Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 18:22
Static task
static1
Behavioral task
behavioral1
Sample
e0c455c44e5082fa2161f9583a9f4fc7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0c455c44e5082fa2161f9583a9f4fc7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e0c455c44e5082fa2161f9583a9f4fc7_JaffaCakes118.html
-
Size
20KB
-
MD5
e0c455c44e5082fa2161f9583a9f4fc7
-
SHA1
dc1ac3c0c2aef143a882f02abcbbb1be65ce2c8a
-
SHA256
198c814b2357b292500a23319fd55dea30f262234bbeb6971abe317b2abfc319
-
SHA512
edd01b2930425598c3a101f2a528d239f75d166d82cc93ac1d501baa1d4918bbe1951adde7f64e4f0d41221f57cb6530fc5586799a95056768751e0f27276284
-
SSDEEP
192:5VaQs+Y/XB/pdeWqrWltt5aqzZ/qLcaKuEC5HvrAOPtTVdskQNzqj6drE2HqE2:M+4pdzNtyWe3SNzZ5HY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd3000000000200000000001066000000010000200000001cdb948818a368b002059e1020d9933be480bd4a68b0376dd287b3706ee919c0000000000e8000000002000020000000665e4a694cfd8ef9b005d7ce7218f9a91885e16a37fb487442a4e53c715270302000000033734e824ce36af169a10856bd489be617a62f97c81bbafd75ebf1916a5f97ee40000000001b710dc3cd8d9b39d37714843d16a29abe9836042b05a3d4ead3975afb58174e1394ea2163b65ac055652472aea73562243af42e202c3c912f1d85539ed520 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{509371D1-72C6-11EF-B909-C60424AAF5E1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 200bbb26d306db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000953bd8210872ea40aad5946cc0771cd300000000020000000000106600000001000020000000784891fdbbdbddd132b01ca7bb1a11d299786c677ef2591ad7c0b1cf676cd9c6000000000e80000000020000200000000ddb81387e88cb849ab89d85165ddcfe28c80cd05d83545cb3179ad87cd416d5900000005b8025d426df45318a0cbaeac2f964ba67489bffd2b226322f1220498afbb4983326045f7559820a91358fbd69983f944fab260935405ea38a88ad5f90ceb1c1a788b8e498b2d820b6a55a5cfc7f173d252533d6a4edc2b33d36852bd62906a599c91d286f6b3e27af88fab0873c80ebb4b9b943038535807898e583e64744e50fdc6d7905585a868bce1e7031e67ee6400000008d4f1ab440fb2644fbe8df823797ce92611096962088e5db6e7d93609e6cc7eda67902ea9d998cd80722c98d6175e2e4423dd74bbc662b2d5a0324f4b3cd6986 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432500022" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2568 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2568 iexplore.exe 2568 iexplore.exe 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE 3068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2568 wrote to memory of 3068 2568 iexplore.exe 30 PID 2568 wrote to memory of 3068 2568 iexplore.exe 30 PID 2568 wrote to memory of 3068 2568 iexplore.exe 30 PID 2568 wrote to memory of 3068 2568 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e0c455c44e5082fa2161f9583a9f4fc7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2568 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c04f1c55fa8767714b8ca8ff25da68ce
SHA12f7d1c761ea94b728f3661631a786d02ff5c8af0
SHA256702abd8ee003161120fd8da5f4cd7ec35c3f33603d2157c5871ce4fdc23c0d02
