Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 03:10
Static task
static1
Behavioral task
behavioral1
Sample
df618e6bb55476904cc7f4248d70b914_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df618e6bb55476904cc7f4248d70b914_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df618e6bb55476904cc7f4248d70b914_JaffaCakes118.html
-
Size
460KB
-
MD5
df618e6bb55476904cc7f4248d70b914
-
SHA1
285668d9096d945e99f6c3489ef7b7ecfc0ecf2a
-
SHA256
98879ad9ef44243e9f421d4f1587ecd26f90f54d1fa2b50b4355356141458727
-
SHA512
21cc652c655fb5aabaa1b34acd19b966998dca3d813196e794eeacbf8bb4e14468b3ca122336582961bed94a6240f406acf30eda140fb4a5dc0180754a07b996
-
SSDEEP
6144:S6sMYod+X3oI+YVHsMYod+X3oI+YVsMYod+X3oI+YLsMYod+X3oI+YQ:F5d+X37r5d+X3P5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D8D73B61-7246-11EF-9C13-E699F793024F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432445275" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b092f1b25306db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000c505b0fdd2478743d5c8f6911a48d96404a518383d6b37051ad058843e8cbe0a000000000e800000000200002000000035c765ef4149c50de6c1a7cfd0cfc0bf4adc7047bbfc418619535942085f9fd420000000a7e05753bae53a7f9dbeb6618b55464b3cfecc76c7e89437d55ae5ad921d88ec40000000d51e9f000f3ad0e127ac060e52995ccdabd0f02a43541435ebd36ccc467e8c61701d7b547d0535ce0d41f8a5330fcaab605eb34c651198d63bca4e0e4f597fcc iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000019811560a4eb909739b702664014b3b505ee24d0a1456f004f48caf7c914e679000000000e8000000002000020000000ad59f5165b87db31b4442ab8e80904d416c1287724496eba1c6a486cfea0e1849000000054130967e457faa5de25b92136b46c197558302fb65e07390f9fc3d4af1c3af50fded9dc567659445f0f857f22026a7045cf8c670f7505276109fa46e2dcc50cca9232d6f267eb57b5808df0d926538375df3c9bbe9af4e940677a8b629b1a246a1239d3c129497ed1684c20de0934261926112cf9d67998a8acb221b9a623b9da749416b1429fdfa96d9d490c48d02d400000002d913f001f6e4042b7ae16f327025121815506b24913bb0bf616841a57f1c63cf2b32065f2da3903d576b67282aa1a66b740e35e52fcf02fc70413adfddbf12e iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3020 iexplore.exe 3020 iexplore.exe 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2400 3020 iexplore.exe 30 PID 3020 wrote to memory of 2400 3020 iexplore.exe 30 PID 3020 wrote to memory of 2400 3020 iexplore.exe 30 PID 3020 wrote to memory of 2400 3020 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\df618e6bb55476904cc7f4248d70b914_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3020 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554316995cdad2071f18ac232e4f7762e
SHA176e06ae282c67f2caa7ad0bbcfdfd9415a915b07
SHA256d38a878978c74fc5ee0bce5dbc61ee7004284e8019c1527dbc1ac95d00c934cf
SHA512db46c186b691e0ee38999d626747f2b127ffd16f1f0d491148a13544287c417869f4597cde483f10775b012b09e498ff1d2311450de00d908e0b4ba198489927
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be1b44b1c24bf3636377ec63f2936661
SHA1f5a93e6d7962a0c5e7092d2ff39c79af0f3ce47f
