Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 22:43
Static task
static1
Behavioral task
behavioral1
Sample
612c8aa7316fda2c92300651e6207da5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
612c8aa7316fda2c92300651e6207da5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
612c8aa7316fda2c92300651e6207da5_JaffaCakes118.html
-
Size
67KB
-
MD5
612c8aa7316fda2c92300651e6207da5
-
SHA1
d95d1622b16d2953180c6aeaaa5e5b59620e980f
-
SHA256
cfae9cc5e569c478a346609e8a03729d0639569fed4285cf22a6643f7cc675a9
-
SHA512
844a91fdeef570a30e24bcc414e011086f69bed72b3439db292b1b72917d6bce506b0be996d5b03a7f05fb1b2cd5172241e6a6853d79a124c9793ebcec793c89
-
SSDEEP
768:Ji+AgcMiR3sI2PDDnX0g6L4n5+hoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVGo:JRVTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000044858f3eaed26cac143cc379c2d88f5706855da11a746275bcc0b2f70bde3bc9000000000e8000000002000020000000366f888e425bfad6d4229ad8f8df47d1e1065ad36cf9ada1d848af057f173ff920000000d219b281b97c8c26e50162aab131c81e9caa6d9df2b9db7ca3c82b57796e2d4b40000000bcc93750ef5735538ee983aa753370a319900f01ee5df5f5361eff2f7576b25a81020165b55b3d802696c1abdf7ad17ea242203e1843089b0b3664e597ce96f1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 409c122807abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422406854" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{52DBE301-16FA-11EF-989B-729E5AF85804} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000e63503c2d4df19b2e9960634feafe6507e8643742715847862ffb4ced50cd018000000000e8000000002000020000000806ff5b19506ea21f57cbe56ec9085603725a1d2f8e120cd4eed56e8a78ed9dd900000004e269d8c518d99efca7164677bd7603d47c7caf25e79b46483aa53585c50ecffaccb40e0066f0d4a718346d98c309a47d253dad8d5b344f1d76dfa07ccb6b1620425777390046429ccc50aff999adce35b9c55cc903c93d072600d38ee079d9a11ba0e283274370df620bb35deb48a63ff47a95515e31d01956ee44a4a4c8d9a2ecdeb30a2cbc48217179cd4b6358a6040000000c66627eb2d3c8d7967fb38662662b2be8fd0cf2430a37bc30758bf05ed9c5d8a7f311a00e0572063c2003e56996d1700c8884c384c9ecd76d8e0a0b3da7b3479 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2888 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2888 iexplore.exe 2888 iexplore.exe 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE 3012 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2888 wrote to memory of 3012 2888 iexplore.exe IEXPLORE.EXE PID 2888 wrote to memory of 3012 2888 iexplore.exe IEXPLORE.EXE PID 2888 wrote to memory of 3012 2888 iexplore.exe IEXPLORE.EXE PID 2888 wrote to memory of 3012 2888 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\612c8aa7316fda2c92300651e6207da5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2888 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD522db9a6ad083c6002a910e9e68fbac38
SHA1c3a249fec3a6a7d984270febd76df27593c94a4d
SHA256fcdff250da22a9444c1d326e24c0ee50723bf47665c7d6fa5a9ef9379ba8fe3d
