Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 00:26
Static task
static1
Behavioral task
behavioral1
Sample
a8d6724ccbdfdbf23727b8c26446ed90_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a8d6724ccbdfdbf23727b8c26446ed90_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a8d6724ccbdfdbf23727b8c26446ed90_JaffaCakes118.html
-
Size
19KB
-
MD5
a8d6724ccbdfdbf23727b8c26446ed90
-
SHA1
974b031eb3199e46c9a595bd60fa83bf803cef6a
-
SHA256
95795f2b459ed4cc977924a70e5fc0c5569880e67dee4eb71fc4b78823e4e734
-
SHA512
3d3f582634186482591cdb42b03713c405a647b819ca1b20ded39cc159d9a83b124bab86916905af7e50d8f45cf466b9b7626e8af571f180bdfb3019eb3f6faf
-
SSDEEP
384:oLXh2md6Wms0u/Y+NMQ91TmhIqp0cYAeLP:Ih2b9sVYzQ91TmhIqOcY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BD676561-5DC1-11EF-B3C2-F67F0CB12BFA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430189128" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40177b95cef1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b700000000002000000000010660000000100002000000092a7e7d593e3d900d665358d4da2d4b192184350a3677d70079717222d137ca4000000000e8000000002000020000000a066ff58ff502e0f6454b5a438367ff64b9d9ae605d7ae6a962310ce2c200db5900000008b88e93dede3767a73e2eb4703011e3e34583f9f72cc6fbd9271f68133706ee3a64502cb2c45b074a5bd4a669f142bd531e641f9269b1d7552051afcbd4b2da284141c9cbabe3af942696a6250a7099a92b0d7876cd6d5a9db4bb1d8c9379d0b75cf61055467211151411477f5306a06a94c5a2debba56a513b4e652e17a8c22197cf7c48f09a5fd241c0d0fc679400d40000000f16af9638dd3aff6ea10f245794a36eb2cc3f352bec0a1e4897d1931692fb91e57be29b1431080598a6e7421df456af9b58731e2629c8f8a53e2c5617a3cf70a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b70000000000200000000001066000000010000200000003c2ba98ed056e4430018f1b310a69eeb1407b4357dc0ac440598af93a5218de2000000000e8000000002000020000000706ade045ee63fb8785a9c343b67bac7c3a220325b7a33b0dbebad4a6c0bfc6a200000001f0cf76309d9801b9b8be48b1f5506662caca0d3a6f4fdd4d674e8f71317a7ad400000008b93b0e46bc2b48fcd036970c963433ec29346894cc430ec0d0911fdccd078a08c3a3f3d4bc82b9352fe8d0ec9b556442bcda6c9caeaa7a2f08637b75e43becf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2544 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2544 iexplore.exe 2544 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2964 2544 iexplore.exe 30 PID 2544 wrote to memory of 2964 2544 iexplore.exe 30 PID 2544 wrote to memory of 2964 2544 iexplore.exe 30 PID 2544 wrote to memory of 2964 2544 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a8d6724ccbdfdbf23727b8c26446ed90_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2544 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD54e6eae404c2fefd0a8a54574dd29b06f
SHA166f17e8e3fca00e241509484fdb000e67bedb42a
SHA2561adc24f3df8b327e3e97bc3ba1009dd0cb1a63373e38b31950f3a6457b214320
SHA5124d58ebdddfe82761f96992ded596f2821c327b9ee1cf5f1538e543bafaf85f2cdf46ef45037d25d14f4930f965df6ac441df7142cb896b48c50e316f36750f8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e03664c28b7aaf449ec7f32d58e69a4f
SHA1cce2395d42f676662e916e5f81f0f86e538d08dc
SHA256bba6518532a7c16cf7b0eef286d2532e89115244fb3849325ad9baace2636678
SHA5126d5ffe1ee5b5e88a4e645460fcf4a81f40c0d21d27136e80c1d823c7118596cd21b1ffa7690446de36016ac6d5fa2e4a7f87cb2f46a811517225484777894009
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a224f5e5243d57a2e0435d059a01fc75
SHA14507874efce72eccaa99d99116aa1caeed639deb
SHA2565fa5086f7beb5aea82a4d2d3d9710e2cef6d3b411f7e5ef076ecf6ab8c9f1816
SHA5128c45c317e64de4cc5763401ddde0c0fc6511edec34aff96c531235b41085f0f1d499f2ed4fc0fd9f7ce6ee1d30db3caf6a4f43c273656f5f48d6c11e13a56826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2c7668f7fc30a78d7b20fd5fe32cc11
SHA1da583c5d66608c6b472ea735f442ad155f28e603
SHA25606e6181247271a31649afdb1df9b9a55198a49f2751644c6a509a942046f6583
SHA5129aba5a1d1246f3cc2e1dbc283e9f5ce066918d7cb900c15cc04ed6e6c22077fd56cc3d88ba80dd391e1025cb4a651714ddd9f362c2d37f8056204316d996f3cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eda3634707aeb7af151ad307a3120a0
SHA133e649b77de2f02fa354107397b397148fc5019c
SHA256eb2c43145b9e3719083240ba1ef913dd8b57265dbd9184eaaacbf612c0c013d7
