Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 04:45
Static task
static1
Behavioral task
behavioral1
Sample
83111ae8c609fc463081ff453c0cc799_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
83111ae8c609fc463081ff453c0cc799_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
83111ae8c609fc463081ff453c0cc799_JaffaCakes118.html
-
Size
3KB
-
MD5
83111ae8c609fc463081ff453c0cc799
-
SHA1
ca8e75eb038602f7000594ac821d6ee72fc1c20a
-
SHA256
8f6cde7f453e1b687d859e77683fed257ed120a02e9a73e2bee41bd85f8d670e
-
SHA512
d1c58939f4edc5dd3a988f4b6c23411360b8569bf5542d44e85a500f48da45fdab7b73ba060faaa323bf806d229ad7371c8b76f9b4c7a73327e3b62165138cd7
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d9c12937a21d6f4d9acc0df449bd34d200000000020000000000106600000001000020000000be01c10b778347b864b601b51299c1540541630173ed229f404820ab38b7824f000000000e8000000002000020000000acd77c62a564cfbc3e8a08dcf57733de8ad0c14ad28150fe4ab46247980bd36590000000eda6860d695af06496b44dfba1b6135897cf18432260027d8e8dc530be7c97f45adbe54412544f1dedefe535db80cc384c29c3120dd122b81473c405a1394fe483935db7c1c41bc3392e32de12411922663216f49deb32f14279cbf581f0ee6120000bb8710bee67d8540cb333fc93c1738490f3120147fd2eab00ae55a966d1aeb3aea2b9b29965d6a205f2fef822e84000000028637658d825a93030fc9c8af6f6928570ebebdfd74cc9d4a420f806f78a5cf046ca508f138c79ef0ff9cca05219f3fcd63dfffd25b0612ee5792a5c8c491d8c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{839863F1-1E3F-11EF-989B-729E5AF85804} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423206231" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d9c12937a21d6f4d9acc0df449bd34d200000000020000000000106600000001000020000000776912ef1769712316cf29780a2c47e79828941a1e3cc9062a83a3bee71e58ff000000000e8000000002000020000000342f52340f77961bfa5f3655457e90a57631f6443b739e0bf9cbffe04db3a98b20000000fa868af75b2e61aceff1b5283398450123cd5a8f2c917b6b5ced7e8166b65b4540000000da8ff740c5d28a16dbaf41f5e48fddb239985b0ea3e4df3732a86c91328eae42ac7874feac30109224daf817933f86af16829ceeacfc0e763552e93dc0f4a5e3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9038b3584cb2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2684 iexplore.exe 2684 iexplore.exe 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE 2564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2564 2684 iexplore.exe 28 PID 2684 wrote to memory of 2564 2684 iexplore.exe 28 PID 2684 wrote to memory of 2564 2684 iexplore.exe 28 PID 2684 wrote to memory of 2564 2684 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\83111ae8c609fc463081ff453c0cc799_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516c72d4251668d98e2adc0b68599e541
SHA1af1bc699c325d725647bb42ed61ebf9ded8308de
SHA25626663eca5dffd67a3bc41e2c1d984c27bae4f240e9ca643322b1f88ee5787cb2
SHA5128888ff044945bf651b620e5f4a194c41941cba97a57d284d698b11b6d9ad78f68ec6f25d29fd8634bdfbff340553575ff53c6adbe31b46d28109188e1ee1fa54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543b9b5c783e930fd6562b77515dfc9dd
