Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 04:23
Static task
static1
Behavioral task
behavioral1
Sample
ef0f90b947048ad8ae7fea0146319bd5_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ef0f90b947048ad8ae7fea0146319bd5_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
ef0f90b947048ad8ae7fea0146319bd5_JaffaCakes118.html
-
Size
460KB
-
MD5
ef0f90b947048ad8ae7fea0146319bd5
-
SHA1
b7a786decfe1675037365cbff3980ba676c30855
-
SHA256
d15474fb8b3df8ddb8271bfafa31d5cdc98b3ac81d4c899eb3294ed66d8bd568
-
SHA512
1fdf1d35a721c4d293cf216dba0683e9b93acc2cf3b450cb63dd525a92e7043a1ce44d7e99f4552d4fc17ec249437d26f4e425403edb03579aad87d399015e25
-
SSDEEP
6144:ScsMYod+X3oI+Y5sMYod+X3oI+YDsMYod+X3oI+YLsMYod+X3oI+YQ:X5d+X3X5d+X395d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d04de40ede0bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000dea18bd731ee92a75efad0b39afb9a8b8ac1559fd09ac9664822002438741476000000000e80000000020000200000003992c989975d1e1812dd984275ef5fecbf949c48ce6985f4f93e68ad1ce34e2b200000003d18efcd614893902f9c745fdd0e82d5cb9799fa1ddc17049d4685ba02e05156400000003c9bc6fba1228e8964a4a0ac0acf6065271a87906bf79caed52cfb98d52295dac4919d4975ca6be5e5c8bcd5fc4c18bbdf1fb69980d0873789eeae85f254eb75 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{36388271-77D1-11EF-B233-C2666C5B6023} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433054459" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE 3004 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 3004 2192 iexplore.exe 30 PID 2192 wrote to memory of 3004 2192 iexplore.exe 30 PID 2192 wrote to memory of 3004 2192 iexplore.exe 30 PID 2192 wrote to memory of 3004 2192 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ef0f90b947048ad8ae7fea0146319bd5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5fb9beddc16bd9cc5c20b7f0a155c6c
SHA1204431910983dc31e747955900591ac4e1e87321
SHA25612cf32bb378c9e2dc5b47644610ce9a1e4cc4b85f53388ac2d080c2d59716e51
SHA5128e78f9b57c1e080912ce8157d1361b13a7cf2804ddae152d5c99eb5019215ad763ab6f735ebd33c5438c7814f2b0fd08171f5ecfdaff6028773a0ca4ecfbacc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cd2fc4a4ca3c79a8868d3a6b6083227
SHA1999dc9114ae63a64e4f3aa9b7cacd8ae8cfff7e2
SHA2561ad7eb0e63db79f27f516c9936d0e8818bcaa4d581aff44769d51c4920fd0474
SHA51275c394523e97d0e84108c7b2987189137d12c8b8699939b2fd8dd869d3a85ce5abea58bfa55fa674a8650c2e4443ff5aa2e3b300809df68a4f754377b09d9c2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51d7a59e7bcf95de97ce0d43ffb6abcf8
SHA19f050ab919a86f57ba2d355c96af2908bfca1d70
SHA2563d2de88d46b344c1b54a8eec681d584b18a5d36b7cfe768382344c629a23bc54
SHA51201b05a344eba66b35ea818da885fbb35f42e1fc93211f28358657edd37bd1840ddf6598465f6d0a9372240c78fb4c3be080a0b56491e43cf5459bb4e2a39de8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57ced21a3f88d4853dc7f05cd54f35ad4
SHA1683370c219dcc5725c0c60af205e4b46b4053da1
SHA25639a790128e1a29ebbf2f577b3ac1f4e713c2093f6c23f2eeb4beb5360226795a
SHA512ee175fad5a7988894368fa48f147f70a7f31d452016b7f7c7500f199f59703f0baf0b41cb57af298b98e4085bcfc041b64fb59075c49255bcacb3fff503878b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD546ed337d61d29d935257e2dddbf486fd
SHA13f08e3373e29f8f3857d100ce0772f052d2fc902
SHA2563c2ff56ac45219460b7671ca5493f1f7cbfeae83bc2a64036907bc18646d2b69
SHA5124e1ef604b3d4a9a76ca15a8239da06abb39cff106bd8d1ff198daf5ebcb52bd8fd3e0e5001355ed58628ad777ec4f90c7e4ee16c32600c4726e0e360f2a8c7b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5209dd110db1675a4460394cca283a9ff
SHA11d2719c69363c9b26afc2aa105cb8b91029dc8e0
SHA256742407f995f8162fc9a5bf037dfbd0cb451c5d18055de0fcbc2534ce4eab312a
SHA5126874b7774e9c8903cfbc923ec41333d73be3733275b59ff006e26822fc4117454db0a236f317fba6cf1c1acd5d18eea53e22a826a80d294059c53d27d93e5408
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9a158f3ce0627d7d1c0c89ac3548bb3
SHA1dd4bf88e601374094848fc1906494c3b588a96d9
SHA256312aec420cc65d89144bd53671a3526124b46baa23e6f246824f7d0abee4e58a
SHA51219b3d960ace0f41dd88c5854df04b221404b9e7b360a84e0082ddccbcfadef85c940281e264f5f4ae0e537e6b7e8817143ce40622b9aa1214dac842a08b00efe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f0be2d6af1c05a7e95db5b8dd85ffb5
SHA1c8e1cfc32b11c6ca09c04d5f72e1aaa0a37ac0cd