SHA512f45062a389e2fdcc64365cdf06aff3d12f3ac5c0f57db2918e8d10e27c9e39796fd82172d9f52a0cf996c7c0fad1ff45de517e8d40d48f8e5695b8c7ba908d11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5936605eb67cb0c094d979529c5afaabf
SHA1fced4f82f04b5689fd49d487cd6a2d2a598644b1
SHA2569ec8c0c0f40e5d271d7431472330daa954d292709355b4ee55d30c4f0e2af112
SHA512ed25b907edb8e330af63528d6787d5e544686ef63b778305ffe4869d4e80aea701af83b7c5da7090ddf33d1454b0332e2eb13c62f034a3a4651c3357844420a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525f318f39607ad8ecdaaf358e5c6f944
SHA14213d54a1683dabb9dc483215697d4b6ff309db4
SHA25612a22ddd994eeba860e29852d1ed5f6ecf9ea54409877dc67af4222451200ba8
SHA512297205b9ab94b49d72be475a15f507d524af285ae059926751a3465cff7cd47abfbdc8a57f75ce40eb0de3565556abb283ede7219382ac6ce835d71388ba6116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a3a9528235ecc1646611288fea308fe
SHA15cbadb08f933ee6f87e526fc9b0580246431e3a0
SHA25621eeb32d4f45d81e28df2d40f2f21ec9be1000152896597cb92753f441ca222c
SHA5123673341d3c0ef5159bfaef403444a9a01e7f7a39b396d3e83d5ae75aadcc04facd0ec89b834bbc08a37a16b9f433ea849ca775c02d76dc3c440be2c61f1872d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58716da6955cfa07686789e8e915cef43
SHA16f98b1e1b57aa5757106afc78e33baefdace42e5
SHA25603ca85886354d57ebd3a395e9cb37cfb00dfa184a077980acb867f33e9f7cbea
SHA51277091941806cd8d445fc1224cba51cde22cdd0cd8489ade28769ebe07a92e494c7c08a300be162e21a229b5ca469e4d370bb578d5f7272d3bd78abdbd8e0e8ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6c155521f48d8559d3f1d5a56a40919
SHA161a11db27a9d4b57637785084168734bb38a34fc
SHA256739d062f38a2dcb83a33ec0341d9ba3364452b511dc81ed0ded3cac887b80d02
SHA512bac210f05c7b121575b139b3d5cdfb559ae0b51d4e082df940a915599dc366f33933b0ccda34bd9a333b794a3488178f3546b6eae382d52778640e378e1f0092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a74010679cb05c113ab7af6dc812349
SHA16d586b36dddf9d02419e4c73ce10296606256189
SHA256b7dbd11402b7846f55cf8ff14aade2ce26df3f0220b1e8c151fffec4edbcf9de
SHA51231e4c82d1a5512b5bd86daace2f811393d29c06959b97b93751df28cda77701ab106236dc4290da8425ccc9fee5627a44fed223521254070359a0cb46e03cb56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a0e33bc23258880b7f64bbaf2ceab56
SHA1e269d67b5411ecbdaf160c028b636830363e4f05
SHA2561347e4e2b11970ac15b99a65fa7783aac41f88a1b76d9bed768b028f3d1045ce
SHA5120c2338d9c212775c9402969a1e3e9a3252e8b006804969f54fd15d9377578b0520689a26eddeca835856cbcd118928e44b4e54ef644d96c5b137a71e6849aac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578d57413b77be5846c30a03b4269d504
SHA1dbe79945b00157b5985325b80134e2e99507839b
SHA2569ce337d723b22b2b5c1c16e32e60ea4f0f2379b89f25887e2ec5821a790973c1
SHA51236bc1e82534b74d523d84b1e21b6ea8e7a4508e5cb45cfd653f9245918c80194c529d2ed1b9a6919f819faa002c622abe2ebcc570af2352ace2812b4b9d4d5b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa2862c41fd3e2f20c56d2448199beed
SHA105f48a0fde6146dbdee65dad3076f10b96aed36c
SHA2563e1f63f84e3bb6a049c2330ef3905fe994fbe5fedf5d9da27c190ce8c21b47b2
SHA5125ab0d4a51a59dc9ee1ea6a6149a514c8e3c255f0055c563264c2a1e850d3fe2ed75706d22633b4cb1f74b1d4c0759a404186f1170281588bc1efa82ed4e95896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fc71d331b7f5bee49bbfec54e5e7b25
