Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
fc0de9d96e5109d1dfa1db3527ffa027_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc0de9d96e5109d1dfa1db3527ffa027_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc0de9d96e5109d1dfa1db3527ffa027_JaffaCakes118.html
-
Size
939B
-
MD5
fc0de9d96e5109d1dfa1db3527ffa027
-
SHA1
640ea66c062a9617e0fb3e2f1e927398325b369b
-
SHA256
48ae760f8f0612a91415846a264abc278dbf62b29d9bed2ff665f1194e43b672
-
SHA512
86ce9cb768b5a724e0c0a6fea1b7049f0b1d4030ca729b653d616f63cb2a2aa38991e3f6a35e59204934c528de34b3bda0c24efd8aff435b464d26f0823ed65b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00f9085a8d11db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000c6330742a2c8a0740f73376b9ec0afd2ac0f88856d6d3cb04e690c579dff93d7000000000e8000000002000020000000b645ee6e34443a107760d4d906c5bc0b02138565e960350c5e9db93e8bf7e22d200000005c6a06f61018e756be507c16528b52a27aed61ff46986a4b99b42b6325eebdac40000000ae97ceed3b272548f0d028c55df05ef2b7824d5908a84f4b665c23092d914a93b395a0267a9fd123c7f16b5d9dbdb60f29ca08acf7661eee65e06539de7f6304 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433679527" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{905D0D71-7D80-11EF-B57C-E61828AB23DD} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000eca2152233533e13ad5e73c23f6b895925b277d84fbe2bda9c9558dcfb63dbb5000000000e8000000002000020000000fb0f80b372837746b9e71780557d196c3e0f4e219ab88bb6eff06fdeb866fa7990000000e5f0257eb3e29441f93dca178c8b623420746e3721b3aaa67875d3c6136a208349289ebe14dbf05dc5e24ab1d44759b1095ade086433418d6121eb2487c8efcbc533b364f4bd27db2a832e1d1b8718bb4f03e7cf5f5785bf14d20d3d4293ee6215b65c9e30db0e45b2d87d7629b21efbd3a6d50d02f079498f6ef03e6179f050cb333810416833a79680f71ac45719f840000000f04dd84e2cd1fda9727b61d94e09be700d7befa1532fe31e56215addbac5672c75c8ed8a435c8b67bb6959f417bb34acadafd237ad72d4f6692e0de30ad08914 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE 3032 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 3032 2368 iexplore.exe 30 PID 2368 wrote to memory of 3032 2368 iexplore.exe 30 PID 2368 wrote to memory of 3032 2368 iexplore.exe 30 PID 2368 wrote to memory of 3032 2368 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc0de9d96e5109d1dfa1db3527ffa027_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e57fa3b988f423113eba2ce5c726596a
SHA154f779affac0dadf339d3e5d970da3bf816f4461
SHA25642ed791784f5012d1d0b80527aef37d59f7124b9502239bcec5929018c845fb2
SHA5129c06d8abb9ffd17336b12e49a5cebe857701281003d8d8c52f13e785286d5bad8f9f91d7ffa841f4c4c46838ea79a0c39cf18c56b65a9c3a031dd460b02e56cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5967445775f85208438b338efe31deb60
SHA1e76c5a1c936805f90ef0a956559bd5431d1e4cf3
SHA256331d8c521196d52d01e852370ba986d2b20b316046b7a76972038b957dc62b1e
