Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:40
Static task
static1
Behavioral task
behavioral1
Sample
084b1a170e6bab70d6f4196282155320_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
084b1a170e6bab70d6f4196282155320_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
084b1a170e6bab70d6f4196282155320_JaffaCakes118.html
-
Size
19KB
-
MD5
084b1a170e6bab70d6f4196282155320
-
SHA1
e4a115f3c020be333295ab75974e39002d3d1e25
-
SHA256
757705aee50299e5281482c357c05842c5c9b3d9d5d86fe8140ecf4e4bf119d7
-
SHA512
451574fcafacd4971e2496fbd36d75334584e67ed33018dc83660dee9c7c2a07e6f41df3aa0a60292eb2b8ced415e2023c3e5aa219635e75619b7eff114ca064
-
SSDEEP
384:QWyJpxgjoDbl6fPAi0Pbe7PBLcBqcYcCcgc1cdcJcncWclcHc4cJcrc3cBcQcj1s:QWyJpxgjoAfoi0Pbe7PtcYcYcCcgc1cR
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{48309A81-805F-11EF-AB1A-5A9C960EEF88} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000b583cadbc19a044631756faf3d618eb7e45b9b755fcecacab825409a6aeb254b000000000e8000000002000020000000e0c998fea7beabfb834e03e5a4953f44153c8ab2f56b4a01c3dd2b32b43609e020000000ec51a7e2b7bfdad6053fe17ea5f7fab5437f43f09e01c09c1d700e5c77ed7fc140000000c1ba533152a26fbec6c14a3a5f36927bf3b742ee6c37cd783e71e7719920185987d220c96f8d2a344c78d5d1b70ab9e67fdbd7fbbd4a692186cb7f89dd590ff7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2090781f6c14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433995086" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000000bb19b662fdd26aedae4cc901af9225eaa93a2a267037e5820bbbab6e9957046000000000e80000000020000200000006105d1913f58cbf9024b59e78feeb94c6e8ef5dde1cfeda5808248edcea123e49000000068e8ced9c62d5e0d27ca0ed02a0b786dbbb2456658444c804d3b7dfa3ddcdf13b3fcabee4cd7181576711fb92f9a6aaabc9311b0fa079c1edfd28aecbe3076d46dc1486513f0a39f4067fe085751d014a166dad740f135abb1119dfa2b81dba3c29886d14d7eb944c40dcad7c7aaca8bef7f2e902628c43284630fdc6aafd76b23ebbe4b5128314c63287f3f8feac84b40000000233cbfe938dd26649f0f2c749e967baee3a5cbbc4f5c845387fd7c9b15e0c0762905e7a104a6913bb6a9084f6575379a5c57db398108a27ff236ad6a3aae5caa iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2848 iexplore.exe 2848 iexplore.exe 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2652 2848 iexplore.exe 31 PID 2848 wrote to memory of 2652 2848 iexplore.exe 31 PID 2848 wrote to memory of 2652 2848 iexplore.exe 31 PID 2848 wrote to memory of 2652 2848 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\084b1a170e6bab70d6f4196282155320_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2848 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5898b02856a15c532b9fb242af143b857
SHA104a02b7ea3149254707fdd69d285a3aac16d4add
SHA256169c3c2ef8bc30ecc4b4340b00068ed84a76d71da1012ad6fb6169c002aec7a7
SHA5121682ac10844885a7479f76f03611c94ff94429eee2c461b14ec70196b4c7e26e64684c98c22d14adcc9c5355fbd448246640b3540a7b77e09d3df07aa22bd34b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597a3718c7664c13d1cc8816b12a97bb5
SHA14b32de871e6565b7786a867c47c7fe41921028dd