SHA5128ae0cfa583d60649fc1127529e69ad19eea79a5957ad509381cb24ffc15cff81e735b46bbd72d9c8dd6dfd6297a3d76f40500338841b1029258aeb97d0ca3879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5962b3787eb81801225274fb2d348efe1
SHA1ff18f33ab6e6c62ada6b68bf1552e0faabb6b118
SHA256ae77e3d36aa018b5761c78039d455c4f123f964ca0004988d6bfd13b76d9d189
SHA512ebdb6a02df7b3a9b31f032c429854ac6d649278736b7f48081c0e89592672ab947c9806aab01176cf6c4be20c1f8e0c93cf1770db4d246c6a6c21bdce93ca598
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5cded1cea9e354b71f738399a8d16cade
SHA1cef86adae5d4617401575655ab05b654367d10b0
SHA256020c8bc729935163e1f3b28bb18d3f0aa280f63d78ec69d71372ffacea1b62c3
SHA51252beb69666d294a1ca2c1c94196aa96ba2fc7e2f7a57ff0267e22a67c606b84a40b7f0e0605ecd9db153f4418bd5d4db66391f089b79e5bb7161243721602d00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5af8b79e83f35c409a0ead8c1a6374b99
SHA10d1f608329fa926650340bff151a1a6926542697
SHA256e07fbeffa6ea652ec3cfe72f94d2bcbcd454f29608bd89e8c5fed94d03e02bd0
SHA512c9e0a07c45b09a7ea614192db3f7fa03890a35f0e877bb884a3ff28253e511582cfb9bb0ca6c0474d6de0d87bfdd76b347a814232a4123bdf58f1c5e49a86db1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59eb7a4d1848e18aa0bb2fe2bdab1f94b
SHA1238dc56aa0c07dde5d155d5829a155166f0d4936
SHA2565f0edfc4eb801935f3724932cdc2c8397addc17b2e3d8422b1fe6720f04024f9
SHA512565e3f3186fb51b8215f284ba59fc525bcb2c22a07122d4350764d6a1a123aa1a39de0f9189e4b197fa7835abd193b745a70c26d44af20e40f1bae23c0fc85dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51619b64a442ac299c27d1e57a2ec220d
SHA12ab6697a4aa46915522a1ca8cd3122584dfc8107
SHA25669e12d11f6a288bd6aae06d951dbf3ef8b6960b693af68716cd5e45dfb2625e1
SHA512be2228484dadd63b085ae80bc56350c30b1d2efa248cde7f611939a6269961b875554ebfaeae5d8a2f8afc9addbdd22fc1a1a100428a37bff712bf654dde0e76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50eed2f471306b661d2af58d0a32a0ca2
SHA1d296a9ed9303b3d4038b085d7d61223974bedaec
SHA25678e0cda16ccec000df85ebe3a645d3ec9a423db0528d04e84920b5a59112d283
SHA512b978516c39516781c5a8a7a989fcf46833f425b322b65827a60a70864250ef00a5508969b420a1631ce05b117bec70f26cfb199fbfb5ddb7eed324d464b5b89e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a411136a8949b5940a4cff708117b7f4
SHA1cc3f43b071aca5027af1d9aa9074daac4a81f616
SHA25634dd34a3a1e9d73218309c4e4f57ad6150be1895d1fc8fb4107ce7b1f83087ae
SHA512c930ec7f85cb8e61968f7b21a71c6091cd0e90a27c696b73b209a6b9efc3c38f4d25c81d9390248f9fc3e27d32a9a2c73e9b258df153ff53a62470faab3cfe9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57f433f60f5d5d7e686e414a6e13d2cca
SHA1da49a121c7a7561aeabc486374bfe78546616b51
SHA256f1f6eb1c4a8bff87c4812e4bbb96143426ade7a6e523429a4b5c0cbb28fb9a8b
SHA5127cf9a311c86e13ea5f7f2d7b5e110279ea35982f30ed5aa3494802fdc7ccdba2c3b25ef3fd52240bd9acd40da672f8ac354c6ba0b2f16dbfb25a5e5045d27a3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58a21046474a7564a4598a9a3a42c812d
SHA10789e6f2494d15803f00c6646e09670835ea38c4
SHA2566dfba5fe255ee7db11a76254fb3900f07ce34defa2066bb98212597ba855fdbf
