Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 08:43
Static task
static1
Behavioral task
behavioral1
Sample
5e2b3f91ee1a790e4aedb7a06a89608b_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5e2b3f91ee1a790e4aedb7a06a89608b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5e2b3f91ee1a790e4aedb7a06a89608b_JaffaCakes118.html
-
Size
2KB
-
MD5
5e2b3f91ee1a790e4aedb7a06a89608b
-
SHA1
8241c0f373464470241277ff6070f77c44aafe13
-
SHA256
3f190613d6a04293f4873f304c3ed40891da4e76963e1e0820eee700a2b04059
-
SHA512
802ac7118601a4ab1471cc6c7674032d055cb4c1c5f2ab0356ef154a7001c7cffc8674cc0f9fdef809c32c75b504d0058fac07b04f24b9989d8ca8be964103c1
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000b0a05c8c094fcb0a2256b03a58173fa63c710f0c949592e809089b550da65c4d000000000e8000000002000020000000ca45267725d883ec1ebded1197696fee8104504226d9aa81f15423c6e079727b200000000386ff4e024cb07e09aeedf99a16bde47d1d6bd3eb3ebc856214391b257153084000000073671ddc8e7eb223288955e519f4117de575f1898fd1b9fa0d37c3843b7c768c8b18c3d9328f7616fa7fe531ab02a93451cdc3aa9c1539d16aadff16b7c1e405 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e000000000200000000001066000000010000200000002ee93d3aeaf3bdd2f6e95f156dc298c7cca6071ba53548b2c12cbe397cdced06000000000e8000000002000020000000a00547c804f6ed150e4204c8e2f481c2778797594cc6a3ccc300ca3424baaba59000000097e729119f64723634d1da0de76d44fb567229365365f3255d6aaf4b58124a3df0137d0aa2490a6966bb1cc0b5666158e5c0f0a012ab69dbd699c1cdd063919a5f981b884466f47d764e8db1ac2133ad1c7130abd1ba83a378457ba76891ad61ae38b918f442d8cd1194f7047298104d33e538a74ce8e834200c60fc94417c7736918e6376f43c44ef16cea43a14cf4c4000000007f387c83d88f23ebee10cf9daf758f6ed2774e647e6bc3a8c94be54dd21f8be853088de7addbc5a0c07061b9d2a1a302c2401685914fc51da8d5d486bbe825b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06ee0e291aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422356487" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0E206441-1685-11EF-BAF4-4AADDC6219DF} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2852 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2852 iexplore.exe 2852 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2964 2852 iexplore.exe 28 PID 2852 wrote to memory of 2964 2852 iexplore.exe 28 PID 2852 wrote to memory of 2964 2852 iexplore.exe 28 PID 2852 wrote to memory of 2964 2852 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5e2b3f91ee1a790e4aedb7a06a89608b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2852 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b1e3cb145250fb92e11b587e549da90
SHA16c22f17a42c093b246d9dee613ab679d2d000b03
SHA256fdd7dd8b4d96def76787a17da4b6a9d548e57bcd7d2835448c5163957d79b91c
SHA512176217c2a5df4619bce52cbdd0bce48ef8adb5093cb8a1409521aa86c8a09571d5e1797121082144f29c890cfc91a0bb00ee12a7cedae2e6016e858785502f3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509345b632118cb169b08507dbfc313c4
SHA1327f0c7835f5b320ec16c52b3a05f6119c6b3f5a