SHA51253a9c44ddaac2be6cc994334ec128ff408e61108c76033b4c54361b581160b4cb8b6e2720740cf5b0a71081c4a9f02b2cde4258897a64edb10453747621442e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be50c3abdaec60069b7bef64474a1576
SHA14753eaf58e1fca944ac28346222f5a45ba9da1e3
SHA2561de27ca79e2ee6e9ca9283331f7fb6baff83dbd33d6c55d9317d26fa7745e194
SHA5121de32e7b4c90ff2148933a3c543fb9532bc36fee6a9fd6fd7a22ce83c5c9b210f6031ed0e5d2da53c5699f5aecc5d227a214f3bba69dd5539e2a6eb07e10a279
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8bb0ae2c56d34da629650da2a052fc6
SHA1de1dd61394ecaacdac9040818bc6de05b91a656b
SHA256a3a773863e246194946b20bdee32e016902a6d42812a231483af94d802aad6f2
SHA512c44362d991dedcb7ab3180aea3810c9e740ce7567a476522ae5b887affd214fcc99c0a525c6e2aae8667e788ae12546a6d44ac5c7f3a173330f41076a26d2de2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b5a3c43eca645e3215c98e5bbe3517e
SHA1df430a7dad5414c0a5fdcf1db44baec928b64674
SHA256ea55dba3b986284731a845d4ee412ba487a7808dc42c53d99bea38cbb1f4baaa
SHA512eda6617ed22dd6af1714cb8d7b5fe4259b37dd987ce90de2ad547fcd8109949571a9fd0a52ee01f3cb49d236cacd79af1472f9d050670545d017285826bf4456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5490d8e1c3dfd2456c134ea68a762b5fd
SHA1241251eddbf68974a089a65b8ff973b7b391b4ce
SHA256bf11e82c93485e00581cc2c7ca2e3940403896c67fc41bcd368387a8a7e8fd59
SHA5122c84d76a8b36d4750199434a059aeffff17183fcc6cd46d95b14835673aaf79fe7df955d42530cdbdd63453d1e4fbbffc44506318d48418be3f2ffb414092aff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb1e5f7309585ed96f66b8f098edb076
SHA1f8bbe5784c2176389cdeccf5752d94b28953e514
SHA25665889482728f8ade3c1969f49842a9db3d36cd048d7a4e74e24e377d523f0768
SHA5120a94df0365a8e91cf29d0abb166d6c4c01509f2b5320cf204deaf9837816cfcdb52f7a2e76b9c0cfc450d3387dc518f8f42f57330943d4d23e1e4c84450995a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5156d6ebdd29f921bc8032209999caa7a
SHA117445509899ad41391b466d0cdbbbeb80704a4b9
SHA256d86d5939e79764013fce18da983ddfabfa15fb60ff0a57025ee906f5bc0f9d5d
SHA512587746285b6ceafa95ffc45d917a4162aafe47ac6ca299d5da17da59cb56d07a398e2e17f5394e9dee9bb17c9ccf2e5f1711c228e9640865fe837610ae887a76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594cd6072f2f32ac6b0c30604d8e44cda
SHA15e9882360ba236301d6929b415ac1bc5538356d1
SHA256aaa4290cb12ad046c1f88d2286baba6800a53255f799c90dd7c2df9ee6c015dc
SHA512f1dea6bb66044effaaf4ae6085e61b091e2c6f9cc96e1086824d2b1e030e0d35c43e3a99c8978e58ab4b0e9b10aac1538183154fec74867ea2c98ed6fbc975cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4b5ea1810207867bbb1e6967be20307
SHA18400c66b1e85221fcbd713de8e13a95c6978abdd
SHA256b7b4947f7336bd236125d29a3906cec308239b9c0084ab37ca1ddd5db41b2597
SHA512e91131e128ae692709a1d58c8ab945edf624069eff73656e6c29e989f973781d9674b3ec84fee321f051ece990e647d686d245867f13f6a9a8350d704f7eb041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dc56c09843660aa227da905889dec6d
SHA1390f9b17dd7209170133ca57983843b8401af5c0
SHA256bc6e1c843fb1534da83765cc72dfe589f84727617135ef6f2dc769c9e7f4f8ce
SHA512120919e224443ed4f58d69addae5482f5d4c7f9c35d026f22ddeec6e7c023f5ad1655d66b967a20b428a76efb77e02360bfc6755ffbba8982d51faeb82d0bbdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52641f3020e3c1ba48defd90d41e13b28
SHA193397753ad7a12f3d5c3435b2f95cbeed2e18d10
SHA25696769352693df93ca9fb2085b764e5f3d3e7e413234c9f713ae16bc651b7b3c5
SHA512be1eabbaac3e8343d3dddfc56afbb7f37cffa36d1428ba8dc7242d0811863263dfa71637302ab318fc40f4201edebe78eb39ff37b641002d31579d7a4c681e80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ae5611eabd677c65a7a5eb998d5df3f1
SHA1f11712a44b7c74cd568690d3f8a9a81b6abbd65a
SHA25626f0d89b80bae26ae68632823bc82f2e0a7c167fb52d66358b27b894f5e4c001
SHA51293ff992e2a2601f8866731cbce779bd74102cb9023b380ae34517dbdb8d4dcb15b02c5f408e337c504d19ea15d356bf057449f0420175e8f2520759ef9f7225c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b3c910b418790950c6388e4d292b06b4
SHA1416971e827fb2070f1b0e8beca4fd5bb63a0e4a5
SHA256961a2c6e07d2875c9e0063f0445b5bdce1b75af2ea70b6190fdb3c7cae800703
SHA512ddbb9f8e69a89b46e32a8abb019d527c8f28b10eba5353d644aca722f35e3b260c555f9660c441728abe0b0be487d698487abdeb2f3ed41d209d8946bcaee2e9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b