SHA51230a767366d80bc5c212b1c82fa9e6edf88dd7258b03b23101595efd4061e1ef07e2a4e0e4e212cb4a1ba456ee87583a017a45253ad67f78053d0071267be2695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5678ebf7cc0143d1c8877ee368d739291
SHA1fda7b1900d7a5a268d2a220a4379e823e71cbe4b
SHA2562408ca33b59ac63c36a6e1466f97ed7468d8de0980c6067c32148ad0cec56632
SHA512703373485f17e9bda6f9f8fd08ec5b4803e7bd5edbcd6b375ba27f33f8d89e6d4920a487896a728c584f70233a5a3fd20723f3c655da4e372bca27e99f41942d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5db0584763eb1b78e40606680bfd3ab04
SHA100f27cc547417dbd8643e7efe69a0f9db6758426
SHA256983614fec858c58cb24b7b2e84fcb13d1fdc63cb8cf582c5d54321447f2aced6
SHA512df47e2c63f1f95b84b231f20538a4bdc0001375e8c012a9b03b600e9301a2a4c363a83eab6362883343ff7fce12cd5351e0331ab3294c5966c28cdba6bdb3faa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c251ac242ba6429e3ff06eced9853793
SHA11bedb3f5cc208341e89d839c6fa1386f326a09a6
SHA2564c14f850f2b610d45d31472adae9be0f4b5c723d6b9b9992dc40b4d0b5410486
SHA512b47b56d325684252f1abd8593847e0267603253d72fb3b31d2444535c1861e2cdc9060c331cd44d602036999cb66b8b2e37a7accf167d5ff9e587af1a93b9cb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD598249c38ca5eb8bf5f8505e7c7e59544
SHA1346fdedb9515487ae7ef8948811a834dc4944d4f
SHA2564aacb11abded5a9356bc9e51e3b1d3e478150f320f90b14baef27d4ad88f7576
SHA5128df2189374d0467347a125d1920a90a2fcdb7a096c20cfbc9e065a8c51fe96aa5578502f222ce00438f1a8a5a0cef9068280820469e098bcc0e06e8a779ac4b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5af19098a004e486c5f402aa6583ce72b
SHA1ff074ab8edc90a2eb7f8e0a2823857902c630754
SHA256590dc1fc0967d51a5bd983e902eff8e9dd4f77b5c09ed7a4a5d06facc56415f3
SHA512e53983a5d5625a3b5e42c399ee139b361aafa6f4141b810841f2b911362091489b7c1cfdd804de8cec24d06f1174043bb6942142b3dec16eadb7c9642a7810b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5029a236aca23de051f5c4af1e7a13c3f
SHA1c09248517f90813fb0df58143c9a42a000b1766e
SHA25689fca4828e3a3af9a4882cc99e0e57d02ab44e7976b9b94410862c3d857aac8c
SHA512ba13c3016bfef7854ce5bfc4099da90d1dc6662d96163d964ecaefefa13d428cf30ea3a30f319d666abc280467f11d32727cd252cb3b628648988074eb9a7e49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56a605178e690499ed5ced03dae4b8e2b
SHA102c1ab7cbb3c693a4bf87f68152b2c0b127dd65b
SHA2564d944546edf38b7cddca5ca67bd8482f8810b0159817de2c697c5c3020432515
SHA512ade6e33b3def52add646239287112a967b548fddf61559196b6c5e7bb03cb760b5fac659cb75b620799e0ac623c66534d4fbb986271f63936860f2b89632c8f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f6508aaac0a8e34eea97762e123355c0
SHA1f216ab378c98442068d03e85ca1f80638fe0ea26
SHA256b3245c6f8fbbe43ba577df667a9448512053923f304e8d50108a6d9d6ae76a18
SHA512cc5488f3a707af1ba3196a858c5eff5037f5ad0f3dac159c920b99432e7e500351d198fb91f2cb16d40bef436898e830e30df3260562aca36f401dad8afac145
-
C:\Users\Admin\AppData\Local\Temp\CabA66F.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\TarA77E.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a