Analysis
-
max time kernel
136s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 23:04
Static task
static1
Behavioral task
behavioral1
Sample
8534b815066d5bd14360795448359718_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8534b815066d5bd14360795448359718_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
8534b815066d5bd14360795448359718_JaffaCakes118.html
-
Size
101KB
-
MD5
8534b815066d5bd14360795448359718
-
SHA1
2930aabd1d928cb207d2a0a505e2887b41c4a1b3
-
SHA256
efb23091895fdfd400adb5f3d942708b7008a8abe170a9362605810be623190c
-
SHA512
2571991962d5d691ec904877b11b248dbc8a744bfda9209146b1f2cc4789488e0d99705eb95bfc966a60983f9314cb9dbc5b7cd4ccf310d67b656eadda508d3f
-
SSDEEP
1536:KDGA6y20TFiDbtXf7xVRt/XjvHUA3EFON9DZ8jEOC596xTOzK5GTvVC1Cp4cDte/:GGA6J/N6a9Led5WJDtepoB3K
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FCD46D61-1ED8-11EF-8859-DE62917EBCA6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 201aafd8e5b2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423272147" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d9ca3d1d8d36b046ac50e5422ea726b20000000002000000000010660000000100002000000097c9850fee8635f249c8f1e2616bb524e0b1a83e5e668ae82c58df0a1c3fb360000000000e80000000020000200000001ad593d90289deb5bd019a461edceeb4eb7f0793b13dbb3f75158f7e76152d0e2000000070c20619d2f5096e466685e1fa3d17f280823984634a7a41b89bdc080210a3944000000091d61c6636c6b081434760e9ca2823519be8cca70e161875834af0f086ec391d6924605dc625008ff8a0ffa7c3459475c53ab33dd3dc0f7d552e2e5c0d098cff iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2504 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2504 iexplore.exe 2504 iexplore.exe 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE 2892 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2892 2504 iexplore.exe 28 PID 2504 wrote to memory of 2892 2504 iexplore.exe 28 PID 2504 wrote to memory of 2892 2504 iexplore.exe 28 PID 2504 wrote to memory of 2892 2504 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\8534b815066d5bd14360795448359718_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2504 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD537c4720b640011f1c74e92ebbd038ad7
SHA1771568bbad95448f75f1ce8c376331127b719c38
SHA256639094a0b9e882d8367699ac28dfaadc8bf779cef909fad168a6d4b388e5cd22
SHA512eebe7922701f44dbf02fe44830b563970ef5b2ed804416194a89139cd429cc69b0b0cba5def2fe86ab836ad8f4067d07e482d02b59439481b24cd8515081efb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f3aaa335c9c8eb755d710d2b3a9ff0d
SHA1ced46749694d0c7a7b6febb899a84f3052477bee
SHA2564a683888795a2cd579456c093dc175d4797772a5fb2bbdf560d2dfba31ae9845
SHA51236925c49f66e1a2b735c21a8be38533c3e6f4698050f90b0c749572dc464446e0d6106265b9d27eb063ae4019dc9c9fdf16744948a9315d884ab05184d7bc5f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaa90614a0f80f5e35289e8a2e2d8f4b
SHA1224e056a0327af74c1e08ad1ae0b3012ef7f983d
SHA2567652f0af1bdf63a86dda2968feda09f48a9353a5329eba0a844dc9cab295a0e3
SHA512a53106e6436496666af8a448ec34c8f3d0b0e046f587b4fa82eeb115e58237b5ae810401b98686a3f0cd6ec1d38d8762ed39885fcbd20452512a5c9f9c471f4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8f1a3c119316826a46c2900a81ea5c5
SHA1517d2047364d8af391dbb78e12aa9ddce9cc2191
SHA2566d5050f2a2a90f777b273d327867882d46778e204186d15424f978cac70231d2
SHA512eec618eb09a39aa0805ff41a09795f96dbf1b660ed345732ff213a25140f274b62042f879c602d1135eac3bb3dd160244e94e3759f8fb163f04b1b5d2de8e37a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5919476eb1ac3d284f587a3c786c579d2
SHA1a7c745deabe8ebe8610270368ebfde5389383e44
SHA2561942e116f0675555500d14c90ba3485b850f5efc66b19a604e4a5736d7d17f19
SHA51277cf61b0fe9f38c96b13009d29459c672908f316f07435cc9a66e2e01ba632a034eca08a278b3d3d93af395cad6933e2f1193a48208b6b56af9a70f0b212ba0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b88d37e8e20d83eb5ffd79ae5771b9bb
SHA18aca849d9a9cec9338734975b1cf1a118a7a8704
SHA256974a5539c16a26bbc66c4cc543d19b9b266cf395839dfb6911160a2b9fdd2e0c
SHA512cc5cf1ceeae1dcbeae7cc08909e8f55b3e74f987778d222ad718a34e0a16f38000d2e83f05c027c93d679aa1d26e614798e60059427ac9929239c1b1690bbb01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b18548301767a08bd67b9063a1ee92f