SHA256c33e3d4ed383bf342c289986f6ebe5d861212f28d5de58c710c6e0163ff444fa
SHA512c3f26b69e3ae02e3b63cd4ec3c8a983dcf632c3ccc3caf17b5c6aac53bfc37105da4de1508f5bbf437bdb4299995ca7b4fb259db0126f57c441691922f101d04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e66ee2d5c64fced82cf6731a1ab0f16
SHA1e89dc1ece03a3e39bc964dea819d81f86400660b
SHA2562017dc9c8f09f723527cbe25e20a8de59f438939ad3d5e920f2114a7c0e51365
SHA512dd40086df784dd35b06fee671290abfa68bed6767a4798884f74961be4dde3977a7ee4c7def20fe2b76c5503912543dd67bd444e811e83b4c0db040b465a0697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57269dd4d5d72f3fb6da70beaa9a19060
SHA15b594196399b630e0f5a068f58cbb7a9ce6e5b49
SHA2564a6e528ee5f25ff707797849b910999aad1a393379cb6f2ea198fa95b56a9c99
SHA512c63495cc3ee60201434cf41a74a187e023d7aa2b12163025b0a6b47b3b544ade9ec326a01b2856660447e8f5e0f3ba7cbfe09320c214ba05a497ec37c2ab2887
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a87fa0ace15101865e91b471a71f692
SHA18877a33f682d6195fb7f892d2ec257a810ed3c08
SHA25616a14d0aefd5fd063eee512ba215e8328a1cf2454fff8da568b213c999f4232b
SHA512cc137276b42a29aece7991cb416ebd2d1580e44efe819a8b7ad04f5b1cc6bec5e6647b83b5a51d0259f3e6255e3e087e945b408a7aff4c7673196c183add2429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb6513a06cafd444988966f95dfb3866
SHA1bd5d25a45526a9e03661da24e7fcc577abd0686c
SHA2563779b848e44bbf1f54bc8de1365914c3c5b3db293bdf915039b1f2c49e804527
SHA5120e5b292d7a6377184278ff5dfc3b54f5ec7d03508beb27919c3343433e87ac4c5cf96c83403b5c3b574b2931ae0747e5db7bf89ec0ecfa5b9d6bdfb1d9483ea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c973e4bfc4284a9bc364d6bb591cdeab
SHA1b97ed0040a7c00caca3108fe923c5ebf11ccf8be
SHA2567a7b0b1cdd644b8c394cd0887017cb13673a6043cadeef3229aff5d0a276e94f
SHA5123af19e66881b9ff6815552c1b37121e76cc844d9b457b42a31f09d030c44d2a0149e69f9e08499539294f86f101aff3cb5837bc11cb9746d850b38d4f5dee646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd8e4bb8d70abe9df0301aed6481dc02
SHA146a4e2a943482d9e5c7c0d0f7da461b09f26c897
SHA256da1c7911f48d5655ec6157ada6073667ca0799bf3969827ae23c86359fa11259
SHA512c0c9bd54d92011467f24dd30b93fb323c55fcdcde3b94d5c8f3ead2ecd1ebe44edb40f73b50f060c162eece6002f58f3dcd66d4af7dd762ac1c04572c246fbc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513ea472f9ad68f87547b293f40ff5233
SHA11c55120b2e5a933ff1dd54f3589f1cd84eb7939b
SHA2565ba914a63773fad8dd009191eae220be33869fd8d7fb65e650d0e9f270d141c8
SHA51239209c94225170f01ab0807e9bc1061fcc9edcca22ae40a9fac6bfc9e616ffc27f9a8ad73e7fcef7b84ecb48d17001b9ee57836586ea1c41daa79ec213758832
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f352d35ce06ea0c338d3387dd4df33b
SHA17a67d60084d72e1d1c5ae46c68e37f52157bcfc7
SHA25621ad2208a3ab6d0b0f8f31385706883307b0d4717310bd0355863a6ebfe4cf04
SHA512bf9c88843cf5101d81138165a2d6a2eddcfddb773c94a0469da2ab4affbfc072c60a8be52ae645a73c6c5a626b0ac3918296935f895dc23d66c16c762ad30b1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1361303aa523a38959158ad034491aa
