Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:29
Static task
static1
Behavioral task
behavioral1
Sample
65db51222be756b90973974e83576ace_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
65db51222be756b90973974e83576ace_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65db51222be756b90973974e83576ace_JaffaCakes118.html
-
Size
34KB
-
MD5
65db51222be756b90973974e83576ace
-
SHA1
013fd23755393fa122f60d976e53b9dc2e21f5f6
-
SHA256
19f4a4f6da99336ecc86d92b2bfa8e59dd5d9fcfbdb9a4dd1ac2dda6c399c9a1
-
SHA512
cabd9aec71ab003277333526caaf1932d5f79cde7b5a6d4759372b9dbef42a22bb9a0512b382b2b6e7c5704698fa4f8df51afe7f81cab93ec307b9aa9b5b7249
-
SSDEEP
768:tzTisF/+i9mbnvrSF+UjWqNCGV1ecN1tA0IwX0Y3w05NmNwN0iZz0VLr0kbK0v74:tzTisF/+i9mbnvrSF+UjWqNCGV1ecN1n
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8385BCA1-17EB-11EF-88AC-F2AB90EC9A26} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422510443" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50334e58f8abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000c9f6e894351e916eb798673a6d323033f1cfb0a305a2cf689639b99390ab41a1000000000e80000000020000200000008b53455b48a1f293f886c20ecdabfe06db259839f38df829e00f6cae7165b409200000000d54d1c504035d95778c17e74d4c2eb5007b1d2cbe52327e0ea43ce828f74bc9400000006323b4b58781cae650b2aba111b9093c10c6cc5aaa904fe3908b954bec4f15fa057b12753286126209e2537b9f7b3f5b8853d4c6785ff00616b7580540ae1af3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2248 iexplore.exe 2248 iexplore.exe 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE 2772 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2248 wrote to memory of 2772 2248 iexplore.exe IEXPLORE.EXE PID 2248 wrote to memory of 2772 2248 iexplore.exe IEXPLORE.EXE PID 2248 wrote to memory of 2772 2248 iexplore.exe IEXPLORE.EXE PID 2248 wrote to memory of 2772 2248 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65db51222be756b90973974e83576ace_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a39f3534dca0cf9373702d56500bbdd6
SHA1219e60bba295a654355099ed7c5139d7b3898782
SHA25697dc820806f4870c1c666c8c2aee8c8dd7a2fa9a283c5f7036b4615b120b4fd8
SHA51271bf8cc6f785e526a1c0767a0afa86fdb1c23a9b53362b65937f0ea9c736a96310f4782499d351382bc3cba8e32cc8233b496eafe9e19178f3faae8c9af65693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5677649bdacc7eb9f6459922751556afc
SHA15a5a4d9869db445471ad42b2cfdae666e15b148b
SHA256dc1e8c7052c096ceeaa078052e07679c2ec55f2791c06dd9cb494fd9d34877dc
SHA5122fb8e6aa5d73caafcc535f5826cf192a1706300f67c5eaad209a9614c8f91e5f61c4ce943940f3cb0cc30e81ad113cb95a0be92258a1d3d013b7e10db0fff472
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e87e160e910f1a2440207f51664c576e
SHA1b15819df220dec63a31fab0b69d8e66d6d103cf7
SHA256ae4aee1482a12a11f53ffef817fe8affcb9b708c8feabb6f1aac5c0bdacb3676
SHA512d7ca018c2bb52422c9ee7fedf0307055b1b88f948cdfba202e78a75f50b872b9ffcdf8b750ce12127eb3313c024d7bb6bca39bc6dfda8de38c29baa6b1df033b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e00407fe684da7e7caa09d2c2955a1f7
SHA1c511966dd1f13deb0df903071aa4eee9c819caef
SHA2564b8172f7d8a41c8b59a00396245623ef14c63dd3ec838abc88745d9c5e114e0f
SHA5122fa2024dc2e6f84f7015e366d9849fac315e02aed62ed55dedf4a3d97d5a9c522b1b195ca529e9e6e7fe3f45274aadce9a28a9412312c6875496d37c95428ff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b7d4a07289c88bff59840991be6df7b
SHA1991b044cccfeea856a95e993907ba3e1298bb69f
SHA256a30a55c098268d9729f6ad9d52b9c4cc622b095dd90beafa1afb50f858200634
SHA512dd31d4ffd5ee8617383bc476b08e36f5d142d0564003bed1ecedcf539f104c050b3cc7bab02d09a52ccba0d924214e2458e84f62a898f3bd6225fd0c3583eaed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba96151067ff7c3338bc9454e0e3d269
SHA1b5df270dc0c6ea2da8f8bad800f83b3226d6dbf7
SHA256802ae628d9e5851924266ec94c4b80e9d2c41e84b802370055388ec80a58ddbe
SHA512a3718c891435229ca60af4e6c4ecc90783dd78c9d34fbde76045a97029ea79be78a930b5508a50c60198abd461c68e59359384d6b3bda41341817b64f356706e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e6f24c737e8961f58720d3cfce7d0fe3
SHA1378d3b95251536fa4a231139f850db76c44f32a2
SHA256a55c0897a81016f93dbd8b15993f142fe4a772dfc9b049b0be73386af4ec1551
