Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 17:46
Static task
static1
Behavioral task
behavioral1
Sample
7dd4017506ffcfe6ba0ce791e422dd42_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7dd4017506ffcfe6ba0ce791e422dd42_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7dd4017506ffcfe6ba0ce791e422dd42_JaffaCakes118.html
-
Size
461KB
-
MD5
7dd4017506ffcfe6ba0ce791e422dd42
-
SHA1
5bb7342c499eba4f784746fa83cf10512c102406
-
SHA256
795570d670ee14738fb280aea2446c9bd6c70bc47c4e6f644764dba599f5cc3c
-
SHA512
72666f9469af32f530204b5ab10f10b7bf684c8b1f120df7c4a3d8caf67a1a44ed1134829fbd88e989d201ef340183c8d6b1b8a052d05cdd92440d091426c551
-
SSDEEP
6144:SVsMYod+X3oI+YeJ4sMYod+X3oI+YIsMYod+X3oI+YLsMYod+X3oI+YQ:I5d+X3QJG5d+X3A5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 903f5f1727b1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000e734a990ad0a2dd61f05a74b697012fadb5b266c3c7b892f41ae49e6c3bf44d4000000000e8000000002000020000000997cf88b4e13e42eb7291e6a3175a6da2fef7468bd99fcf05722d2567700960090000000f6dff98123bfc05a36af1fb2b81a53431c64415877c38a7c55dd53a7623aa12172b099448c3b0490dd5b9249dbefccfb7d28c4f14e9388fee5d25723539dc11483f08b8f1dded49d0556c4574a1696b0223c5051b289033e9ad5530d6d1bcce9c28b8f6133f35591578a3bacacdee14007c8d733c75a6b2415594614688d66dda795a48ca3f166d749af8cd9a9d3936e4000000049fc5e322c28111e48f320bc9862b3ccdde9557d362d0d00f6cfa638bd40357b577a03fdd6f192a7f0de85c62dd8a06eb1e76fffaf2e3fc7b504f19589c034d7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423080270" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3EE113E1-1D1A-11EF-B195-DEECE6B0C1A4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000007990f92040db89faccde8cec5909e351c3567dff79d0de60babbba48a35c4fa3000000000e8000000002000020000000d354c0f39b80d0bb4f0e13c89f3316d856f3ed62a2d76cce38e25e4763b25642200000009a1b62b091ddc775ee7d1108d44c769ffc5cac381580282324b04e3de29571bd4000000020ea1c072012543242362cc6572bccec1a24d351eda222eb1fba700cd2f6df3a256b1c3567665aff6a8b4431fb6a1d9fefeb62e31e22503b9ca78a6a0dacdb35 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1608 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1608 iexplore.exe 1608 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1608 wrote to memory of 3032 1608 iexplore.exe 28 PID 1608 wrote to memory of 3032 1608 iexplore.exe 28 PID 1608 wrote to memory of 3032 1608 iexplore.exe 28 PID 1608 wrote to memory of 3032 1608 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7dd4017506ffcfe6ba0ce791e422dd42_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1608 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ccfcdacccce77ac6c7014f1fcee46fa
SHA127b895f6007ec4d8f2786ad82e2c91472b48c55e
SHA25646fd697608aa5c9dea650f15a66afa7bb4a1dc0fab0062a02e514363d14cbfdf
SHA51200276779d61211f257fd7a8fd8763353762741e7b41ad82571fcdce4a7a53e867ba2abcd36e5c9ab600d52d47989faed25b2653fe6ea5aa508645899f77b7623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cf19d79b090aa264d977c2b12a221d6
