Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 10:44
Static task
static1
Behavioral task
behavioral1
Sample
3465ab215ac057d24500bd13b4fcab60_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3465ab215ac057d24500bd13b4fcab60_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3465ab215ac057d24500bd13b4fcab60_JaffaCakes118.html
-
Size
34KB
-
MD5
3465ab215ac057d24500bd13b4fcab60
-
SHA1
6723b72961ad62364efc0aeb3d7ea143a4a70011
-
SHA256
60b8894822578279521a06ef594eedee1a4d41239ac803cdfb224adf97a3dae9
-
SHA512
51b98b895a03c5361306b59e281dd561b083e7d35499253f0a962c4eb61ba2463e20f47d640fb6ebd156303b5c488ab427967473ccb2d83fe1ff093751a085e8
-
SSDEEP
192:uWTvb5n3cRLnQjxn5Q/3nQie+NnEnQOkEnt59nQTbnFnQCXCGArw26k5195+Z6mx:jQ/v1tw12JhGTRTpzqOW
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000018c327d018d91d355e759eeba2ee6c0dc04a185af03761035e8ab2e74a87c13000000000e800000000200002000000095b09367ce75a60263be362d0fceaf8f3a99b9bd5e360ac7c1cfde004a380c5420000000b047ffcd991a9e4e8654a448af2f5025bc8ae91ceeb97f99cf35bbc7935c1c2140000000b5ca6bd0f236c0d7a8fc0db931668c867571b7c8d857a7579fbb86d51fdf8393e0c2f6ae5002db092cbd3b4b722aeeb72fd5fe7210ca2bf33bd6dade063edfda iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{84D816E1-3EA9-11EF-BA91-7AF2B84EB3D8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80e13b5cb6d2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426770196" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2584 2192 iexplore.exe 30 PID 2192 wrote to memory of 2584 2192 iexplore.exe 30 PID 2192 wrote to memory of 2584 2192 iexplore.exe 30 PID 2192 wrote to memory of 2584 2192 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\3465ab215ac057d24500bd13b4fcab60_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e69255cb1f0563bbe5d0089d4cdd8ccc
SHA1c3a58f0575eb4234ddee0795906dc5b460813467
SHA2566bd59b4ff1e3972e7c7b59cb0e8acd16b8913009b6134f5180096d8627bf65c9
SHA512886f66835ab3c84410a71982e73f08ac558201cf9c01cac12f0572f578399fad2f1579a40d0f8bd220337ee3d92fd375671bf5b621cc40f210f6d0dd77d37d93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1baa40bbe5ad58aa786be6a54a1b9bb
SHA1e213b1243e6484d89194321d1ce92a69b90b4986
SHA256794849fd55ce9ef78c12f1315306b20f4e0b26e3a5768086d00a422189be0cb0
SHA5122ea78eb5ef143acf4ce462171346afccc5e0fc3c28215966b43beab3e479fab3be2e38d279a424c5ecb3078fd1687f7d7316c2b03f5a9ccde4b0da59c6036c6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531071972ea75909031190f678235552c
SHA18c47de4ec76965352c6c948df5c297f5e15f3d18
SHA256ffd7bdcb817a02cb74ee1d43b5e09903195a156cb75343b5947ec7400c08c3d1
SHA51248a23d803ddd0fed285261b22b127ea120558556a6b4cadf00c5ac89b330888407c9098e38fc0dbf30af0800275dcffbf57821ef5bc9a7515141b03013a4932a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5261da77dd5d6d11aba1ef916f0602178
SHA170f97888e59919bb78e5cb2c1a4bec75f824495e
SHA25694a7bbf568b22cbb61d9bd78eafa7e5e09f8104484af4cbd2c24bf645f96dadd
SHA512d7bee3040f3a72343f2142c9285fd036455d30d7bf3506e7d9af47e4d2408d6e73bae7cdd338c3a0863756444606f1d4f79de0810bf65859ff4bca91d99d65a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5863d8f4b0b03066c0481c8e37467c2a0
SHA197d855c99fb41791ac08f458898ccc5cb7a4f0c4
SHA256795f3f14455799a649ea013f59abf04abc69b8a6d30183889aef2a90d364fb08
SHA5129166e525228a7837dfb1751702d083af410092aac2029a055abb6964851327a1b2211dafc1c91f673a1358f1a9ba50756a8af77ef6ba502e8de87bd63783d623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d10016bba302791289b300296639283b
SHA1899673a6d0ae4a4e2540859acc7e38adedc1b6d7
SHA256307313cdca0694a15966c1f86d5eb48068c209941d1029ccf8ecd2812a0d8eab
SHA512f38118be7dadc39c0ca61881bbb0bb69c136715a3d4fdca5157c1f529efa22752c827fd24dcca34fa2b7aaa63fc3ce55a69298193b11baf96596dfe329d1a18a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8c9417114599d5eedb96e071535a682
SHA11ee0a484b73da2644efcaccb542a705539f7a765
SHA256e66e5b37fdf1fde5975d6868f0459635ea423f984c98e931a4a2a0eb7075d53d
SHA5123ce0d3ff15932b2920baa8b55f7a673eba05ae3f89963423a7ecd0092cc896cab5dbfc822f05780f6660d6ea60065c8b0c51286d5afb143998d038cf1ef320ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dca6df8a011ea8e9da4317761a4fa59
