Analysis
-
max time kernel
118s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 16:03
Static task
static1
Behavioral task
behavioral1
Sample
dab7b43523f0b365fb0c00b95347db99_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dab7b43523f0b365fb0c00b95347db99_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dab7b43523f0b365fb0c00b95347db99_JaffaCakes118.html
-
Size
91B
-
MD5
dab7b43523f0b365fb0c00b95347db99
-
SHA1
6fdc1f06427d8a6d05807b6c09c177eed4e9d5d8
-
SHA256
7978fea88ffdde883615c77b37d985b084633acfcb884d38038aa440778e5220
-
SHA512
ba0c69582cf558f57093af302c6d390564de8f61c7f1d73cdae40c716ea26e581db24bc45cfcb1b87b7bc2878d0472f8e1c80074d4d9cf0d0407151aa8c6b1b5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432232511" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7065e54a6404db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000034ab1a822cec37f70901cdf4f98f100cb5009816eaf73425c4f426f820d03b3000000000e800000000200002000000042e7a26743ea533f397300408af959ff29c8ffe1e3130e4d0aa029fd1716c5a42000000081a8a231f796d1f77ee277c62eff643b2807dc89f36ad24cfdaf7e7a31c4acb340000000a29bb41f5f8e289c60f7e2a9eaa996b3ccb3eaaf4dc45b99fe624c66eb22e13ffd32a17b2b15fa46ee179e749f998b5ce10d93063e9ee1b42cf132bbae765f05 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000004c3ffc7b12e63329409e6944c9e286b8c8c9637006d1309be4222859b663a7a7000000000e800000000200002000000074110f71c39c6ca43f65235f9c5c2a011531dd8029ccc0620d677fa17438c1129000000066eee68c3f8294824069b26e6e9e17538599a1672fc013fb989856db234c38e8af84ff4fffebad2dd0f644feeb12909f281baac0965491191ee6bb63e04bc36d6f95d4305897fd7dd445d531b3d6d494144289c507147046f57e1fc7bc5bc694f64e2dbadf6e4c828807b032d4771db6426972956b2479899d750ce6e7c0a9a5e3b688ff225a61bdf8e71d732cc57acf400000001b41a2dfd3b8f8b4a6bb3a86fee253e8b86166152e6c1639b2915477722bf8e5b8d40c2df8aef29e3e9ba1c6cbb4a78f4f92e373baf82f09f288bdf88b48c7e5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{766E52B1-7057-11EF-8587-EAF82BEC9AF0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1720 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1720 iexplore.exe 1720 iexplore.exe 1364 IEXPLORE.EXE 1364 IEXPLORE.EXE 1364 IEXPLORE.EXE 1364 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1364 1720 iexplore.exe 31 PID 1720 wrote to memory of 1364 1720 iexplore.exe 31 PID 1720 wrote to memory of 1364 1720 iexplore.exe 31 PID 1720 wrote to memory of 1364 1720 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dab7b43523f0b365fb0c00b95347db99_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1720 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2d7a0cb924c1cc248f612c2fa61511b
SHA1aad87a0bf296adbc3bd324a07a3f50d2f983862c
SHA2563be982e26711341282df06cd74bc718cb56b59b178bb86e09138cd8acac5436b
SHA51275bedd30aff30ebbc0ec4bdf51577314ae4f096725c3ca74c7ab27c0233834e24973c78209d820c782b16ae8e7ea5d6b80a5587c00cb33e3550cac8cb40fa31b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519cf80e19d775196760d766e23e0fcc8
SHA1e3aa740ea44b41efd1e77509e1ce3d60def58bb8
