Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 00:49
Static task
static1
Behavioral task
behavioral1
Sample
eec2307e604cb3cd83f124c55c0b0834_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eec2307e604cb3cd83f124c55c0b0834_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eec2307e604cb3cd83f124c55c0b0834_JaffaCakes118.html
-
Size
34KB
-
MD5
eec2307e604cb3cd83f124c55c0b0834
-
SHA1
220e88878aa5d07575f00ea751331767016a9a94
-
SHA256
376129da56ba0fd49ba6f5acedb7cb4e71666a153dbc75c9949fb1672f84d67d
-
SHA512
266427736cabf7853529ae1e7077f0a9ccb128c99f63841e24981195c977a8a1cc76f89d28f09ce986ecb74d4f063c05af6aedaddd87ca944dadc1fa224b9660
-
SSDEEP
768:J7EpFwSXe6eDewe7eIeygjI1yCJC3CNChCICrC/CvCPJExBq0Z24HLx8lFUFn:JwpFwSuDqtClpjIUEWmyP84yiJ4q0Z2E
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000005a00494d6f0709e26c6202751e312fcda4646dccfb22a761cf516284e4b2840b000000000e80000000020000200000008178b7263b9753a83de903e9d37c43dcfb841f89b40c1d306d514d70bdd19cb120000000681c1b3bc0f0fe8843dd0abe1e6f97727d2dde2cf497fa476fe05d9e1c1ff92b40000000a92c4040d90e384a172931938fd5531b389475b7e0fbabdbfb5895dbd892c04ff5bd76911ab6e3a09c6140f2d56bb9938aba93fe1cbb322ed87d1f65dfbbb31b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6E289F31-77B3-11EF-9FB8-523A95B0E536} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000ce11490b4322fbdc026e7c33989670176fdfb1346c5aa491ef8e1952a6fe9dbc000000000e80000000020000200000007a461fa5d3ec93939d47be998013d0b6d8e1c57d4ed5872e61060dc60c7a83fc900000002ac7bb1ef9a5dfecb0036504c6850a90242a8520adf639fa78e9948a41553b80f5111821e0f307284a2df10da212b26694757712e0b22e9e66e2bd0f63cd2b10ccfa16a89cd4c92055c9cf74c6a689b3529d33f3b5efd94b63d174cfa5861dc333c5fec78b42a9c29ee48d3f134c6e4f2c2c4e00939c734ab1ba139aa6b6872266d0231a66d3f75333fdabb0b942cf8740000000083e546620b5fffca23830afd0b33bdc613d85f99e58d2d96532c8341de9b8441e4076c20fa4f338c6cb29ce6c8cac63ecc3779e7965f410ac4933d73943fba4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f041a552c00bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433041668" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2320 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2320 iexplore.exe 2320 iexplore.exe 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE 2416 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2416 2320 iexplore.exe 31 PID 2320 wrote to memory of 2416 2320 iexplore.exe 31 PID 2320 wrote to memory of 2416 2320 iexplore.exe 31 PID 2320 wrote to memory of 2416 2320 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eec2307e604cb3cd83f124c55c0b0834_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510dd46ef6518ad58af86ddfdcd64ca14
SHA147f5b53d21fc26b59c81cc029935eae68af5b2c9
SHA256f5f9c58b7915c8d66192d4d466b1cfb08487b5dd03786e7af4d46bad989f96bc
SHA512a85ee84634d46b53a23af7b25d15780d7feae658aeb177a9ee20377dc130b0e4488105871d299c9e3d24b822de1ea1d1c3f4d4f19714c75aaedd946e27ce9d51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f0578001c31729fc6279ab6e1fa7aff