SHA2561917d64d4559ba1b426f38ae26877c7a0fef5d5896593ca452c1c515753ada4c
SHA512f80f962c05a29678cf9a4dfe399ba9768ad968671e5933cb1b37352f358d443fd87287e5cd7820a4d4dac66e2437840aaa2af61b88a3a1b550a171ae06cf0a6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e57990900e29459498245e4ffdb3156
SHA175688b12bb9f765d62dd42078f5e0c822e47a479
SHA256417f3a9920e9fb7ce1be09b9d22b09ff8fc1f5af232b24f67b274044477217cf
SHA5123028ae5a6b83371dd3e44d3034a745c2297c0cd4c5a22e2794832b06176ebbbd4fc077279b4c7a0dced2f05d3d9f1f8f71c8637b02f49b4886638f23db17dc81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4cc4b60c47b57a78951bc097069c002
SHA1e58749e218c168a65380b34920a55dd06a7e2a5b
SHA25611dbdac0193a1e799db718edf711ccfecd15f775fba9d053ea0251db172f5c27
SHA5127118222859cbf1b6db59f405a503a83b6065ad2abfba7e35e97c9e9f19093ee08f237d5ddbc21422854121f886d644ae6bce9f7598bb84d71e77c4ce1762b8d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528f6fba5136c45427cb0b27a3c62ffa3
SHA11bf99c7d4260c00af113fe2f0517589893c3da5e
SHA25668f41ed8a4710e79641423805d1e09fe53d8608844b0b03cd31410638c1477b2
SHA51291c5449cd2e5a5175599e6f0bd4fcebb3d7c10f9c74faad4e995129328f897a489a6534b913ee7f412334c9818cb320065c77add136e04a91a6be72974207440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c38c1d4a1dcc000ba09746de087f507
SHA125b825fa4f55ffbdcca8199455750a1ad7065622
SHA25613c50eb5105a162dee91ab215f2d6ef4a15cc7741fea63506d7496491c83730d
SHA5122940200e1f5e3ff6eca5da5bba65029a7b414dc25334778a2d26fde6b583a905f84d29ba1aafdccca8ccfad37751730d1d7e8b92f43f83b50b63a11d31d7eeff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d366752643b4804adebeda161619d1d
SHA16bc6ff58eebd587e1f3efa1a4318c97e180f0f45
SHA2567f2b3000f3504dd40845d358d3b8b664d49e9fc9d94cf907053bea2a6d3de7da
SHA5121112687f4a50967e3c5e1d17cb31a8f5b90193b811f1dbbd265c8560eec60b3cc87c0e036a61298309d12aad6af501ce18637132a6994cd9f7276f0a6d0e5ebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52dc7febd493c7a0aaffc5d5fcc54563b
SHA1071a2c580ea0dce6103734c064b2a2912cbd9c0f
SHA256a7a35e8a9af71c2c70f0505ad89ad2445101c8874d57a547c8a9ffc12d21e759
SHA512c8dc350883cabc665efd37ad463a8be33b797a118f277bffb60a9214334f62ab44734212ab067a7c96d3893ef30e6d16cd86ca219f97f1a3fe4d06cf8398221d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5577fdf5d339873daff8deced5adba1b9
SHA1408a7da640120d1ae771ff9e5088a420283f85a3
SHA256694a684ddbe07477c31e1f9667a10968ee846a914ce3f58086ee8053c80d9bb2
SHA51288606b9eb358f9c96b68126fec9fddf595accd16c2ac6c54608caef89a9fc254a09c42f9b25aa1c25c9c4630f51d2a3b928896fc4a20156ee0cbba0c14d6c128
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52740deb06885078d1eacce2e25c277a7
SHA19f59907f1c60071a42288d037e9b403fba5bb6ca
SHA256a31a4c5bef28387a25c4b27287622915c3b9e1b4e67d5868a9da23117c8c1081
SHA512dbba1183be20dd926d45246c5292d2ba8c1e9e61800fde66e72892d04cabef0476b987b2e251f62f70789e010fc979dc4737b5325db0fd7a55e4b4540e65cb1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dee94947f8d5ce1d3ef25cf925aed154
SHA12c24653052df5c7ed54abab51982f07b5f3c0beb