SHA1155ad7a0395e3b39071853288845f66c818a1540
SHA25629a61aae3ef64129e085fabe9c97a6a8cc697c62049f68fe221067aa733297f1
SHA51215f8c875404cfbef088cd7abb4804d46c6f971acd959d4495aea844592266617321f40794c035504207bdbe522b5069213a4a739790d9b6185c080210eeae90b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570a3623fbc33ea114fdf0c8709927913
SHA1a1d5aabfad5302abca30d8756b816d00aafb15cb
SHA256ec9fd43bfa553d20a3545af4bd7578a9bcdf0727e63ed283d6609aaa96f9ed67
SHA512b55dc9edb408d0caeec3ccb2c0858258294e931dfd078fbf9f426fbf7512eaae5c9efb1d7e41661ad94acc6583e7a60ff0daec157cf90925322fd870b444ce7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d354d284fd7c9cf8cb838e44e99dc7a5
SHA1939a5e2a4e5d6025233ed20a800c877c78d40ecb
SHA25680943312ea92e5c78eb1104275656955c1246d51676678e7ef4f483795ef60c2
SHA51270f11e04244f7c12347e3f550cd561009e3f3b680d4cb54e7485bae839ca0e9b30ec6d0ce5ca315a80bf36d29ca6e1278bbc0abcb2f02764ba989953411e05b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5532e6a63764417b2f057d1a8b07ecbcf
SHA1379e9b60ec113c1c6daccc03c566c6e5a18dabb2
SHA25671a53a5a898371386d1f5803217d51595d45a02463d016b4dd3d828a964c1e5e
SHA51263bc5d526aaf8bd6ef5917bd7f44cc522c5991bc332fb4b0ffffd0ccbef6061041e4e65f4cc91b7fb71664b5acbb23879b738677ec90059ef75941a1f4a18f61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5424f31f16ebe7caca08f3e1a9e243dba
SHA1247b930a8982fb1a3efa2394481c9209c70246e1
SHA25605576749ad30338aa33f61488bc47ad77ed2d6f1a7524d2b116703e8fb828ea2
SHA5124bcd28e22c454a0921576f808247995de6a9bc6cdbba2d46c1c27d49fe21115910731897af446321360f17c68a1a448a419d4e7131a9e0fe80bb3e612f51c521
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecffc2d7b89211daf6d445822aa52dec
SHA14adbd0caa3d74e7c8d266558bc272502c64658a8
SHA2560bfbf24316ce6cd348e7cd899658f26626b4b737840252fad381620904429849
SHA5123f6c6baeffaae10d0abdff7c663606a14ae7c94b24412f191aed941208e2c7ddb9c1a42908f51cced7df9e3ce192754f3c6ece191b8f579c015374a04228aaea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f072bc600d1af4585966c7def02f214e
SHA1d1423cca3c27ceeb90befd6b319fb060859c73da
SHA256e3c548804919af9921fcd0d6c56ce8b076ce037983aac8d0a55da55ac7315c5c
SHA51223ddb4ac00269ae5855601e560add7a9fedc92fb5a56d31c51916ab547157190987fa9cbddb7105d105433fb882dda3e90f45c346a8f5581cce403751af3cdc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afca222c44a336975fcf8abf0a1b7db1
SHA1a8167ef0c95471da29d612beb179276f794ccdf1
SHA256c5d2a31ca4160ac10ffea79b49d13d703936d2dc122644115b8c9a79ff69cd62
SHA512ca464b4b55d09b08a42797caf4936821b3e6c4ddd37013621a4d98ecc7e1c4daf212f063528aff686d2f975ca6d19806452d45b564578736810e3f31060788bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a80cd91eba58a325e19f3b7c3b9a471
SHA12c363a6eba4e2c063d13bd01379d95ee574422f4
SHA25697886fa270091bf83e4fe6bc37418931477c51fcc9dac255cb775f2676e225a0
SHA512f60999201e9877795ef7f214fae5fff79d6eb9b544d9fdc2ec5213fdb4e4fa7711d696422696460ed8609b6fe635f31b0d27b1afb01cb7cdd3c232168a31c0de
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b