Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 09:04
Static task
static1
Behavioral task
behavioral1
Sample
4f475b5a624a2fb11d24d0e341cfe7c8_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4f475b5a624a2fb11d24d0e341cfe7c8_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
4f475b5a624a2fb11d24d0e341cfe7c8_JaffaCakes118.html
-
Size
3KB
-
MD5
4f475b5a624a2fb11d24d0e341cfe7c8
-
SHA1
321a1dad935abcedf589e6e468124cb036f10e30
-
SHA256
3170e3a43d1004a77b891535f03dbcf14c8b2bc754d1127e3ecd781e24c9fb2d
-
SHA512
0570b2ffef3d214e292da21aa71610ccd8bde37da27bddd39c0575252418e4d3f428d59ee51bbd4fa433e01f2c32ce1a0a310f1860ded2bc5eabc554c598d527
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00ce6e4639a8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000000babb10be25b51d58f2889ed6c8368d09649585348ac8126f7f7961499025008000000000e80000000020000200000007bf122938d4502c059911fe7f9c5ede13d408653b5825ca4e856861cfcb2bd702000000003aea10daa8adb86db2a26d5558892c12cdaec1a17ed2eac181aac4d7021352140000000e299df70f55af875160064a1671bb4e8ad16efbf884e74ab5239dd23d655450d782ad49989ba06bec718a6a9f48d879441b5da925750a2a239e08fdf0b7f16a3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{71D8F841-142C-11EF-818F-FAB46556C0ED} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422098526" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1936 iexplore.exe 1936 iexplore.exe 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE 2032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2032 1936 iexplore.exe 28 PID 1936 wrote to memory of 2032 1936 iexplore.exe 28 PID 1936 wrote to memory of 2032 1936 iexplore.exe 28 PID 1936 wrote to memory of 2032 1936 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4f475b5a624a2fb11d24d0e341cfe7c8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b6aca97112bbea63fdfe3d26bcd80a2
SHA14a6a85e49fbb5b03f9d2399060b64640a539b591
SHA2565847360035325f8ed94f38e8a1f0874137c27c05707202eb692bd21d94076b96
SHA512ed6275dfd81422c5bc403756012b6f73dc407627eeb2ae3dd8368fa2b879266e1227450e93f5bfbd264c7bee49be250f87363fb5ee144a2351d43f1b4e3e72a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0eb369dc00f4961b8ec2524f0644e34
SHA1dbb015307e5bbae6b5d0b4dabd2aa3627f55475f
SHA256d7eaa2a1f41b23a47af604eb3a8bd85b60316a289f7766833bef03ce7831286f
SHA512c825a519cedf80871f21884faaed25e3a3a796b72ec8d9a94837d211fa71b17ac253ef42851975104c51ee4af44e0e5159443bee6d3d4d823c960c49ae77f628
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5881c88de897dbd88c53392a6e9edebfc
SHA1da204b435e1be965fa616ada920a3dc286da80ca
SHA256697e6879efc9fafb97c584952d1b3159c75c05fb5ae5eeb3d5fc005af2fead54
SHA512ed6889a4bff13dfa32108e265a9bd9b60c9e7a402a4efaf35bb705c2abbe1d73024521ce5e24e1d0387895aaaf1c87dd021aff58e1202a48c08eb838c4754c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eea635ba983a450d1218e6a2aa0dd289
SHA12ece39878a19ba87939031fd0b5af9800dda74e9
SHA25642f36d2754ee5ecdf8ffdb3c6939b179473b6dec2848c21c3e71dafdf47e8dd3
