Analysis
-
max time kernel
137s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 07:53
Static task
static1
Behavioral task
behavioral1
Sample
3387fc307f09acbd044d1ece421dd5b9_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3387fc307f09acbd044d1ece421dd5b9_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
3387fc307f09acbd044d1ece421dd5b9_JaffaCakes118.html
-
Size
69KB
-
MD5
3387fc307f09acbd044d1ece421dd5b9
-
SHA1
f6831bd5de463677fcca90690ef34bf02db3b9e4
-
SHA256
46a6b5200f02f2ff05e6f34c0ac6e1e7cac06c344d09df38d5be28aab4ec1a65
-
SHA512
2fcf11f8fbedf877877b2300f3a9c472960ed81e9fcc15ca476df13aa54261ad4d0826589e603ebb148e15c40042f13ecfe58ebc47d5b3197d16091e019aeb37
-
SSDEEP
768:D/NE2+NtiX628JlFhGQ+44wzv09A5o6gwZry:D/NGNtHhJThe44wzv09A5o6gwZry
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10b7deed78a3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421576108" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{17E7B341-0F6C-11EF-9A67-52FD63057C4C} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000328d32a92f18367b400bf1d85e081175dfa4b119e353a0c9c3d4d7b39f298c64000000000e800000000200002000000021a1a4d38b475364c17b6d7557ca6aec87502b490ed94c7b6396f8ee985bc92c2000000067d26791ca8d4fde835ad6a78ff087520cdc3ce4b8459e022abf6ef7f3584fdb400000001db8492b9c0eb4336a14225924d01ce9725ad71d899c8bac4443174df9d7190bbc20d8504f27eaaac1ea1f07842b825922f5a0cca618470284780e004aaf7dae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2424 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2424 iexplore.exe 2424 iexplore.exe 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE 3028 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 3028 2424 iexplore.exe 28 PID 2424 wrote to memory of 3028 2424 iexplore.exe 28 PID 2424 wrote to memory of 3028 2424 iexplore.exe 28 PID 2424 wrote to memory of 3028 2424 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3387fc307f09acbd044d1ece421dd5b9_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2424 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3028
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576000c2e2c6f5f5bd11782a967cae26e
SHA1cc1f95171e4ab5bb9d8b2ea5083cc2fc7228822b
SHA256c77ce18902de7c12f8cee0fb6e87ae34562027d86a8f54f7344dbef0e3ecb055
SHA5129546e1cb25a8002654e7365ebf9f281b20b123bae6934edeaf48531879980bbcf9860f0494322a1840888a4b8b695c1a9a59cfb63a633e437587d53b20a31a2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58220bb5b2e8406379b9008bdabf35f7f
SHA1d222b6bf3749449cc4fe923d6430f82c19de2a59
SHA256bdb93e9b509a7f9db59e201437d285bb9535ee688186b42b839e247a17c03999
SHA5128d3aa34e9b4b7e60346b6b2d0d994a2f7daaadde4f9e719a5e61913f78b25958240da9cf90153a69cef2ae83e2b74819ce144962c95670745b94bd99ecbca41c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562a702206047208139700b2e3d0b7e68
SHA11bbe6024b34738f6c0ffbe0eac570951b313c051
SHA256a35cc42c5e5155dc067848ad4c1ffc218252ac34d07e4a8f1bfac02408e95207
SHA512334bc7c0852f6c4bccb372c770f8b566de0511665fce6bfe6684876cf486e848d4e53463867773c2635aef255b7f3e5e641fda6b9aee83289a79ef29043f70d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5535e9619cf8ae4eddede5492424b5a67