SHA51220cb2af102bbd57744289b47cfda6775879dfa143d1e5fc62f3ebb64d66ac0a01d0e812545ca085a44b180bd8a408779c75f013f64b9ed0a0eb1903bae238905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558eff44ff8ae52726eb78cc45c1c068a
SHA12f0e4ebe1dedc889b5e5ef38081e1383078e9164
SHA2564e4b9e3778c13fc4e70c310c5ee1d2c2beaafa6ddc2c29081158747699f13b5b
SHA512b73407fdaa1530b5a965970f6042da8771cfc6f009874b1613c74c5c1eaa9b9060aca6c4a4ff8d648d0bc347eae2d9647b8bcd7fb2478782f35bbdc163e40a54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b6a6f259afab1738bcb7f71189fbe0c
SHA1f32c20afdef6384f50ff2fc301c9b45ae41cb429
SHA256c9d5954957a1e46c1e3b7cb210c783b517050bb5c8d7f0b47aa8745636d75a0c
SHA512035ea12cdb0b9b50e0580a5065d8c1e234008404c12adcbe75a3a689bf035cc9a86bc0d23f609c85aa33a42449f8da8a38ca05fa2db6ff20984e60e91296ec14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5516c1ef8a2e7205ad620f5be375b2035
SHA1bbdea0fe4fb085945aaca35ace6396d8640597b0
SHA2564d5a4d47e20cc2d1df2bdf07c0fe20d1e79aab5f0203c3f9033f5b2765681171
SHA51286d9cba42265575189d39566a1078dbb34ef9ec988b92795e3d9fe1368d86dd324b4c01db3d03fee88d35cc7a1963d2734a119547f5395ae431c81b59ad1e1ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acc61970197715d54aa21e1653f793c6
SHA1ce1ce5f5f39efba8db16521967b99ee41b5df58e
SHA2569d3e454fd0235f7ab91c8612cfc1a0624db9627be2bb90323f47c3147bb2dcf0
SHA512a7f4fff38a7ad4cde6002ac914b7dfbf1d8ad88d5a424bf0c5765cf850a4b8380e8713d098818045bf7b5fa81c2814c91dbbdfafb2766acb6ba44c68d85cfdbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d216e01cbdbf721a7010379c0e12e5fb
SHA10d7838806d1ff431ba909d6ac51953f78f693c57
SHA2565b96bef649738211ee26c91d6817a4bec7edb0e17bc9a8891a925b8ea5bcc145
SHA5121177a938cec255921bf616d970fa01a25e4b0715cd37322a1e109aa663619008e740353ee540fa43a22d5bb2290f66235d8c1a280a77102c988b02e33f28c064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58bc38106471023513392f0e5e75dd905
SHA1304b762ec7858f7bd702268741addf643626e4a2
SHA25645683fb684de7064e9d3274784b8f995c182fa39ee5fe383c0f44a09baf268d8
SHA5129733b5fffbd3eeb3acb1fc0b029fe2cf20c165a4bcf3c2fe06b88d230f23fb415b3713cf068387068bc277ed6ace29fbc5a3769ea91390b598877acc23b9a2c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576623e18685d8e8c504ba4ba0947c160
SHA105d486e2f1a6a69e339af4faab04e97ef3d52de6
SHA2566bccf6812830e96e2180420032fda464d763c02b16bfac5f1ada4f39b83913b3
SHA5121541f7f69dfd8e0d94897bab8f32c594677506a489965ee2c6036ccb4d039ad05e8d7cbf778fc50957171fb29f7b0f5412c9425944013ba529e132a2d2290ad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e7bbcb816f60a8f8a94513b7a399e31
SHA16e74f54f0f1d142855dcd5c96e2b93212acd4917
SHA256ca0bbbfe51b8e315d88b7b8b25f51857227d2fc2b016d2bb6efc03d29e3306e9
SHA5129122ff829253eb537d2dba360ef200b053665acc5d9176692d554d9289f33604e24329398267409a4fd4c89e8e4150e859793387c75326eedac67e63939bbf3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eaf270c0800067a1f76e5dae15017c0
SHA13e20297a5f33e8deddb99e1aad4aa4586999fb93
SHA25634e38d878abc22431fef5fdf0ba9e767162f9fdd82536fa5f734806a3eaa297f