SHA512e12575ba7f564191ebfac8c8954f5c2d0919895e4a3d3bcd705160b15df6b18de0b4f626c4cd12df8af6b399282ee550787f4f7f90931ca77c2ea735d36f9239
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e1f04101490cfdba86ec62868d2adce4
SHA14c0f850856504dd5517aca0ca43f6d63dda8c7a1
SHA256db0767c3eb492ddc972aa69424d5a56c2bd17b9b0de569b68f92b8fbffb0a8ce
SHA512fa75e7cb81289e01f56230352626f17fd3004a7cbfa025725bba178227d83be5977c42fa8df5189bf633f007bbdb2a305755884715713d57728b5b6917fcbf1e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524bead9de9e77b7d93ec20421108f767
SHA1d20b02adfada20ebbba401e927b635ba6a715d43
SHA256b39186f1cf98d7c9f142c4a055ab414fcb85d9da5bcbbb6a6c5fd1114f55350c
SHA512d62735b573e52ff94ba57ebfd9c23fbd1942e1b7434e19647f9674eda27ed9ce396b21c972ca0e2ab58230aa17e6780f416340001404e1591e1ab05cea6e1a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e24cb5254cec9d78c6415fa4f8e56f7b
SHA13997561fe12032fd36b4b958a12920348be68fdc
SHA256953193c4678a8ea502e58ae9cbe35e3322a717a662eceab74bd2e1c0c957b46f
SHA512255d3be3ae05ec96de59d71e4ba1b5dfcc73f30a7661c960fecdde79a4bc32180b2e0d298e4dd539658437deb5221c463ddc5f3a9af48c574f80c39cae380d9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2475ccf5d7a612b55fec2287fbed9a9
SHA1bb90290e4b78c49243a4bbd9268f361eee153326
SHA256b66b8b2f6232a528ca77ab7527aa6f68c011d98f42c5c0c73045839fcebd6ea9
SHA512c9f056454b2343f4c55aaaddfd18e273bd25eb2533c882a9fef5add97d26f24bc3031616e597f4d73f6abf9eaf1b383c9e68ada6facb35187b69dcc955a30a52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee77a09c64d925ac298add49df5140eb
SHA1b2f6969ffd60f130bf4c8cbbcaca2179c2934465
SHA2569627331b2da4d16ea34e6f7d11dedc7b1eae40d512c05aef230a761ba42db64a
SHA512aca015b48c9f6c5f9f9731bbe931239d6f665edf02c3ec6c1ca934854b00a51f02ddd0674a01d53b2d5266c7017fdb0e2117b49b5fd2bf223db5a612ee8ca054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558e56da1574c42312711a0e34522b705
SHA15ae8758db99d05e71dd44c1c7dfd2201b2fb8840
SHA256ae23062d12e2f88a8d5cb251985668fd89d3fa53fd631a4b3329c287b9b3b1d2
SHA5129992d106be0352c46664ad7dc7fbd43dc812bcc5d15d7258304975113f16d91e9a564539e7dfd7b0687d4c9cd719e9ab148d76ac923db9c96bf66962eadd9f56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590120047639b7f0fd7d96fe28f47fd03
SHA1bf5f03e3a00178a38d3b10fe25393a3785c9f018
SHA256bf354ddd7336e1531fb040c34a1ac3dc9b7f02f01c274a95566cf55b4b2b2be9
SHA51263e54d4be0535454d380869a64bee3153d2ade6a079b7c6731496afc7d193282c9ceaa58675a14a188e58c64a96de6f708eebb5a4340c19a2cba222f092d8583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a560e108d60564c811488b6c69b942f8
SHA1dd24162d48564bcba3e5f388176ea4f90bc57951
SHA2567e34987c4870b69791bc72843312161f3d296959eff7fa7593d5a9815232594a
SHA51217d62930eff66966b947b9a398c6d56fa28205dd6c355d9bbb203dcc9034c439a81d2606ba1ec2c18407231fc34415159a1b4f19edeee112cac61d97dc02bcc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8df93c58f4c276616381f6a6df873ad
SHA1fd43c4a0c2a5dd33393edb16b73bdab7a2cd2a75
