Analysis
-
max time kernel
120s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 01:21
Static task
static1
Behavioral task
behavioral1
Sample
0410f4078fd916f64688946ed3cec31d_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0410f4078fd916f64688946ed3cec31d_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
0410f4078fd916f64688946ed3cec31d_JaffaCakes118.html
-
Size
3KB
-
MD5
0410f4078fd916f64688946ed3cec31d
-
SHA1
0c80e0ecb075d344a6e9bd1b416fded9b041ab94
-
SHA256
db2e04968733262b15c231ec1af9415ec6536459a44efb2b608b93311649be53
-
SHA512
b1a50b0521512b89c91afc2f9fef8a351c7858ccc9d9934dcc9a4b7b01e053ea8325b0525035ad05ece7ec315a598a98584e21f4ef5ea016dd4bef172a375f7e
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000e92690de6d7be9f99670003b6f3b17de6104aca4d59c385fb3ac9b8a1da7ebe9000000000e800000000200002000000040c6a97a6118b790ee4369e81634446d9acdcab676b0d5b66e77fc3305a9561220000000e01aaba1fe9f07b435a4d034f6d9215aa274d34b175235ad1fbaa1d685e1ce9140000000816362b5d88bbe7952dd064e4cae0defcb07642cca74a6df65f192b5f7d5f91d4a4ef7f5ef131f3d4cb0a6b1064f8a68aa9a9bbe1fdbdfbd80f59a7d00296f56 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 000419860a99da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B0DE8201-04FD-11EF-A1FB-E299A69EE862} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420429180" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000678ebe49e36e9d5e129c4870ee625df0961ea00f17c0cf43c169cdc10871e04a000000000e8000000002000020000000b2da02dd1c63c440c8af5fc0ce8cb5ac589f83849983dfc55abc6f66626ba3ca90000000e7e70095032dc6ff675604aa804e10b80a8b5054c0ed60b25560e0fa953fe78ce4d4584791d8930d14f68cdce15b55f2a985a0c115abaa124ecd8894e8ced35e9cd2db541c661f10a410aeb50b1d9928ba6508bfe2a9c1ff6263868a6dd96150f58b1e97c702ec57465336665783fa6c52e4b5e8e0148c97ee5d7b6f5bb37a3e5ca0d8062aa508077f4aaa08de13ff4f40000000f36d4be75eb2b3a5e00d81ad86535a0eb178771855906dee59e14d3e2531d913bd09c3bea215f18118aa4cc7bbf0984e9642590ff63f95cbe5f840863b82b5fc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2868 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2868 iexplore.exe 2868 iexplore.exe 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE 2500 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2500 2868 iexplore.exe 28 PID 2868 wrote to memory of 2500 2868 iexplore.exe 28 PID 2868 wrote to memory of 2500 2868 iexplore.exe 28 PID 2868 wrote to memory of 2500 2868 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0410f4078fd916f64688946ed3cec31d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2868 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6a69a3926cbf231ca8f5f76b71a29a2
SHA131b00d60c1699f146888e6246f9e86b91c332e3d
SHA2561ca88d725b33cfb581597da53e04dce8b2575a800218d9b175f041f1feda7ffe
SHA51230c02f2a35f943ee7d1b03b90b56663918e2228b041765e254ea36126dad2e3f59b57203d8c12677ac39b3e03ca4e6f45e50748e16d8e3047d1b16606c5fafb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed316bba131927883d9ba415f36f3189
SHA155321a5073f6d269d67a389953d5d605d1076d41