SHA1944b75c80e5c71457fd72dcbe7fa4fb33796ee70
SHA256fbafd25810a559f303646cfc6b5be3c25aa7c54b9e5e0c48181436d4bcf0df6e
SHA5121630519f3c513568ffd25bd68ffc3cb16beea69628397071aa5ade9f22e7fd2a673810adce470c8921a1750b58902b82f6698b0981e6218d84786eaff5e7a437
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535d1ab8cc9a6f4ec5650c9a0aa2b1b8e
SHA17c55c94373399c83763f554f3383c82f1785ab84
SHA25687cd46b8cc86b433fa12fd3c3e677f41dcc1f31e885793f78ac074310765fe63
SHA512a9e89398947c29be689046ed5b5e88bd38257b7a87b247304095237bc96ab372d1c96b632457d50dad415408cf6099c64d7aaacc2fb955655ccb22ec8696f035
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e860974129b60da55cc166b6e2ecfc9
SHA105b2a2ee1b22c6dd676883723feae6b9288f4f12
SHA25696c509c6fdb620c170a3fff6aa9901a8d4a4cf82796fb681b82512573e0cdf85
SHA5123d1727f241a9314b99da68dd5c88665dfd4ff38ef44f3c03ac8ae80acb64071eabdbb88d2db56c66a2ae96ff002436c58480cbb5b061dac91677e4e342b68ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e8467eaf697ab2cf493d05166459b42
SHA14bad6cbc88de24042ce5def41405ec69f62fe7aa
SHA256a617d7a49ea72a0aa1687c20394e3c70d354356b2288ae003b53a88a7b0bb5fc
SHA5121e772530f5b762653912d8010b662fa2f037faf84979ef9d733de27037018792a1e3349442f370eb5ee40f49e2d21645b677dfd33047c24959ea4516f5d62e25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4248684be931a6b15da4a6f717717f5
SHA1429662a397779b9cf7f7137bf56bdd9aec1ec50f
SHA2562a399b75fc44454eaa6b6f0ced1ce81355413000681f7cbda0e06e22fdc33ce1
SHA51209bc6ebe6c105a8f1c443f594fdf8e36a0a05123c3cbed65463d268726e4636baae6465cc12d24d41c625c07a6eea32d2744c5cce8f8eafdb74514604cf9d4c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d1a225c895eaae28c789962ab342428d
SHA10b5d6324a7465df0d506b1a963b0fb3ffb1a757f
SHA2561be350df7a9ffe211485c5ba06199b6446042fd50accf6a0ed6c8d540f1add03
SHA5121cc0fa968010e85e1a51d667ba420b01bef33a235ad07cb9aed8b994a861ab82d309c7f58c2321f4ab1ed686ca74b826b8ce4b2f592dd81753d3d10df624c170
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ba2f2cccd5a43a27d12cb21f3f6236d
SHA1bf9d947735ce600e29ff627038111ede7fc99813
SHA2569bc4b98ca87d8b53cb8a1c7d7cbfad8906f3128c2f6cfaf2e78c1c4813341de3
SHA512335cf58f39091a37611c4ac4d9d61bcc0ed873ace1f8f3d9f35a683652b7620ba40fa7950a0cf76b77cd502a578c4997cf9f937afcd4133009171f80b88355d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ce819c0378914caaced4f0f8414317ca
SHA1a5fc96797b1e9352aabc4339aecbe6bb56752efe
SHA256e6e826ebf5bb59420136172731a71493788abc790e639051e64d069fd79ff785
SHA51285485054bbcead987a7683508a0bb1f5b0a1c531d2aedd0feac807d88083037506edbe11dc74d5382220b2720fabd786416ebaa05865af2eca541cd94f791178
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fd84d5ffdd36e2a8306c5e659ad0ed21
SHA130da6835765066033590310a70f222ecd0fe6182
SHA256924f194e51130f3701c7d8b0565229252ab58dec27e61eac144b312ec82a62d6
SHA512a7d574837a316d0247c3cfd1dd626844bfba1291667dbc54ef2cfc84ffa0a9c204badcfc663da378e91d57a497a798c8d09b962edfaa42a0b5667e6013bdd034
