Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 03:30
Static task
static1
Behavioral task
behavioral1
Sample
a7dbc04cf8dba2b0933d0620deabc0f5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a7dbc04cf8dba2b0933d0620deabc0f5_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a7dbc04cf8dba2b0933d0620deabc0f5_JaffaCakes118.html
-
Size
2KB
-
MD5
a7dbc04cf8dba2b0933d0620deabc0f5
-
SHA1
46ca690d5a14dc43f57cb196a5a1cbec8bfb7b5a
-
SHA256
31a07d2697c9ba8a43d941db9fd2e6b1229ec52b61fbf7ce6cceaa88ac3a64cb
-
SHA512
e79dbfdbf0b66a87c23e9d0bc2af74bb32706b34b2ff0eefa1d9c95f24c99e8ee26f9b9ee3d28836ef2e41525fbd698be360f178693a4d067ade18153ffd25a3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10d892570bbeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d3f7306580e44c4bbfa0f000aba06ddd00000000020000000000106600000001000020000000b9a336fc66e7e8107c0a7323d7692c99625bedfc50ea8a61c5694cc1abf83bcc000000000e8000000002000020000000ba651be51403910eaec48efe8df438f08c255ed4e1e71498862deb8fe83d03a390000000348272435e9326dc53764d4be9c1a21b4deabc712b81607e5b5bfd641e436ce9214bb218665cb81c3e57bca3663f6c734be2acbe6fd9aa60645539f12034ebf5fdaedface2f08c2e6bb0a0d45f11d10ca1bdadb1bbff6bc02e6c6dd5fc33e7f032028489288ff99f66378a7cf039f50408e5f5c8dfef16eacbc49a6d1fc4d55c150761fd53e46e371a1d5c3096eb95974000000047d6f9e2918deb6326b444f9bd7f2be4c0c8a763b616c071d9f7c07e60ec88ff6ffbe660604beeaf4d06f9792eeaa020e455bd9c4c89c49630144f10527c22ff iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424497724" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d3f7306580e44c4bbfa0f000aba06ddd00000000020000000000106600000001000020000000c51bd6eae634ff9b07df4f6325c649af1a92e862387bbe9a2f2c00f74ea361c6000000000e80000000020000200000003557fd3117d69f513540d11e8a530a45cc8e3b0e4f185a2329e4359e17d2ba4420000000dc1309fa1ec60e8ddd268037a95654ecb74774e55972dfebb844509dd7826f2e4000000099bf7c9c4988459dfc224b161542e36d7c85d1f215777f509fdb1ac11eeb4efc466a71df1a3f8088e1ca42deb61d59ce95844ad4f9b58763f7b2afffaf0e445a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{82CF1481-29FE-11EF-B1D1-D2EFD46A7D0E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2864 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2864 iexplore.exe 2864 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2052 2864 iexplore.exe 28 PID 2864 wrote to memory of 2052 2864 iexplore.exe 28 PID 2864 wrote to memory of 2052 2864 iexplore.exe 28 PID 2864 wrote to memory of 2052 2864 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a7dbc04cf8dba2b0933d0620deabc0f5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2864 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d05dcc2c01d74d55aa2e01467a99e3f
SHA1a5c62debdc81422ce2c9bc8538c2cf21c0da64ef
SHA2566facbeeeab1e369135cdc14af53b6b50a989e84a53ce1d226c5df1474a0f9ff3
SHA5127eb210ba87b3aeb9ea4956717891aa1ad1d63f7fd3a99386b4229dcc223717be21a65fb88171c76eb1b739e0a5a12ccd15ce0640411ef36a305bea3e6251d5d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533ec6e40888865a17dbeb9e9d8caefec
