Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 05:06
Static task
static1
Behavioral task
behavioral1
Sample
b4ea23a7a94cbacdbc865b78f56c4b58_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4ea23a7a94cbacdbc865b78f56c4b58_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4ea23a7a94cbacdbc865b78f56c4b58_JaffaCakes118.html
-
Size
213KB
-
MD5
b4ea23a7a94cbacdbc865b78f56c4b58
-
SHA1
85881819bd74f4bb2e1212c080412df81d5203f0
-
SHA256
1f906ba07e8960b9cbeb65bd25909fa3d0a96075cf20806d6221ccaaef72efa0
-
SHA512
d0dbdcf5a366864e86d1bc140a71c74c12fcbb5f81c405bd0e0284afcae7321bb6cad4e85e99c2e82e2c9a65860ca5b680beee3c38a302f2090b1a2fd5deb8c4
-
SSDEEP
3072:rrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJM:fz9VxLY7iAVLTBQJlM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000865f13d9628b32188b350ac4e4c2c501c17d8c04349f481126fbd871905f5fe8000000000e80000000020000200000008045ae81cea90f290f4ecd43ba2b65164633825fc221cd97fa83b28bfb6e59bc20000000dab03539a2130272cffa6d5e3a2d0f3c285fb63e1770ebb9711022315e76216a400000000f3c7c864b72a42481479b6a1db88c2b8227840d2904c244f807292ed9197f2c3c819c518ade1845a065d5ae8990bb59038818646606bed5f68004125863f1a2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439105047" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D5ADB211-AED8-11EF-A6BD-E67A421F41DB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0c346aae542db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2340 iexplore.exe 2340 iexplore.exe 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE 1864 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 1864 2340 iexplore.exe 30 PID 2340 wrote to memory of 1864 2340 iexplore.exe 30 PID 2340 wrote to memory of 1864 2340 iexplore.exe 30 PID 2340 wrote to memory of 1864 2340 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4ea23a7a94cbacdbc865b78f56c4b58_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b99265a403ae5c9da8b170dc9bfbabe5
SHA19638d54b87f0f08d60b1acf872c93d8d3a20d49b
SHA256a55dd7ad24eee8915d43aa790f23c9adb56b4ac4ccb563184c18ca444f255394
SHA512c83c46aa3a0f55dadaf9bc0d833038f3af6e0e7238a7654e843e9ecc74474240724ff0da2099cdb8c75acc84d8b377a18242136871b6ad656ef0e67967e1051d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d56dbaa1cd770a5790b559ef0b7dc2b5
SHA1c525ece91bd4e8a21d305e02699a88b797d8d5f2
SHA25674df6d5c3b868f7de4c8cb46eaaa28833568b67191e72a412aba8e126c696689
SHA5129935fde74182b037ff673fc5c89941da5cef8877393cf412249a205a6ff61c22023da9e1a6c0f41d88d3bed2aba7d73e3263e536221ed4cbefab6872f8daa92c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f05cd5db18dabb005a0e26fbf8b3e3c1
SHA1f9b14c406f52ee0f709624fb700e19a303b3e10e
SHA25669848bde503baf3f2b80499f8958719d61bfc15b116d0e90f02966d68c440992
SHA5121ce7544929518e3a5c1ecc2a65dc63d2e0ca9345b57e35eafacf177ffd93701d4edd5ba14d628b190b06e6b055386c83ac162b937a6733128e3cc4eacccd79a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587515b575fa876526f9b6333038ed4fe
SHA1a87be5a9a778765b07c14bec03532a5c9114268a
SHA25656f726b06908222184b6a9673cba5d9c83ec33c013f5dcd2e427b1d1c73983cc
SHA5124065f88a1e6312c87479a9759584d92747fc302095782746a065a67803ff4e05d97245638c6f15426560987b9a9d55d92a2ef28451dd088c4b2dbcd9ba812df9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c6f92489f19dcc3c7a00609bf574104
SHA19781b2fcfa00b2b0c8bc295de9b0e046d3172e49
SHA256041f353ed057f64e44cbf4f16ebe820faa457120a672634246fa8ac442d9e86b
SHA512876383e2360d68c3ba41821fd13e7ac676f62e37efb43a5072358df9a8456aacae239374b5910d12f2390588c5120dc97dcdd4a905bb5cf8636baf8c3924a782
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d6c8038db233eed1fd8de2f7a3d97fc
SHA120be49124d5a7c03026f1e7eb28b79a80b609a5b
SHA2561a654f6c37d439b025165356c8f9f6161db0dd1c537194a24448f1c76d1440e9
SHA5126eb756a266ebc255cce65580bc0b337ace570b0b67718cca19062db1abb6bf3ac4d120065e0fbd44aba20232025484c87082d16ae6074d7092d4af04113b3bbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513f9d78814c195e7f9e438e161998b60
SHA1240e0ed3303d382b9af5116195059b201f38ff2a
SHA25608e76765994df7a4e847bb0d3d067ba3832444def1a94c9716b82aa67afaa286
