Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-09-2024 23:33
Static task
static1
Behavioral task
behavioral1
Sample
ff80e71d673d17ad184161dbbeb5230e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff80e71d673d17ad184161dbbeb5230e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff80e71d673d17ad184161dbbeb5230e_JaffaCakes118.html
-
Size
19KB
-
MD5
ff80e71d673d17ad184161dbbeb5230e
-
SHA1
1cf38dda96d965d42c79bbed7a6aa80910630132
-
SHA256
133bbf37029859f8819028bfd7b53773eb4a0ef5d08ef69ff19a7582cf9b01ab
-
SHA512
36ad92e1a73260cdf6f1431db904d0b1b58d0ef1c261e17c2ebea63fc22cb04168b1d045c496b3fdfcdea60dbe2acb9749c0a1fa6552a1a0db398e62be0fc3dd
-
SSDEEP
384:SROBMeVKb4P9ue0eI3j1vlDrF/V/EZpB5XLmR:S8Cesbre0e45
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{49B94F01-7EBB-11EF-BA23-C60424AAF5E1} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000084e337614fc6116ba78faa01569b54780e855d4cf564ddf84da02a124324e339000000000e8000000002000020000000ef78b68ae1df6e7a4df3a2bd82d912b384b4b6af4a480591e3dfde68bee0311120000000d831077ebe9fe6ca1398568e5379bedcfac2f14da01001c9af1ea424838e97f6400000008cd5b570ea3ac1fb19da5d32bd6aefb9ae52e183970fdb081e6160c15835046df52964642ccd67396d439af52322c0d0e0eb8591d571c2ef85260708f11e4dc3 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3045fd20c812db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000064b7c1940b53c1d23e4229592c62f800b96558258fe88005091317cb0ecfcf38000000000e80000000020000200000007074fccd2d0cea667ce38b12a763e8d1803c7746957e0ef3ece8e8457b20e94090000000486d09eaade1160631b34080cae22b15c688ecd39fb2068f654aab9ac8e991bad7678e80b240f3241fa81045b71ed267f23947857a92d0e906e9e96257cb2874ac18e567e4a581859b4cb8ce22138d3a4c08a72a34d525472d1f5a73f8777b313bb06e5be64eb3ae780e7ca98de07f78bc44f349f878c558052b72e173ad127e137f2a7d94b896cc809a2403425e47f54000000029d615919e04004fcf9ee57d827a244ae2ec36f7079d53050d975a8484e1acf34123ce37d4c8f2cd697215d551ad7b0d105b0fedb010e967e062ff26ed9d2107 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433814701" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2528 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2528 iexplore.exe 2528 iexplore.exe 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE 2356 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2356 2528 iexplore.exe 30 PID 2528 wrote to memory of 2356 2528 iexplore.exe 30 PID 2528 wrote to memory of 2356 2528 iexplore.exe 30 PID 2528 wrote to memory of 2356 2528 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff80e71d673d17ad184161dbbeb5230e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2528 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5354a58c0eba37df0b83bd4ce8381bedc
SHA111f8d2997ad941ad8e6acd758abaaccf1d879b8e
SHA2561145950be696d47c76534ead2afe003be592084645fbcdac2d3f70c27ccefb27
SHA512b8aa43f1f804b6129abba59d89f4c474ad0692b1b3a539e1aa4b6d0bd7ba401e9bc8b598fb7f1360b41c0fe5fa4e9ec4b0e24dc2b405b332bd554df4f5e2b833
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e91b048dc3ed2c3623d258480d7b72e