SHA14ea44f276efb081bc90e47176ef49c29160074ec
SHA256efd5c472bfb7e00f530acb5bc2997c10281acd2ff3801077c2223090b08fd8c1
SHA512d77f0546fba8f8e70840d81b98ff4d86f23d0a53cd42d802002cbfba4390f7351f9227d42ae451336154d7a3299fa349b7a2506083e46f8b179e108be050d3e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5771210429a768a50bcb1094ebfecbe63
SHA1df84702a7b99108f47a87d999465b90b6aecbd3a
SHA25650c37e491062ba05d366c4bddab5c7c5547793ac4cde24c6f9d4ab4592cafc3d
SHA5124ec51c48d3631371a87fc1d9690e874221c3b9d32bae4ac17d26058f74493d4bea09327df3e1ac5d270c79b169608a841cf8821cac407e04c3dbceb54c867020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538ff684f5a4482e64af56d18509266cd
SHA190d02065894d866627d702f564b6dbee0709afe3
SHA256016ca52f2050c3800ed274e93c3c24642a38cb6673700f33fa0af106894b57f1
SHA512ea97c7c638e96c0155692be98084ddd20355350b3a6e1b06f00281a61c785c388cfbe71548035cda4985c9d360f7f0cd8336467e026b6fe42996e7898acf119e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b12db61f4ba6e09ccf4e59a8ea1d227b
SHA18664715b65ba4a4dfd6fb0981613931ccf84fd4c
SHA256f1b202c8bd72bd17c1ed767481ab5571c3ba4e1034d07c591eef53878b9d4e5e
SHA512685572b680ccfeec6941c39f2ebed876b80791d303a1a895e0d65aa3d12fd54915e8f6fd0cbb6e3ae97115126cdc94cf779deb9f3aaee78dcdbe2dcdd02e1411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bf852008c4620c4ff3283cb67b92000
SHA1c463c1b44ce41ec87a5d0133043535a512004d1c
SHA25631aa2c587141861fd53a753bf2e4c9783fa4ab0f9597da01bb842fe1927d2cab
SHA512efcd55d674da8066d907af16152964124cf72bf3679f908698756a965333ba9888e08420a51e2c8a49fada8e641582733919b7d516e3af9823548b37b9dfbd5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592e436911ee93241aa73a42842f288fe
SHA1f873236a1c6f7e71d90a0cff37b75280b9808c13
SHA2564ca2d329470c330fc4f160d5a843a93c0fdeed3057f2247b7970d9fcf093504e
SHA512fe269da968a4a73aa70983f52e2a65691684a2632587e43833309640961c6666e6e4f7533009c7c1dcea54b975bb4239a855c89ff58ceeb20cc41518109968c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2c99b8d14bc751ff19500f92668b2e5
SHA1510a1bdc8aa885df3a62e9a411698f2f1ffcdc9c
SHA25659024d56107bb766866c82a4bcc37fbd5f7f56046d5cf3c36708f5a19224d043
SHA512ffea1e2b94aebe0140214c0dca81672543ef70f8ff46b4775e8daad5a5757808d047c756bcff2e3afa2ba895c9637622abce291d4c713be7fca4a39f5860b042
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7fcf6d69611a9eeddde18ce32fb7d40
SHA1620f9f4cf39472e4502f7554acbfe4a3f5013158
SHA256f649b192607457c2a4cb3afaa3c91e1afe09c9f2b4c93d19a1f35b3c0f82df72
SHA512123b063091335ef518c0709ee0f3f145240d71db24e83e615770a9bb08886c80a09de4b51a785fe71e0c0202301758f497f2357a3a337ba72119305a47d2796d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0099d8ad89184e4f99a6a8ef2b9320a
SHA1cc2d7ee6864e605a10aaee8a2eee96024ce6a0cc
SHA25608f1b4b95c54e7d511ffe1170bcc58413090926343c1f6d5d651b29d2b67313c
SHA51250f841de08a7c988c972daa5954d18ca637367f3c02ed91473eb900a23a28f68c68f7d8f8639eeddad432f6a8951272dc1bf36233a49e4b0dec522c8ff2fe712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b64e2627ec285d3df3d43d542d366d12
