Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 20:24
Static task
static1
Behavioral task
behavioral1
Sample
ab4d440d6cacd60cd425c37af3a83efe_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ab4d440d6cacd60cd425c37af3a83efe_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
ab4d440d6cacd60cd425c37af3a83efe_JaffaCakes118.html
-
Size
6KB
-
MD5
ab4d440d6cacd60cd425c37af3a83efe
-
SHA1
b3dc6d7e9d0c6a6f30525582782e9887455f419e
-
SHA256
01eae289950500563678503e311a59991f18f101c8f6bad4c513ad8b8a9cc20b
-
SHA512
88821f714ed6a9c34ebb7d72e5b46f8b1e3deedef1181a24d994cfdec73d84e121410ac1166ea0f93881d8f44ee415270266cbd9cde1803960ad7165b17e01f8
-
SSDEEP
96:15ZgO8zqX/qxDADFph9mRnr0JlCUbenK2CFR3/r5nF5nv:CXyi3xcJb52ij5Tv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000051aa1990a3f6d42a016494a03463d15000000000200000000001066000000010000200000006dea5f9c8217a761e46da037f40591411a571b9dcb02b83e833a6de780707161000000000e80000000020000200000008dd9fe95facd83f4b2607e0039045ec4856f88a2e2d8ff08cb4f6168745229e22000000017e3b51190b4a25e030f045bb44dc62f7f7468c696b81d2f902050a7a95f4d85400000001cf78090c43a270fc90d828b3a77b3880636108ed5dd38d218da79425f2cf2aaa27c737013fa1cbaaf8186f9d5c6cd8660fed574ed114f0ebbad3c4db602f7a0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0D9D3001-2A8C-11EF-B85E-52C7B7C5B073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0aa63e298beda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424558516" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2132 iexplore.exe 2132 iexplore.exe 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2564 2132 iexplore.exe 28 PID 2132 wrote to memory of 2564 2132 iexplore.exe 28 PID 2132 wrote to memory of 2564 2132 iexplore.exe 28 PID 2132 wrote to memory of 2564 2132 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ab4d440d6cacd60cd425c37af3a83efe_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc2ca8ce3def46e22f2fd8db28d39a11
SHA1b98571c2195d8634921848d5f7fbae63865c21cc
SHA256ff57e4769119c4b8f41b60fe0a81c57707ac37d28bc97d39ad9b300b69b0aa0b
SHA51298eb9d98d9b4be3fb90f9976678a17bf6dd8cb3b2a4d4be58b153a329cca77c3e39015dfcc116f85fd187f0079276f64fc264da0c1723986e6d146c6d344bd15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543482e1dac3a824d0b207c830805863f
SHA13a715bfc771fab17f39916191ff468f4ba1a2c21
SHA256a21f89c4495d8ad00d673cd152b531da6c7dfbc06f3928cd9190c2692b4dab93
SHA512b83371b203111c313b2d323d8dfcc49643827699f84cde9606b4c70f4b6837c9d87a6be160764f009aa0ccc567e40add016a6cf9c8d06a117b7456af6c7c14c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580a38f8cbfbcc19ef88283216934bea0
SHA1637a425e5be1abf0a1a84e3cef1535ef7f698120
SHA256f5e5109999f77be5ba0f2bd467605db11d5e769f39404fb84556cc0b4c21c1f0
SHA512f92cf6ce7ba74dec6bfb6b652b38c58b3feace83d9ab76ed23a5d05cc23e9f92163d6705d7c69e2a152869bd63db258158e88ae14b7dc9dab0cf93fb520bae0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f680dc777aa735cb3f0407db51ae6753
