Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 10:55
Static task
static1
Behavioral task
behavioral1
Sample
cf630203bc326a6d61bf8782be5f556d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf630203bc326a6d61bf8782be5f556d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf630203bc326a6d61bf8782be5f556d_JaffaCakes118.html
-
Size
26KB
-
MD5
cf630203bc326a6d61bf8782be5f556d
-
SHA1
328bad3eeecbf4529245540706839ac5f51ec6b6
-
SHA256
8b125fbc438f7e1ec0da3f04387417daa19477555f603bfd45fa90673f4bbd34
-
SHA512
674235055552025456cd17a0791de7526a8c4bd73d0ccc04fb45fbc0a7e72f1d56b865b1ba89d13f8c16b9d65334d2d24bba5bef646832c25381c6c9b28f56fc
-
SSDEEP
192:uqyrTkb5nmWnQjxn5Q/BnQiesNn2nQOkEntvLnQTbnBnQuCJVevo7NtzFo+NzQ47:n0Q/JygcIq2Ygc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 109dce564b00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{80958F01-6C3E-11EF-BA16-7E918DD97D05} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000000e14424857e279e268eb256457038a47c2b065c202f926c7caeef1fdf2946a4000000000e8000000002000020000000a68497d8750c035a833359ce37739572bbb71cbe11fcc68e8f0b30d4e3655172200000006288421a2bd0badea061ada1291a36d1f03da512d2ccec7fb7521eb65291631940000000d4195061eeecb208aa7c762b6c2c432e4110827313f4a13988d21b1865dec9078c25a1003844d31eb3c5bc9f7e9ffe11e0c95b81250b859bc6509cae288468f5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431781985" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2612 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2612 iexplore.exe 2612 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2612 wrote to memory of 2388 2612 iexplore.exe 30 PID 2612 wrote to memory of 2388 2612 iexplore.exe 30 PID 2612 wrote to memory of 2388 2612 iexplore.exe 30 PID 2612 wrote to memory of 2388 2612 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cf630203bc326a6d61bf8782be5f556d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2612 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD501c9953ea5873fccbdad8cf5e0179a32
SHA1f701a9ea70c861c3cc9c443a1f1331a82505f8b4
SHA2560b53019cd7f18e43838b1ef248a79c967cc6e343aa80bc437425857fcd918b1b
SHA512f2159ef88b885875533b7b27b47bd85e31e759b02b1a79df635108b12c6b4b907b06ed6ffe0ae0637b37664701fc482ce8218a0c83b49179d2e6738656895be2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c4e2d56636085d2965ce0e70cb32067
SHA156c06b46403f075900e95e9960af894d54ff535b
SHA2567cbd4dc02efc732655bad9ac83d56aa3cc605e513758eab89804b513871b32e4
SHA51288a5cb23fd50be33dd6af85b956d538be2346ef187ae21cdbe7d651a229f01523c70e579d5bbda1cbfd84c89e54fe47f49cf4e41ccd8233a7477caa7bb3bea5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593b7f5864ced944b0a386fa357c6d99d
SHA198b5ddde1175badb42c682c9113a84f70fccfa1d
SHA2563a134d65900ad6767fec5f8d2543b60f150c9a1849f6afa7c742ac4c4455a0e1
SHA512ecf7ea3b6439faa4dff154616396cfceaedf4d5ec6100f09ebdbc855c552bf10814076da1026c88e106025b5118e4ce329d625c23a514ec887ca1ab8e8f14bb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50bc3d593933758eb6616b66df4f03a04
SHA11e70a95a7e323072ce80e8bce13391c2727cda46
SHA256859fd1f5c7b6dfb6c295e7f284ded3bf3737b02f6ce4227b042f0a1d5da20022
SHA5129d66bf3a0e35a97cd5cd947dc534fae757c8e72d1719be14b28ea5c86696eb099f931e5506f08f42e0f468daf661b20173aecf3907e52f21cf90f681b5e6a5d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1ab5af0a00e7e3de5f7c57c6f44a07b
SHA1c04a439ec13fe4419d33ed39e9794661e035e702
SHA25614549f0fde0e1f493bb51d0e7ad94b1fb04f2a61ed213c6b9800895ff8c3694c
SHA512a8973e0cc0bddec7b2d8c147f8866f6d4e665041a92ab4eee83ff13797427b178f8c7ea807785e82a3a141b7f7f1f6e75dafc5aa9df03103af585b30e5c20daf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57454bc893d748fbdea869e9649a47601
SHA1a1696a298434cd9d41f887757602a0c9d4c24c6b
SHA2564f286cdd61f52e998218aa06bbe575e0a1084990ad918f1d5d99b0d0ed120868
SHA5120a1e145312ad608307cc889670b1648fde91b8e1cec157a9606383574bd270dbd48e129c8d10de274e79699f55c4f3b1c8b036d32a7cadd28fef430416ab080d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569f5d155bab5b4db603382672f66807c
SHA125d11b8cb39e35a6d78d50be27742c8be243654c
SHA25658610f96be48b0b3e5afe041bb00d09df64882449a90bc0636e02af22cb526a6
