Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 01:12
Static task
static1
Behavioral task
behavioral1
Sample
a4d128d60c84f4de4484ad78a561b511_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a4d128d60c84f4de4484ad78a561b511_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a4d128d60c84f4de4484ad78a561b511_JaffaCakes118.html
-
Size
26KB
-
MD5
a4d128d60c84f4de4484ad78a561b511
-
SHA1
a80a254341cf84a1b961e5d823adee11f1fd550b
-
SHA256
e6017f6323e77e0b4b73a5414a6ba696366520830b94d80965843276f7fc5ec8
-
SHA512
a54ab28aabba67bcf52173c4c5918303e80db06c1a8e769ed151583c5c76fa08199e1af0ed3f8fb73c59933c64362339ec41c967464f8a658f4c046884eccb52
-
SSDEEP
768:jS+YhqD4D9mLAHj37Y4BW7OxMNWdjXMGMe:F3AD37Y4BGQM4djie
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430105415" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000001f4ffd38e71c1aa8c9fc0709af4cb6c940ebd62e793226e766db9d721292edcc000000000e8000000002000020000000a693529176d112f9be401d1e461a9419579484c686ccf4cae5e1f4b4032fb5e420000000fa6cdcfa08449583921744a3873acdbe71261306f37f1b9846c8795fce6704e140000000e34214ba085e39f196fa38cb1f5bb9c684cf0c41b9e60e0581b88696a2269f4748eb58eb32612a4a923ee5b87c5af7e7de5de79a40224ad4a488f1179b4c978f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2053a9f50bf1da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EEFF3D01-5CFE-11EF-B82A-724B7A5D7CD6} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000a5505db10c62fb0a67ef22474ff2b4b9ed0456c57c096a3d22e87e6b6cd8a45d000000000e8000000002000020000000b4a2fbd4eab94379178625cf645ea0ea7e623e466a9b62016e4f6cfb7e46abd0900000008c62a70be978bb3a2752278ec866e6680f77c22c042fd9c3307434a7eb46ddc983a0c6b7121b6e9a36bc72f1fbf8dda4d38ac351034ce685780d9eff36f97fd9063441c7235fcf4596f4dc162c005713c44b10655d3f58faa3c3c0b2b3489ea181bf80e43f92a594e3eede930fdb3287c7b93a1337ebcf0d64d0daa6fb3fd4ee3bf0b8cb11172e839dba0d33d5ffc2fb4000000089b20068ab39f3196e0e60b59ec38e3ce95f4d906df34d270400dc6956f8223fb14c4349dd0dace7a2c41a1f51a790c6044a9e41167273a874aa9a4e7e67e7af iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2524 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2524 iexplore.exe 2524 iexplore.exe 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2524 wrote to memory of 1808 2524 iexplore.exe 29 PID 2524 wrote to memory of 1808 2524 iexplore.exe 29 PID 2524 wrote to memory of 1808 2524 iexplore.exe 29 PID 2524 wrote to memory of 1808 2524 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a4d128d60c84f4de4484ad78a561b511_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588b0228323c7e6ae3f1bf18e848bc8a7
SHA195214dc383bb28e17b373c56cf12c279d352a390
SHA25606f5b4091028dbe5da16f002cc39887da251ac9f5283b031755b88259ec3270d
SHA51205c1a0130b75b39c75b9ca4980acaf8e946c4ec3ec5247eecb205163032c05703a975d33f65ed301aad86f50591776f52ab7845474b40bc00d796df3448801cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5563221cad01fef103c8a7ff04341b9d4
SHA1cde6bb6e9abdee7d26b97568107106d338e4951f