SHA1752a8c59e13cf8561b21d91aa43f8a213d5d3778
SHA256da15e04147dec165862f517cdb923a7d0531f8940f079485b5af1716a79515eb
SHA512b8349a6ce792ca97a0edb28df0670863f4aaf69ff26c8e6ee099e6ac0c878f16f4d55f989e4713da2df59180fc51f6d4a5de83ee4377b8a4612ef7147906ab09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c18f7ae8b740a648329e2aed3d38ac2
SHA121c32a1a3aa657e01500b9bf90aefc459801bf8c
SHA25619e994150d15ecd3381d64f02567bab143580c645f434f3911de36d16528a0a6
SHA512fcce3a8be55354a9b608cfe4563a9ad9edf2eaf44470d90932391c0815f0b7d8450bde91531c2906237a5eeb292261bb443270a35e475552f0e2a65e677b4b4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52005debe59f93e0a5ae4be064e937942
SHA156d1fd40e23b1cd4785b9856689b64b738ed5cfc
SHA2569a4d6234c553c88245fa286fb90a90bc3d2d072e4232b8d0c1ea7c0280dd3169
SHA5121ffdf94af63f110c7d38825d4aa26739e725dcfe4e0d9f97657e3867291430eaf516a0d39c774f9c805b1b41cdee0c26a889243927aac1af476df6ed15b7dda9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5221db44df7bd2cea32c6c88ea8eee6ef
SHA1567348535d932d585215d4bd6635136ccd317f78
SHA256598b4bf77bd84c6badd81e53fe92fcfe60c67b589f2011523388de38744f0664
SHA512f35cffb5f583c4d47ead2373408d6b32fd28cc2279f5ad1dacbb6f0752476f3c132ba058298d492fd83c68eaa2ae3b7b23d2237d3424b7922075b9c464f26edb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cb52ff54888e78cdc4eb57229cac2cd
SHA115cb1522008e06feab0d6b6eecbfedec1d2a486a
SHA2569440307cd089ac3afcfe43e788fbd23c495690f8128711947f5c68a94f832180
SHA512ef13461c2b410ca2e65cf858fd1eaa5197211086a792336474461edf457d9219011c2554168ee448586b91c25e0a40701c35b452413833d81eeb58024f97b443
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50aba5fa23254293ab0adb8e4c07c4ea5
SHA14c17be59eb1b8886b73232f27b2023405185f0d9
SHA256f3ac06891b932555397575448a15c6922997094ee44c4a42f747e8c39d3d43f9
SHA5126dc705e37047771f9ed2d7bb3d4c0332a6caf8cb5b8bc8ec64ff7509651d7d0a4ef49839dd752bfb58ec463ad74443e0871c7b1bd160ed85ad50e921bf34016c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2b7fb8a0c845407b4e6267c406d61d8
SHA1a244e2e3e429ea3dfbdbe97062fa71b15ca9827a
SHA256e3d885952a92ffa6fe87af9f93440d9f7acc5f4a1501d8cd9a2d752491760537
SHA512f6bcb592eb80196a66c5ceeb100f422d6a0ba7ad05ccd0da4709d611933a86c7be956b60eae18b9916ff40ba30bb4c275123adeb8d54e190523c5cb55fbec362
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589f44730f5ffaf265c38439c7dfd4c94
SHA193cdedf2f41a5b5a967efcca228c7dea82206ea4
SHA25663a13e4f58758ee2d307de8123c71d31aa55524d1a15e9633d866c84891b37b1
SHA51261e60342f2cb7ca974d36b51f37ab23dc4f9f3eba5fc49c8ff0647df62eddebecf5b2f5c36dbeec36ad021b504a8bfe3fc0d516ba68757381877cff94f913fee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb734c5f3fc5a4dcb662b3c0208fda42
SHA13f1052f50c14e006851e825e95aa9da039e0a807
SHA25691b1905dae94075fa010b439035cce7dca0d4637ff07dbc34edad8d33da5bad1