SHA1382b195e39d7c7fa13fff516c468ae7399d3ba09
SHA256ef29726a3b65e6f1b6cf73e7a43811bbcd27678074a276eb80ab93139ac9afee
SHA512a6ca753b8467ad45271deff532767f8c8d7a98190c91a8fab7342c8c6a01714e5267c0c29eea873b4b5a073663a4c0a57964e46092b586cd33d83e0453e15aac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0e50821d7a8a7c78a8c03a973830787
SHA1366cc72beb9139be8a71a07aed6b38767e6eb1f7
SHA25642dc5e075151bfc2daa94144f313eba5ff7adf1b724e201b7ee742fb02e1f94c
SHA5124463bc5caad18c3db77c4bf4f8818b5d6c7ee49b0f1e482143ceb279901f84e4eef658ac6482f4d7d2bb409e07085434d0db81070efe76fea485816851be0361
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5604277bd3cb4bcb7521fa2ca37f63031
SHA1f87f8f0e3dab1e14769f75ae2041d808fae77bd6
SHA2568cca702a9af40bc4c8379265f17f96a09d047720fb59f3de4851c6eb11ed0cae
SHA512060d209b198976cc76e845f1f430313585e23554130921c68a175cc48e893af8d7c5301490c8e63a27cf09164dd74e37b8f00bead83fd11f52c14087725da1a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d58b16a041a7ee48b691aa58480248c4
SHA17467ea3a2c106d3870107c039560225fb7df8010
SHA2568a9ab6399009e0dbb896858c4ace504615b13e3cc699d0f94efd3cd1b5f4aad7
SHA5125af67b0adb7dcb095fe9cb74fccb3b9926eb44cff88e724d94f9ea819642459562e97a06fe713d4c23c92a805c886ead7ccefa3dfa9b4e5eec903cb46c8555b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c0fb9bcffb058e936e8a9413132ad7c
SHA15037aebde69776d1c9b7c8aa7637cbf6a77ace56
SHA25603b977d9a676c0bf8facef70e092ed8caf40e41410a24f288587305203391ff1
SHA512845da9a35d428433520631fbce891acee4239b7573583b87a35f6d960c5ebd6f635c9abae446657e4ebc8185c1b0c513dee0a056183b319a9369c7be97e67faf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522cd278426f6949bc4321f9a6b9777fc
SHA1a98b7f7e76fe52e1e37f8b4ad401ec1cfcee0d44
SHA2569aa0379671f2bfaf667fd75d61cbe60b0b68e20fef69cff8c0312209d48200b3
SHA51286a551f813682198691f0a09dcd5ce20a8f40c3a0d0142d59634db0de4916233c21439bc8d49201c439d5d8e0b2335beba4193878e3413c506485d54862dacab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58642a34bea0ba7921ea114831ece0f48
SHA1c5d31f8f004ec71b576f8d1a98115dbc4105f0f9
SHA2560270e1667b8f9ec42c3bbf4c25a44164ef004d370312341e4b97780072041d1f
SHA5121de2f50d763e26ca7f9ac79df9a3ade9072010861afd4ff1311d3608a00b2160b86a0a3a9f464a0bcfc8601b516549765c731fd6ecaf037f894ec787c132dc65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d10df3a1a909257bf67d41a62ee5179
SHA1d5e552c2ce53ced074f81cd3aa7d1d642a641668
SHA2567fc75a745857771fbec8bdf53628d6efdde3f5c6cd63567d5631f64d3473599b
SHA51238cc9f04fb5490014522905adadb348606dad93d004194481fd20c1f4e4a5b1f8c93948c55e4689bb78864fbb2bd95dbb5e62725db23c4edc03c1411f00f1ad3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2ea000cbd8fb04ce375db253ed0e859
SHA12e943c94f2311d0a1cac024067b93e2af4f52b8e
SHA25673fa94969e73f17c741a44dcdffbdfc28873a0cabdcf73a5337a06c6bd7d0675
SHA512ff297a3aefd7656cc4bab8616f585944b809935e7ecaee55c1e5508b5cef3827b1a67d7d16b7990aa7e7a7b96183fc9719ac407f720fa2b26b35445de073aa1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab53ad5063bb53705fed3e8285b6826e