SHA1ec4cc95f0b6d6b9d6f15c96eadde14f590c01f59
SHA25646ddb31876436824d5af2d21701c0ccbc1b17c9e1f007fb47413fb1ada409602
SHA512e296e17664a5b817437e3d20b0c7cae8b1abd0e00ce31b991e5ba3334c5b5923dbaa1f6b04b811a75b1801654bf7dc09d9b5a6b26f09f4a368f4271747b54ea4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d77de208fd21597375f207ac7851ccef
SHA1cb0c2bbd14f1802427ee379ed2d1ef5437c3432e
SHA256340c90e42051e0b428ae618ba77944054b3f8ac0a3bc8c64b6623e50334ac325
SHA51265de6006698d48c88a12ee40962a595f3284981f0974c959e78c467bc6bd5b4857f3ea752a74b101a7ae53ad07ca8d10cafa545c393a44ba0b4be7011add75f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504c3793257d5b6e8f2f5670ab99fca32
SHA1ef70fc507bf6ccaa2f60e8e9fb569af74b0d8383
SHA25691e5a7123455e5606674f1012798dd5d2094560b813ab4a7ca5717aa04be04fc
SHA5120759401179bff8cfa6cf88cffd792bd10f1dbf40abebe2dd1f25e0fc6ae0e9f4a50a88f494a022d970088dd226bf42ba17de9ed64960406a96e4d06b528c2b04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa9285e60d2e440adc6b1a57ca58bdfb
SHA1dc9ef6d0d395aa1a9d02a607bfcafaadfd95d511
SHA256288c963538719d83a3bc043d149f239e2e6ce64150e33e4dff21d35d81089c09
SHA51261df6cf23afc7a617ec3dfdc058aee09df97b301efd51f685ad8e89b4f23f5e6252be61a65ec8778f123ec7ee9f6b259053132f5202dc27bcad01aaf97abac47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53903f261809c1eaf53bad7e7b32c9707
SHA1a8114d1b70b1d93abf6459e43659bd7749f08998
SHA256e759feeb073a2280484410df932900890afa8e35a4eba00641ffc4cd01b6df57
SHA51240d6c33418c3fef45ec4b107a2dbac0a71dc07c2d97aecd3999cc3996ec67e581b3975dcf7d00ccba9af8beac7b860a8aadf21cb28046a9f7a3e1f03f34c328c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550760115c6b92f6dbfc20e0935aeb548
SHA162aff04ecda866c9cb64d1e4a27a2cf1a1ab3db2
SHA2569dcfbd3cd4f432c57cea604dd67bd12c902a171d0dca35e3af78fd2b46933e4e
SHA5126986d6c9635fe5956c5f994f123bf423559ed40e8c56ef7ffec526d3f76768bfa9d3a7caca7cad4b31a873fca4f0a4ceea20b50e0d23b3580de1759d5fa7c4f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566cdcee157ded717d8bd3010ccdb5b43
SHA14033ad135e11a70e0389845fcce51350bbb2b95e
SHA256b18f35722f1a9845d2e288d3d803101dd60a363f845f5779e5681485e3792496
SHA5123df821c0237b88cb08182431a711cfac5b2644978d77555ab8be6db5aedb2377420fa4157e921129d8f311a2904591445c34e00c749e350fa3e04ecbd80b7818
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e80bb98481f2265e14494091338828e2
SHA13e2e26ca561162c6546435d4700a59a62f03f268
SHA2566447899b62f3c853282e3b784c545dd7b7d3c7b2827a1eb049366cb84ba4538b
SHA5124b65dde160fd5c787d1919613400af71d8e12030d18325054f0974472833bb8d230cb4e56e4d099f0b5e726953c5517b4de12347c04dcb7c7a43e46d334de5a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5430b10f197a9d237cd7605ffb267e723
SHA1582f2546fe30b1f56112bcbc637e0e898ee4166b
SHA256b519333693018a94186438dd6401ce332a8a9279c7eb0d5f21468fc35097922d
SHA51277e9dcb1471225a56a4a8d784eeb36ba4ac8a818dfaaa4130c0a983dc8a11ee7f58c1b24b083030a1fcfb2bd6b7f2b39ecb94f8c65fe3e8a32c579745d60b840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf075e942b951498c127937b9307cd9d
SHA1fe7baa42adfaf9885be120ae783d0d56b3356bde
SHA25660d58278e7dc916accc204457f54a1f026abb3e271606bdd404e151a6f84c559
SHA512d8edbf101a8d37ff7f1889ac942b1dfead4502a7f544cc6608c7ca7176802a5a621d020383196cc98689c18d781b9696d926a472248a97a7ecf90e5c3d6b326a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab3dbf36dec5b095af98c27cd0344e9e
SHA19d228f94168eb3920f5631077048ead2a399bcf3
SHA256c0f0fce0d0e3d8afae646deedf296c856f17bbb4d0d7e10f07819a45816a375d
SHA512ba972511427dfd48713a232d8e7d60c798bc2416172f20c8045be0df0e79f0f1a2a663b0228c9d81134a5b177caa9fa9b421cf42b1107b98528d713a352cea5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD56924ad77feda2bbdaea3f076f6d38bdd
SHA1968f26c6065793bb41397f83e01786ec6f00e342
SHA256b23b855379c7ff4c62a142b93269bf5981c29d615bfcdfbc5a80ae48ee6f7652
SHA51211a7181035f37a7d4cea15ce81d4bdb675fae672e4bba3cfb77bd5b79444c942b44f2306909942c4204489864907aac42f9fe6d0e3b987aec65f581045fa608a
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b