SHA256581c933a2a6e479c2bb9cc4e63b56a15274a7465c2ac74a1c36019480605978c
SHA51266c50c045265e8b93cf8cf9c50a71486fef129d6c26a63b733861eb29a454724f630701a13e6acb89d8bd8f538e98bfb860533ce177601db1d3eb436419f6d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57097ffa073d692dac925715c6b2d483e
SHA13d56fa290cd109e04d4c8edde2d8ad2167271db6
SHA256eb0a8fee2197e103f3159ddba7ce2ae0e165e711dd776862854eb7b7cfa8a00b
SHA51246d9e5b7fdb2ad0ea81de6fd51b4cdad7fb5cb66646c3e802daa13bb28989e337a81fcc64ff8ebebad164c39b4d2ef1033877d12158dea3b723adabf43ffbd8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592ee818d824b5628b48d630aa6aa712e
SHA15eb345d8581f84c2056fcf899dd0d1d815072f3c
SHA256d6577251750a8530799e9b5b210c7176f15549c5ff668d3dd8622418d54f7e95
SHA512756485d75d2b29b54936df0934d32585b6d82dbb83888bc5ea6be81c7128246d972a42b56eac481b34d4211c1431ed56fe8080bcc3d6e4769da35bb509e66345
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5767f8f04c791caedc4b2128dcbff9f58
SHA15b0f4e9882250ebec4832817b7c4b433325dff02
SHA256df54cdf80834ffb19511e0cc91181e5dcf98728d0ab2314dfde6c1e60b749e2f
SHA5120eed06529e3c99510a9520dd46054b1d4ff7b50bf947b89c30eb7d78f1ad120bcb7f407acf8d15b756ee5c5170e76db6abcd852e4abe56780a397faf80e864d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555b8aa7648912b544a1b42682b56dab3
SHA14440db14ca20de38dd12736f88e96b04a8abce5b
SHA256839ebfac8290cfe4b510620969a4ebf3ff3a6dbc387cba0ddac66367979f8609
SHA5124adb5157c51bee20992aa073cfe4dfe2c0202ddb6ce12a671141bc49b6d03e98ef09a23d8c1bc7fd68c73463f74b8c86ed64d83fc5f74cc758139840c0f2a830
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5912eccf7e9265784026fcf4c701ef2
SHA1714966375cb6ab3dcb236ac6af2eab9bea9df690
SHA256b4b94ac221f2b1fcc8ef756a432caee89fa184abc43ae9378ea6a8a5233c2fb9
SHA512d8f8579ee921d3efb1349624f2c98e55866e43c0a3cce34771c13bcba332681ebf6096f0ff1979a0ccc0dab7d96c55f8151d79f81170a741f1ff49fe7231f338
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8532c7264056c20eef6d914d6fe040b
SHA167d1729599c76a82fdbc469d05bf44fc4671257a
SHA2564eb01321ae76abb1da75564d09b42d132b3b872b9c3ee9bf96b8caebea5af5d9
SHA512158999cbabb3e1c842673e1d7e67d86bd4c9fff30b91454f2e16619aa251a081d8f3e52632bb54b4399199fdd6e71e596e4ad0dabbe6dee2492110820a1aed9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1deaeab9056355c168a6c57a1bdecc8
SHA1ce94537434359bda2e0071c536582afeb7bc5de5
SHA256df91e06deae629fa373ed5b586b217541576395c1f4e04603b0d00373da42858
SHA512444e2bf521ee56853753c3749564c13a9711eaf178af8b63b8b0753629b885d51ff3667ac7cd89c654b99df712f996c13f77f0803e0d8dccd682b4035e5b2080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1c7d160bb82ad81f245ec760ced4416
SHA1e8f8b9fc3937c34bbacc1c4d47e5446a67532413
SHA2561cf8d5cc915f86d7cf75dfabf9c5fbc31bebd4002e5c94806f4e105edaf2e702
SHA512e54e8ce28122ce545d5b38abe49e01cadde6386dd03eb7e9fc27d6f81102a0b7d831cccafddb666a547874bba9bbb188afd2a928bf241243690f420c4104547f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae25381a00dd84ba749735bc3749fd13
