Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 13:06
Static task
static1
Behavioral task
behavioral1
Sample
3a2c155f13294708aad265611d2b6888_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3a2c155f13294708aad265611d2b6888_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3a2c155f13294708aad265611d2b6888_JaffaCakes118.html
-
Size
23KB
-
MD5
3a2c155f13294708aad265611d2b6888
-
SHA1
4fb03f5fa4fb15466c73b25a28926f632da9520b
-
SHA256
a1826e1136302888150ebdd92fc35db4552a92484969c7816e54bfe5d5499d36
-
SHA512
99e5a5fdd4cf86025385c449f1ed30e7d42a1178d36ee3147966e217be359e97111490192f4eb93884c2d5f570ef788e4b42bb3ec80bf8cb14fbe83db4ec4cdb
-
SSDEEP
384:SxBG/6h/8jh+kTxp0nNPdKorpSq0siiiDsDfCpT2EMr:SxBq6Wj1GPA1fpZ2EM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004ecf3e4259aa05419b9c0951a15b131900000000020000000000106600000001000020000000c6c762683c138f6e6cfd2f317ce443b21f85a99845b7d960054eaff5075c3b1a000000000e8000000002000020000000ee0f54de00a4659e019132d80d3e7fa026fd6d7f57accc9f1074ada3c5a0ba45200000009aac359574b04c4001d893cc830ce6b0b8b46586e859c6537b9b004847acebf5400000007fb4ba6235d85f8ca70e040a6886e92fad525f8f00dde513101bea739e29135e7323f3c562da8a5251d508be21ec3031cf032b22baf1cfdd1b0ae8f4061a6ab2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434900260" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CCB81D31-889A-11EF-87C7-F2088C279AF6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 104897a6a71cdb01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2976 2220 iexplore.exe 29 PID 2220 wrote to memory of 2976 2220 iexplore.exe 29 PID 2220 wrote to memory of 2976 2220 iexplore.exe 29 PID 2220 wrote to memory of 2976 2220 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3a2c155f13294708aad265611d2b6888_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598bc52bd9cf5a909d7852d774fdf5359
SHA190ee78407102d4426037e1b8bba1b2e21718b4c6
SHA2561b9f58181486c1415c0abea5ed3b4b79afa7de84c5843758e60fa903214ec85d
SHA5120c831d49c9c38971a447e5a6b8fcbcc85cf15ed27499550324818b8b4fd3e62b51d8fcf64de9abdf7f6bd403130e72c5830b806ea7ef0921f26b8b645f94ad31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5f395022e111a7b535022711c8bbb75
SHA1c51f4e4cc8cab57994df70f2c2c69295b9ae705b
SHA256fe793c213b6a3b0bce5c34e92f0dae94d6d6cc6bc006f69cdec2d97b20bd97be
SHA51227e16c319e2e5ba5e7c4ae76a9a3126b7a9a3181cd215455c51b2fed8a0bea59b322fff9e2dc4006d7f3bb7849179d4f4d0d4378e941632d1bda114af617843c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59efe869ad084e9cb8a18f8b90f54c089
SHA1d68e14cb722e7b858fc230dc0fc56280dcced2fb
SHA2563d239e7e082ee4a6bd8c142dd8bff11fcb96f525c3c1d264e4ea0d4c1036c6dd
SHA512ceec49896716cb96cc2db58f69f27f4339e80c435024ff79e2687662089c32d67deffe72490962234d695b6d069661b3630a412c0598ec6c08df1251f776a9ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544625602a53855c6c7d7a18402a818c4
SHA12e8dd74f8b3ac750661cdf76c36e9394627cd244
SHA25681058907c24d6fa221b753ef2a4ea05451743097e73e9b0ccbe2e543915b6f00
SHA5121f8efcfdf4e644bb376c5981fffb0d30845ee46a8830bd204e6c1b16fe28732b35dfcec2c12c270c220297946da97c5f9c01f5a3b11f2871a06fd3c64d7a1617
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5462a583e1b07d1e112448bbc5b30800d
SHA19d8e1b6eeec769dfdd36cd4367c75ad48d35cefb
SHA2562593596b2ea38a254da4dec58e76675c918fd53007685accbd0c72088ed44d8d
SHA512fdac80f4cd20907d53567b6f842004b60727724592cdb46f5c3c3dca7cbfa5b158b92941c6ac949790e6380785354abd4ad4ba2b275b7c9db95e31d0e48d77a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d1c355935aa36b0851fcb3dccaf9f56
SHA181b1b92efb838f33aa21a9f1447c7375c03b0e3b
SHA256c5a88257208af9e220bfa680efbcbe24b9129ed06554f50a237709e6c0954035
SHA51241d81d4f2afd5f73e49ef160250b04af794a723b0fc1eb1863ba8684e921f7b8981a7f9b2f7a9fa8110ded272571d4a0d907af758714ab0c5199d014a34cf9d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dc8d3884b9cf6bf8e60d6142faf573a
SHA1ad21d7f41b74670d4b0deb1373090092a996dead
SHA25658d65d888f3870df9fb18802a0f89dce5e6e965d6198d1ec14f964c151528766
SHA512d1650530825b8fab85d31212ce3e16be0be0072cb105cdc9e75c135d3b7185285423b5c6a989792e0d5d6580b88b58805fd6976518656d908b6fcbcc972d019d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4e117dd1a1a5d5ac898db3c483e80c4
SHA1d27e819c4d5c7f2e5cdaaf20da76ec95e9f74350
SHA256029062c4d7ec3e45acad168fbbb497a88bf7665d8b34e4e0431a11940051ef59