SHA2568913e09cb115ffb67a87e80580a16a1b9fc627bbe7a8f888bd68bf1ceb10c697
SHA51277ee88562398c76e512118dc1fb001f66ae7678cca6feff50b7b5f7a6badffa358255df4775ed312018305b629aef8e4eccbc9dc70b1b2a23cb2826f554ea9c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50524da477d794f76fb15953d31d32dc4
SHA189eeda65904bd622e36b6f1e5f5bc46b7e60f0c7
SHA256543602a67762834efb9e491a0bafc3d85125b51856d7cbc6279a12991770af86
SHA51212577284b04fb9e6f4fac894bd5509a38e47e26214004a24e1a6d7d78ae4bae66f1f4ff998c39baaad5c13dbd61573593982307b791c955ff5c1de2c3808820a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b37793dba4c6e2b0c754b4f6b2c27c8
SHA187ac73d36f9675f93691cd0cf48ebd0ed42a6e31
SHA2568483cdb5ca89a5a5d72691b2e4aadf9e9b742a1bf946fd85f244ff4adaaf98e3
SHA512c64bb508fda7e0ca9b6d3e58217ad9aba362a13499c4a066ec8ebc50d4281eb782126da2218d58468041a6907773f8652294ca861d36fd2e349af2955b725aa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594d977273b7b8efddf946633cd311ce6
SHA1b02adc4a5bab2acdbf445f0dd56c425686fafdf3
SHA25640bfd254f0b8b161c55a5d871b302a7df61079369fb6428955d43fc9a4705c53
SHA5123d9fb8d745ec29f689937492d68c0f03714987f1612d18b05e7b64b3ed84abe5b9011131d2ca6f1ab2d06ba38497626ebed5636c903ac3382da82ac9dfec85ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55998f87710ff9eb0cf06c5bd8edde6fd
SHA1b62932839575faeef3b81adbc990cdf1ee40669b
SHA25622d8ffdc67b8206ff33a3cb4aa65298489c4b2dd554c1d9a4cc3de12a5720511
SHA5128ab0cca885f1494546ab00a523c67a5e03267f6fd639fc906bf232b306fbd0a8a5165c136e2842e04e95f64823967e677ec15bb4ab5659d31ba1c89ea908050e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5862d8078216652a2a268714ac51a7b27
SHA151fdfcd8ad07be216c14f6d3060f1efa05f818e2
SHA2566b89297ea69c4f6ba03b514cd883ca523a340db75a062ea979f286b881d3c58e
SHA512b77a19aea40de8a93517cdd701fec101712481506444c88b8a6805139847c689671725b97a07e9103ea8be70e1a96a6a7cf003947f3da006ffaf8c4064966b5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557098b8e9c0664c68a429e7cc32ecb96
SHA138e11e552e6a23f88e88fae2e454fff08c2ab6a7
SHA256ad0240805b02ba780504e51a6032519e24b0f6a8b3d55113bb1529055bee259c
SHA512645372dbc06ff0dd3ef0aa22c54e658a4ad37836d0a9c3165bbf7b386fa835ac1477a37f3807d6d9c593db2968eb75f6aa625e162de01e1282ace346c82b649b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59714aa66d0e62ecefb555a3d451591c6
SHA1e7cccfc0102184852cd3cd935bbbc1ee93c22702
SHA25662f2191e5de812b89a9252cdcb8939f852317dd68657567034e73a0863246622
SHA512799441fa8b67dee834c5898c84998b85874e79fc84e9736b2a63a3aa5a3946a4a163a8048b139355560894b9352f1a770f47204d7617ce7cd1909b6a2b387c20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562898717f0451d2e69affba910a47129
SHA15fd49206cb73608f19879c49b749b15ee268b2be
SHA25697c3e405e05bcb4515ff07a487caba7a9d6533aed13ea8b43d5332b6045ecdb2
SHA51288b50e92ecfc7a3cacc308b9b53a95f9e99bdd7e65857fd909c52ac5dfee8ac038c5375f9d2deba2200a202cc0aaf6c37de77d2449089b48f24b00f016451ff1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5406b369aa2f1624508abf0f6ef78aa41
