Analysis
-
max time kernel
137s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 08:12
Static task
static1
Behavioral task
behavioral1
Sample
89d7936ea6e2689631fafd2d36a1de6e_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
89d7936ea6e2689631fafd2d36a1de6e_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
89d7936ea6e2689631fafd2d36a1de6e_JaffaCakes118.html
-
Size
70KB
-
MD5
89d7936ea6e2689631fafd2d36a1de6e
-
SHA1
c92591fcc261d97b808253a70d1414aac114a7c1
-
SHA256
99402bf40ba23ab20f3ce93a0b21c19ccf47601de03d405c6c2253a287e7769a
-
SHA512
f202fd67adf75303042aa04cb263f704735150db0c1032b7661f58e9584b29b15d4d7b024edc1a23ba9cc18b25a57a302ee0a254dc17231f83b0e6a64ce395e9
-
SSDEEP
768:Ji8gcMiR3sI2PDDnX0g6sj64eqFSoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:JYvbTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B6549A11-1FEE-11EF-9A0E-5A3343F4B92A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7013fc8afbb3da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423391426" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000cdcbaf52395cbcbee7fced8794c3fa86522fb03fcd1d9199851ca2df66a2bad3000000000e80000000020000200000000f61db5ff0fecac3cde341a8fb38a283cbcb420a2d01c4b05bc59bf713e14053200000002ff0fc1eb653d59b391f81941bb61fcb7cc61a2ac86d2bea88c5f86e1d28e0494000000023cca654e08391c1b7206dd71a9e428d9ddd6e15f6fedc0b3156fab087e9c56afe7f2db621668be3e12a8ffd778d4e8c607b924124813884f2b1d7a159ef4c17 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3000 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3000 iexplore.exe 3000 iexplore.exe 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE 2144 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2144 3000 iexplore.exe 28 PID 3000 wrote to memory of 2144 3000 iexplore.exe 28 PID 3000 wrote to memory of 2144 3000 iexplore.exe 28 PID 3000 wrote to memory of 2144 3000 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\89d7936ea6e2689631fafd2d36a1de6e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3000 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3f84dcde9430b76a2bb2135bd9d1264
SHA14cbe174d2a5dd8b33853dde9e66170550982f172
SHA256c9ec9703990fcf98b8388ec005ece8d8fe2e4b735a2f65cdbb57d63983b9ecdd
SHA512218b5e8bfdb1f0f1f339650afaef3e57881d9654bf19f706c665fa9781ddc3f800f41c5982e6c5de1c58ff457fa2f94ee7a8788d88f23f2b0eebd577d78fd487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e7cb3f254f74f2ed569a1ad32bc7c4f
SHA1d09503796bd4ef2183cfcbd0961e99933e24f2ef
SHA256ded849cd31810cc8624ee3a7710235b38eca0ec428a24efa54ce6369647f75a6
SHA512f15ce165f413e2e4cdc0d0ddfb6465448629ec3d9ae543fec48a803d1e533fa6dd02ee8f66cdd8337650ed4c6b81bd38fbaea6c042d6bb02eaa1ecbf620c4918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbf0168e9f61a4deff7257c07e7c5ad2
SHA12c08c257ef4b98017b73b71b16657263a9364c1f
SHA2561ecc09f5a79642022055304afbed2a11635dc698def0b60789b9f8e27064cacc
SHA51258cb17c2ff9ae6afb1ba40be51ad5e290566c2d1a010d7f2445726e5b08b22c83d8e663d70c79a2d558fa1f05fd1f8dce8d70b2a3171faf5c2ab57c29c0de631
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d14cd9c72dd81549b87d7c569a7433f
SHA166d6a94ecb96bbe2d31fc9dea0fb05c615526465
SHA25610631561013edbcbc17265d70dbf766054d317bbd93a9ae13e4953ff7c3cb211
SHA51203e4c4c85ee69690e281680b3ed34f49d25c12ed788d100f23cae38a1ad1a06ef8ab07bfdc3ffee013456532b8350590ab4837163410f82fcd16b257527de5f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdf6b3d6791be897a0e9edd4554a7519
SHA179cf7527a088d230f4f3bf2e0dd16dbe14ce79b3
SHA25691a6e7b51bfb6ff263d433975762832816b6556ffb7789b5fe429c382dd5e562
SHA512dfbf0948a8fa9d6075734dbf91414ee38169e8e77e46d194dba78a89c1966ca8ee74bbdb113f4300f94603a34c2c5a4eb52c77dce3a669a54c1d364ed5fce38d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff90f8a4e6eed3624225adb8a270448a
SHA1ab7a19b47a48c4e03e648f11a24fce6acb7c7dcf
SHA25654d4c9e803a82fb1b1f0b9a5fed68c13d830539b6acab0155e10c2214dc39bf7
SHA5125e5e4f8359498b7f2f19c080c502e20d458eac355433b29c036ed729fa7afda8a7f6b6d864774fc61ba23fdf3830b8a0da86181beb112b1cfb44b5ac96695c16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7f489b801b3710b745982656f7bc356
SHA11e168577098eeaf57a62fd381150e745d118dd75
SHA25606da41c46ee9f5b385425dfe36a11b2cbb49eeb170e2883c2c4bcc16157c2d7e
SHA5126fc682cbb1a4d94be98c3a11b8cab85c39d7ec4f6a63b1581c3e5dd1a14806927d190e9c49f3a8cd1b141a475f34ab4851fee3d232a7faa7c3b4ffeefcfb9392
