Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 23:19
Static task
static1
Behavioral task
behavioral1
Sample
14eed6b00dfb55e31417293c855dd6c1_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
14eed6b00dfb55e31417293c855dd6c1_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
14eed6b00dfb55e31417293c855dd6c1_JaffaCakes118.html
-
Size
42KB
-
MD5
14eed6b00dfb55e31417293c855dd6c1
-
SHA1
601c333e8568ae517263545b91f3fa53844126b6
-
SHA256
ae91ac0e48e71eb61e54435f5733e5443b3e7f0c409133b42b2b4a17344ca672
-
SHA512
3bb559cd2beb411ae4852a744f203b5a04a7acaf06e1019eb785d69d7ac163a6598b649ffc34a2e78836776d1261f96cacd47eafe4e2d9ac1aac8bf837633071
-
SSDEEP
768:wfff60dJ5BADxs6jjOlcQW2bc962EWVbgu2uxVu2xSu2xxPu0dSYyubqzWYy750S:oFmQW2bc96JWVbbSEYyOqzWYy7ee9GbG
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421026646" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C706A571-0A6C-11EF-822E-56D57A935C49} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 404378b5799eda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000abcd728d5fa33e2e481c37de189989e917f3af15b8b045c2e1831254ec0fda74000000000e8000000002000020000000495c291e874a944681b6f108eefd41b6f96ed2e98ec525cd6f7c3f43d6b8ee88200000003cb3845c9d2bb9bd629b6e3ac74504937b9893ec3e59c89efbb3a6564deb162b40000000a06f52dca36f560f42b397af51e6e2f831177bc38f19a219e04955cd6e6389d69f1711529cb3a15584450b1329774229cf7b1b9c4966a99145b0b5150a27d994 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1504 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1504 iexplore.exe 1504 iexplore.exe 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE 1296 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1504 wrote to memory of 1296 1504 iexplore.exe 28 PID 1504 wrote to memory of 1296 1504 iexplore.exe 28 PID 1504 wrote to memory of 1296 1504 iexplore.exe 28 PID 1504 wrote to memory of 1296 1504 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\14eed6b00dfb55e31417293c855dd6c1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1504 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD56ab845c2cf04eb437f0462735573564f
SHA127844cfbf0df13295424d3e97a59ff9fcfc85e12
SHA256ce1307b32ffaf30954efe8b94223a38dbe1937b1114d923132f270c9298e5ebd
SHA512a00b30f00ebef7a4010108884597208681b9fb0ecb45666ae8f87980174579719615dfe50fb92c752f82057b60b8ef1aecfd47ae3b8a1b3b99338614f2f52f44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b285403b37b64e7e7284faa9e885180e
SHA1fc003afa6199ba325dcc7a0787973598fd8395f3
SHA256e2e084de83acfede73750f59b64b573c1ee473038dcd99b1b2247900b2269c62
SHA5129adfc12a1f042c9af2a8fc9146b40e1470481ed6d26ed62591ec0281a546cfc513f9333b6da3abb8d84d7f1c7c88f5252fd277538162cc87629ab0d157c06afa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ba32fe0d0ef275c138f19d4bb3714a2
SHA1308711d109db3e9feec46708f6fbe783c59e1446
SHA2563407cc814d2c3dce98da36112ebfe019c449d18a5bbf33c0ceb91af1b8fa4c9f
SHA512ce4f3a204c159a9105c362a81ea66e625615cf0f933dec6ffb0970610c2e0a3b360de67ecf8adec247eff09245fdcfc5852f139103afabfe9a22a4ab980bf4d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52cacb46290fd7e5c1d0acc9017d92cea
SHA1f1c83de2b37df43004de6ed6ef7b9c1ade1c090c
SHA2566e69ebc81f6f360b3dcc74de87758ea5b4b6cb225ee28efa61cb0199e5e52088
SHA512028560e7b5d2ce8c26e2d1106fbf63a861e5cc05bff34ffa1e02fa9bfea3d3d218da10a9907572d2cfb2441d8239fed33c0a2f61561bfd87add83dc29df7221c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2610361d3be715e3fe63f91254c0f00
SHA12919a779be6ec4c69800d17897af9214f8a4cb9e
SHA256bedfb98ee7c34f755f614b13cc8592568f3b7dbfc842c7e7ef8960d79910594b
SHA512bed7f720b563e1f4db94c7bdfba273a4f10ab51fd33c3c6da36735b54690036033681fbda40ec686eea645796a8808ceb6ac3d725d5ec935614f2712a006437b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff7c87ecc463ea0338fef045eba9c2f9
SHA1b93bf84485f630521bbb77e30b128a30f8cca078
SHA256c460d8f06d09477a3a0a182c98c02e8e9de9fb3699c39e396e86f1a9625b6295
SHA5126e57a1ba7dc8dca4e6022a48de64eea3973f114f1441712d6d499d0fb63d5d008d8891c57dfcb0d56b90b2a48daa755f54fcc65bc20e9a94af00ae15a8431780
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5174a11ac969453f3e8be42a2b4457f40