SHA51249f174f6dbbafdbeb73ed77fe472ce7592d2e5caf7d1cdd695f407d43823ef111a523b1e06bf07bb30e87c17cbfda57a2f81b6931559f782f7a4c4cf30f8148e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f58d9e6a9f821ebe23a87e7b076ec750
SHA157fad4365b5850c5bd50e6aac0b0813f4bab40db
SHA25672c4cd1c79b1f05a600a76f119364b8af7e89b669c28e6bfdcd1c4468a62bd59
SHA512b3c2651d19e26b5a585420604c776fa4940d6f76ea5b3148173551f78288130ff54c73216c7ee05cc1d21727d2c5f484effa3d1f20a10f212a5f419d4233f94f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b6c9208cbe99ba071a00070a63ae305
SHA1c3055876f3f0c9900a0d3146f780c67947c36575
SHA256ce1f9dc13f598fd363dc306094ba3caa421dceb53e4f05459ed487814e57c126
SHA5122f16844310fa22ccf2850a99f795e0e0fda0a2c9fa064c7a39e709b82ff0a8fea7c68c581eae1949813b01b80e31ba0e33d752642de9ad08e7c6a778d069b35f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8dafb75e167955e729a864e124ff16f
SHA109addc7d52272182fa535cd2f9d9e18228f73c9e
SHA2567a55bcb4fa24a2096eb827855178bc23b4c5da3a7894413e180c5983baa6b8e1
SHA51279049b86803c701e9fcdfebcc5ef3acb1b089c5554fe8bbd07520ab52c0613dcd15ede45848a13e566a37338140dd55d8ff6abff4895974a3111d9e8c7d131c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5130542f8fd238a21535d426a0d8a42a6
SHA1babdc6f1b90627e042549e747328edfb9000071e
SHA2569d4e39d0e6a098bffa869e8b50a0c3a91e94971b2910cb0413d3ad70e2816664
SHA512fa0a1b58acc6276bb78f37033d5207ef1ac86d40edf2ca00362d0ed965c649f1056794a3b16d25b987cf7c28681bcaa7f6b8a6ff3a827019580fd495ccb8927b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e37b8c546950f61ec02451c84de943a
SHA1d2f55c22173a955423d5befedacb784ad2d771b3
SHA256ac1192f9eefcb91d97c5b326e60fa39aadf3fc3deac12af7caf8a2c3ba0e416b
SHA51285a25f40e9605ee693c76691d78e6d88c46a47db72a1dcd280df27606ed119e7a7952a92176c08b7fd73ebd4540e1a0155480de8868be78da1b26c3d50e931fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dbdac4bb0dc29c0daaedff6db3f8139
SHA1a71736aded4d6d1237c200264eb3d1fd430fbab7
SHA256e8b16aa62fa374bd21a960dc3965b49384a2327b1b184ad07d5a46f2cbe844d9
SHA51220db2888dddaf844360097d4985f0d1b04aabe01b82e56f8a46ea853300b10d562c4d1ae22d654727afc5dd2eb9311c3b0b9ed2e69a64c97faff9912e485c88f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ecdff16068b13c446593e562544756f
SHA1c69e79b11d177e3ee3cd4d88aa7813635bc00789
SHA25673f97e8ba390074ab37b45e05ceb8908cc3f1af1b3d018944cda727fc39e5846
SHA512d4a869a975606d185059356da1ab50bd744e45a00987a6bd61d02642828628c299122345710130e2ac1243509317a3e1d011710bad6bf01456253423d37fdc75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bd45f7f0957b4858f6f26bfba6cea20
SHA1457f7e29e7ffe104b3f0b2de09c14ac21196f91c
SHA25686c67a240b8cbf1c805cc1c9cc4c0474d8512f185d5b3c07481a58bb1e706806
SHA5126f2411befa93db855d5bfa4986fe6890fb1d90ae6e5c4422d4a09c47b2131b44a51e359bdfdbe504d1edeba51e2eb7a9a7f77d155d0f0c6d8629e0ac5eb3ee93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cab745a9e6653d7f92ffad414e0df278
SHA1998e04b6dba4d5998b6c225a5029928fd7cd2ec8
SHA25697cf98f3fc413aebe2720a8c9b812f42bb2389146626601ccf827c927e226a74
SHA5121c97b019ce6359518147832a2c80e010d74324dee053a8f5c0d1d8ce827417c22784d50bc6750c58e5d9cef940052b993df29fbb1cd7428ab8ebb16003632c5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509775942166cb7271ee2ca38a72f6d1b
SHA1051ad8f3ada43c3dd228b84900f994103f7c4a73
SHA256a9ec9f791c4d832931a166937ffe40c4cdfd575034543c187f78d4b6424a84ec
SHA512df4ab8081c5d466e996d8c37734bcc9adfd724b85971317f9d15fe061bad0ed172737c84aa31d16e64761049fa2a49939efd4cf584d7da935165a8782b21b452
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f468092bd84f6c6c2bfdef22d5701ca5
SHA1208cda6e681176a1f6d66fb6caa6613835bfbc36
SHA2564eb23de9c3da7e288c2e45e706c5f8af64bc43a52c5c324e168c8bf6cb66eee5
SHA51203fa4837f9166e17f965160a690d6b7cca5bd9f28f5579dab3031d76ec0d4942934054ecfae2304c97f6a98af31bf0c7830ede7f0f09e4201c68b2fd856c6c8c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DUME8XYE\errorPageStrings[1]
Filesize2KB
MD5e3e4a98353f119b80b323302f26b78fa
SHA120ee35a370cdd3a8a7d04b506410300fd0a6a864
SHA2569466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66
SHA512d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DUME8XYE\httpErrorPagesScripts[1]
Filesize8KB
MD53f57b781cb3ef114dd0b665151571b7b
SHA1ce6a63f996df3a1cccb81720e21204b825e0238c
SHA25646e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad
SHA5128cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b