SHA1775039ca1c322ebf1ccadad6e86a6e98f923bed7
SHA256947b8c267e805511c71c7118234d403ad6b6f408d0908898c4415399213f4214
SHA512094f513b0c46bac1a41dbd3d80874bba11f41985c3a09fe3638b8406153a20d418eaec7c8508c6136782b5b4e8e32c7f2b0a38df4598bf83ceabc41fc14c5633
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540a0d7ad8d1643834abc08439f0ebb42
SHA120f212d05cb2cf69747c6ce05bfd0c37b2c71319
SHA25630a727b29093b9808535f89ee7309417064388cf9ee8c6e75446d99acec69435
SHA51290aaaf7f29241fcbfddafa6a55e7d929daca051278c2af2046b974c217e2f145b6890d92ded867c4b02a3510b1eadaee39be9592a4e3aec31af33ca439ebced3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdaa2a0aa8ab27b47d4bb4270671e18d
SHA1a31a7be5789612b860a07f974fd2e85ce210f6f1
SHA25610fca0477b6405ddf734a7b230a66dc73fc9f5eb860533ba40726ccbbd1ca61f
SHA5125f6aeb403c3c5b2bf4b0d2cfee1d6fb148b7ad0dd16ea870be70ed66ebfeea85f03423d44c36172dc193d6e23a880fba84ab78e5768e5def3466d6d67c5d9351
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566efb587bf0e8e7b415a97b856201f7d
SHA10f7ae0a04ccf6ef2f3473bddcbece46d1d81db64
SHA256ff48f3b0b868369052acbaff5159ada6c74093ea99dfbbd7c6fea72e436d5ebc
SHA5129cd38416ebcc4b7cf5f13968ede480c019967da02c85083f98fd40ef5d561c292c2a35ada76a18ab8a1b033a5ee176b7765f9401691eb4b4ceaa474a81de0430
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ccd794f0d62f668f59e919426ed5685
SHA120f4ac60ae7bb04ed73ee9870cc2f0a80a35362b
SHA2564f8bb201178f66f87e16bd30190fb5635adab8d4d3d02632de043562c3665d8d
SHA5121b05244a69f073247ec1b3c221be561f2035770211da93823db781cdd73c31d1e8a9dea24d000c0a27961b247982dcad6d293c747305e0599dd1aece78188f9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbd37b59015299cfcfd9d19125d0fc1f
SHA17965c75daf30ff15fa9d68d43b45fe07c5609332
SHA256c7ec2f91779d76d23ee18be9b456081d30e1f0226cce7a1e9906e2a46b5868ae
SHA512e0da45d4b6a092d3cae914a014d8d1f44b922c54620d9ca87d00dd1c1368ee530d1c9ba1a7ea4a1b5da778569de041b25c722bf1c88c932fd3913e5f2e029bd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51571f6cd67253b9bd5565fbba43ced1b
SHA1ac526891cafa6c30f589c1fbcf4c708f4e8c0ae2
SHA2560065464c1b8938ffe1a4678f664353c4d32d334daeb2b85dd87c30010ad4e929
SHA5124d2ebb1fa312d0bfcc58468080cb2fb3f0e96490865d58b9771323a497db864adac58535af7759fdeb397bac9acd30d42f177997de6cad090c560a662477392d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fa34e3cfaa398da69dad5851b6a069f
SHA1d6cd68841121da3a031c9a317e6ab1242e489a2f
SHA2568c229a0be5b96607d603755dd5dda5fcdd4deea6db87e25520d2db0c92298bdc
SHA5125cb24d4dc44dec26865f0f7ad71f5e0ea83254affe1a1066011a5e67c1baeee5b236e042a10c3d084741d2148501c362b9a26f33402ccfb4caa1c360c8a97c29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dad8ba777cea70ced5d3e5cdbf516506
SHA1e54776fae36acd3862a5102ee0eb9551a5f2c585
SHA25689fd2c07c427beb1522036fdbc0e76355d65f21b122f4293fa6ddade940d9923
SHA5128a7cdfd00c236d4249d733e082eecf33dc16640d90052b8be06736acab06d69b848e5e433237cd4be110106452e4c44d75b472e87320d6c5062634efc518f429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546c05163d38e23db2ad1e57b1014b03b
