Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 06:39
Static task
static1
Behavioral task
behavioral1
Sample
eac6db347e15aed625884b641a353893_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac6db347e15aed625884b641a353893_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eac6db347e15aed625884b641a353893_JaffaCakes118.html
-
Size
35KB
-
MD5
eac6db347e15aed625884b641a353893
-
SHA1
7e016abd2b2ef718c35258f47670a125a65f6207
-
SHA256
17c36bd2254347f8ca8f45629655f719fdabd7fe079c0db6f8927aa7f960e6c9
-
SHA512
e7ab4590aed7595d8a0dee59bcf5d053e55e5b8dbae6b651244f040d95bc013d7afb07b5253e9d48d7c45a2df1deaf03053a4965872ea783829e84b9bdb23436
-
SSDEEP
768:L6Al1p989bw8EeQ8k6F9gU87r+YblzK3ubbr74ikvD5KprfhU+2h/QE34qbLPynC:1rMoE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 105bfed25e0adb01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FC87E641-7651-11EF-9C86-EA7747D117E6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432889865" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000000656eaeafd2e242869d578970fb0e1b72b110b727b3e9b8af9d19e32e295a447000000000e800000000200002000000092b48b1903792455616a53c6f024f83ef2bc173a3bf9997c7e4ad713960a057e20000000b322b02eaf0afcc2996f0b2fdcb6bc61140a63efde096fea074741a28f8063ec400000009ceb4f1d22d5c4320c203b38e828ae0cb3f57382a4ee0bbbb21b5f9a15a491a1d36a921cb07bbbc5f9b8015536802faf53088397226050881bb5c758b8eb285b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2492 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2492 iexplore.exe 2492 iexplore.exe 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE 2380 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2380 2492 iexplore.exe 30 PID 2492 wrote to memory of 2380 2492 iexplore.exe 30 PID 2492 wrote to memory of 2380 2492 iexplore.exe 30 PID 2492 wrote to memory of 2380 2492 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eac6db347e15aed625884b641a353893_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2492 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2380
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c74ad5fe1f58e5577c91ba57b8da0d3
SHA1683d9847928ccbf29b6a88e263cfdb17940ab6b7
SHA256f332e71b0210f1db6ed4adcda9711daa2b106580356e531d2cc233ff4b5886a0
SHA512542f062b0fba474a3b4e1ff6f5a155b6a33d7f30c00a29621a0ed28687e159dec591b328c11a2cbbf3344ed2775e1f3a4542619a09ab924b74795fb0b83a29ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daa5dff172fb21b9789b70ea30900502
SHA1f09e75d29f67ff458416df896de83e5fa6f1dff2
SHA2562af987df12346bc99d0a4fba53b846bc6f5055b5e6ad713ea668e9f68823b737
SHA51285724fbb1aa7b27dd66d062893bb1b57a3bd0a1fb94e6a8b72c189b52a8de2c5e3db49ce4ba318cd10c3cd98b0c1aa7c519f624b3bfb599077f3abc1f4956784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d00f08db29e9b069330a0965ad3a8a98
SHA1d27e3e80012e7f3a499cc81f1389ef507dee3ea2
SHA256e075fd521e5a0064156422672108dfc66e4b123c2b99f2bc409760af0a791540
SHA512cc977995961f971829ae7de6bd0619eafee199b3fbe843148750c72e23ec6c80d7f90f7e750af8227099900a9ca8836b4c52570fe74ee8a12bdf22178faeb981
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517b2f5660c82162858ec3c6b3c64bd85
SHA1cdcc21c4ba4c14cee8d448d66fd9b40e0999a0af
SHA2563372b765044deb47d4a151abce404b51b3992f28d0bdc5fca8d0aaad9b97af19
SHA512c980bb54860740840588e946f221ac1a7a225834db92643811d9c4a80ce59d6bcae679fd8af8ebf3807161a4976803943a3bf138066a7b246129c9adc1279663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523f0c1651975747b9378e47840086991
SHA1b1e98d0bdf072cca3e9b69f3bf9d31467fc483ea
SHA25619c1e5665a4b66de5270298b69431f0511d1344cb6bb29f1e04afe5f22f04332
SHA5120e0fad4294dd43bc21be900f43e175fef96c9a1c0458d173b80975c497ee2ef6fd037a9bec14f95bd8d9063831999ba5d6ae40a47d302588dbd3a59c351edf90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594f2c0dc546504455c77e757b42966ab
SHA1bc3a622141b18162c78bcc5142d2f724f63f3eb7
SHA256abe0fc8eb821832258b5b2291e2091aa50c71bdc9d9ca31237825d6144a401a9
SHA51217fb3b9bff8b938ec974a505bffdf4d688ad020d28ab361bd937e821a6ed8fd7d15292cc41e2f4cfa0036fb651759fd03ab756f2a0a4b5b997ccf6094a85037a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5609e025bc71fd0a6b8e7704fa9dcd943
SHA1626e2a2936cbf453c272137a5117a12d4e7d5625
SHA256c3eb3ba76dee8fb1f2405a4a4b5b273ca6ed3cf8a1ff0b4d79faf647562799a7