SHA25659d9b51a06c08c614a1943eeff07e2656c434991d260062a9cf452856877698d
SHA512e647d621e3766e22ec121ee4adef4929b526b073d6d97c8839fc11e8113b616d45d3d7c320d8ce2173a298f878bee3145d193b28d941ab936ee32d763bbb0fd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547bb7efee631f7ecbad25a88b38b1443
SHA134cd173abe6682847e9e85e3f695c8426acd4c44
SHA256064e8c4ffafb50eb053d1a7c36a86ff0b5c61fc7c5fac0ea63ca7add9a9678bc
SHA5126a15af98bd47c2032651ebe60b6d7460a9997ed16e83f9133caefffdd8179b52f0f73f6672b71b5b551684f4975c45118afe1eafc0d07615b1a0d5d62e7f8268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a57885f95c8f7cf2415fa82e33796028
SHA149b6705d6767d39dbae49f43943e06572abfc146
SHA256a948ce568d34e7539fa7103086bb347ae76f08ad99786622b1efcff89ed5eed4
SHA512add9e2eb7686de4143d38d7c1435091878263aea14f4ac2bc5aab02f61b561d5a030f07755a649dcaf37f5c38c542197fef72b1b29beea2cb725db6dc0af1e47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb11a2e1b278c1cea2fed6229344bdbf
SHA121495f97de9e688b7ac92144878fcdf50a6518a2
SHA2564c3e7729a1d98483c0bfcbba27303070e96b25e4e3454e41db7ce2287557229f
SHA512f00bc3a79ae9c6c7b108295dd16bda50b63ed25788e7a56ace2ed056f1a0a7ee7f61a6ad87eb8b7c3194da9a3237141556701d230e3a7e39a56a9da94763b3bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a83e13ae10144a72c2fc6b0f0ded1d03
SHA14565e455a3e5da57b23f200e38d73b1129a6f7d2
SHA256f599e17dfb5b0b01d608bb8116268c3bebdb6f55db8eb42a4dc261799bdb112c
SHA512060f95cfa5d6f0a2d8b5ec371057b96668794e22e6a90735a0fef29d1dca378e03fabaf0fb9945abab80ce76d74c314504b6830efd947bdf56500d16ee7ad43f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec665bc070ce1f99d52b494ebab45cf8
SHA1b6c4875757637753a91c8d1281e2fdc25e69f381
SHA2561e3758a4fc75862e85d1884ed54259545bfc562c76b59a3f75ec0890ea7d2988
SHA512eb48f1a7982c30b0ba9bbf4e8583ffbee236b48d352e290817099c299468c849ab97c26f110cf3f016037875883200ed1aeba21c5bac1b49606c774aed4105d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df542c6448137747f3b00ba53014757e
SHA124892a8a91e438a56ffb52a36c16b61244761c95
SHA256c7364a925e6389be43b81d24d2e51542f4c20fd80e1783e570a730a009f61810
SHA512860a02908287b1b33e270711eb15cc6b7bd393056b10ff7dc54c3a241ed2a33341af4b049c1a2dae28204c013c01a869ba543dbe4abab326de60b81c2830c24f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c43dee62e7e28b743cb99e8dcdf34ca9
SHA1328d0433cbfdb69e0f80105541511980bd3d0512
SHA2566cdcf4d2b178c7036f58488d2150f38f563fb4146c0b8612ab1df9563be792f3
SHA5129caf66a797aa479b2a7d6f8bb5c1d18405a76507d8b2d5be926b886ec1079e95e41ccbb9ed112c9667583ae73986080b976c894de9501092cf525145b7968037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562fab5c1d7822e89094946ae2f7899a7
SHA1338abaa6f512ca0ede924e572a4f1df67e6cc601
SHA2567e6ac05b1153450a933c9f497d879156c032033c2738ea4ac74cde0a74069c0e
SHA5123c11d8954f51785b997f2b9c24e2d9413a5fa851cd8392cd77f081e7c44deca313fcceee2aa381b0127fc67d8e02699d4ec70be1326948a3b3aa032d2468ec28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd5fced5a87db2d6037db1ccbb4c0382