SHA5121b51aefae7d67cc97a5791eb2873a6f8f82eaf38b25c12fe6f5b28d5d2d03b55b5b48fdd615746cf379e50bff27052d75acc91d7fd4aff95da26786901beae05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55438d358abad98a5f9899be1ee0051c5
SHA1a8ae80990d1e7445379f5a4fc794be38829c6803
SHA25649bb1eda269d6017b88cc7588bae1163a1799483434ce9c92787db0f6a4007c9
SHA512d0845e9b106f731fe135767de09da1d09bb2c7317b339ad5f1482d30042dbf6ad5446fb1abee33a20a97c602ff406a00a44521e2427d9e033a9758fee05726fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51f5a9b3ec9a5fbfe4a7f4b659989f068
SHA1902716577fb8a2e93ed0409db112c1ef86e4d622
SHA2564ee91f3959ea9105a03164697b3052a51e2f7a35f88ca3151aae64040dd22fd4
SHA51292cd746208d368531efadb91a99549fb97ca6740ad084933e3e617113a0ea85a403e9a1f70f3f00078f5030cba1a2494da4da858d68ddc04ddaab74dc523d46a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f12a2bfdc292de691633f55b6097b95c
SHA1c1ec6d82698bfc474f4adb1b9a981a01e5f05486
SHA256527874808df4f1c67631b51f3a575ba235fa391537e61a327276bd819c57ec72
SHA512d6f5421f51fb840b645b6066f7e9a762e338d57f7497b0a14857e2e294a99a0a73904f388d03ec127aa58172bc93b878a1ae3de7a749959e8be35a1ca9ff2e66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56613e3aa70c8056c32fdb47fc18781e1
SHA1a070bcdc24dac4746f2095ba7573260b2c6f3bd6
SHA25663307d4e96db1ae52f5c392cdaba6624a2b18e79a864214552bbab48812c7395
SHA512e77a984609347414714101b48bb65a8ba8ca15c7e6d782d33ca97c318c10f62665ee3045b2b19b83a649c1bc6d0940a68b13ca77c3ec47ac3a53180bd785cb7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503b6f216e618447dee23188c5555671f
SHA157dfab2c32e289a83acf81b46e93c6fb0a2693d3
SHA256604fec634a942bc0fd614109fdf324d9304ec593edf99543ff9ca0e1e424aeca
SHA51285c6d5662e782911d15aeadb4148847ac8dc695ebb66f3c716e68183eda3499c8c0063a44e96752699da0d81b1053d3568116034d1315557be4284f53e2787f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa62adeb3d3b2c6ea1851c68aad39965
SHA11219c7f356b052eaa25ca5b3e3096daada44c236
SHA256dfd0c0822a49dc7625f72230020ee668121ed1f055bb764ede572db61852db0d
SHA512fe39d4ff8f4ff4be867472ccc519e970efb206ecd451f8f7a9b870fd14bc668166fa336c55bf2a752225e21027a218c3ea75c5e3f9cd1fcc370d3a7df6f73776
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c8de24702291ed72be8c823370b36a4
SHA17eac90be5b303ac0bac9b8de70e948b0157ea707
SHA256f1523e701e2a109376152133a2eeb1303f05d413002f1a34cb72c446143ca9e8
SHA512995aa5a5c6078b1302622414f6001ea78eb44b87b13314a527de8ddecb472c5eba6523c9d5e6e949868fc23bc0c21843fc2f9369b4a936c12f2f774567305b03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b9540a88f7fb6b035523dadcb79c41e9
SHA10a5f48515b6e89b3ecfdb7cfc5dcefc467f59167
SHA2561efd2ea42a55317989c729b9fc4a2466ca4a8caf7d034e0be2bbd8b1fd92b3c6
SHA512ab7dffaa6c032cfb8b25fe61fdb4fa22fb10dffbbca493ae432acbe8c6ae71b5f70b7e583e9f854f16332108558e2b88199c0f008fc4610493e00c4a62a2e186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f88acb1a5edd80ad6d83fc3b1208fdf
SHA1292509a61830a5d49ab398b2b8627c16a0f5cd42
SHA256cebece47b8f09d6ffbc4f0c0d66294e840f2acea60be5c3af59c49f2c84714d8
SHA512e5ff8ed427602eb4984239095d0bcdb7698e0c58dbfca32f15877c32e9fd9b785f9ba8a126fd7da9ba750adfdcff85ea17bf59c4273e9fc672f1da496928b342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f21b38efe0faf120f0fbc9a624c3c867
SHA1ec4bd6e206d23956551039a7e81b6847addd1695
SHA256714c25fe8a7ccb302e273e8eaa6668e5b3fa59ea932db389157bbc6be5270f28
SHA512946e409b39067416fd67d3a8c7134a4a7df1c08e28c8600d8e03815b66e07c7bada5873711ff832ec272181332cafa5cdbcbc2f19682211dd3cd32ecca108839
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54962966efe259c4061eadbda3d071410
SHA1b8abcbaf20f1c5c7e5d04683056429c86a3150a3
SHA256364582d2e491fd45af4116aa310fc5d72ad9d9a49fd4a1d3b99f6ab015699e4b
SHA5121e82170ac64a7e4d6ef8c925a41335161fb2e140003797c2a73bf77a3435d9d829eb3338b8508c48af0110a2e7b6275af3b4b001ed42e8d45a72608cfbefafa1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f25735f5aec1773c059ab23ac5061da
SHA1c25fb039ba5b6daeadaffea645b8dcb01dc3236e
SHA2563f0d17f214b799462fd075769722e7b0482b90a5535a88418b77047ff42043a6
SHA512d019846f020cb996f94ce1a8bcf39e0138889dae32c1bce30e814e1f87723c9048f091476790f89129a537ee6ad954c6e6348cb4655fc77f2860ae6bcf97e4cf
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a