Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 06:38
Static task
static1
Behavioral task
behavioral1
Sample
fbb5ded0fd32fa9bec504a727eea4d53_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbb5ded0fd32fa9bec504a727eea4d53_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fbb5ded0fd32fa9bec504a727eea4d53_JaffaCakes118.html
-
Size
145B
-
MD5
fbb5ded0fd32fa9bec504a727eea4d53
-
SHA1
62265210ad0af4c2f43311260a52b7d5e586eedc
-
SHA256
c6bdc53fef75e14c754bca3eb6cb19837f846156dd676cef6a8ea4ac2acd9e08
-
SHA512
6fbab769805a602cf2e047db3e0afb4d3d91529eda2bfa43d84fb5678b0c5d6f63475a98153711f30bcee292a5b5f74f73832fb1b8ea5e96f189f0817a5c1dc5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433667408" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000ca39fb61b556c8d3131cb0994ac6139bffd1efd91053de25c2f782ddd9637920000000000e800000000200002000000016898425e7b880f5424c50623821a05bb40a47d1f1cff650827afc70d146db2020000000ac0bc64f0def9a6dad39ed716fba8750db3d45cccb0629e41bb2bc2d4be81410400000008b983af3dc722b3f68c8464b19223aaee0fb127f7ce99d084107a864c82760729f91970282b7b50a5b34761d76263063650c2b60f2d3723e4c71e7dc2a82f149 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90f14b2d7111db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{58E06021-7D64-11EF-9FB8-523A95B0E536} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000dfc1a758e2a9f2d7456a95639a8c95eb4f7dd8da65079c0681f2e9cf535b755b000000000e800000000200002000000085ae38ebebf9af873b70190e6ae296c8f09300100db0ca23f9e5fdc258463e0890000000f33d521bb2a06e11cc7d54dfefee1e593dade17fc6bf090ac69627efa0e615a4f3c8d7469fc3d6aa19166bee406e4e818a2465441f87714d50c50332de8e075eb06dd7cc7e29684eb3ce38d51568dcc1fd5a12c862dbb7e0b632d8731bba6389c4b08b0f7d7ba67df9d99cc533f274653e2e7bf8a5f00877e8d056c5a1da9b9c0d591f36826748b32db37eba03e531e54000000090c0cf56f196d394786199b6b78f5f9061c592eb41de6b373eab6ec67db9f07bf44973f6795773e8f82a567acc04d720ac83bc0e373fe2806eb8418b9e8a8440 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2128 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2128 iexplore.exe 2128 iexplore.exe 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE 2408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2408 2128 iexplore.exe 31 PID 2128 wrote to memory of 2408 2128 iexplore.exe 31 PID 2128 wrote to memory of 2408 2128 iexplore.exe 31 PID 2128 wrote to memory of 2408 2128 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fbb5ded0fd32fa9bec504a727eea4d53_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2128 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e0da2c6542e0858a7ce0f7ee36bc434
SHA1db43010ee50217c3cf8b9f03d7d0646262a668b7
SHA2566014f1a6c526524eba236549d5cf2da15c44bd71e8a24be02296733022eb388e
SHA512749a9144179fd6c7c3bce7b4eb679cec2e612c04244c5bb0201ef8057f7184b9059bcf7117053519cf35b7ee705ecf6264c1ba59c6e3efc4e14b7a7fbf38cdf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf8b231d8fad3ad355047662a30088a8
SHA1b61b86d145df7db6efe7990cb70c20b28beb35b4
