Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
ea8bbbdb3b5cb3ba2bd66af4fc00f4e1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea8bbbdb3b5cb3ba2bd66af4fc00f4e1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ea8bbbdb3b5cb3ba2bd66af4fc00f4e1_JaffaCakes118.html
-
Size
2KB
-
MD5
ea8bbbdb3b5cb3ba2bd66af4fc00f4e1
-
SHA1
5413b77525f74a4d5028957bc5f0297649cb0acd
-
SHA256
4c2fe5856116dfec62cc4fd56986f245d25e02129b5ee50a515f0b0d569cd83a
-
SHA512
5e1b11df16a335c66748c710aa7ddb04b90222b27bed980ce75dc2790adda55b0f17303c7312a1c2925830cc20b101180085d266e51d6ae1b6d988d4d7f1f3fc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432880275" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000000d9aeb982d4597e74410d1418c93682233a4798485cd06607f99406e6c02f883000000000e800000000200002000000050db43b359ae2ac358933760e1179231ddd46872ed6590fe031738d2339ebe822000000015da875b93987a5919dfba005950c1f5fc17bf0e6a647bacbf69b20a808cd18c4000000006b15050402b20f5b1899a112f8f2ad8dd6365898983ed85bf4cbd084675f51a4914222ccb37e0bc5296129505a262c2f5e3ab98f7a18714d632bb4dcaf777fd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000002879b135e66ccaafa7b43f836683d48bcaaf19de8d22390eb9f7cfc15dcdbc12000000000e800000000200002000000061947fe5a7be1c53b9dc03baacc1d87583d1db7c23482b8dfac085573bb667f990000000c1a391774ac93f52ab6fc039f780a9cfa4066009ed81caab14fd0d74adbd89ddafedfa0a538a10abf4191e536b52df9472e8a1699b5b0b38550ac0f7fef0ae6233f4b1b897299a654009abbb158916912a4644ce65d00fab37969fac540fef2f0643810701283eef731dd10a1e54b3e9ca3cf63eed7edb17fe934312be6db4f170cda49dfa3cdf55453cbeddaf46f209400000003ea95c97be19a09643066453f2ab709c0b24bae4ade3c801b699fa3f230593f37e6444392e38906cf81f2dc5ee44da9ef2ee07fd6abf717f80b642a0dadfb418 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A90EBC71-763B-11EF-B60D-EAF82BEC9AF0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e076887d480adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2404 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2404 iexplore.exe 2404 iexplore.exe 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE 1956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 1956 2404 iexplore.exe 30 PID 2404 wrote to memory of 1956 2404 iexplore.exe 30 PID 2404 wrote to memory of 1956 2404 iexplore.exe 30 PID 2404 wrote to memory of 1956 2404 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ea8bbbdb3b5cb3ba2bd66af4fc00f4e1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2404 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0a3b342c1bb7ee9ca49f270c2a4ca9d
SHA1868fb66d0fa5e5441c36230f265b0210b1c33678
SHA256fbd3c28e51a4a22b1da15b3842300991c162e08b92173985c5bdb5a45dd1a4f1
SHA512844d4288cf7b09a376ff3c039d3bb14e9010313b21e01e21f22f2250baac0814e77bc59bf1cd17a0363b4dc4bb02dd11ed319c632d3c37bcbf336c8564543905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9359f277b10ec6259f6928317e9e8d6
SHA12018b5bb4ce4d38599e14218f0e2839b923e7b17
SHA25686866a8e81aeb71307bb09f577819710ebe4a57e3972f15ac66e718f7c79bed1
