Resubmissions
06-11-2024 06:32
241106-hawghswepq 706-11-2024 06:24
241106-g6hpvswajf 1006-11-2024 04:29
241106-e4bsestnhx 10Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-11-2024 04:29
Static task
static1
Behavioral task
behavioral1
Sample
script-mad-city-7.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
script-mad-city-7.html
Resource
win10v2004-20241007-en
General
-
Target
script-mad-city-7.html
-
Size
7KB
-
MD5
5d35c07aa73b879487f5f582f1eee2f7
-
SHA1
9a239070b40e8a8d6fee6276c9bb4d7baf3267ac
-
SHA256
fab320941a27be2dcce314470f9df44e72e3fa96432900a0bb5075453fda384b
-
SHA512
16852de31ca0c9f5a4618cdfa2b113e2866ebca07c23fa8faa3ce13013da9ecec138df63c4043188496585f774abba0e81766cc26c6ecb9cc5c72eaa77388f31
-
SSDEEP
192:PN2x2Bcu38+G1YCdjOGC4bdsgW8voy7m71TyPTN:AxHu38+GO+OGCkQ8Qy7mhWTN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000008e57c4e9264eac976af6439a29c931db81ef4cf6ce106073473b8db702d1c3a7000000000e8000000002000020000000cfce38508738a2843a1aab080d41f75a5ffbe8481639fef212cd0440a3d1fdca20000000036f5698bfca675ee0b07def4349ecb3847109a3ce58f68715d384f7558db74c4000000022658c30f4ddde73d3ffeec4ef03fa1b3e083cb514438973fc53a76aed2ae0234f82a43734922c0e9ef9e2284722f58d9612429f6b0e7d843ed86257348f571b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 608902850430db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B08CAF21-9BF7-11EF-AD39-C6DA928D33CD} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000036e5240533f36675a19aa71c232366a90151379f66349b7418fd7b2f670e9383000000000e80000000020000200000009610554d972de29d42330e801a84e36bb68073a9bd8365c7d45876751eb89ed69000000032c62c1bf1953ebc2037118998a10714c377f32dc5b7d12bfc4ddfe89c265748c752a065346a82a121095c89ce5a80c3991d9a09ad7f83c4c7bc5561d92e30ce6bf11c05426c8dabffa0df8847f390865a7e4284123b4353ce0adc008c8d56e4b9c1dea41436da6c8c1cc46c0b205113c33780c2d5f318674fa84e43eb0c061fda69f5d25f689cb09f74c87c6bdccfc540000000e1436e7f9882e5bfd9fb1601d08302f005b315cb684b69e363337e5b87aa748ddf6db4bcaa0e2c7b9466fd34f428077906f7297de47ade1034990fcc8906121d iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "437029226" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1668 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1668 iexplore.exe 1668 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2820 1668 iexplore.exe 31 PID 1668 wrote to memory of 2820 1668 iexplore.exe 31 PID 1668 wrote to memory of 2820 1668 iexplore.exe 31 PID 1668 wrote to memory of 2820 1668 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\script-mad-city-7.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1668 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eba07df91e57fd74796bdf35faf5a82
SHA13ea5526e67a6a28e0d5d438ad7dfbf73ab12260e
SHA256b3fa251701102b2d7728710980df5e4b4258113b298000f54fc4a6164266c27a
SHA512617e0af979193814e85b7942cadea41d82c8f5ab05416ba7b12d584ba5318f5557d5a9cc38da97bd256fa88b9b46d825324bd96231a84fb1fdb3dab014db5863
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5f7b5b0ba53a8ec8249b639348774a7
