ee1
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a