SHA1ec4d9df2444a5c83e2c3deb84a3581a38df5715f
SHA2560b8e0fbe7d33adc353ccc9919cb5476258fc402c99281cee8b87a7d5cfe70e32
SHA512501405e77b3bf677494dbdab9b57d4410f95c5f4dd2c2aec5b9facaeb43857493f1a462adf82ef0ce7e783e4b0cf94c8cf883fac0d4be684dabf9fcb3ae9d3c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbc5e26716cd5d5f7ba14c2f6caca393
SHA12f96c44405fc9238e14ab4d7a3aa95afa0c74529
SHA2569f6350c6d40df0d4e3a37a21d04ffed95a4ab11e31abd4216f1af6ad7cc1614a
SHA5125cee66bae105cccd3597f08a9282bd732544346eac982680dd4d87c5a8c599548badb4002b8a4b209727dbb9e946c507eb779b3f11cb53f07b499457ceeaed12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9e89d005a06d34d0c3ce97bac64d436
SHA13f88fdcb9549ad58d3c633eac4ec1fc526ffa6f9
SHA25692477dd14d33d94639725854576d639dc2b452cbb4259de90f2f9faa48507602
SHA51245e32169dcbb01d3a7ec9b4b63796d2f7de691ce3f35e931145a9198a5d979a9d8233eb2fa2d11d05f6da34c101683543f915d11c2313511f0e308b7a49274dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2f3971b4d9519e5ce41a18b509817b4
SHA1a3034e8d5a011c7343f8a7531ec9865a0ca3b6bd
SHA256e91e083e1066212e3f7303a42aafc33ec82b6e7f5272161ae80fc1e18c3ee7a3
SHA5123e9dd2f6c9546551290476e93798da9d517588b9921072f87b9684141472a49084f8493f62b73301f314c3d73366a990fc5d1bdf073d0f1f471dabe4b95e57ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568a0dc3f7b7cfe00fc321cc54b0b795e
SHA18ddc770b6faea23ef58fe7e41a090e8d1807b8b6
SHA256954558c2d6d589278a93132aa903607870e06351c9e38cd74d3ea2b911cdebb0
SHA51252aede8b8f2174362472fc7121fdb3a843b371473fb2eefc2ca1566ffcf67a8913311d2ca497a00e97267f4626b89cbba56d5e7352be6e720dd396a75a7ad022
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb7cbd529328e8c3474c3e9d46163120
SHA1ff3f1fea8012babb4f1c5c74d4b65a2cff5e1563
SHA256f98b319ee3f2310fa51d4afe674b860b36661956cf51a71c7b3e537cc2371a8e
SHA512b453fd8936df9c76e57f6b10b25822d9b941ea78a7dab0083078c281563dad23a0e3208f3ba7fcfaf14e61c67f7091066713d1df6d883d5db70d3c32a023aa8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fcb849e3f190d87279f620e24586439
SHA1ecbdc2c48c9c015dc20a685f93cea3a88bbd0356
SHA256a23eeb735101f43de743ff4e0318f33646a50d9baec08e504d4555e01da1da73
SHA5127d41ec1fbeeb7846e334cc7279d962d5c4bf0b13d7482818f49eb57c4765c8bf439843b51a3c1e2c0846eb2606327a7f531edafa0089301810f17bd15089a19b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5befe09fc547d55fc4b7a234e325fbae0
SHA13c7abc304af9c79588bc41cf8cf881e64ea6f826
SHA256abd79be50b4118d7015a08e5448deb62971650725e7aed92a0d5c54a87a2cc95
SHA512fc76cef5d0fccc8718a36b3bc23d560591aa307f73d00e884595a82aca45355a5d2a71430cb336d70ce7f19b4b7e9ad037d620b1247ddcff2ec2583aa1ed6d78
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587974a91f512c66506c3688f9f20eced
SHA1f29281ec78c1dc6073e3260d4b6f3308676316f8
SHA256e1d2d597d865a17edc3054baf154a18449e37484d3a7a872b857fb6a760789b8
SHA51289c999fda00ce1ec7cf39594472416b2fc96cce80270d9e53b646cb914e19cb3b1f991de24943005e0108184d300aea10f223603ff824800a940c1a695636854
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b