SHA181bcfc1e9922c34594dd34cf4e8ffadd8f51272f
SHA256d550f9e2894003ab6d94e3fe45a397199aa87191ec31ab179282591420ad9181
SHA5121ddd5e9f2a54c0d8a89432bbaa5689597b9280c83c7d52e2f06793b0965a546fab830a36d7f8d8ee0b822963056e02d094c318b6bee09c597bc87ec970e7d28d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b087f23b869aa98c114a2e83f67f15d5
SHA1865d80ff60d24e4a3bd0673d9d838effee01a0e6
SHA2566b3cd8cf74458830c2eff8f545c911223d300ab1f0c9e1fefeff79ad05e6feff
SHA5122de500315cfed9102c13b0daab78ca94555f3dbe975ed5651e338d01ad3fef06d0a5b7ab95180be456d9717176164b9995ccfd427d023ed55ee9553695cc23df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b21df611ff6773ba9917e1d9f354e854
SHA18d9994b5322d6a4c678da5f8c8538124236531b4
SHA256b4d85cb968dcfbb17223f6837565f53e10651641610f29af253f044959603306
SHA512c6b9c1200c911acb4dc8cf5ea9c356af4adcabd3929176aab722740062fdb35f1001975dffdf873395af885985338b4db986ffc869c9dc7e981f86631e335b56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58abec69fc0281519d40fadede96c9d79
SHA1e0cc803b58de1d492000ef78d6a1e7bbfd8aef9b
SHA256c2d1c723fad62009a834b4cc46b070839617f4d613acc6e5d89f0cbd78cf43c5
SHA51241af29d6bbf889c51e2ee67ba7a118f5efa6ffb4e44289e1247e92db5af370b8f660d1fe505caee9b0731579aea95fba12c2cc6cf72d6caa72e717e8959cd27e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508ebbc501a09ac09e30acd5e47a014d7
SHA15c0c4b0de7fc8a9914b5be9e6902d4eea674ee34
SHA25691094728fb3e5f7d6ae3fa3f8bf69f2e1f869e9f69f03d6cfb9546ff61487f87
SHA512aba4daa57d93987e2b366c7942dc6db1b049bf1eeadb5b792edd8b64762e1a23dc52baeee0094edec496622a2d9c3fae78d89d7194702b47c7d553777e95b432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508130dcafdc5a1c891d6ad167acc893d
SHA170e646f76a83c3274f15ee336eca983d603cb4fd
SHA256c1898d66944499995c7ebaf25c119df29fe9595d218d7d2ff6e8bcf145b3665c
SHA512849e8106a9249f291fedbee9bd54f469f2c1c1064a1f3574614cfdd2af69daeac57f0dc409a2123ee2ab9902955b6d4609cd691f2fd45a44369da5ab587dd51a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da95dd3bbfe8b82ea0d427b205912152
SHA110eb4a8c969025794daba1fcb31e5156b4ccb70c
SHA256a07129fd75d6bbd9c8db662327f1fdcd68ae1eb6f33c33b98592ca7608c7e13c
SHA512048304a8bbf397222649d167868cd9cdc00a0abaac180547b65fbe0824d51172ea14776457bab731505b21840d4ed5a6fd88684f4faf44669beb18f5f76d5d02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c78bc8971f91151c5c6b1b7c9b1d6124
SHA186548382ae203dac97189ae1fa4bc2900c23396c
SHA25653bcf6afaa60082c14e9dad1993db25d7cdbb18f5d167fb5d859a4be53117a1f
SHA512469677be903e85244b5f5488ced273868756965c20e94a59352552ed40f7fb63c557e583ef2141f164111b17cda300576b06fede1d2cfe1fb93994da3c695567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5260304e0620b063c0b82ed36692911a4
SHA1d4087d763e67f77cc3ee2eadb407869e07c1ccc0
SHA25603c3ceda2c68bd4b1d7b3feb59da1b1a7ab668485031fc9a03eba3d6099287ac
SHA512e49149bf200580066562e62560b0e4aa68e30cfd29df62dce762e7e5f5375b1d4c5e6cd1cab61e2b8f3edc2467fa0a800467722c16e34b6ba9d8a2823c330045
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b