SHA2567c9bc30c5d62e1705ec257d0426cdb4c07e76b07f116dcb5ff6e422338e67198
SHA5129402b57349f295ffdc690a6c82b9d4af43658da78018c5cb5d3a138b316b5000d28c710be8ff2e14556d24988217734e710511be789048760d270338133a6a96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc144560827b890ed6e0409cd5ee7dc1
SHA17b4b262fc6df6155a5d7ee7b9b617577794c8064
SHA256c6dddcbcb8fc2d7cf7e6103c2d198a7c4a031ead973bc95015fa95cbd4647f63
SHA51289336c9bb9bfc1f922135d5a97efc7a48bd5fd2b47ebda7ccfa2c43352c71c6fd615dec893ec44ae3d4dd26ed0cab104f1e7a825dbe9845e0091fdb27dc6b83a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52632dc96c112ce92eb1b6b561e0fc3ba
SHA141289e83ec57d94106916827026e5242a020a17e
SHA25685bab39ede16c4194ee2d77e393ad7fee7fd944944d50f8019b55aa390230f2f
SHA5121472f3fed51398cd6cbfd749dacc16697e78b74091c88333c41c76d280f7855a6012dfefb9588400fa5cb22845be47b15a799293cabcf48c727dd407cfc89aa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54103f396f0bad4ecb200bda860271d81
SHA194fc5f4908352b6a411d7fd086a3ecb1e31d6328
SHA256bd26834abc50f86edcdb99aeffe6a60ecf722781898943459691f9c3ac130cfd
SHA512c9a667abe31eecf03a09299b0b61f23fc03daff328cfde15ab6af9334ed9e622db167f6bef81db0dbabc7392670fb465686885ef880e6ac751a1934c1b45f867
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b100b3b3d23e0f19da2bcb8229709c95
SHA1a0924c7b8604e6ec9f0e67efc34a85290ae3a2ba
SHA256a2f96058b7259d0c6218f3392637f276389f186038c760f78f1e3fde90494ec4
SHA512ffb47f91e51adc27246a62a3eae4569d6739bb06fbc35ae4bd5ccc6ecbb05859e69190df7a92a0c943caaf678816a39304c2fa93bb78b419237295f9e1b7e272
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c309292e92404a2a7310ffda2191a12f
SHA192c855c363e8ec5ccacf7ffb6e64f0e13c1210ff
SHA2562ee6621705e35a5da83fd7a36277d7bc23aec1c8800c4dc92719f41f78b311fc
SHA5120aa12dd120ec264569165c493c1d290d65c49195e0494894e25601d079f306ece391dbde0c71deacc4b125332b00c98d8110a669c40c72a673a03e03633ab1c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a74bb1248512dde70b29ebd90aaa1bb
SHA1e7e9398cf844e5b120d9027cb9e6cd5e0a741779
SHA256cf03afe9bcffc7f6bb5b2a6e180c859f73d590ecbf53a3f776c6ca61948306bc
SHA51255871c72923dcb8c07690d6a04caec3b5966f05ca6797b8b678ba54591c7d9073ebb6645d501db4237aaee60fd0beda29c8368588e70048f14455ee662d02e35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5edee71d64f07f24c1986cb7da0891c94
SHA1f99a81d0d2c3d9e0f1dfc715e926684deb948a7d
SHA256dfb9438b916c252114ce5d6c56fcc1ed2ca1dd12b43784a47a2935b03102c10e
SHA512e7c931763682c5c37c3f41d4bc18faafd7cc65b0485bb785f9b946666089d7c710934fb18d1bd55f70e4d8a5e644064fb01ecd5ac2eea267b527982fcf200d68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5098cafd0e2ff3c50f8902b066ee8b688
SHA1ccc68d00098fdff1e1064de9f291bbb3b022ae94
SHA2566f2718c98fd62e844cf4da8b25892468bc82790c91bab4962ccb3120d0e16225
SHA512dc893da70fe00fe67a322229937e3ab97640527a0f1c3f869ce07e99f4063b58f97afbdc4a95ac7a87d1c04d10b40846685dd070e1c4520ebfd049087c5ea7f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b362cea8dc60e62851bda4b87a3d7a0