SHA1a4cca03246dd4a819d76e5f6e2ba894f807d2770
SHA2567c2bfdd56e660c4805c8f78d18afed493f0aa0f63cbecd1dd24d452403e07c78
SHA512cdabb4263b602b194f1a17662a9b23999740abd04afd26e8e1f4cd8db5e2a4e3d3c3d857bbcf97e710d8786cb38fff9ff06defd66c1ee37551f9376524fd604a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e484c816fd6c59756958a02639e9c638
SHA12122d9f0d38b6da5e04b51954c93f8c17fe1df8a
SHA256f9575421b492e0e0f024c84367ea96b10bb70a38ce8e3735eecfe795cadab62e
SHA5123d1afdeb2c7632404db65a8d237b9792127a41ed0560186219461a3a81d50d73a4c713df76fe409808a4cfb508bb9d2090c16f2c643f1267515bae4b5a0ac602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50072c71607cd7b714165515996c05f58
SHA1a021487465dd21e74f893f6a4c2cd0a4d54ed6f8
SHA25618b509c4359519d7f18d2809d34f6454240ea9ed39e3f01be148c90738cc8f35
SHA5126d2f6629a38c1e5ca6ea621d8fc9ad2b00da11181ec4488e0ca80cbfba5d6d1a17c1a1e41bcc30918d7ad18b82c05d168592629561b53b84ef14c2ccc05a4e88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53da0f20cfa1cd2a81d9e4daea5b737a3
SHA1415a31c9640b11ae184add2e5c4fec00f1b33423
SHA256e7e341d8a6d4ae634f5a5ec8b0d9c8fcb4393f517612c29057c4522b10f6ca60
SHA51282fca785ceffa114a20fe33bfcc8d28c6b945d8cbd578177a38e7c4d3f69de31c6c5d25dff77039a65d7697902def4c6a0c28c868582d521d430b5df4ca27e7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f677258e0999225c70d4d4defb1066a
SHA17b308767034256a3619021b5cfd86e8358aa545a
SHA256bff2ba25f79947253206ef566a0c2f361395d5dd07a6d7bc8bdb7bd5a61f3f48
SHA512d6c9d89d6c7a8591741a85eb7fbe7f0b56bad489de608a0978b77f0c4883c629064f74fc07241d7a16977fe56dd4f3cd33a78574611451c7cee1192549b1af8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54babd384c73f7c9550f592d386ccefb5
SHA1766363c8700a2c234010d8ad3a54fda64e5aeaf7
SHA256dc47f20046ebf1cb878b8bf7870e7dcefb6b9a63d7ed272dbf67a11b3c0644c6
SHA512c2a0834586a1335d809d6fbc73c4cfb534c295bf4afc165d805633e281e88ea4c297b20436e19a80807d4b6efd0f105e74f41a70cde7f3de3db454f95454911d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a614502625e2e29e855ee7d342e9221
SHA1a77d2bf562d59795518cdbfbd250dd23faa3e9d8
SHA256830f486011791defd8003f0efe46f2855a670666df533dec50977641aaf01824
SHA51293cfbd710b9f3422a056c59ffaaa3fb29c290e68c14af62167f84dd9cce9d0ecf2a58c0f2f39295677dd82da2254141c90f3e974675ab07f1a95ee0855733721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a73e7dfb2d53838f427add011964c90a
SHA1e6b6b07245c58c01b3165d599975eb1bc8367f39
SHA2561c6daf0d23e6f92822e91e6c05ea02a0ff1962ccf80a1938b5784b6e4f240ac6
SHA512efa9fb788b881397d6a965cd3793c6404eeb3e3c4ff9134c2922f225aa35e318e602040cf42b16328b455408955e4744dd693d08c513d9f4389a58edd6459f41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5828bfd4000d93ef23794ea8db7e4e4b8
SHA1b3bbe5f1be4e67b71204c36cdf7c5fe12c24749b
SHA2560e1ebeac3fdb70cf495fd8366eb0695522ea891281836ce036399a1e684ffa23
SHA51217b3d22e79c2c1bd82c7e9e30d0356bb4720ca4d1bdd3f9b400919fd657e897e81a5f19adf2f531978118c6aa15ff36e4b77f347bfa57cb4184364a37ce55751
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a