SHA1ef5e0d5bae1f129605c6eae17c51e7a1eef3870a
SHA2567fea6e8e361b6651e5019ab6bd600399755613bf1d612970b72dbc9f2fc1c28d
SHA512cd9b49bbb6db4ce79c8b0b469de93ee878f36a33706ef8c92a3501ebb0597e2e91e3706c9e1081fa54006ff236525100b4aa73e1b1cb5f5cb206b1e62057b0b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56aec6426eb1bb32144bb025e0e59150d
SHA1fad3f84a4176acee557f6ad1e05d5c45883139ae
SHA2568cd888c8691332d4837309c940473ccea6419bfd3df90dbb5468ac7596ab2c2f
SHA512c5cb3abd19d11a8f7bd684410d671b50e1b9e446c8e2909e268b197cfb07bec3e4cc4e6ad5e434d93e3f556a49d3239c19d1134311062d608d97fae9e3171286
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5893cc4a541da8be9dda804fded5f52c4
SHA132a2bd033cd448daf36e0ec016052719f3e452d5
SHA256e16084815f659aa58aedf56ef1639c56a8c077b7aca1f87d28c892f179ed65bd
SHA5127e0ca2293582390b1e4f1724611c2edf87dd7bc3a61dcacfe3e6a0039103d7ab2229eca2cc8b36ee01ea613fc7c7256d5925e1bb44bceb203e0b155fc3d05e75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edede28679c34e262792a7b2d294c962
SHA1f13b8528fdc52a7b29646aa56136a1405316f34a
SHA2566a2f9e368137c0d9872a21ef763fb75f424b2fdc1ebb706f1449c55beaa8fbf1
SHA5122c243fb16cf2388c56ec28d013d26c6cb21a3383300bee02a249a1413b016cdd589de3d1cc6f2dd2f4760a6fb467ec567603b375a63dc502590dc3f89d864a73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a22429f01b02cd0a1ba567601f174d3
SHA1208c1f51553422e5812fd646b774cdf38f82a7ca
SHA256ddebb2ce94d4acd272693c16a00ac8f1ad65db9b74104537f28cd55e401bb41e
SHA512f08816c9a441fd3917643e39cd55d554cc11d6ac4d9e25496308f1da2419142202b7e68db042cfb7c1315d4e35702e8f677585cd3a38b03c25ae2f28c519b360
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5531d7b069274f0deeec7a318dc008afd
SHA17105df7b5bc2d62cb3a00d451766ef854c3edcec
SHA25650e8fbdd9457f50bd6fbb83f61a50e728db8eceb635deff08df8eb880647d74a
SHA5127737bfeda84b4c223cb3f8262730c59190393551fb01f393db6682dad047659f3007d67b7953f45ae2fb2869f4730cb56ac9009f506a3da2f8114d05beadaacd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58fd8759f8317dea84eafc197ec77f971
SHA1ce13db77b78e14c7c7fe51b5f639e8bb54e10c83
SHA256ab00f1c26fca5777773c785e8a5a833eb4882bcd4f1aeea29baf9142c74fe9a1
SHA51252b0ce31dc520221e3e329f3e804cbd906105b06b8dad4a3dcc5d07ef06613815fc3e2106b335a0450d3fb9fc4df047d71f8d8b38b0b7ed4df99420d8cf35b30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fdef24d15b0eef6eccef03ea0b9023a
SHA1b76da368fba42c1de6b8dcaf0a6f02088c379a92
SHA2563c65224e5dcc8a453d260b3b51425abf49ba2844916a41b4b5f9f8991f1206e9
SHA5125a660008918cbf5d34aa1adfb4d6c159c59457c5f9f2f1dfbeb186b8615e69c42b6cb3b5ec4393f5a0210df546587c9bea4c25b2306d073398c46d7938a5d825
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cad6ad93516b9ef1dfa5f987626c730c
SHA1c2c2c868d68c5a2794eead0910d292014c305488
SHA256c2f6f7f6cdca16d8a5d8b5b7359b12152288465efeaa6777e2ec1036f850cebf
SHA512e17f6e42763516395a10f3759c3fb5e5cc7f2860d157d1a22f067750d747961be86bfbb41ac3a5c1b79071b5c8ebae9639e105ab5682cf1d129aaaf7166dad9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b638b33b202a92550cc97970f5c02e4
SHA1a8ad94f60f37a2cb2a95fe0f2f25dd747acb0f92
SHA256da4a4cfb24bc026928af107863cb509eda3b1b9f0a46acca0de7eccfd61a4b46
SHA51267881786cd37af3a30e058e4a2b9df366cd8e47c0f2ef5ee1f6965c91d294c30149a75549f60975f23f53ca44e2693e895f78aa0351669b2e422ccb234a25014
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD558b09bfcd0d405c0e5d16260f23e556e
SHA1ec8d7f23406cf8b6fb6755de1bf244abec4c5ef4
SHA25694dd66336d84c37722d28b91a84c8a8f85f2b3bbeb7bc19025ad07fbcb3ac8ca
SHA512f9caa3cc887db23c0f7713c59ae40ef038083da35c6d9c7070cf1e765486991027acc15ea5e02d7e9a342fddaecd84032f4c638914102dc3ad102503819b8a12
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8ADCJI8Z\styles[1].htm
Filesize556B
MD5c4840739d01294b19f7e3ca29cd3b896
SHA153eec30797023f4f423b77face0e629f95d648c8
SHA256c920d410a076f640d7610c48830d300cd4a8ab38d7bcba34d9237d7459d71cbd
SHA512ef98cd5d97116694743034aaaa4642805067412f5e1f3eaaf970a84e30c4017282b050bb69f37e3b462f5570032fb1c01f12bd5f4a64ba57d0f09188122a18d4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a