SHA512263ec5b12a9c6a5fc974b5d29895a9a235c0ee4d01e17314b69bd29528378d78008ca952e3250cfd5e3b3b10afebc28ca6ecf4e3722c71d29c988642f4343507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb5c2e493096fa4f6b6464ab9676614d
SHA1695f771149a03bbfc53e6b82ae041107dcc4643d
SHA2565bf0b78fd06e47eeadf2bc9024f5c75f4baa04b2b4f4138e69b0f755a41df5f8
SHA51275d15fc3673873f1cd282e6b94d280873e1dba7905dff1fb944244c31d1bc13163779b7cdb67586f18fc28f1b259a0afe16ff6fa4de2540b6245a1594ff07f4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5181b30df947d5ba3fcd5914100afa14c
SHA19131e1ca0dd5b3f052c4894a95e044e206051b12
SHA256e66b54644eff88a98b71257debf57c2dc10ac35851b4d3a7666b2f628366c8a9
SHA5122b94c5bf057972dafcf6c481531291e75bf00b50153c232a68264ecdd001ffc5986e9e22bccedd80e0f03b73fdc3eccfbe30c9c3c6429eb239300bbf649b6a10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d956599956e231eedd5b38a7ea22c53
SHA167ec64a7e97721cf87cb07c4e07b14a624ddefc9
SHA25647193f4cdde85610d52aa79b07d74e6ba3d729846658ff169cd8b1fba2337832
SHA5122bf30ce267ceee470d7b07f6c382c0beb856be310067b705246f05828dc8255c0d8b393def26dc25f7441e43fd408aafdfa95cef7566e188b669b4a253533d26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545abb94be8eba21cfd9d79c997f2c8ab
SHA1ed8ef1023a5a4f5da987a7609386e91774a7a041
SHA256c46e69646c47dc7abd02d0ceb389f1eb16ced531358d31cf4a6c63b54b57563d
SHA512bd2a7ebbf7eefa50a3e1b83f71b92f43615f411f17fa9bacfc4fd04a617735f2847c4b75ec678c175f477b6316200c33e993d5f5811d88aacea8ded9de42ae89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c78fbf9c49be5fd17d96573d470c6db
SHA1da1f72c36e300dc1cd6c470fa72861cd9cf42be7
SHA25640dc5a333cc158572c719348b9403770b6675317d34c73fd2a47cbe172e74dee
SHA512e33f56825cb6c66044e763313936be721d4a84ef9876dcb51a401b007198667cedcd4883ed251586dd1133df29caeed9360d26a7efa9080d412283c0fa3194a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8ba7386fb1e1c9ddbf68d6c25b83d0f
SHA145b0e4ede8435ee9721dbda58c10a78d4dde2b5f
SHA25616257a9d8666ee62f444cdc9c779b6584679b69de051ac1ccb37bfcf6a94565a
SHA512f1a286f4855d6c5e41a8233226016a229cb8bab2350a338b80c9bc806116c966f5bc2157a7a59e0430d6ec2b87e080ebdf5a0c329fa171225a5707bde421d740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD573b7fdd40b4e495f41516df8143a82e8
SHA19ac163b0fc85a61f0d9442533416f7b8e8b77636
SHA256185331b8a79a7909fea6ea555423c47cfe243988741aea0c14035f53b58ea525
SHA512a2d89980cc5afadf796b713f5d1c731aa70f4671aefe1d5bef76b1cd72f2c21ee6ea2d0be901bf230e015d51e207f13904d70ec59d32779af41f4835a433cb1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a4f765a27059e696ef2dc97e0f63b189
SHA1a6b7025e7f7eeb0176950555bdb55836d1c96f96
SHA25675089647f0a0bff5f9f5d4d54cf2c9df100ce0d33f3e9324aa9f9c7878c70eb2
SHA51222e314f2c80b203a0def2ea45d0573a3ef6ffbed4feba2441061ecac7464f88869e7d3250a800b9049b184a094ea1c676e30bcd297f292d71ae0b06e3ca07362
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b