SHA15143eeba5aac44003cc89a340f9d8d700300f632
SHA2569c0a3a1d1573be86c6e766439477fa6304c43596206319c86785fcab7a96ce44
SHA512f5a821b2b5d4e10686ee413ce8f3149a1a508a4f43ff7fd3f79bc8831395d6ca23234fb95e924b1132b8f1eebabe4049c73b9d4cbc0041a26289e5358501884b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547cc3a53db117afe98ec95500c731b04
SHA1cacd1b99410dde68c86cfb1da640b0bb2722fb4f
SHA256eb44650694de36eb7c10de6af92603640c00a41f63d7c4da0f654b2ffbd7f03e
SHA512c5c6cd6f1f6e08ad2551138babe5856568a434c7a120335cf2ae2cbb687c11558534a4e914b39708957ef9735759c67438b58861116338777c0c5da3c59170a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a62d0bdd29ee18b28688ba3dc44d86e7
SHA1d943d5382ced7f6037e2a7953e96a6aaf8870ffd
SHA2561f2eb0b6db737d0f7b36779c8f5273482fc7182bd090b2ac8efd84c36c2fca3f
SHA512ef1a9def8ab8e4bb33ad95cf526e708105f0934b3855491df287baace5ea7811aa895ab216138354b6928fcb4d357421f89db41fc61715703e11de70be1f3ba0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57601a072d37f7e59a40dca62d8ecc939
SHA110a06d533393fc72368953475a152c1bc2ea8cbb
SHA2568bcc439de165b75ce8f23e26210182c96767042a65563c6ac7431feca2ff90a6
SHA512449176a778492043bdc10e91775fb6123f2a84272a606be097a45e58a098df99b40ce1f222737e40ee6ce426f17f16001c0408c7325bcb8a5510b81309ce801f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5682c8fb730a10313c9ceca91335f4ad6
SHA15af223d5b3818170b97742e0659e155437d66940
SHA2568ee415602e6babd4f0ff80fa901a289e3275744a8f260fa00de1fe957b6e33ff
SHA512a92c0ea372bf4a9cba4cab2d23e24a985f50429bf1c6990265eba0a7963a23cfbdaf314d05faa3c347862eebba4646162a67dc4c99231397dc2690bbbd6a1ce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538591f9b095eaa87c8a3fff74818b133
SHA1f6a99b1153423e47b8243aaf9706fe73f333d8a7
SHA256027e3afdb07ff3670a3536564ea257c567e09d9a3d884081d2924bb8209e1e58
SHA512e63dedbe232cb78d0d7417caa1c127728377945c5d75c4e70e9b33a6456db0ec0362d84390cbb5ae65acf02d278a42992be7a18487542dc718b5660ec2127964
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52afd188b6d1c893e2dde96133a78468f
SHA1dcedc767049a7e44a4e212d9689445b9214577f8
SHA256ded9c0bd7a85b84bf614494d459d03f5435ddaf7d2d5d26eb738080560a381c5
SHA51245e0823d5d7f7137c5d8882a39e3366e3a3d2aa4bf9b1e69d80d469fd62b8b039f8ad36f627cfefdc99c0b5482d07179262138444a976d354fc76d2e52a44815
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9d3f3c79cbca1997cabcc3cef6ea75a
SHA1a80daac369b7f48d570f24cb61220902d9979ce9
SHA2569da4f078424a7ebc76f392beaf92c5feea4eff8d6e5d34c727af6ca68026ad4a
SHA51202de5f52da030bb67904e14d33c10f90c6e1e26f5de4b0f1020451f69595f0471fe3f4c6813cfdc3da4415fdcb9b68a09dbfd394c721c944021ca0df623a710c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557b0dec84392b1996dcf756b42cd4bf4
SHA131dccf5e5c295f4f987717e6e088b79e4e05b41c
SHA2564cddf0289895000c5947fe347bc764c1117c691369ffb8117a2f33cc29be1005
SHA51261ad21225637816cd62c9384e7afc9eaa74500cbcc3314561ee71cd6160ce8b094194bdac5a7a942cd94d01b282af08f96916484f63413773c491bd6b5991105
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5769a412d87311492401acee0b9b8e8ac