SHA256fb65f141259ff43b94cd794e176cfecd2c2052a56a22e9ababbac1707f1f0fb7
SHA5126ed58129e349c31e42b77853788c1cb56a50e5adc6d3b9e6d2ee5187e33ecc4465e62b6d1dd88c79616cdcf4115867c3e03dd2ac552b098cc1f8e36921238269
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2d78eeb0560a764abb31aaa0edd5acd
SHA16d06a7a1e1ba3542e499d5e70f126a00c02853bc
SHA2566a81e44eea54c28ee3efd488ba7479f519317c21d72d9902a3f76c7754c7e451
SHA5122f32280286f522bc8eb5b2907e5e306ed2301399722d1a927935db7888ef88f9eea18b595a1f1243ae7ad331888c2bd241be0ccc8e92d43d0d6a51335824db24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe4744f90ff0637a82971232c74e34a2
SHA1aef0e0c26957912be733204863b286cdf8afa8c3
SHA256e77565f116614211a59540cac36c98971e00f9b35e52e64051ded1634749f4bc
SHA5127627fbe0d52407c8b9ba1f6cfd99c4b3ab5b6fd4e3997f9f847e7d1b8b560485e3a18a68479a89f41238c4cd0b49aa3aec8500c358def215872f37a59509d793
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be5645cadd2acf28ad4fadbd3b989ed1
SHA1aca8e78d630f4ce6a0a725492c4cbfee1aa77e1d
SHA256967b2bdd35479fff47a6afacb6931672837b36d8b55e551f4cd939377c3dcd60
SHA5122c5d4963bb51533de2622c75b4f4f27490631452dc01af1c6725672eedb1ca50b149312bb36905757c9d35b22e56b30fe289a8d9a238869b91d98ef6ee700792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5511235636d03fc45e9fd1fa69d9684f9
SHA1beab60f73ebe339e32b35be2f32c3320bf9774c9
SHA256974e9e484c88fa529a94ce44c4ab856dee2dd36f5560da836547efee64e36051
SHA512ce8293a1b3d443ae803e8430b503bb61af401123d399a40041f62d0d5a94e5f3b88100236c6ff78ad12a5a25fc53cf2ece60b5bd5b1a814f5e6e52fd95b6bc0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3934230cf7fb01c1dc5e3fe26aaeafb
SHA18ab6e10cd28d43448cffd56f0c9e28d15a135b5b
SHA2561433a3d59be72545f5a05b2bc3640105426cc24943517bfa333dad16b030ba58
SHA5123a492dd1dfce34f7b497917aac666aa82bd8b3cd3663570c96dda1d67ed548bfe31a7176550f1d16e298c6883c0cde0f93eb3f05f0b2b73de52f39d6a8cc9c92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe6fb8a7172d1b1c45405c5696a80cc9
SHA1ff03ead8f4cd4526f5435b6af5bdc089bafa598c
SHA2565fbb78a4540695e114b63de4af65cdeaed1c14439b74c49e8eeb75c591f53b7c
SHA5120ef18593d08a09967c337ceaafbeb5c12125da08c45699271b4e8fc51495261481497c1158f2d7ca797c2899cb3b0c9c83463d4082392832b7cef3d42a6b583c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d19e2ed607891b31d714e23fe854866c
SHA1d1a2a654f2f937cb0289f87d5424a8c98a7735c1
SHA2565c870d3ea007f29e08c38f3dcac0510328b060ce8d9f1ae94e78ca0612d87492
SHA512f66ffd0ec3d17de18a5a2e0354422e70bd020857a31ef01e9ee326d2045845eef3a244ec83d8d014720569cc6e722f8931cf6d1af92060a9b8dd066014c32418
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587b035478a31016e637ee9ade1397bca
SHA16ee66251c304b8013550e32b2ae90ba0939e28bf
SHA25620c150ab3984f7fd8a9433c6798a9bc14b93b0c3326f183bb8ea6429ee7c92d8
SHA5120bcb7c88193fe2f65273ce5704a30e85089ae78500eb577637a339197d64077ab11cf07e8c2d6f424224c11d2c138642e1be82fb450bd00422916b357622fd54
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a