SHA1861180076d51a44fa5cde6199a872f45b5d3ff36
SHA25622cc096c0ccdb258b9fa3b7b41aba026970bc03473329220fcafcee524cd026d
SHA512cdab47379ab171c15b4a1ca11b8b0e39e1dde0e51d7a815a7db11fc1f22923e918f53a98e337cce16ae6a991f45fe6650214ee8e1a6a0fb6ed25feb1669f33f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b1c69aade505653f6745e17aec3ab94
SHA11c892cb99ae279b6f21a9444b52816a39bcb5b09
SHA256d0a686dbc855f380095eb534ad04d89e41479a285bed48d9e4e170cba2d24cf6
SHA512635e5924ab918592a44d9cc3c4c23d4e1ec9fffba9839671fe2d96fac0deb2ded582d30be289fe35bdffce9f7eac9d3228ca0f6e28a36b6d6dbdef1d0fa773b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd15209d1363e4430405e404c0724658
SHA113c1af4586665e91075495bfbd3664dd14b1bd97
SHA256bf6d53c680cf30d3f6899f3887f4cb57cf0000dcffa49b80c38b5be2b78a0102
SHA5120f54665bfee6bd301aec39cfa102f9110eb64866baf82265d53b9e78f7e1273da68efb9d826e8221648261d1d93feff86808ae2c2ba2471de22cb646ddcb15d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b5e2307626dfc088e8ab3d693e82e8a
SHA1f88aa35d2186250230cd508104c2d5513210de71
SHA25649c59336bf6e4170a41d7c38bad71f3f441310f6b19c98db6e91c630fc8835ac
SHA512fd3ee3de695f703a83a5723346a420d040afec5d0e56845f67af5c0d6e99e2ff91f0f21836e716dfc1e4b3af252f8b620d3c4bf71d834fa64a68c6c78fb6f620
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541a0e3bed907422c556211918d23da9c
SHA146dbc384e0a30e7c0fdca643175a6218b4457a1d
SHA256e799bd674167c1e61ed6047129be3ae89ee91fb6efb54b64473302b680751abc
SHA512dced64df04dd23d3324d4543ee74520fcfd3508ffefafd2a8895cac3fc37477666dcdafff90d326c4a6b613dad4f47322dc114ed44c558ad83076b0d94fd7a0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6d39d3adbaded158647a21d38eca627
SHA1bc2afa69bcccb5bc42ecfd1ad94056b2aff81309
SHA2569dc3b534382837aa4cf7ed1960562d9e632cfa4e91714c8f1fcaa8f79f59973c
SHA512d496de2d1ef4a943d708b5ed0b0ef75d0737bc9c6e7e5d942f27a5f6bf0ac3feb946a4deb27454cf9e92e1ae2b301b1c50770bbb83d131873cd45863cc251c9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572cdbc54fd5c6bf5a449500617782d3e
SHA1e566eb50a2ef346565d70732bba232abd4ae64f6
SHA256cacaa5c811cd3c1a234a0baeb261555abfe2c267720ccd33efe44613ab7e5ff3
SHA5121b4dea96c22ecb2b575c70a7993d468e05b0764e258f41d0872df0341af66737f8e3c6189cce858099eec2e01c44288627ae8765ca24d86daf76508a20d9787f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c0478bb6ec85768fc9aecd90f9ea78b
SHA1f8b9a4221e3906016d9c1c03f786c354531ea5af
SHA256c8dab90cc7a65d619b0887123e23fda6a6ba6a320094640e6ccb7e81ab5d6e4e
SHA5122dddcf2144dfabbe181f8abdfd3f1582eca6dd281f6edbd20a0ed1eb03b597aa5e0847df2d892bef7441b7577ced502e2f9f6f74db65a9ea49fe0128020c09ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cf0692bf59a86f777140ca2f7c6bfe5
SHA1a63a489896fcaf9aad0c28ba14a5a3d72fb439e3
SHA2563e5f0d70b3fe0beb0de0b122b29030e02a1ff7b9cef9ffa7e9359d8c4bc555e2
SHA512983d811379196122222a8e3920692a3aac14913fa1b7e0f163a74c36622d31d7266ac05726f7eaedaedac568eebd13fe4c67f6dafc94a907969c097637fef6b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a124187e55bbfdaf4db70d0a91c769d