SHA1a34421f80c8295c9e61c7fe3500bf8077f6a1b4c
SHA25677a3cc6eb9e402583e2988b93ca5919189afd8e4b1bfda20c624541506c9e531
SHA512cc83d881f44a5ab206060a8977a5b8d3dc2ac11a8982023abe8bce851f3aaf7b3477877a16d35df6acafaf313fce24674bb0435ceac11c6492829bb4357ca4b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5283197cc4ecedc5c17aa0cec62551035
SHA1cdfc2857dffb7ad6a120e10f4e9b2b0e20f0f2c2
SHA2564c1de37db45fba35e6ba349037d89511af829b552f99d0c7cff09b36fa936776
SHA5126307888ed5900b2ab2ffb6a4c161e9dcd417b03aef0beafa8000f10d1d2225ac2577cadc0290174ca2b676880ca147d85f73ad78d2e9c4e01e952bb8a9b81c76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da58f2931e5ec7cf1ed3e202c615cabb
SHA10c0e1fb6c2650ca14eb2cbf40ea08d672bc474fd
SHA256c86b4a348c80c384e0645286a65e40b0a3431291c2a4819e1cc9eafe58b1edf0
SHA512496838a192f48792a3e477f7a92c5a86cbd0f2c8394635373ea4233e37edbd3cd3583a9e7d099a333991c76a9b1d0e710d5c08e396851628a66ab55c5742df93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd8e44074be3f5d542034f602d25bd01
SHA144ca82ac7241d98984ebbe24a3b070eb12e43519
SHA256aabaa19a300781eafdf9dcd6ff8c730a48d6fe813bd07b10324f3ce30d208caa
SHA51268f96ce9b9ca7411ea2b4ff622b41c329ca0943012af2527961f7f0370540f502466188a957ae48c7e1eaf795c00264246d40c094179125902cd06c41164ad97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b63387d8e91a9b586ace8265f4856d29
SHA1ea12fbba18770bfe17868766baae65e8f30b6525
SHA256c1403bd378908cae690cac4d187a89a2c8caca1edd8d2de2e14d434c7ad2c3f5
SHA512708762dc99b2864cd85961b21640c953882d9053072a16b223d1c3cfa2a44491027a4cd3674bb6fbb5c2a44acff58ed3a44e96eafe3e7d071ed2da613ccf30c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5878d4e261bfcd9730aa395dcd0053f20
SHA1b70c15d799494ed50f39ab0c2a121c612e5f3a6e
SHA256f14ddf915426ada84f159b9b66fd0fbe8749efdabc9c8617084f80bf6f494c4a
SHA5125e0fc1d668d6ce92287eb524d8dbcfe2bf94a91a7ff64112a4a1a6c2eadf757dd54108d244aeef2f6b339b2a7516f2616bc10f2769aa0f409ed7d1a61751c2af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5514ecf17f92584af83982fb9171a3fe8
SHA12225553a19b9a9056841dfb169e305fc408d7fea
SHA256bd5e6079533fc7f8362e2dd520f5cace2d0e81e6e0bbbb4e7bdb529e2ece37ca
SHA512e3fd190fdbcaad1e2d058a621b562cc4299d8650e0a22b9f403798617fa28fe65af71fe312915f1d01916786cac166a51c108c0aefc7b37ad175ec8d66238519
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e79dee8c97d3dd7280a536ae1fcacf0
SHA1f8c9d0e544d7aeb8cb8619fc87ae2210ecb8f087
SHA25646144a27e1b8daf602ae4ce50e27d97d50f762cdb827b926314846c66eeae6ed
SHA512a10f8c6bbac4e396879cc2a8d4b7b9aae0d6d0e22696a82a3e7544105aa7889192baa0162f3d952dbc98248614ce48d0d94c31b4a38e873574def5ef31efa4b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b17d2def00715d3734405acf42240d1e
SHA1ec3e394e59e4bd1b838d9f2bc0c40c0c2f240204
SHA256dc55e307063d5d73b3e0e06ffcb939c7d2a1e321456cc08f78e6112218b2bd13
SHA5126366aba0f2e63c75e4595b1540b0bffbbf65863136b4814e4686c933688378c961e684f229415619506206422e0b2025fc771833521ac7a53975dbe0be55ece7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b