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5366dcaa17fffc3b5d74da7f2e55c4628
SHA1723bbe249590fb79024adf9c042baa5bb18ba05f
SHA256bc9afd01dec15a52220eed6416671d5d5c0567ae39c13dfaf87216a84e42998a
SHA512b754270e53edf6e72410f3b8db020f736d8d1eead7b352fd81171a1b23cd9d868f0a783f3bf6bc0425dfcb756cb398f922071bd48bde0625fc9c9ce8d93f5374
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ddfa0b753099a7b70e983d013badb988
SHA1584e7057ec2464bbef35f51eed4f02109f7ba0fe
SHA256774078efbd40ea4f728f9e55524360adb00baeddea2d7331ec6399aa6893edf5
SHA512961a02acb78310fc4c88fc85e76e9d22d43c75209bbd1175be1f857fc0fca56eab467b49d90682e0675b6ec46b48e3e3ff64e8547a11c26cb3d8a7b4fcd25dbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54bccedfb82f0dcc521d9bb793be05660
SHA142adcb473c84a9c2bd97d08664e1f93a90d1364e
SHA256e6c19627e5f893f2c4d2696d67e757ad7078065c0c13ef762559d7943e42edc2
SHA51223de05f17d497fb5c04d48afda26b9085e629cfd8e9308a8a8fa8410a073e2eca1db52957b16ac593a2bf6d08dc4e3f5d29b37f4b5d7789384aaecf390f41643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d0578e1b1aad60d01b548146347038da
SHA12ff36ca3b032149b530cc5796e3bea1d59c43249
SHA256da93d55359c2349d052d316c6633a79fd83c37ddae36201427fcfde66ef7f944
SHA5127688fed5b7ada373908648de8a3b0ca4780cdb36c618671a992fab7a63b4a5d55bbdbd697267fdbb466e20d6d06a36973e70692ded9a8368d329e1382e422244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56aa2fd41b339fc65ef6b7c8194567417
SHA1ca3132a9699430855f6daeddff7b6e54eeb1c1e9
SHA2565dca22b0c0db8866eb1600bd3584fef23c02e92f167f8bd35e973810b8933678
SHA5124dd5963d3b9225f7f768c2fe1eab28ce6e5b326bc006c02cf8276182afcc8387f856abf50890d4af592928b7e7ab8d42aea789a0fff20c8ce9aaef3eb971427b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adb61ac3a7bb3020556ecc35e64eac9e
SHA1ef22c3c8fc4d5e777b5a274456bb2d5d01ea8e3a
SHA256b2c0165e4811d34238b5052c7a8ccabfe69804c4d846dfa478c2b818edbbe909
SHA5125a16ca46ccde6c10a4b8d24832ce9fb753e764e227d6cd3b70c2cb15b7ad01180e1df2033a7d5ae0ad4145697264c265d81ac2bcc4b5e44451387607370c8880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588442d357f211b7ee01be0927921295c
SHA142515b5cadd6a584824514df62784635d1965e79
SHA2567590c15bb93438b0d8d290947276d585f80ccca487cbe4424922249a47edc02b
SHA512eb8e1db05a35061b4b32274f7c80a398cd97035edfed824d66f46861767fb27c9c1418e86238e20a6438c861b4308681b3dc58cee0c6aca585bf5338beaacef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9bb167882789f4a155e01c7d78ec1ec
SHA103e44fed870ca39df403efd623e6ac43e75eab7c
SHA2565a3d3a40a7c939ac586f849a9dc20e5fa8372a063f5c44ad199f0135a82b9b80
SHA512363cc00563e7a151ae94f0bdbd6cec0f6eebc82e35f580a521e5550fe9c0bfd93e210c2d4956d18b12269994db40e0f8ff04fe13a9d9cbe74bbe69f3b0571375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD518a58bbb0abcfe9c6da0554e9c592c3f
SHA1789919c86e7c7cb4f033df8f88ed834d7204a1c8
SHA2563bb5ae25a30ef4b6ad2640bd996e692078e19bd245ff304a3c9f0d4e6f15cd6e
SHA5120ad8730135b42fdf8eead6a60e070f1b05984170486984d22c48e3c81fd2a8d695c9aeef449f2bb77122b3d52f968b42d48625804395ecbdef97df60e77444a1
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a