Analysis
-
max time kernel
146s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 19:05
Static task
static1
Behavioral task
behavioral1
Sample
dcdee9f7fe06e1187a50e4a0775d25d7_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dcdee9f7fe06e1187a50e4a0775d25d7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dcdee9f7fe06e1187a50e4a0775d25d7_JaffaCakes118.html
-
Size
968B
-
MD5
dcdee9f7fe06e1187a50e4a0775d25d7
-
SHA1
98b90b9627a8abb957396b637f204a1b2ba39ded
-
SHA256
4e1fffb97d659b8918ef500a725fb73e6f5988bd7e4b7ce4a7e1f5d8d5ed6395
-
SHA512
266ec331cc0e6c376dbbd8d78a77f724eb27818855f833c41d5d4428ec4837b0c9472ad2b4c86dfdf25efcf3df17b2ab3029364f47b57604ec2f763569768b5a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40de5fc74605db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000f9d93214aa2f6484d53eff24a091cde8b8db3e64d22642ea11057c35b7976364000000000e80000000020000200000000841d12a3b53e21f981eb075aa2bbbfa05ba60af8b9f3f2f29d9e1309330d3d9900000003bd36d4ecf97a2759ca7b477f8a848677b91a5cd45f5fc634b27808c73613c1459a7449d906ce471d1adc7cf8c3c21e1304b66dfad5e36aa69da4d392fea1befb58dad756266297d78badc2dde4bd6cbc3bb16f7347b614147d53d1b7323e1bc9f3c37f47610984f20e11030d286df6f9e1b48062772b70909c3c73557048f7065df594658d4d083d901b400cec8c33f40000000b5ee10d1189392ce5e19d7d831e4b91ccb6e7341db5c135813b1c0ac18d36037c8772dbba07abfab7fa2eda99f3178b3e727ef80dbeaa79be5cc7ad0a7c95d64 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432329785" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000005fef790c1f74b9a28d6baf13ae8c12edc087a6d9811a177450f9a824644a85f9000000000e80000000020000200000009f5bf418d125f5a34f83c007a518d1a79191ee4373724590091d681fdc975a2220000000bfc6cff1c313f946ab3a3317644016e7f173c39768aef546170d8c00f7b71d984000000043f5d3a2c45f8848debda072cc4d74d146932132ae1b3c8b758fe2271561cb39d0246c872eb22481a9c098742ae6d6aac5ef4e64605b578cd42e3603d2bd5922 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F2DAE8D1-7139-11EF-9628-7EC7239491A4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2488 iexplore.exe 2488 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2744 2488 iexplore.exe 30 PID 2488 wrote to memory of 2744 2488 iexplore.exe 30 PID 2488 wrote to memory of 2744 2488 iexplore.exe 30 PID 2488 wrote to memory of 2744 2488 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dcdee9f7fe06e1187a50e4a0775d25d7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2488 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57098b79f7e6fcf8546985e761728e97b
SHA116cd10b5a62eace8bf0fb62f624e43edcca9c95e
SHA256e8f851e256270184072fbe9b6305939abd32d18ae3f132d7ce743ac43936cda2
SHA512ea1549f7f4ab43b40246fb3b52c8237c57e85bdf9dcb5c3822b431f7032900d4541b45cde75ae6d2705b71005fbe8c989110e856e12064395b2819a9b3f79fca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4f84a254981ee2cbc8a35f88699a0c2
SHA1590def2f51d9ea0dd2129af01ab583bb0c779fdd
SHA256c7a003f5f74de81dc35d3f2a98f2078aa5a9051966804c6b7ab4dcdf8908aed4