SHA512539caa6d1e68b8854ec819396deb9af5fac51e593da88b26c44164d21ef6391e53239c82299a3ffc3cbff3adaaea8787cce1c488837b453bf73c1005729f27a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8fe88ee197ec84b9d344e1938d83bc6
SHA1dcb99b3c9e57b702f75a70e79eb7a16ded06947d
SHA256e3342454e2ee615189857ec786de226a0fd456b27a1a2469eea2ae9d92464887
SHA5122dc4c0a0b3468695a4e11769d8df18859057fedbf6564f3fcf42c843089b018311bce871c82dbf095a9ace6d2c5e22033ff23007f313de1e84f2fb48275a8612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583692b37f7286ffac12b38e680023999
SHA13ecbc4b786040e3006b58211875647654e9af13c
SHA2564099155066844de73a39138adaaa9e397611f53e4149ef044a86f6686ee100e9
SHA5129583d78afae1af97754019a60e99a07af421388e1c6147282030651f8d6b2a89c139c52a76e8fd0391232b8af653de06c0e89ac653dbb04ea72f0e564377eb25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b7f1ab6c2bc0ef8fc64297928742a2f
SHA1d485805bc7715ec6d6177a30dd84e2b8eddcacfa
SHA25689ed54a70bea956ed0d700ae10e04518687727a29567cc7f04dce4942aaecfef
SHA512ad5881bc8b795cc8ea1b9b33a1ce4bd6007a697d27a7aa82f1ea9c899885787ad029aa1c80fd97d8815c0afea166174135a9d66fca46927aa0c73a76dd495d5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54be2a251b6ba0be71932529658feab7d
SHA1c9a763ce04f50c8119f00dc0d2e628fdfdfe622c
SHA2564892525ab1d8c2729af1e62c5de2f1b8f34fd2d99a767ccd578f7403515e314c
SHA512e97af778f8b57651a4eba83dad9851f9449fc25fcc42c2fa056efe4c0e76da6eeddf46152e08f355534c9cc62234f27a15a5bfa3126ee62e019444d13b6e373d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f31868aafe47a3a0e9316b0f24d5962
SHA1ed22244b44b20366be9e32626bdd626853bb443c
SHA2569467c384c27e75ca80859fba61a6b81e043d365c001182039f04de7bf366de6d
SHA512abb70eabf62d7605c056f5ded8c8bc42313f631d1c7d6c2f41f4ddf09e3186badad9f31be2ecbac8dc361173c7a93ff51414c9c24e6c248e76222b3c4ee75b8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5139592af468e84d3313d4cfe221648be
SHA1259ef39e6cf64cd42f881e15ad257861fd8f58ad
SHA25623a607f4ec6bce8a7aefaea46cea75feea824e04e79ae4aec6d48cbfa5304b4a
SHA512b99b45c97354e79ebc1adadca84e9ab64c523cd5bdfa62aab34b84684c1dc07fc5f0953643a04f974091e8646a2b7ab92e186d1b8bb0d0cb575dc3f3173013e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598cfc395c792c44554ac69c7a67ddbc0
SHA1bd66cbb14497b81d383a9b42c363870127cb2a15
SHA256deb38b81da3f8c2ca656bcf8fdcb3303073644ed87382121026df93ff273a0c8
SHA512ff2b07378c1e4c49fd544dd02f1403f4096d96982da5c4828fb9e9794977ca8bfd0c5197b5a066abfeb04ec2d7fda854fcb50a4a1e80fc8e621b335cc276a58a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c6a23d03846da43e92b3a8c11e241c0
SHA1be12a9c7674b53cb2fa839b007d91c29465b95aa
SHA25673ebc6da3e57f40789b92b31b318f8e4972d383f9ec35b6cc65d34ec1396d15d
SHA512661b1a14c3dab6331307a24521d1a912b498155ef968829ef17efd7b27d7e830f8b7e896c8029aaf4d8721ad01415127ea308e254031c0dddcaa68fbc37bd031
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df88de537b0e647778b25ec1c3d401f2
SHA1bcbb6de6fceca42f323478af99abaf4ec16e34f5
SHA2568a5587e9ae3ef535e0c6c1906f7bbbb60e458c0f32c048117cba6a3e347f6235
SHA512f19c89fb4c9375b8180b155e6337d5058ed917cc38f8b56ad86cd16c1f02253f73b8786270f5ad75c5b3941095ba5f0864946321f6fd5c64d6a632193d4e1d0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab092156928068c6b0e1b2dbdbeb694e
SHA192f8a601293bd1511dbfd742ada801ac7cce169f
SHA2566ffa5dbd70e97cb14a6fb0b68b31c746fd7edada185da38fd773296a684b5320
SHA512370fa7bfa258e7a093bdd1feb0e048bffd712eb733480a1246a55254834744a666c87789cbdfd6f5f4bab3d4c2ec9aeff14385448912f8616bde33425cd4b188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5831e697be98867149fd34b8ec05356bb
SHA19bba9bd5cf9c9c3abdb6d5453d97518905102055
SHA256cd470b6f15ca2acd8735193127cf97de4f7f4e4f6eae80341ec3afd233e805b0
SHA5120bb258de93b0399774423b5467f7a8aee731867e734559f17d98a737abe9783214d2fdfd57a48e403849c6104d065d85fa9ecd0061f6cf5627c3106e602b940c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cdba9e388d4ce3599416769335ef0517
SHA18382a051faffdfc169c7fb32ba5415eb4d00043a
SHA256e486fb9e9ae5903a5c032aab6072a1383d099723ca801c90575cd90145ef2a10
SHA512762b66a163c2a94b852cc12a733c10b4b929edcba093953353b443fccd7fd46b5fd46350b5e257d7a0bdb96955d90e9c933a1325b152985ce6e8a155d402f88a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b