SHA5122add3178678ab073696bb2cc11fff1ec2bff96882aca9f75498a184a70c4dc3ae4d6814038b352a6b7e5d5376ef79a0b0498ae57e32dd0a9bf66723b582ae30f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a03622e1b5375d2fa1486b8d7ad578af
SHA181adc1af7c9347d71fcae502cb9f46725da94187
SHA25645f6723089616aba056e573cc40fc46c54712930405deff0b5cf585265b3c742
SHA5123c8406545a55896732110bcf0a2e1300862807c922a83e6427e13bdd653ce1016744f27941a0fe02b5bfe5755358ac63d95b67e82d2ba7f02a55c4a487ecea7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f7a151b2ee42f0448637a1166b2b7fa
SHA1a112748ff7b57eb683c7e2b19186ff04acdda7f2
SHA256204dc8c12d85b627e55acaea76324792e899323b6ea9b64d5a5595314aebbc1c
SHA5122da0d248663085cf524480643b9d10c91bc808f0212b7eee02278926849cca917179084c2d9edd6372e76a51060a1eefa225dac481b7aa68d4344ca1bc26a0fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7c627d1f74d6d5ec5efa61e11c43584
SHA158798702dbf8f1431a5ea113300e5f5c4118158b
SHA256bc72195cf6ac689b1aa91f8d21c504429f1adc5f8e8a0e6bbea2e9abdc7c6bea
SHA512d004cfbd6e04ed983bc4e360f05b13bc9966cf561f7b407739f5a751f29003e0a09b1b6a54b1a312710036a996f991787c92e578c2ae42f048d2cc05c870b85c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e436d30753cb6292eb12026915a790e
SHA1f6eb98c88337731a127f58794668ba35acf46cee
SHA256058c6026d79f214074d0d23573712f545f18201d378d2bedf7bd025ba6585271
SHA5125d15656f70963bb92a9319d394462c35e30595a6d2c5e6570700de01fe1c35aec505841af4d5dc4b175a6f658afef94aca67b4fb39d682e61314759ac580fdbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542176c099be5dab28faade0f7c2d5ef2
SHA182722cd1786914f5d4ca5064cd08c895ea871530
SHA2565f1a342f1997560fa5697559b4f8c946b979680eaecef686eabb6d8e4d1acbe6
SHA5121d32a65513493db3caf692a4bfe059f92e85d1448152dd2887c978af94ccd2abeb3021d455372066b1c157cabcc06b7505261da902780549df47596fd55a2c66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e71988b18d02db836ccde235ad61983
SHA14604db45157740c1fa8a6b9ef228e794af4ef03e
SHA256d2596eb5dc7a738e4915a6a37d9746ee91999626bfa0971952abf87e0638d770
SHA51205301fd8d27c861d141def05fdc802b05db5f4c0452a8217113ec2e3a31f2055d64a038989728dc0f1d4f24df93597be30c24a59167626635ef9b873ece8a401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591b1607d450053c1a262c4de27524f8d
SHA13e4241a2b7f348c48428b27911ca2fad0f9eac34
SHA256cfaf4be5846bc73eaf94b6e6bcf83947d0731b9911cb5198fe3dd737ba96f7a6
SHA512f18f4d4a5473bb939491b1f5fe35669a8bb83d99f52f3c7e858e12aea8f8ded16fc0ec9dd7d55099897b9bd479b730bbd9946ea539f7df0ec1b018012f367d4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ae5c466b2809caccf58a430d59fe500
SHA1d05921eea3eecbd929a46f7e36eb0c1b7a6dd588
SHA2560f9b0ca938d691b2c3d1984739ffce0f35d7d52a96a51f3ca8268f28572de988
SHA512fb3a203af704cbbc0aea817105b3680cee3e1c8bce7acb9babb18e3bbd1a07a3bd49fb2cc7cf091f4b7875cafb20b5f1a2a9ac84c495900bd2f4a2c4b447cf0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4978336f36fd9cb6874019b9805a5fe
SHA12ae7b1c75a37fb391b0b18cb4e2508a76ab13d27