SHA1dc80344e42f0e421663c923bcd9b6839b34e1067
SHA25666af0ef13601247eb9de0f4c0577b061cc43daa2a6b1d1e0476672b6c8389ab9
SHA512f6772668dfa23e98072bcb47976e9add5237d564bb196341bbacf91d1dacd558d6a935ef55e1b50ead96acf20cb004a424796c97f6db86fc7d50fa8f7845d438
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563302d9107531326f272fe646c98ce9e
SHA1b7144fc4cfb9a44905c9a2c13fb45786ada09307
SHA256a7d81998b87a3fc007a2772de3084f7edd42ca46c071547159d402ef6965663a
SHA512b33903f0ad7ed7c99561962d5693472ce15723fe845cd541afa93abb849ac2088e2cffd3e05423b646db115f0d508646854ae4432e267aa1d98c07d4d7d2a8b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57fd506f09173a6b70da66b523c6cb4e0
SHA18aa13c2b52058ed07fb3f6367ffeec250972e0d0
SHA25693b49a633e99c2b6b899ee527fa59041af2e997df3d21c21e42248b16b570dc0
SHA51281a9142dfd78715876628fad710611f5a239cf0445241a43f050653b5b6208128aa0690973e2f5fa78e815b7160fb87fe0b0f95e7586a589f6297e6c9136bec7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d492e5d7cda7bddd8a99c5fa00465655
SHA113fe65c0ef7cb4cfb95d97f084d90eb4ceb2b7a9
SHA2560fac8c0a6a3e80e3e98d794ec699ccdd7a3ae21fafd1f8c251e27c26354ea8e1
SHA512ab84ba2b52c928ac3aef03a515d63b8c810c26538ec961eaa055457032a29893b779c5aa15ddd58fe52875df04d5d84048272323480125e238d0df31ca74e044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50381f6f6e827b3db585df66cb246d5bc
SHA17e003a0958c3ce34029d940f5dc237c320760232
SHA25690d062174910f09cd3d8a84c1bc613b4015c67c492ff475c7462b0480c9b3d0f
SHA51268e6e6ce6ce325ca2f9b382f36390ce869ad2c2afac73f1850634127f00ca51b917f1075dedc7cf9e2712e446e14fba1cb74b0efa3b8d989ba053f84a7955975
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5144dbc26fa71c5daefb8d68f5a999c77
SHA17b20be9192433180ac726f188f3314e8f56bf14e
SHA256e0acf3992c8b3be5f88c435f03d12020c01ced5dd4430ffc030d0965945eed2e
SHA512bf67978932eb23771ff663ad85512ca400840d06b6b557dcd929f44c8a16a53d046f7308f905ecf390f346463eef11cb26ac5e471ce2c3bdf2ade2c33b43cb4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e12bc63e14c3cda58d65699bf48c2b9
SHA14d8a398b45ebae456f729f5601f7a10b5d8dabea
SHA256271a36039f3db3715d62b0591aa72c67ddcb4e793ee0f6ee06723040f289a7fe
SHA512acae633c4b95c243fd61211b0f832c2fe712d6d843b9544108d23b144b8cef22df50181c0d90f30fe546002af792e1ad997181aad298d83a1df622b1c9d2ba22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f4db29825fdba10e63e8bde70537708
SHA117117f89fafb3e893611cab549bdb135293c225a
SHA256b65f96d11fc5c91e4e981cfc20ba0de04baa4850f35c5ae66e39ec25b84d6e76
SHA512b8ea49408e9e6de969a2247ff6eb174b419d460420145cc1f8de1a569fed3d7e1679dae3784e772bc02c8cb07adaeed7fb0538617278385c9256e52c6d8609fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f09dc4af32e3c56d8100a96886402644
SHA19cf04de59e07dc27b4d2eefd0db344b9148a9add
SHA256e6b9e8906a6716d19a38fea5697576431a6bd4940a78cca6bb52ed7b35870ae6
SHA512a9d86e9149c0e0f9d9c34afbcbd8f66adfd200fbcd55b0bf9ee6a2a0c1e6867295502e6ce673c83ea8b31bf1ad72b4edec9be3e59113408227d8c7bed6a4031e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b