SHA1fbae983ec97ecabc9ec96104e3f7fc58434a1ced
SHA25671bae2e7bbea6ff14a75e064852f1db93919e936127c4e3ff48e354b1064bc0d
SHA512981bdd76e9333fcda2e56765384c3a03c3dc735a5681ca36727a73c48ffdc5240c580401558fdfdaece9dd8fc1c47592614b1575941c00b56bb63b2f0a705c37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0ceec5be32fa2db9456807f98c9d315
SHA1254550f01802346b7b8a9be7dd9f0017e8f27bb7
SHA256e4d0a86607b9ba91feb6469e59b07b2abd75c7bc74081458c83332bc03fded3b
SHA512399d1f856a210c535b3e0b9d552146ec2820a1a0e43dc979175510ea41349ab3a475ecb65e7b40d68ed85930fbb9ce0c04fad564509bdd136fc678b4dec78bc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdf8d1fb40ecc2767e6c7185f736855a
SHA189d3c89faeda217be09bda8952ae56578de296d0
SHA25629c7a7dda7a04e2349826b14b32fe1bc5d2fdb669e26c692d620eb7f292aa6cd
SHA51234d9d3de3d771f47946f13aded7eb15dc5a3f996053ad7f18df64457977de09b5e369353cb4ce5b263ecb29e5e7eca479ca179431279f0c91d78d49504ac9b17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e771b2354a43dc3804e8d19bfb46d73
SHA1e408da4c49e1e76ebdcce2c0e60e7819a2989052
SHA256a84a17699c42725122a2eff0d27f33a39b60b9ec50cd1c17417dc218c477fddf
SHA51277e54b272a4ae44e8bd0539b10896dba28268d872a92e93da2fa2fb192736b359fa29cfff2444ad4d766e9abd1a2e03a3d62038d8bc80ca0e935d2aebf9213c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57aa59d171842d39c4bafb654e440ccd2
SHA18612e7b0af960237654447a63a434a1b9dca00ed
SHA2563d36d4f549b341d5c5134a15de36d116c78dc54184ef32b43793977e97c3a914
SHA5124cccb4c79be1344e0f87d1f57a102fd7d03435f8a49c8c7e4ef5e34872781e82db41e6f3471a3e3211329adc21e3b7f7efbf8095743c55893355f1b365f47141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7b684a148216fb2f7492a5a72ca136a
SHA1938ce733b365c96eb944e00572df34d8e3ed0f5a
SHA256f3f93ff9bcef95e62922201f874bfc763a37102377d47519d8d4c62b6ec48f42
SHA512a50214b5f2f8f0a580004c7e655cd099c9cdaae3d119c60af9beec72b3d90bc38575981dea8038fcc89f4ae1ff3adc39f7a1516d105e83c0555b61def0419cd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5597391009e293f44f29acdecaa52873a
SHA18f6957f2e57aa8957426dde0ae14f75e83deb81f
SHA256df3ac6b923e40e9ee4ee3662fccd521980ada7582159e9419a5bc3a776ff1c66
SHA512c5857f84ec818896251564f98c34137700b0973fe6f40e2d057b52a5cb334726c19eeca50a65fdc92c878c987167df46d2411a7279534fd2b256b8416432d7ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533132905202533146f894942dc6ed696
SHA15817e811290cc80c0958290604ece90d962f2c0d
SHA256737b7f1977fcb1c0072020289eea46f65babdc7331e1785acce9934e182b642c
SHA512da646a29801928d43710a95f7b22d40abb7ac004cd6fce92db085dc0df74aec183b459a05286c3b02b6c51a264ce11bed5cec41a3e728518270687d4a6ead1c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511761a740fc4b4f7b0a11f0cdc2494f1
SHA13b86f5c045bc5392dbc84cca6c4da12093d0177a
SHA256caba955053c0841bad40acd490b8618458150ef288622b343a860d46891b4ea4
SHA512740d0b29eae2bfd704caf5f2d47da280958b5c4feca00b371bf80555c2d044c175d0978132c56998ef29c785cf96d51af9b5b1f9fe9b4dbef10c0a23750ddfb6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b