SHA256f949ce448d0ee925f6dac76cd1ce6041c2cc99e7ae983d24e05f717fbd70eb6f
SHA51215eb1b451d8011dc04d02bd8232f892b0ee34c29a7e955af9afcc006d43f4ba4a710687096a5d00500fc17948970f4a2d3e70c98b9df951aaed23dc764a73daf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57631c130e377fc87e083e8c79d7ce53e
SHA109b6c5f9ff3239e8cb2a49b0f6b16248b7577396
SHA25615d832384eed460e5a2e4ab623ab13681f9b2d8e22dc7c7d1e4ebd4ec04ed8d3
SHA5124efe7781d5e55b149db4d01743c9c0fd71ac5691fb422460b0a7a7de26a9aa6a5bd45263db7ad63e3f4ea2e484656299e3d29fe42f98fc3df308a6d9e310a5b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5210001f6b3ad612d9cd70090e6f12a63
SHA128994ea77f54ac732369a6a09b634d6ea2a83989
SHA256a341ff6488b999ef94151a3caa3cfb89ffc2f46ff977cf05ee622c4eedd9daf1
SHA512aaf50ed60753947fabe86285563aae689941d2296dc8532c1770ece85c9a7e51255cfbb398c0d8685a432ad6fc25f7174ab2cf5b131a6a5df65e9c2e9526ddbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56743d90b26a4395e9131c742d20ddd4f
SHA1ebb9c68912f5931c2231469b0ff13359084d305f
SHA256aa16e9d81ae2ec5cfad77cfe9392de32935d011649a5b6ff6a3fc42b5c7baa35
SHA5129c539641a4dcdbd6802769ff11f4ab9dba0bc99370cb47e53201a0410cd1861ebfe8da974801d85ecda03e9e30527c2a1c205864ac908034d3f698c02d065aab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594c2c6663cd41ca056032d49dcf1c71d
SHA171d8c54eabb795b39b9977902ba5d142b7b751dc
SHA2563e147647977b18d023fca4ecf8c19731900d55295cdec6f853498d21b1e71f22
SHA512d598828a95b403bc22feffb598b31c38eb841b4246dd5d3eb44b36f4775619f9043d003ead6113e0af6a1dfa04decbb7b8013f051686068dd3bccaebbd7cbe62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf0b71138e2c5525b907e3f307422924
SHA176b57e657802fc6f1714e01fdc08e4c1117a25b0
SHA256f7e825439758216f78f001632e5132393a9f0187da6a8a075afdf4d177e04274
SHA512a9d64081ce6a03a7f6a7f3f869dff789ec5cd51d59477c87a147dd26a94f828531904098170d21aa79d56d8bd75866e6e9f9b88058a2c6ca02cbea9dc63c4741
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55125437995a7053e58efa8ea27657358
SHA17749ead82777258b2d4da69266a8feaa7638e119
SHA256b1dd7e2f4d80ec41a63df40df09aa3ee274d79e0cce79749b939a932bbd4e3a8
SHA51263e1bea88425ce0715345277cc23a7ad46916ec7443321046e5ec45097b17aab0d015d722689bdd760f049b6ac4cfa83d786813c34fd3c79c036a3cdafe76656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9a47e85e61431e1fe42442590e4ad8d
SHA19041108e7185cc2ab0f97192bce3d4b713164039
SHA25689b3cf4e491011168022595cecc658fd630073451da67fa64857965c84c63258
SHA512a38baa936c2e4fc53bc1a605fe9be81f60f6c2376bc563007a10276ed43c1ca9748a3a5ffe64b91efb756f0cd8075eff87518adf192abcbc68609f376e2494bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5492e6b84991f3b177b9da320a8f8667d
SHA142dfac348706f4858a7002732fbb353c1eabbd33
SHA256fe5ac0a77a55e474d345d4ecbf57be3e929207e9c02595eb29e397c7eb928c6b
SHA512fdf2e67aa1d61b942820cae2c5e546e075e2557be7cb7ccd57bef6555ac0d5385ee1277ddd6a3a4af71813a990693d35d7b0fb34c6dc5a46eceeb83d654e67fc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b