SHA1837574af20bc09cea9e67789c0ba1cf43503397e
SHA256086d0d5fc38fc7a4f877684090c25fce183536ce57e01ad1db36eed2b01e41cf
SHA512b23100791d4ec8e36432175c7f4166bb038eea3aaccb177648fb155fef1b66c252f04053002549bda6ccff9c0a8475d920a0430e3d8a7f2c7b5737c092e85952
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd3909ad06b5819a58cbd885c653e763
SHA120f054ae04120eb1189902d46094dff86f917561
SHA256da82a4862182335a4c3086450d9c68d153ea344f7d7ee7498648a66576937272
SHA5126c37df83e5074d45d95875fe569e83b0cf966ec7f609c2c46eb420d1e5ec04f03363ed8af015be41f0ec9e18b240a5490a999d7df48f71b2ebfcf1bda237a04b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e53a10520f91cb956096b2abda3ff2df
SHA157bd2b318c2613feb6e0281a6c610fa2323d5513
SHA256ad322528df6c632d6c3f57cd3382df0860c7f09fb318bf472eaf10614b63c2bd
SHA51253b425aea9b8d5fe3edff59c97e1a89600faab7e6d9e485cd9c258ed5480dc5cb1078c77ca4146faa74da3ac4ca101b1208fa2f4e6e65e93c84e33a68f13ef13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5504cd682840323dddd6070e27406d4cf
SHA13bcfaa1089fe4861684310a83a497845d39b2d80
SHA256a49f60969d28d46394e803311e3b66b8e2676a2d2a49cc45e74b245b371ea0de
SHA51218354d256440cd12e9e7eaa0d6c3d8b892ae04b3295f74aefa42396a80e492d227a8d4fc097fcd5ba1dfb695d33fbaa681ec3a82561e352ece9bbb55f2b6f567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536d85eaba01306e08c93bb89452cb1a2
SHA16d904e3a288ce4200720b5b268d7811d4bdfab14
SHA256cdaa34d854af828a2e055b3234014da38c072b6bac437e3659e4b9803329c981
SHA5128946cac010e4e71342d14518f9fc56cd8cff66faaa37e63f727516984971150bdf06f30343ee7d39b1a6f7553380722040d6b34bb0d308e4dfdee9699aacea80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585d3773dc8b8a4b7b67e8e38e3a16bcb
SHA1154abca9239689e2e1148d176686668dd0d934fb
SHA2562e7cd7dde80f32672123355ff759fcc6cd9acf6a157f6d72fe630f498d85b637
SHA512599bb5bbfb07d6aaa58f9afe6d4e4e4d1cbc77a8467f53a226a333f198c1bfd8f4334015cc81baafceb1b0ca66a867f7721c8392717934bade5127e516f473b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b77150af0b53ccff09faf9beacd42510
SHA162a4c4d580b31bcbf2a18186b51695d0f421c354
SHA25631ae7a72391febefa0a98b4d6b36121570469eec9822d1bf1ede9601b60df0a8
SHA512d807bdd40025c2b96db9473437536eaf81286c17b134f5caedaf3d4f755849a076b25db357dbac8e31cafe850d7a24bd741d220996f966e6e2f5c008ccfea6a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500192cd1cda69954e8ad467844dfcf79
SHA1f1185f6509a920d4b3cbd51cb315a531ddc72b49
SHA25614dd8bc14a4b54a917a430badb8c5fadf8661ef78f40b08866f3cca2bb324733
SHA512dab0cf8a736941ac24b050a054438da6b657423d901c2b5d27de0040e6fe05096fa18ade6aff06171d4cb57d3492ce41dc1e221b1ef9db43b89f384f33b6c409
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508afb17399f9210dcb483c3284a695cc
SHA13269539c8f80573989ddbc08cf0f29a4e5b4c5e2
SHA2564db7f025d5413c91ea737759f249023b88fb1d846de853e86cf2fe610f88e189
SHA5124c505810d3e4316cbc8d77ffb5f4211578b87c7467c62b6aa336ff811f0a248f87c3c702dba1bc41ad49ee436ca9c6650399cc3af1098a2ac9ff8c42268ee80f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b