SHA1da9943b1b9c370daccf8fafd41cdbbeed2bef935
SHA2561e5e41afd7c830826e4081b7ebd87618d72ebeb0c326664ab42968836dfe7dfd
SHA5121468a22a2dcc47a8470e3cb77d0364238f2c666367d35d1fc0a51927763d555fa99f1fa0d1c9bd0d2cbdc6725999ebaf0f4e90a9b1539ebebbb9a1ab36ee5e89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9de3071d5858b4aa7e0f983248cd2f4
SHA13b3ee12d4dc81978542790d0e39558bbb8cb1d53
SHA256aeaecda5831cca4dfdd3cbc0ab42bdff004cb58dad4cfaf095163626216db934
SHA512d94617337d4a816f4c816e7b0784476e01561c35135ca8b2f69fc9640b8b89401f27cc6a320f0a751b54b686e78bbb1953978b3b64b37df361097598bcb7fb3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b754634dfd2a717dea9d8631f52a3a95
SHA12616263d9cde75d08ab1e700a9b0b0853c5d1b0e
SHA256514b94ee316b9eb8fae06b348c6469127dd2d1e2db6610947017b585cd22e001
SHA5120517eb2a1420ef562a1cdc486889be5dc9cc4ac0fcd43cf15a2869a00c215b7ec3a0ccf6258d66c472b49b7531a8af44efc0e9faa9125989b47ed78233d73ace
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58094f65d16846b9e469a1d370523132e
SHA1a5c41028109a90ac7ff56c7234f1131771dd1ab5
SHA2563d11925c776aff66fedbdf3a10406aae7f69274b033b098afb46511b2d0b0c2f
SHA5126c393237b80cf9f9f51ba32c4ac168b6d8a21259e0ee67aa20864e469950c3ca939711dd92d8fcdd9a30af83c2fa9cb2a54eca10c87f1e3f0b5f44a8a5961c77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550f4ec40cb3ed86ba5024d74879c3fca
SHA10c28e637864d26c386674e5f9e285d9adb3ee638
SHA256def2a7d4f38047962a74377a89994fa1b43d0d8c02398eacb7002519d3d127a5
SHA512d2b38d806cae4b5c776ead3e41427a04f45b0b20b1b756dfbea7425fe6b13a47739cd09c7031bfaa5f8b2e9332af4e6c3afb911ba4c14bec8e8ba88b58f43249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc38a7da1bbeba40dfda7d275d38ca40
SHA16ec3ab72a735cd1da14db147edd12ceb1f5e009f
SHA256670460ec79be7fc97ea4970e901e4af46b8cbbc06761e49379bde3dd9169ec8a
SHA51273345fa58e86e8b0371b524a286032536a80a0abdde9b85457b0761004a88d0b848dfefe49eacdea621637d5623f464a17e64664894909fc2222b7d6860c90ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1cdf6760dfd7da4f3d95fa0f5bad4b3
SHA14cab592457e1900b20d9db8a28a2f7761e58deff
SHA256a17f8d3297e61bbe4217fef573976ff94a14169a2cb56f505503632f8ae2e4bb
SHA512f6480e4198b9abcf92959e575c0265a58f9f9e0d1dcafa7e40b2e56bc97ddedd0ed7bf6e48face9628aa4c2259d68f0255666ce2c0e506f75865e4985f89f1ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac1a3a37da58daad2da49a6766387af8
SHA12b91bc0d92cc91700e620f3ef1db4cc32d4b3855
SHA25601dfd208bb2f462ff10c70f1f5bf4b44040885e5b41945658b523561a183ee79
SHA512fbb446af1fa00a7bc97814a428954c2b867f367c4a3c8a8e5179e7b38c34283d484ca2fa24a5fa7491882ff9d6e3295fbf9c654719f0e0d3697b199bdf92c073
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540b3d08592ddb093d528d56fc8ae7a1b
SHA19e77fe4470f5bf443bbd5e98649822f6b27e0653
SHA25647e2e51d77fe16f314b2707f939932f778d08045c0bf83d3596708eaa6d06aef
SHA512b34557fd24e222ec088517509db82e8025d80f0fbb114955db1d7a95035a70b470ccf01c95e9d347a216762154c94ef5eabf52240c5ea66a7822875c81d75427
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b