SHA5121bd62c33adffdf7db1b07fba515c2464b88218fb6d40f94c7d65b94eb700bfab767dfb9ccab38dcc5e232a1a4a1bef78e32bc88479256413f4d2aa025168a79a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ab185060d4263f770e0089b10d82a47
SHA1565b516cbc17bd892da4ea443c86235ae0438959
SHA256e307c0c8c6386785111d82560c76084d30db5fcc60f333c82bf6dd9c98714be2
SHA512e4550a2b0fde57cda4432f2f920058570c07747e6d0ca9e4d8003d4f150f390cdccee4baf44d495faa89f09904865a72e04017ce4691b13e31690782ec2d3411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5054226c6f243e3386feaec37c73fbc18
SHA18af04c8405e21060fbe9336fa93aad35238d38e7
SHA256ce2df72aef18439e5e500cd8427ff63f94a80683d2861967abba575bafca7681
SHA5128a7c0df1f408bd66e121e4d03c759234889facc61953951a709a3dac5d9762c6e0d4236e6c073b63827e86273f59be6f95f0a4ab66003d83386098b87972ad2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a09df864ddb4aea53bb7ef2ee7408ec
SHA1d5cb4510637d9a07bba13f9672dcbecb6cefea2a
SHA256e2f86b0c93c481f6e9b8980b89f874faf5e642ba909dec05c156d7f3ada1b0ee
SHA512b945527e7bb1af613d021d2426d02451511172479f4faf3315fb333b2c7f2ad2a53728fe0f40985c2ed92d901cb2e5941abe3b4fea372532d84904559db03027
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591b9d273c465da55c90d0b11dd630aab
SHA115e7d8be31552c41532b3fbfae63ba8ec239195f
SHA2568bb26618309df118a57594f9363e41fcc7e7663276b469511d9d15f07e66d7e5
SHA512a37ba5d254075f9abdd14bc0e484bd7577221d2b68252f15b821c83f6ca28add651de484cddd61549f2cebde356eaf0b05cc95e2365b071580d5c0317ea2f5bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504e09e4b9d8f01cfa700e3a768b62b2c
SHA121630e8d33888f273ab154aea9f2cb3322233427
SHA256c17da51f3953b650250af87dd2d8d9c4f5b61b5b2030ac48c60e9dc37cd4047c
SHA5127ade8fedc46aab4783d118bde7132c79817fdfc5dbb002ae7b05f2191a3132055162d31ea979dbae610c732e0c43de74cc610647932f2cc486d91edc7fa1c829
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4c0cac0a08b0cb781210b98e3014ccf
SHA19c21a53000a5d82b6dd200859f3c5206490ef6f8
SHA256fb3dfe7f990dd6aa49efbf95fda8351a440e16094ba5f7fa5c8348a5051370f7
SHA51217f37a117eff8d96da70daf3db89786f4c00b928475d2b2229d600cbe66198c95ccd53540656eb331c39b3514430e114b71e3299129516ba1a4c7edd33c20cee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1b137051c0e6683a54abc236f0037cd
SHA13d4762dc79d849aca7ccf96a178ce3cdea931494
SHA2568983acea376be353163d65585de57adee785712957c5c72c973277520a407837
SHA512e92b85607679603b18b605949c4f5c8f8b73ac2e1e209a232d8b04e46ba3e109c0fc3f084f760b39fd05eadb2345832ab43e106f9063b0daea36709fa2188957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fd556e438219d959ff0ae904856ca95
SHA1d37414db2ca0868b4afae799107e0849d699ead3
SHA2562940f6e026898073798d2da2ac1c353046af7c8499119535ae65e9927bdc0f14
SHA5125a539850990c3fac6f4f28cd5eb40984e821a5eeecfcf04f140aff2b25d6c3433714495711f186074449d335668c7a438923a2b1e2b9d3458aa7909eb1bb514b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ff59029beee14b9b5492cf132e9b641
SHA1a4b13175cc529926d2b6946cad3f151f774fe510
SHA25663548895deb1f4b8bc0ad8e10049c9cdefb5d78da014d49c62b10c7e6fa07918
SHA512b8d145acfe8d66c4d685146479ca7c985ca91721cbd386c9985f915a0e7d7ecfb46de2181446af39c2eac077f54d1353f6c18049a410008fbf20c70cacd4e529
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591492847665d052a686bef3c00c8ae85
SHA1b0fda92ed578d1fdebd90e7febf8cd4fd9cced83
SHA2569e92a36a3ee733b14280a414cec39eb02faf5c5a45489ff5c948fc8696d3512c
SHA512cf8294c3a54bf55e8f9fcd6e49e2a75f5f650281e07472f4d98035333972678d5ac9aac1ec64af899e79fa084f67283aff4823f8291c47fe211a0abd1775dbec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537aed4892fd3da6e7d4c8be5430c3241
SHA1d9691a19c7983db895252a4b01b87e6f7dbd33f7
SHA256c72ca09d89556679763d8eb3ed1e8e615d156ece913a26a212749c5bebf466b2
SHA512c64b6bff06ecd8b5faa58379bc7385b5c37ee90ccb4b5c1dfa78f72cc468f25daeeb5cba94b109008ffa1867e01bfb894adf6acc2862096310f228cdd8a0613a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5870da186c8c2bfa01b513c9b35aea817
SHA1b00de39ad07f71e151ad972bb75b2ba800955da5
SHA256274e805014f7a4c752b821f8274c85e300c88de456fc0442d4076e49c88fb276
SHA512deb7227ad108c73fdb3c72cf8ba5e4945bf8412caecc3a7889d09e748facfe413dad1a299e5f132c2a594abf9ec38ecd2233fe3188e9b2773bc93bcddb960761
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b