SHA5128163cef904f965494ba5806b14d46a8c4e1b89abd86c422eb80c1a6bde58bb57dd0592da7a37c06107d04e2cd4447416a7af845a16151af8ba8a276aa98a9604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc4c8fcdc30572be1572d4dfe7f2a8e0
SHA1acb6de1554312ff9c6cb8fa70a277629d6a6aa05
SHA256b3fbf8bd942939842701943f47b097c88e1578e1ef53138c1327d6c883f8ced5
SHA512514a2e5553965efb1a7cd1ab5361a45d3b42e228e2c078452eb5c1331e075a467ba1ff3fce67c7563a3b6f392ee6211805ada326c2a45550b8bf36410b346941
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52410955565ffbdb385f283d89060299b
SHA1884b3a099229a2f4a63c8075c26e7bcf31d5cd28
SHA256a0d8714a0571908fa1bd9ff4ea1e8eac57c82de25c23b9d2eed5b7d63200bc2e
SHA51256c9d2192a0961abf60054fc2e63049b376701d8fea054e4b53ebb85e32b7c4eb6540f01443d36e9d204ea5e478d510f86692c2c1e9611bdc5322c82fd7cfc3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bd680de819442ffde79f286f67b1c71
SHA170b74a480cc8dc4b432546ffac7e1b92255cd4ad
SHA256f054a6d00fbcda498e26d8e2cda36be35c5aa6dffcdaf4c7612c30fd53a2a1a4
SHA5123d1993688b1a3601b3ef0eb3d2b746875b65f7e08afdb7b7e9a7dcc941416c7571f71dda16994a7694425e2757a5fc29895e83d7c9a0035e6b27d426f973db09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd7d7ec7f1fe5666a1eba2203d7fcc67
SHA175f08750385905de6edcb715d0941fc4a931ea58
SHA256e79f69b4a8beb1989a233bbb6fba14b6c36989e4eeeaa66d32bbd53fe981dcc9
SHA5125b8d39ccac06f97e54bfba77df487b831fe2edc5eb48a325e21d4d66c96bfa24e79e2187a29af9623ff07d549ebb116e5ad26f12b70f4d1509646b73a75695ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c12aa5d15945d67f6667b3006922f8e3
SHA100d3f9a74f26288847e14bf16a4279702d2789bb
SHA2566fdbd11900fe3fa0c48aa292266cf593c092a19b10f316817c594f213ebcd4f0
SHA5124d70a5eeff9d0171a2ad80ff127b0a65af1ed8848fd661d5666c55539e9324ec7a9b63216639187033757954f210fdc38fe05da7a0e10261dec7fb74f442fbeb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a275377838bddf38e5bc3b173e3fbe40
SHA1ab3c5046b41eca1e696dee2141fb4bb9af8cb349
SHA2560800f4e3c624eaabd75f4dcf7758a7e86362a99e4e7b4f3ee161d698417bc199
SHA512b67f411429a5595b40cad9c8eb7c644611ed77a19fd90a2f449f26971b1d5205a45bbc6239d05a8f476a5d6e07e754c32fc7646be8883053a030cadf1f5fc133
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53880ac8d4c34e04c8857777e47eb3e71
SHA1f357a279e671a5e49e8fa92edc2eeec480ca74aa
SHA256fe4c5d7cf6892fe9571eb65f90f73294226c02ebd80b03056750f7c586d0d500
SHA512b0b93b195f4e1a726a5f0e5b4236c19a450a7c5ed1d3cc34f7624b179d3aa0cd28f877ded13f6a649263c8065e2d39c7a39c9f57e7fb29f923207bc1825d2c9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5beec9103bd988e732e3d848827a9df68
SHA151626db6d4b46780748296a4ad4efd78cf1db53d
SHA2569ee95c740f3ee52486de2bd3d4c1058c53ec32246d0ea72a4e53a249b4a46ddb
SHA51207198c9dcc88e430b824879724302727dadf3cc7eb24c025ae3b8cd8c32bd739a5e803681841915b951cd95dc56c930d8b90c3625439454ab158fd23897a8ebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5115928e157b9ae81b7542658345b055b
SHA10640148bfc47d7eff1b9ead0e7f3253a1266a102