SHA15aa99f69d4b732ee08e9da84f256308c1748f693
SHA256b98687ea3b425739e15cb232044893cb55d4ea22c71eb8a6b8ee395e6ef1ab18
SHA512413c891b29cba76b3fc2c41a5d6ec17601783b12a5047beb2c830160324ff080c6891c9fcf4c053c9e33b4465e52c1df95f15298075b76b4ceb3f5dc64b65569
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a3d4abc94a2601c0d7279f705ce6dce
SHA1de155fd9d72559682df2062d39277b67a5318ad3
SHA256f15ac7317f67ba6035a58174d96125e704b08871f031246c265d70f59738cc78
SHA51274c01ba6b36ab9bb9642cb9c6758a3f34d95a9fd14c5acc7d6fee2658fd18276a0522562babd2822ae368f72873d6e006b06153710c24fae1c7292e62fd6c827
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dd94b680bd16c020cb01c4554659261
SHA1ef8790a0fd297154b8da78140741f53cdd578160
SHA256b778724511444e8c7f43a03a140afa2f2a331e8b3455727c881fd1d94dc6f2c4
SHA512cd93191685d1122f661fe271712bb88c35f6a39807202f66ba1b6d09b2a8dbf9348afe612f86d1e5de8609036d96cb74a17e3f0a3b26cda8f6101a6f5c8f1e9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54999f27261d5be7c521f0f44321421ac
SHA1d847722c7f92545fffd39a022ee90cdc95420e10
SHA2569c34e0e374aa0d9b7a63bf5b7e1c3d101af5327eeb5e1b0b850f8746cdd87439
SHA5124cd908900c24efa3f246c9aa59293bb9d2d38a60e8cc64e125087fff1a53adf6e4e864a9d477fcdd0ba53b31724fb3ebd1958f87dc497b792cdaaa10f19dc69d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e9347c7787862f0c662160acf4330db
SHA182cf3e5a10d7eed5dbf19077aacbef7fda01604d
SHA256b79626895f12a03106f040552c86c807aab54474d1045bd4e047f805a1bd40a8
SHA512127aa2729972e5eeaf241412adcf0cab9e4e9d760faf55eee286e9211e14f144098030886a5ded20464508f8104545e6822bb4fb0d9500d236a1403b29baf02b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58702202492e71ec57e47b814b6ae2873
SHA1455589f572887638d6b629e19e78d32311fa037f
SHA256ca30b39e83deb8561b310fb4157974e963f0c598f624a80a2b929ebafb63b205
SHA5124c5509591bb7ffd39a8002d9fa2f407a8504d5a1fb5766ed63fb0e6efa39e0cb4ee7907f8bf6ace49bcd5997c8e1d58b406b4ed3d90a5797f90fc06009c1e701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cf30dbd66171e0414cd84a91c9958cf
SHA1a3cd7d1ca818a6a0e262b107fe868776c92be91b
SHA25673950c72b445a9e62966c237ecfe9af0338bf25978045d28dade5d0c31eadb08
SHA512ff2b2a7e879b68e6cb2cf1f44af6e309d5e7674af1a8f1e21fb73cc8e468c86cb05a7b370ab8c4fde0cc891de5b64e86aa39f9f696bd06a4bb19ac430e25ce35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59132b200f7b4a8da61d4d9ab34467df2
SHA103fd21019803df42a065eff39f09cd5d26413d4f
SHA256fd07022124f2bead346f4c32444e7c88de1700a0048fdb70136e6a9d028ee526
SHA51283fc462df1d330023a83849c0a5803aa75b248aa310ce597d397f3d0fffac25fe993713c1753b9ef3ee0b89460b6c4edadf106c34ef37c9aae616b70254d8a98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddf5eb71b653bbac06d2ce04a9125cc9
SHA14c9313b8187800db2d9307d72773944e6a34f7a8
SHA2564d39af774041313e09fe7e1b4f5765ad1f56bc81cfcd2cef7c44789fc4fa0840
SHA512a6baf247ca78780a2909410e43a6d00156dc91fb2786ebd1be385de82ba48b0277c29a2a969314f15eab9a0b8fa65e1dfcbce1e6145f58f040e86fa29bfb4f1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582caae9b01166d126af89336c4f1474f