SHA25636086b6e4807f645417365860c172f3a029a60f5a960eef9e7438f17cd9faf01
SHA512af927659716f8127d2e1bd15a8ecff2b5ffa81800185dbc02543eb77a0686cea8feca0a51eac6628822330569cd519d54b56d856297c1a4f22130035ffa99331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511849a145c47f0021fc8f45b6800d592
SHA1daade072d412b013f8a30df1a26abc4c74c780ec
SHA256d6ae7df8b264748417edc2ea40c0d6a002eebd48bdd6a7a91cf16f126885738a
SHA51271da616eb19bc40a4b1303c309a1c2a192fddff98270d6e75ce801259e9b8407c3eae6117dc7e3065d48a232b1b41ea2ceb08d4ce0b5b66eb4e406708422ea39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582c8b2784a20a637ab961d25babcfc45
SHA1ce0473bd4157f87976a77815e759ce981aecfdcc
SHA256d5259448b30e64b7320c77d63f55012380a981c91039dc42a34cf710884aeae9
SHA512e8b05d5880d3b1cdda5f5d9ec971a75868b5fe89a2870852ff281cc4dda6ed127528758c49b1f6a4e60c48751a401a6b949c00d08971728387e081426b3341aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD556840e74c35d5f393ca2e1f6a659b788
SHA1e77e70e90116e118c34c79a9b728d1b17303571e
SHA25691ab919a77238c08dc34c6cfa57de579e029a6681ebf2da74229b8cefe09e01f
SHA512aa3bb812d1fa9b104adb8e849270879a479ca0d7ba68031ffb1415e686c0ff383c1cf67b443c00f3e847f590da5b968565085102d5a685f4a8ac5865e7c9e705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5991346707bc42b3439e69c89b1a53411
SHA19e12267e4b1bf11aa209a983a27d9a802f4f7cf3
SHA256d32cf46e0a0e682bf99845f79f10c56106168362dec93596cd049a9c192ecad0
SHA512b70cbbd32eab69f37434ff547b0e14eb91c6161a851115d7b4b67398f6cee90a1a8927e6cfdf29d11eb7558bf7209bf4d378009264bea910b97faaf36a2e57c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e2145e986b163cc25e14e675132f8b5d
SHA1ffcf6dc17a5e9cb76a615c8a444d52093ed53832
SHA25617bc36ae0d5dc6ca6abc2d8e393e50eb65cb1ca301b1e31dc034f07fab37c8ac
SHA5126f2447a94519821440a37814ddf55147528819ec72208d55d5d2b60c1054e6aaa387987694c9449c57dac4f3febfebce6390209bfee551839eafcde31e800b86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6effe5db6afc2efcb0a2b0b47cf40df
SHA18edc48e0d8c639c9fb2d6461d522c0ea458282a2
SHA25689a38e7497ab98e336adc26092a818f1397e06c8c071a96644d724a7b54ab6ce
SHA512ad9406ad91eead5b6f70d4bf00f4d0c72631c47a01fe979335763034cb1cd077d262af847c8d1931eba390aa483098850cd8352775830cfb1e52fa22938d3df5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53dca47a519a66adf14e3b3998af09898
SHA1f0bb8e0a55d550370f4ce09692c0cef77ec2fe9b
SHA2562ff2b165cb8da654b3cf007cc86f6575613fd1e6363f213aeee711202c73027f
SHA51213b8044a6ebcdb11e3db7b4c3cea459b7c7c02170fb1a5a14546af791e1d480846a8f402d3081320cd48ac0f89b33051d25d7f3f520f7c45b391d401fb750ed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57128996c272aa605041efdcc0341dbcc
SHA1a56704ffea677aa540892c8a953be79301d16b4e
SHA2560041ed361d16555ed41905ffcfbb6c2e9e83068bac779f5792b9f07d210eae3f
SHA5128cbf7532d2864b7c91c9e185044da3219f8565d314533b108dc522abc2c647db84aa78add181ba2f77d079d83d004b10b23cb64fa4a0e460c682c749a939a1a9
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a