SHA2563030df558ffcb08d044074bb48fdef0058621f34af0decd0157566afeb69ccb4
SHA51209dcd60d2751bba333f4f14bd67467e9f5fdc2e341d22039332fc1085d8e46d02f064b75deb87d5b30337a68150355359738a3dec309972b905c00813008d600
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf48d1caa6135664551f78a27276e234
SHA15bf84b0a3d439d5b28f4fcb45c9da2686e97a215
SHA256a75038a2b926db4425404dbe969bbca5feaf7510ae53801f0f964ebc59cec636
SHA5127d25c631baffba0e0d1e09c5c64325306e9f23e91d23f25c9fd61304762f7684ac11276c7674dde0bf23d8639c31308d73673734517be9966cb9acfa299364fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db14b3300216454cd7342e9a8aedc612
SHA16d86a9aa4f7823ec14b2498f0a547e7eff09fb75
SHA256ee18ce80f316216c2f17b7c7c7c6aaa7fc0326db03e556b62e18b9dfb150c22d
SHA512f82c3d0c11beca44a391211a54fbda15279dee1deea61cabfd2bd57933af5edafb1891039fe5e15c8ded8aa10d811763fbf0418557cbc7510f02f487548b77ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f156b8a242064acb3e5e3433331283e
SHA1f9b7e24d8aafc5634fc5d26b8df5f4f7ace9973c
SHA25661bd1abe2e17a7222f69e0f456b1fe0f9a255c9a0630c75cd61de72d8b43f1e8
SHA512268a23caabede16ca93ad434d2334fb76941b4c19065ab6a9376a6cbf093d729ce24447470614dc575c92a3c9aa7d4e6d2fdea93b8c16f7f80631e97418d75f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ed8dc5281e5776abd33570b8b4d0ef5
SHA1090a2b304a635407d7f2d6d59f6e63cf33f8231d
SHA256180c6c2251ce37d85677ba2af2cf181c6c0824df520a426e5861a25fdebd9d0d
SHA5128dcf19691aab945ee8bbde68d2a5ee94c4b39840a55a22426a213080c9718ebc64ae8edcabe6e8710ba4e80d63c47a06ea0aa40d4cbf29bbcebc3f9ddf9d4505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f560334e10bc57d2ef8e5e6f28adc132
SHA1d5dd85cd67c1c990171aaa39eba1ac7dba6f8be9
SHA256544a79cb0c184f8d5aa8da7e450f349689926b4056ff93de467a968b5f87a80b
SHA5123ad1f0a7a6fde8e88f63f5e692827acdba4784250e81d853cc3f39acaddeb794f923dc528d92962c3e14e05495c58f75cfd922272b569cb439793cdfba5d7972
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5120f36b963f747602ca8805e58d7ab27
SHA1720020de2c69acd428e1e04ef1ed271e16a41be9
SHA256bd8766fa17951bcb82b1eb2465b4eabae067ff416d7f48d6c4d9937d165fb76f
SHA512e1d5f5112c5c39299ca292616e35fae501738b484e35fe64a0a7748b36e090ccc947cd3998ca4ca1786cf4a590cdce3fbd90f782537b432dd84eb8cba547a97f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5401637d3d37c04ea703e0cb3cdb1a52e
SHA16809b9a9ec2397ef4d889ca392a2de06ea2ba902
SHA256aa841a1f16c8e3cbe1fa4ac7e5be7177eb40af2c486f15700dfe4af4696f2b20
SHA512c3b9c2cca026fb446d1c59b6ddca497606aba2b3dba74c1b27f4fe527889d9b751f7601ed5c3493579e50e0dee2a675c077bb67060ab4cb6be9858a0a94952d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5243feb63a65361cd629ee26ec5747de1
SHA13a50fb376b69800c36d8dd294d49a36583d6624d
SHA25693a0f4c5afa92ab3ea532c1a95988d372976f5a038f091e372e9023f38bf5611
SHA512188907c6895eb18740ec1b2cbf6e18795f7585feea77a14905125d879540b8fc09c250672926e4655a7732addcb3ee9f9613c431f9646c56b2b8ef37460b9694
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b