SHA16c16dda6ef8b6ffdbe0269a0d19c166f920ba506
SHA256f2e730906d65ea4dcd913d7105e4f3334bc71f495f22c3987679e8476ee7ad59
SHA5126062fbfc19ff3968835dc1634286db9a1789bf8dcb67028dac52748ed65b3082fd91e28377217b6b7c4cbdf0d6c30e0eae51d78d81c1e2b6ac6eec36e332eb67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f71a6799237d39d1d39719c1c78da64f
SHA176a5aed9bbbd0ca4272721b9f48f9609ea9c4318
SHA256da85303f42e5f6d19a8d3ce94f76f4171d200d5fe0e1bd680895a3772a8a14b7
SHA5125219b21bff5b6951c27afd1849a8b5f2755d82b36df438ccf3f54710926fabb92b06e884f24818404f2330609c1a5f80ca6da2586c87688c6264213d6e71d1e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517b92ded783f52a4593af5e35c6a0256
SHA172f63c6fbc149fcfb5e597dca4977a333250a23e
SHA2560c90cf0b62c058accbaa5e7f49d7361a2063bb23bbd0c66010ae7fced66c7129
SHA512d3e8e1a3ef9169e46cb59a8e0b9ed055ac786d523aa1575dd95d9ff31e9f4a16530fa03756380115adf90b66fd5fc0167ecaec1982e6ac81f28c42f20906dd3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a85b4cbd7605f6ca5fb47471db79b6f
SHA1f0a1d6b0de817c55bfa4fca60631a4577462af7b
SHA25685fe833f24116ade9f4788f385d8507586ac58ec2fcaf3cd8660008c036a1c38
SHA5120b70d69721602e7b817980ddc6df0c90c0df5e3a018f150d5287428793fc194be95434fbbf5b9fb07cfa18fc66611a5d1aa4c599cf39b2271a99a01abeb7ab25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53babacba2514332682488b543a6cc6e2
SHA1916504011bad937ee8b9d61ed294ea55f9ac3863
SHA256e7da5443c2a0eecd3f0eab23d94cea894f9b710c9fa01ef87f28223b326e7ca0
SHA512692ed0582e44cce444c221ef134400da8da172bbe056f93aed9af86ea4bf2c8ff2dc966d3fe931cf79a570259f740fc5d2027d4a496858393ab1245ba117a3b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8e124e2748cf0f81227c4baa5ca1ae2
SHA1a9a24483609ad1693bff4579da4c9253f0dbe3f8
SHA25621f83cb659915ca8827c62d9f2e3d311c098c89c23c56296796fa55aa6ae4f16
SHA51267a42315cb8fbdea6676e01770f60c999c55380e7b6cba5fbc7b52989ca943f3a637a8bf49632d07016c53db633330762458ed2c52fef2ddd96f7dfd9a9ffaa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5578e3bdc4b5516665b37dc24f74800e8
SHA15d0d4be01e8a9b1531e7c3a443fa7470a0a3c898
SHA256ca1817f090a33b1048734e94ebc4c82c5f86476f815c0127b12b4cc9bd6a4fb2
SHA512a8fc8ab3cff8d43e76546c2919075f14248577b2effb102ca7edfde69528aa7566de320d070f3cf07181b40e974f2d13c054ec805ea74a23ce49992994de693b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542f13b46ed7fb527631294f7f17cd48f
SHA1c3e2bb48e23cebd09566f390efb55b32cce43874
SHA256720f0c0ede509c090ff7985f91e965fcf621f799211ab5c71c39673f80003cb4
SHA51215ce95e5cf3dfa771f72ac5331ac4b6797886a139ebb97bee94680a2e989e4c013ea7b9815acb77333238b7713775c9c8efd0096ebee6de76b5cdf6a09d94b97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de04c36e0b054284a94da31ed5f8e270
SHA1e228cbdd8100cc4ab5d39004c905b6b372fc8927
SHA256a71f181f686139192f032a767c4faa05c5902ff0a661dadeb1ee5e1ee47ea28e
SHA512ade5d84251ae6e2ffd3b8008b959097bba8f192613934f0077039aab93b734f98afa0d4b9098dbd1d4f9390fe03e0bd3e77bfa3eef51017ab377b2a824c3cf6c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b