SHA2562fae39618f2b126159b3a220b485524f4186cfceb2c8591ef18d7c30b6c61b6f
SHA512c80f18b72e6b8b018de53f0a56f217874628c543d81a5add51b4089ffb89be6ba9d12ea5b6a48470d3617877433e810680c8328ce98be763904212f37d775019
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561348b22c90647e7f02ff7230f6d04de
SHA1f2f5b2b6f766e27b3ea8f05bd9c1b064a7d042da
SHA2567ef8ce0d023d7a069a4ff53325af1e6ebc921972cfc026a633891d1929d0f069
SHA5128fb0b6d4414ac20f2f7f86584fb2a9c9416eae2e3d382572e014b167c12e77c0661d22e9ca2b39c17d0f35467c1b273e826ad34659046b022d19d0e9c16d2ea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54602563c77ab396a6e69f01c8ce51621
SHA12fd4a3c97a7291bdc84ba87d0f04af85c78bfae3
SHA256718247af35bf19f077e6e384877a7e923d2655aa52fcabd6de1a5d9116ff9361
SHA5124db905a410856b9e117ff5b2be708b389b0b1177bc9f3925e04f7faeb8c47e21e2815b23fecbd5c5f28f4975db109ef19146f94d5fa114ca21a1c5146f31d6b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa44c7e7db59a9e0d98bd6ba3310ccd0
SHA184d1ef1a1830be6912e81a500b9ee28962b04a63
SHA2561a80de06ff6a6171f1337093fa4b70d8d91202b5eaeb4d4dc4e5c4853836dc24
SHA512c9c82d19bcf2dcc928881c97bee315f703008be16fd674e0e45892cfbeeb3598fbcd5cc5d855c3d3a15520b8162022e59404273291fff4cb29b582035717e96b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5234f83f25716d0f3233774fa03a93063
SHA18c16a1ee21e531e5d175f389b32ff90fedb8633e
SHA2565f79821bd488041a04ee3a4a102392ca63170bf4bef1cb00d8d2f51d898158d4
SHA5129ffafd5e1a302669abd2ff7ee02357c9364211e80c721b4ccde4894ab6bfffc57896e44806d5d6995f60608f5be1be0939c31a4d891789ffefc0c0a5ea61bac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b387edae19e83debf1b1a3923b8853a
SHA1856c3b05e9dfff763425660ef2609ea54eb98935
SHA256786f1b5073ae1f9cacb2fdfcbf9f6e7d271a3ec7659828780e7c322ccc0b1ece
SHA512d0ede66e8cea8047779bf7ab6dbaa70129b7423f5bfa376c0be9e2bf5f77583881d674504188d8605c3ae5aa4df16396bf7cbff60e7b91793fd33ee562172fee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b16c0fec2ec2e1ee75248d9fce001138
SHA190b5ae9a69a125ddc7e3357d2064b6ea8c5e29fd
SHA25608a3323302da63503e1c4ac2b75ffa86268eb1c74c5fa19176194b3ece750857
SHA5120df04d1080a2a1830a7c0e72d5f761fffec43d1899103b5cb651528d1b36412db606e4750c6a14cfe09708bc9035727a6124e989f549f5349f74d13c8ff43192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51452efbca70a29336ed3b853400f3cd8
SHA1ef0728c50934f32ff15c16a59e86f3022810a878
SHA256be8bfd7b88c6b23a851e15280f3a2756a304750efc8fba52ffafd6ade31671f0
SHA5125b72304c8af2dfc174d03e785e101308316a0d32f1d8509bcf393477a1443a3f8bb090b564f31de5522df2e74f4bf28be527ad3fb946fc4b2043c6d7ebc361f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523132893895df83d0077137385e6f0e4
SHA14358255d4aff441c62a85177c73e1024fe2083fd
SHA2569690a4227b9a2f7fe9b55ce54240ff5087c6ca6a4e6079ee3a540c9f5b247085
SHA5129cebd27343da954db05f8135234fcb63f27e2eee19f7ea696064f5b30fcc5c0bfe6403e801dbebd2506eab3d94ee1c13714d4e5ade1900e04c9cbf635f7989b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3c902542c2555cfc6da664d0e290a2a