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b23867bb2828f6dacb4e1a61f2113ad3
SHA14d1c41011872ce7e2f0f7453f06a47eb50040bf9
SHA256a2e23062eaa1953556ec90a2be0035bb57ca3498316419aae1043ae27bf06dcc
SHA5123635d6517fee25f378d192747f92fac2cdaef004b1317f7ac615fdbcd06acdf84cdebcd482cb0ebab1489bd9e28b58725b55a079efcb55223fed6daa72bb6bdb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587cbe24f55480beee47cd0c5452ade08
SHA1298f2425adc4557a5a5c95d1af5295962549febf
SHA2563af295ebfa94d84d6c113d9e12e72d7ac67c50ddf8fe25cf2669e7cff1e7ea3a
SHA512f383d91f7eb40898ffb0488953bbbd3989272f8e301775a30a368d914b87e4264f708b18e4d340281fdf0c485ca45aa0d6deabe7c85065ca608fc2c5c0cd01d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6912dc88dce39b438dd8caa92d0d972
SHA13c422f6c74c4e5071fdc8d6babcd27271b268c8a
SHA2567dba469ed7306705d217e498b4cb05db7e27a3af487f841a9385b7bf25b9a015
SHA512c04da96a673f48acfa81be43ab3a8e01d5b2d19163c10b6f30f23cc3d921ba5f002415c28d44f7b711bf2738f7f1e5e0e292ba07b917f1b96c7f16d7cd45017e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594269bbd73c232a83a266a29cd9cd11d
SHA125b06d34d435285531afbe17ada040c02e98b2ac
SHA256eef7b36fbdc8e78eafcc5822545f3cf7bc6db6578af6cdfa6d6acbac90988562
SHA512163ea8f13cea269611d2e1d66a608114f893fb0c925262f4d81786508a21ebbe6fb07fcddb2c4e094b03c8d7850982bee365c59d9a51f076c1e41fd3789f09d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51053e1a90a61faaa979f81be0a2d4537
SHA1e50c10370dbd563e342a29116945d973157c6d4e
SHA2565d48d369ffd2ac9b0ef9a5efdc78be580d1477660a847c2490137dc8fb6cd32b
SHA512d20c4dfe363380ed4f8ba3097a35562c327781cb7cc0627b1774d6f12288147fc4ae9c6f3aad462c4737b873446bf4cbaa7d7e9a1f751c63f21d1ec1c0593d97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1a5d97c9e9ebbe411746fed00cb57f3
SHA1baefc78549de9d904039b8314435d96dd2bc7ddc
SHA256d68ebc5b4f98a53978288c873525176f4d4d21f5f65cbc424045a11d824b67d4
SHA5121748a6e67455ef505faecc2f1227bec7a30e9f71a0088a9ad046f592b678ab747c8d1dcf23a64a8b53822442b735a02d48360895de045714b3d29161ec29b540
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e85b7c7f7f252f5d59239c27385e3933
SHA1cde4d9e82df732c057e24e9510d6f0b515ff8a8d
SHA256260eceab420c098203912cdfe76b9236d360c31e129e9418a8a5e0482486e789
SHA51296ed4404bcbd4632e58c0956fb6a18cc1c87c40a2555b166c045924c6dd5851150f9c0d587389205f5272fccd7f49870ccf7684f6359f243968775184e427da3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57cedce687e18702928ef9c35c5886216
SHA198158e8f87d7f18404f30494c257883ce3a87e84
SHA2563b74766cfba31e72519fcc51a05850c79e3541b1f2c168a3da43d0290799ae81
SHA512cf3aafc79bfcd7cfca5314de708fb74c579d52b217d9cd86b5627b5dff0cd8c3a037b2197896649b77b15574da329a4e10fe55bacdecccea807c54ac2c791802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5311d8d53cbade0ed701447ff68e8978a
SHA1a9db301fdd33008c61a56a1340ad6cb70dc67a23
SHA256b4e63029ec6d6692560e3d86c271614e4d2f79630da7e9dab32b93053b6a0d95
SHA5121afb234a18f5471480abad5743dbce78a67a3b64609d0e8d9fb409e8b64e391ddc029d79df09f3dfd457408849e67b371db96a50a10203a1ad4516d6c2f35e87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4100c2ea0af8d8f56ed699853ef12bd
SHA1a3b0ef2824de5fcdea5778196484f268f4a758a1
SHA25647e289eed150a8305bc97c5478260192c165ca15f9a07e818cef8671c68b11c2
SHA5120879b62eb13e2ead7f4200ed87707d042f6549a4a614b67c3236ea61c621ca4d5658afb94d97a2999d1fc79b6e8ae75561609b6243836422ce286742bc7d3264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5914422abd5c03df45356831f39f23ba9
SHA1e35fd0d155974c9fc2a77e5f8335cc62d020e9de
SHA2569383f13bde4708733f9d02bec10fc0ef7e948f37243f974839b9efb28f0d9f8d
SHA51206113702e67685ae04bc09254436b4d3ab82430437dd9c0e8c97a1e698e5d847e130b69449efa31e86b17db7ef59bca1cb31eec94d864318bb64f2483ee7c248
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6b1b1d85c5303eac986f04a1fdd07bd
SHA172a19410883e8c9324b983bb114ed268719fef65
SHA256d952a372190171edca472479a5418d19aecd85be3ce077428385f6d5e323bca3
SHA512e19c802b08884c9567fb51906609876321ea44a7ccbedeb5820898535c81174a2581edf4870e8ca57ca22039bc3e69030e151778ab7dbfcd23227d15d4a1df73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590d75404e11c27b9c779f5ff256469b5
SHA160ae4b7590b8965398cba1c89569a3c0734eb61a
SHA256c4e6ffab909aaec5502048507731d924a0165d4b8364a76ff0a243f50f230152
SHA512242acc11527c51f511339a280715677ae2874073ed0af944bb80392bca46a9551cd26c5d3a2a7c143a62df50dd439dceedf6984c8ca459f971f1cd47b08c9ae5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b