SHA512675ede4c463c9e18307cae4e93f548ededf120c02a7335751415159806702f0d1b1abeb855e7080d2cc481c7caeceb62b33f173be189ecb3548124e8780bba82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573e80ed4a2b843af72405a0e929709ef
SHA11cfda2464c141fdb4266643dd22df33332191c33
SHA2566aaffdb43a0e2e9f78c7a0155cccd99420439470c6277863292e5105c4e58945
SHA5129500a0fba890dddbfd58a28a1e6bd22279905233f9a1c7f7e02ed673d6fe4de90ed5ae61356e2f6c980f8cc2ef1940cf86262dd9d7de7f3eb43d91fa6b952705
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555795ec320e7b0528012f0a587f7efb8
SHA1539a1529406095cfcdfc5e7f4cc5080c57512d7f
SHA256544859d5fe07db02b91199b920c16279063236f7b5318aa7aa353b9771551ec4
SHA512095ee6960a3da17ca9205cd309ec21bb533c79deb022780813b42d617c98012575d70b4e08ebd3510f8a7d5ad8ab3a26c8c1d85c4904dafe07a17db210b6d80a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab95cc0f1132d4aea3c1ba8e4d911131
SHA1bcc9d0154015b8b74c8e1e26a04e193ba9ebdf4b
SHA25610c322b5ee6b20864a9b02b2077c2a7befcb4e57af5f330cea12f188d0d0a935
SHA512f66f7b333d5b1b9bc6d75f9b6803f80a67da21769d123a90490304a7a5676c0c998494f80d7bb2512aacf4a67221e6997e3345a6e591248f8616c9616e1bbaf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507996a8ec33ff99ecbb2919f4de764a3
SHA16d214ad1fc73c92503cd974db3310446d3b31022
SHA2569156305cc332e266ae090640bed493f610e6e3674fb60bb0c4746f540a3b6397
SHA5129012d17c8171ba5ad24fffbc3ef35007822d47ad2263b014f9a47ef3988091d8dd6f247f6c8a7bf79b420a1676e2d22323e4f5a2d892bb1e4cd7fe4d799fe665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b15ab5bca8e035439dfc8d430a72d973
SHA1071e7534da27d9a4027f15bf0941d1b0e5dfc82e
SHA256ac83dbf779037980acc92dffd1e54ac05ea542272cb4d088934d8b68eb1b667b
SHA512683f4e361de1b8d9c9530bce49f491363aa892ac49b905f027dd705d3065bd3e41f11706221412ba4a8995aab37af23d126c0a87a1846170e6a30d88bc950240
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540c5ba84e11053af2bfe4b8b81f6ce0a
SHA168f6eb5554a84e72d19a31c38318cecde9078618
SHA256ffc4689be881292dde5a0e4f1beb834481c51635228bc949ba3c40bdc37c6485
SHA51275796a0cb5d3d60fda6351244d4cce831cf26c2b43a09cf9d21e8e52ae3873793caba4c5e8fea38302627a5241d0f07046b125e932efc4cef06421690386cb05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a7611677edc640db9a95e10ff638569
SHA1900d7c12f97789323b616482e31515236ad9fcbc
SHA256656acd9e307c7eab7692488e449a75fe7b940a6cdb7f103c4bea00eea2b6551c
SHA512ba9405555a272f8007a498757f7c4fd84dd9738532df1b8c43b2db417cc44379cf17f77c083db40f1eef532e724fd7f3c2ab9ee4e028cc4964b04f8532ecd4cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55596c453c44855fe20449ac190c9892b
SHA1c87c30b14b9589b2983aeb0b84885cb0c38200c0
SHA256c847ae6c7f6adeee5e64986b7bccc0dd4e56c9175842bead0b58602c12b7d830
SHA512640ba833c04998ddab04143bca8706d34be68a8b17f78825f462ac6fdf7cc87696b6789661da9ee64d4755ad57338a610a94b02f43e62990667ffad485922cad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de1d7b50c6014fb3473ddbff216b7cb8
SHA12434694b00af0d2b76e3f621cadbc2eb69dcb868
SHA2565a946c0cf7e6893b8c92ca670eec5f0a1df57a33b407bc5dcf5e466feeeac9e1
SHA512dd0cfa784412d0548251718dd8e6228217471b331133694b6900c30796383b06de92f8f5037dc4c536a9865da21bfc318c217bbf22cec11eaa5d0645b8c476d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5770a839f2a1a295da0f6fcfc38c20459
SHA15e8a4e35895e63c1b76f980fcd1bdb96d9f0cdc0
SHA256e0eb9962e8da2518d7a3b78c1e6c34411ac674645621a69f0006a9036b75ae35
SHA512cf11865e91323d866b3c944350b3c7b7e5b54a72994e31c458ff82795dcaa562c299ec251af24c051cb98fe7f6df1c691a70f0937931ac105b89b2d20f19d177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c75bd4f285ccbf8b001b00a0c4bf179
SHA171559f431bb80b0a9acb481de2d10772f47257f5
SHA256d73e5fa7b371155156e1f385e970bc2a1f8b3c246ceca302844d6706ded48934
SHA512a536415155b9324ec44f7ce83b2fa7078383635408a1a0c771fc3b7f75f66153a90b8452b3077f00d99f69ad6adad2ea711ed350026893c07c87fa06a3aaf477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563a21d3c2f2732cb16b132912325d5b0
SHA1137ef074331848dd3876ab2494a07a80b26491ee
SHA256976c88e4ff4bd82ddef960fc88e97d68c01c9837de57ffed69705407f768a7c0
SHA512a66b7505f868abb9cb1398b8a943d3acb1b8bad14efa0d8da7c49f2be58e3b5b402b62a6fb6a78dcaf5a6cce9e6ed5c30c7eb224b16953173c9a28eebe04a291
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b