SHA1a20110e072bbc4a1649a42dfe8a95a3ad94ef152
SHA25601b03fa024c17ca2f3e20ec2f42c5b3a9dceabb1ec7accfb5886a81adbf756cb
SHA51299c3a63598e9f2692d6c98cb1a70be38f61ed29c1e2b04243c03be1436f8dd60e983c96a559480dffd5d77ef4fb290b55d0579bbb687783127eec1a014fce9cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d01ef50bcd04fe91246abaab4553f48
SHA1775d2117a5b8e938bb5f41421fed4b8138b1846f
SHA256a95f224a1c110e1287360e13497d5170cde63a25e358a20ea0d14c03a2dd934a
SHA51286cc203481b4bd4457a6ff288f46184b69ebf99fbc3c932cab14445fef755a7932123fe816fd933c0701e863d2c3bdaa1c7718a23cd3ea4b2c2582e15ba6ee7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcfef000b40424a592aaeb51e678780c
SHA1ce0f6768d627c331e10b3d1288a3b4941d9f7fa7
SHA256078aa5b00c47fc58111ea9f2af8df0d5909a443722a9395cf9e0ca73377e94bf
SHA51253b1b70e052bac97b1839e730cc59594f66d3f1045a7f6cf4812b75562994717ef63a9a1c3a05b1b07371cd40325fd5a0b9fb81c105af2fe131f6104302cc85a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a2245c1ef6d25f6cb14cf49e47027e4
SHA13950fada782246acac34f8b439dbec93cbb99be9
SHA25639504d1ffb19757e12ef6e29c8644dcd903bebdca97fdcfd750f4afa5c34626f
SHA5125ca38ae747102a3f504fca10471a2c64d7036f60a1e0f3269ea1a8396a4f5a016aae4fec61fed85b5e7427e3fd89382940295c9a4b7ae20f5519bb915c00610d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54056ecd339a15477637f5890284a0192
SHA1ffdc38274f3951efc3ccef1148867f5bbf4a39b7
SHA2565f9d23b881e08481e426029fafe2e0ae5ac1d03dc47de5df43ba7e28f89d9a52
SHA5126c3fe44509eb6bfde3c73878c686895c5e9e1b24a5389600fac8a1a6962c00fb7174fe24d6d97f4d59116e59e87cf991d20f1ab383f174ceadeac2e3cad2bdee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0e75f1d7379d484cacb550cd11476ce
SHA17a0193b2fc4ab5e7bf9d4773e802a60461f4468b
SHA256e01f389af6ab9d568416fc20af93bfb81301cc3c8603bd1ec6199480b5f7616c
SHA512a5b7eec7c8000198a80ad402b27349d687a927af4ad1a99c5b9ef512fac4021806bfff446e0288a6d02dd45761c4ad27976330141b8961bc3b6ca6c31f7bd17e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541e5ebb142f7f961354b87501b083708
SHA16c48206a7edeea1bf45e133e33968a47313fe522
SHA256e549f53a714b48875be631a78ee570f56b98725dcaed23f055bf963979be82f7
SHA5127e9db83445669a39a1654a6a9ce1bee354d544077e5a7acdefe2d59134ddbe758718bc2c5d0269e7fa34ee8dcfdb2dd6846165f8f5117fb0e6f5ab5d71b216be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57299863bcd8d3f2245faf5691760b44b
SHA18f46abc17201650e3436b04793876085b874aa92
SHA256db091b434ff70c5d25c72d086af39fbede06ff389bdc85243c7dc23959b7ba5a
SHA5127a11f4ee981700475f977c8c3c8d9ef64ed5f29494e04dfd953a9847a30e34e9acc0edd7b48137cb917268908af59e333070d0c2f25d88caa1e18689f7065082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff800b5a6a41d24335621af02c2b8103
SHA12e31a9dd02cb89e1c078739e872adb1e48563022
SHA256e007c60e14a627a14594b5978b18f42e18b4ee36686d145d5e6bf0ac3316f9a4
SHA5125c4e45199862e2fefcacac4d3bee58abc307cb0b60d9fa31042cdfeec6b7d12c40d6108d68ab66bd2cae42470fab7cdb3139fa6e8231c5bf0333dd9ff4ab1d5f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b