SHA5126a6a19b499276f6a190d378d5c5d418aabe56643193e4d8c092037da51a3c8e08694f068dbc4fa1ea8ecd5c377f2748e04e1c697d630b471b80af904e4235a3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58489fdeaef6f9694a8e54e88a6d31280
SHA1e4a2fee9b53328b3e9d13839eee77951ec630532
SHA256268983d7f3281cfd0996c829c03d8b040ed046304e7d820dc90257c8ec6cc643
SHA512684c6edba64060d8488e94ecdc40333bedc1e17dde84261c5fa8e2111adcc4cbbe4334673e8c4c075707d7718d133f89abd1a466ef59a027c39664accf642e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf6a71fa959db456bb42a9777a04b7bb
SHA1687e0debd583fe4fbdef76584f4b22f475ed6db5
SHA256973e23ddbc02ffe8dad892aa15ec4b8263bb9e9d51a1df949c2531677315c25e
SHA51215768da6805dc10aba8b2bbc71799bbfcbc6bf724e97db624b5cc7c91f2ed999ede4c0a17c87aefb502fd9ca1d5e883c34e8fa5af5c401b2cdb66dbffb5ca12c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f678bc0799170c7956453571a07098c
SHA146e6e9e639933df6e0de63d347d95ec0b42b6312
SHA2562f62fb423049aecb4681610551916da62dc7275cb439fc63950068464c2088da
SHA512d436cb6c647c3dba50a9a4914e04a2cf4692b8fc9f749a1979c3ae77f84105714c59ebdcbb819944bebd01ae8b370930a7e4f9a030b95486848cdea6cc1dbabd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5242b14052380fc2fffaedfcc2e3eab9e
SHA1e747d052301803d284c74c85b1acba51e8111be9
SHA256e2d3b8fb6812e8672390445c465b0ed84477bb9f44611ca3c6fa5edb3d0dd9fa
SHA5128d621bce7d18288b618eb95833d00e1f8c251d9f240e7808f05a010061724746e7e9d041b911cfce55e8b1bac9fc8e9127d446f84e227d0731fcbacdaa7b0cd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aed5b1c0b96df786c2bd9c0746d44a39
SHA1dd29a35f1b4ff80505a8ded505f0d17ca707ead9
SHA2569fd2784c275d22712ecac8e634c1d0bc9c4089905c491b85fbbe8ca54c9f2630
SHA512fbe7386f70b99a83d34b6e69a5a240c496ac73d4a8f4033bf4bffcbb26e662bad78abb758f45f92387a3bbe2037627c2183d3a3a9a84f34352c34710b89521e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569fdca9ee9d76600fbd4461fc6994ba5
SHA13372cbc81d2e11dd5a2d2cfa3f13fa43069eadb6
SHA25642eb3ae8465b726675c30bbc6239d803acc5bf2ac5820e8ee8479bfc0e4b0c09
SHA512991d2d76dc60c7d4412408ec02df11aeb782a8940c4e299c71e54c303bfc6c928c964e182450ec4e22576d9a674088ef5ee512c0d31c9e809a1c0ae4093ed3e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa9fd671fba05d768e1de4605e976fcd
SHA1c34978659a4c42fe2667c794181dd6b55bc96a83
SHA25647d231c274773668c7c6c93723a2e1a3998d5d6252ba243151c1e139356fe237
SHA5124078fe229bd269e35dd0c4483a59df3f060e5032289396b76625db61dd9b55c8212c16204d22ac89a36b02c745b8146183b44dd71723f701ba5eda7e4bc85250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be5fc0736d6e45b702f484d06237e017
SHA11326a741809cdbbddca655c84d1b6e680f979148
SHA2561b060a4accaf34c51d64698fdffcab34e2f146c3625b70bd83389d82c33ca213
SHA512b8868df0f4b9e07ed0cb40528a0bda7a550973382a32ba6748d6b01f5fbb0751bcb9fc66c455b8a4eb9d3686ef32c82e7b7db863b5965d5b3b2c3efa46dcc60b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b