SHA14fb461fd72e111f077be5cf9167383a91b94d76a
SHA256b3d9708bc1fe05e8d6c011c4c45bea82d485e4eb64ed9a432b3db1c930137cd0
SHA512df761af78ab642ce514ad9a18e9b779c14d6468400be7068d6f73ecf401995c8486a8a42352739fbcde0a25b08a2da0d0391424337adac2af1c7ca1ef7ae49ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5bf321502cb6214083623807d5a2a19
SHA1764d9c7aade5ca49f4c0217d1304b86669447225
SHA25605f3ce35b5d8af1ec40f73d9e375884fe2ff096089d1752b8031cc69ba4d534e
SHA51281c2e541bd61de03c0f780a9a61b09f1e4cd3e617bd58f37292532d62d255d8da6c82f1c5ba92f81545500a40662535459e20bdf8d383f0e3e10ae6cecf55018
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559f687db2e7b2e7aebfee470b07e5f52
SHA1353824115bbf266e4246f9e9356fe8bb87bf2160
SHA256d1245fdfb6928fd9e31b2c914795a113141d351c269396792b1c986b18809439
SHA5127f2624e0a1bd54ab9f7b157fc65cfd590273be2c56ce18fccd1c02531cfd9b44250777854bb532292b0607c5c190470d607e1157e51fb3672959df891c7ad77d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55028bee5e0c935dd7d5c5dd6cd56c46e
SHA162366d90c96772370a64ebb5327ffb569b32d59c
SHA256e27cd907030acb41c2d7f69711bbc94891dd9103189f6275b4243e14e4438f55
SHA512a01ee9f2af665281cadaf9d76d6e5d1b5da30d73d50105d1b28578b327e2019ef289412f5248dedd3b14d62f76d82eb3ee67de431b57ff63d9f0aedad93f011c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c137080d5ec8a2cc7c94515f06a8e7e
SHA16bb1897d58c2fbfa501089a8cdb6c159e9b41832
SHA256865761894d8229387a1577feb3a56c09b8b66383c47745b8530ca90eb3fefe7b
SHA51296070dc22f0234e5b95b03292fcc350a2243e33416d917d8d3a6a64bca0881d6655cf81b790f10b0495871ea1cbb5f4bbe53dd59a480cdda535b6d05e429e482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523355e96318257392288166fbee4f719
SHA1c40f1bc2cf0b64b46168dd9555524fa5ac7168f0
SHA256c54f6a1dc6eeaaca8c9e6728b3cb3127e424bca4f9b386dcc5acedacc08af2f0
SHA512dd8f8f2d10268d4a806baedeb1101ef84eb6e0073fb8fcb37f8b11936f896a980a1a0a48fba0b5c95e8a44e1bb5bfa572a9e3a3ff9fe517505605765ce213cfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a43bf57cce832442e7d2f06366561800
SHA144833dc049d077456dde37820de02be80cd2bcb9
SHA2565d59359249b80043e7d760290c1d1c4f02950b42ae02593e89beb11e0983dd9a
SHA512b85fde67153517aa3859d70953bf1572de972127bbeeb824afd0afaa160f243334ffb2851176cfa12130abe736a6a8f264c8c5c70503acae452307fba711cc6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba85e22186ecf322e67adb2f8ad11e72
SHA12478c62010f44d4957d8567e9a5e850acf960eb4
SHA2564758d8a18f7c68ceeaf44c57f2eb1570226694ccc3f54dd5463b77699c63a47b
SHA5126e9a75230a27d61c3f2deac683ba5b9b2f5f1a7a2acd54cd52e7f69364ca5497c4f2e30c64d504fdb03bbbf2c52d5c0ad2248ca71ae8670a6e79a33221fee379
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595fddc84494ba998702da8da5098cea7
SHA19c33a1d6434fe62f30bc6b4eed71df58321d44e1
SHA256caf792b314cd4a31f6dd1091b87912489de4babe5ac2481b8418f981eb4a791b
SHA512f0cf15ff5f5b3bf98126d0c414821b6b794553aad412edbf255325cb131f4826ef4dd8c63d5967e5f3a2d0a68135263a825ac553d604a4f3694ad03cc07f04da
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b