SHA1a1f204209391b8c47bbac5c6817304b048305a9d
SHA256771aa6ec3dd6cc230be5488eac17d8c02f52cd1768d716cfc51a1230ac73a5d9
SHA5122213a55e0d6ebefe7e59aca91635e49bcac9c028b598928bd0b0501580d85f20586d8d9c099aaf9a25445d5e34590c2235728d5fa0079482900448925de10637
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54290188b3b842c531c3420572b6d69b4
SHA14b4cb26048d28d2a604592aa54f6f549a447d551
SHA2560d990406cfe2ffe2247139caae4c1ed44ea3bb504d5dd2ed0e98e27ab50af1b5
SHA5121783b2e94cdf903a2001dd0759a722551ea4b5a63b1186eb0528d08f7241e3d7879eaca4753f914efb82db670d9ffe928cb7aa280da53f8ff2dfca8b0c0ee3ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad64a4483fd879eb96624a764c66cd7e
SHA197635a23408edeb12b0b92cc8dfe7cb6be8f5db7
SHA256a797a1b491a9d02e2086329f56ed3c75858988936dc54773a8ffac5452b4c930
SHA5125e9537a775768438b9e243d44a6b415663dcdf773b8511097329ba61cfe1ec2a39dbe1018cfa17543d166870d1605f715a39e34419aa79f83d3fbd06abac1a3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e46224721c1ec324aa45c5c6602addb8
SHA133e7a24f2742ef15aeccbc27fd839ea90b81f0b7
SHA2562ec06c479691a4cd562c06d2679ee0cde87f97f950cfe523c180827ac997d131
SHA512733f9278bc635f59f70904abd620a27acbe20109dd0493ba01ccfa5c312d48c8c45ac35806d3c6b8bab670d3f8eb2ec5027fff2f2c215ebcc02a808196acb4dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d0763153720ff379368da5ff443589a
SHA1b68bb45b707423dd9a2e4274430abe5301961ce6
SHA256c04408e62d98d56e90634a645c3fe7c2418993a21cbc3a39ed814f318135a1b1
SHA512fdff0878dc4fa08fa82aebb48c32b92ec1644d2db9287f49719958c145573180d31269fef8eec156126abf38fd7b6dce18264bcfd443c8c7fc2c71d6286c994f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a12316fe710fca84cb81a79ded430674
SHA190e861eb0aa0f5576769f9bd463c825bd36bdb60
SHA25621cd6b6cc5d1e0daaf86db72ef8d023aa36dde9e792ef408b9f5b78e1aca1145
SHA512eb90fd21f2e6c96b60820944e1cb2ce611cca3161badc0c414631d93fe04a8acdf925d753c0c4fae0c76d29ceda76982ef7d32fc1f5249f7e5e67a8d55a100da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD560dc4ec9c719f97f5d242ba472793f4c
SHA14b47c40b52971dbe2cd1fbf1b187820646f01010
SHA2563aac5533041840ca674044708a8fea019b5ee99e0755fadc060ed95ce3305cf1
SHA512f7dad38925bf24600174cd52af8883f518b663aa09c2dc4ada16492bccf6d1adff23b3a7db183ee4ecb0b2ca2f0a3e89fab9db29e4ac42072931d67feb8df420
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5697242679332aaebb28e21087634cdaf
SHA124ea9c29431c574e1d0faecddfbb6a4c846d898b
SHA2566d1ac94c064a6d8d20b498c5ac581a9e4331a0e649ef81d7b11dfefbbf12756f
SHA512e64e51a76d0c64a489c79bbd7d80544f1d94df2579799f57e40365773264775d618d659a19dab90912cb6df77b2827044fbc5974bb11eb74aaa87464759b7cdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2d6eb386a4658d7bd5d0b5e86285889
SHA17ed46fd31dc323f33ec35ecc536528ccc1060d2e
SHA2567d1865336fd321c22703ea1fcfa887bb1c999cb8baca6a4e943ceb7cd9c06625
SHA5125bb638233d25579c03ee2c8797b11595eb6f87ce4394830f14738cd6d2a88c24bbb806783bcf08aa3798ae4352e41e49f4932573b3337ce565dcd9848b27c378
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a