SHA1ea2910d5d9b82b28d24fb40c018e32967c4848f8
SHA2568c47420cfb64ac1cc3270be6dfe04baec5e864dbc94bfcd7c3b3a6e87034e356
SHA512fd4f3eb063b248374d745672fd723f5d1bc11e958a2f4c6eacdfde5019afceec228faf0193bb4e3e3bfb0733498fab25b837d8b09293c433cedaf59d86c996a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59858a0c50638155c7dacfef21153ca31
SHA1a5f5da7e71c9390563c02849b17024ed1af48af0
SHA256d53955d02cd6b01edbcd9ef324957ac9acdabd550631be69c50b27f38ac59afc
SHA512c2e73ac7337a8a8d535017fea6ef3848053ab21e8037391524b48ca01413cdd610e48382572aa8693c7bbae40b52e4abcc14850293b44267277e6b3ae9718370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ee270c3824563f6d532437854f679b9
SHA11a90d83d501337302b8b25e7528c20cdbe14e2df
SHA2567403444b8c670e0c1d80489616a8ff1a1c73b67f3b53c7c2cd684c06135fb95d
SHA5127f2f08a975a07e2f4fc7b8a2eae09199829d4b2bc4ea2dfa718e4f259507b532418fe80bc4da4450412af77349715f3e1e5f11ab9b6831344aa1537a22938b18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df2c568156ed0172c62bb3d0b4a65e8f
SHA1947f78a0b9c36048c7ac83edab7a8992d6e1e71e
SHA2566eadafd50bcca36e9fb862c782d88aff1f50802e60fe5330990bdadd11da8cc5
SHA512e3e6b582667627f57c45e97eb893a554345dcafaace89d3371bdb92663b17ecc3a5426b1d9f63d7392f3ed689a409fd5e67847ee427adfad97138b88bab408ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595807af11ca58bf4f8a314e6fa3285fc
SHA15525177321cd56fc577c08172a8c37fce5199bd3
SHA2562d12ba0efabb555232f86ef695826db8fb22714463ba5c42d35bbe494d7d9308
SHA5121cc76b225197585d8211d849501ad20f6cbd1af7a460d1337e7061260ed9cfe31ad5da0024fd81cf27dae91bdcff21bcd77f7066f5dac6daf249f242e6d7a9ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57987ba2a5c913394b4fa31b8f33d1c73
SHA1b5cf1e49ec36a54f6f2e081c0b487f885c35e094
SHA25697030e13fa83951d351f2d79c658af1a87c4dd5a2798af7ba8916fc5f11ccb88
SHA51267ca37ceea84ae644f9c342fd9602480e03800eac26f0670ffac9ed17973a008d33c4cc98452b454461d208de04b59f1001f1ba6bd8ba0c9df6c6e2e1578c0e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53672ed22dba6fbe2d9e45ef1f8e77cf8
SHA1a4a0e0e646ea07dd7c2196c4da759db4fd7fcef2
SHA256d186f12272716da4408d100104993de0c7f1f2c3e9e8404c7013c58f04a4aeaa
SHA51286cc6b2f390bef540890239856d7b6d0c2bfbb71946f5fc461a6d32320e4b2ec405eb7ef736fa393c67c7db834ecac3d52acff9b84a32da4d287b2ba31e7cb54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c8da4e3b0d6713d7f861438856b9b91
SHA1f0ec9d1d259067320c680e1f9bb743306136b5e8
SHA2564f378f204d8b7e7846d7887ee10828bf5827c28ce6fc27f50bf8a0b02c87d824
SHA512c0a7e1f88191e2c122d6c86edc077ce775cc75579a9e7534eabb8fb04091563f88e40c7364128e46e35af8e607e0835a8657f4b1fe1608ccd7f6685428fa5e30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa368e54624be3ef52c3451199344a62
SHA1b4b656876404bafa793b571381eb8082d016f6f3
SHA256dba238de54bf17d5929616b8a9515bea59e33c23177ef867e330a908de28a58a
SHA512baebb84bfe563213a53941c8efa67be7dbbd6cc7bb9fbd792147c0c3f04db0e08241be3758a92956da71246b8a7138cde20b5e3160f3c1ad2cd30a99f65f35df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca7df5bfa702f8f1bc068e3629628982
SHA17010414a42f909afc1aceb7474a2495c353d7fd4
SHA2565fd502fc96f4d6bdfd08b967ecb9ed17dac4ff6dad2d3651e4d16dec4cc96662
SHA512419a38bd0160157c7c3ee3e6137730a054d574a3bf08e75ae2baa9bff0622d6efdee5ebeba9eff218428e14f5c2a9c527ac057014fe1f82ebb39491c57c00af8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591d70aea8dd649d0b6dea46d3c835672
SHA1eb026ed7028b7542c192196ecbb16c6ffe3e8938
SHA256368de092a24ff0b439ce702c332e000430dc42119df41e054ddb4d7224e1d128
SHA5123d573cd48e7bf33f4d5bbf80063a0dc65e4a72096c6846eda5fa2ed210567f30a66d75709e6c391acfb80a9f54fb5c1022e112c0c0a69dde81319fadd44fb140
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54561a2cd152f5875f851ec73191866f6
SHA1a7e52d38f38c23a8dc30c3b4eb8ae76b2f072d8f
SHA256c2d5153e2b25a8758fc5e5aff3c16a97c8af321247b25ef9ad55000fef95dab6
SHA5128d5d69546f385a21979ae2c4491fb9529f9d6023f8771beb86e21bd67262939c0bf151fac7a05df6faaf93ea3b228a77743e6dbcb18ea2e86adb35e96b2bce34
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b