SHA25631b6d9fdc468c4ccbb2aa334931a566d281a79b17a5cf2d10bfc27059cf2d567
SHA512483d5585677489588102f98536327fc8680e16c8398a3f05b329a0b04fe943b354f19b55352f5b2b400035a91c25fefdb4e262e411e01087d0df2d9d2910b483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfeff886e0d6c2560aa916429abb7994
SHA170835a5a81a838c5a5df5d2f833b6b853a871059
SHA2568c637342dac09c44e991c45b866de71b6a49f91537b2282a230ffa71092ff623
SHA512f9e8a1ad6d1abeeb042522320c2c2daa657cebb50dea4fbb3f0aae3b52422b7d4dc3fc29f58a64ebc17eabca8d5ce4b22691f1d3102dae665bdef7c2d370b860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c0989846799f23df8aba112d3256822
SHA1aa81701cb9a1cd3ca191a829c56b053995bb5f81
SHA2568f593424c44091ccce1522bca99606d36fd4207e87ed7f3a27d36cf97fdcb178
SHA512e4e983652d1879b213798c788e6050a60d4a48cf784d3568b217a3189f81c17a1a0d164c7c10e35353c16baf628390b965dfe159ef50b97e3725b3845f2c34cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7ba21e7ea45baba4d2ded95012fab33
SHA1fb248ab5e6a7d52df546a4c4753c2781bb42e8d0
SHA256ab9374e99caf12560de464a7c59d070280bdd56700348a0006c4fe0423fc985c
SHA512bf41cc15ffdb7dacdba6452c8b27cbbf06d733d4ae4695ae6013a46e8fbf70e22ac56a19d3d1965fe6c28f261824240fa21a0467807075ed8a7f79d3e79a25fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb8a8d8272be31090e9ccf442e29bbf7
SHA17f9e0b3814f388531e8c9461b659f7d0da5f2eed
SHA25617c8a1340afe0d07c8d871566f17b1a5458f230ac260ffb8e42428a6f24d251d
SHA5123b4a579e4f2d0abbc035aff9a9f63fea390dd1ff114e80c2b23365e70458a8be9f7c9d42b6ef91ec554fa1c9cc549559e6e30c60471d975fe5c93a4671973201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acca774332fc354e290415e462e238c4
SHA1cc36af020ab4ce4436bf6614b26457884eac9e03
SHA256eff629934287bace2e5e9a291859feb98af4be2086c1fab11775fde8fc6d9c6c
SHA512f58c432d430973be5b67e01fde7264c385b998d744956fee29edfa19f875e06c3a6de1777c01911252d04ea34b2951084b0e848d7cd07471016bf8e423e4e68a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5774b48aad136a6a6a3cd5ee1af38fb0f
SHA1c880680264baa1438bec64c28a403729fb6021e0
SHA2569fdcea2a907a05cefb7b861337ce7117a3a4d547c0da4a3cd97316ff67001d77
SHA512c343e44fa422b18b01ba44216cd641330d120725250a9de902f9394b2376ac5b4cbffd8352fb4f4c2f5db9f5c1b9b94c4557fa0ad36a5321ab514e4fe8d808d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ef115c258b08431e5daf7751b66659d
SHA1a3a3e8df9db3f9a71a16b2496d48442b5fae61b7
SHA256954080eced31b9eaf8f27916d62d33b413dc511a56bc9143f2f5e1b3269d9f67
SHA512b557a7cfd2415fcacbcb5582e258c4b427a1acace3c2e407a2c6143fc07ccf11422c7c45d6aaf5190c1ec9740eefc7a0a7d0bf624a9e4e9c03155218d8ca617a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5474f35b1b9c45d7a86363b4de16fe428
SHA1e2d6353ca6438df5fa6dc129fea811e12b15bc5b
SHA256c9986a95a574805f63265648151c851ecfcdfb9e1ce7ff7c1a5126f0a5d702aa
SHA512adea50616e61df67d837c0af222ba853ae9490a662c1a1ff70989d870fc68523d3865bf0cb96cc168bfcf71267160fa76aef2432cdb288475698bebe2e754ea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54dd23f8f9d51d4ad773b86bbd223a64f
SHA180c824585db408f819a8ccd43e7ecc08510947ea
SHA2568b78d69bc3f049aa37f394719547727fe4348ed455010ec1ae76b2afd11bf85c
SHA512dc1dba78994ff7fb6f35611572a839089bd8baa910147a0ebbc51f6e06678a5653c07d943fb7e8a638b9fdbc91479a3405c6471efe2aa5f0919ae5fe7fd759ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56998319f1b81d1df989ee835b98cfae1
SHA169d37eb6394e7c99f2261347033d8689d8772357
SHA256e42bf872dc5cfcef17506e016986df5b9aaf7bb839c796d70f9533e8aa5dc319
SHA512a3f4e87db6fc571660f6c8cc2aff8758888b6f2675e7a73fed5162f283b6e63900570595546650e2c014b374d75a9f10e24c6155caab2826e5ab1cc5b925ae5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5122123bd15f70cc6083d286afed9fc
SHA1759bba258a7cb79d5e185e585587c76f17937e75
SHA256bb979b84486272f8b141a1a6a9d243f63196fc4e8f0ab0461adca27365a748d6
SHA5127e18aa3cf36c28c73c5d6dbc0fa08ec0a20ad850ba6d0949e41ee0aa2305ca211001f63dbc5494d41c24cdaa23ed2d1acf44fe5b5a3cad35791123836ccf5a82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562fc5b62006c09d0d70c9a3a93c806c9
SHA1d0730cd848368567f5c6a5347f2b50812d3b42bc
SHA2562c6f26b698cf674bec25dcf061d392555817ab03106aef81c8c7333af22950ad
SHA51276e9a31759623ae05e344d4b4a2055180a4c0da095ac6beaea7f8aa14853ac9f622d3ed430084a66cf7684bc135f500dff63676206a0803816a8d00024a5a7ae
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b