Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
87087bd496eb374aa31f3dfd4d6d7de1_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
87087bd496eb374aa31f3dfd4d6d7de1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
87087bd496eb374aa31f3dfd4d6d7de1_JaffaCakes118.html
-
Size
71KB
-
MD5
87087bd496eb374aa31f3dfd4d6d7de1
-
SHA1
cb62362da82871bf083b73fca602e7949c49104e
-
SHA256
b4d9ae91ca5061b1b0e715a187b72259e281b28f62d0b5062d71d47994aabcba
-
SHA512
b78c4eaa1bce422d93b2d3fc70b2b309c42076ecf3570e34357e7507439bf6e2ab64c13156538b21e4e9a1f17b57a05d27d932efce5fe3670c13b203b40e78b7
-
SSDEEP
1536:qZyPAFBWnhpjJOXOrShEdqFKJfggjt2eVUDDkw354YLNwqNa:qZEAinhpjJbIEdqafggK354YLNwqNa
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000f586571ccc364c48ad806d5b1c610d52154b458074cc4b1adbb868c13a50f947000000000e8000000002000020000000b7790d6e6a56c7cb3058e34de5a9a0db39d9b895057e0f8cfe3d31d16c9b4013200000003f46dd67459306e1790d148798531d5d41d33ffedf53284aa66595c2a196e703400000005b0544b2cca91212283ce06e75e1ac1ef965f9b89478f0281073c0e838e36bbdb4df5fda5dcc6e97b8021bfbfe30e54ca2f173a35da62cd64dce410308c92b64 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 6075dc2e4debda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "429473797" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{55532AE1-5740-11EF-9438-E643F72B7232} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1384 iexplore.exe 1384 iexplore.exe 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1384 wrote to memory of 2132 1384 iexplore.exe 31 PID 1384 wrote to memory of 2132 1384 iexplore.exe 31 PID 1384 wrote to memory of 2132 1384 iexplore.exe 31 PID 1384 wrote to memory of 2132 1384 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\87087bd496eb374aa31f3dfd4d6d7de1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1384 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD52ca576554feaeed4b994a84f2baf0c06
SHA1a63bf3c4294d3576ddc457b8e3cf34f3ef4ce498
SHA25624d6fef00b24879ce60679fa09a35cf32116b03ef432a92094ad2490f1942dbd
SHA512357a790b4fac3b49af75f264fc9330012910cbf3a6a531e11bdacb00c8757243faa25c1c578d91e0907b406e30f456c444ecc76fb805e8e33df08f93571872e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C02877841121CC45139CB51404116B25_9CE832D646FBAFC5C4ACFC523FDD84AD
Filesize471B
MD57bc357803534b61ff31a2e4f7ac0b640
SHA1976adf6b3ba0274fe5ddc9666bbd5c4f53be87b3
SHA2563c0a2e9b808949c7de0b8fc2a45a3c4f8f16b3bb739870e3e0f3e5ecf465f0ce
SHA51200f39f54d3c2e793995fed3538b470362f02ac022480336e4bbd6cbd60e2ee0c2e57e847b92ca198bb609e8fac479869e94e2a86049d6853632d69dd99f3256d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525845bc56ecf0c4ea46214a77b1d371d
SHA17817903aae0ad5b9912ecfa77a4d67e24ee05ae9
SHA256e4aec96e5d0be16398f83d799b5cf775852226a7da10df9185bbeaaced193295
SHA512ee06187b2e552e00ab09097274b59dd07ff685ae8a0587545fa0838c2fda3163fd98115972dbd39addb62d37e5f514d404411ffd237ed07a1992ddc7ce578097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569089e1b490b6f78201c11f06138d417
SHA1ba83df45ecb1bbb6197fb0c4b19b831d9d2f20bb
SHA256fc60fd56b189e00097fb89b02de5d4a0229d72b1f0fda80fc3965b115f974b9e
SHA5125ea3ec059ab448ea38a32ef3136949f3fd0de0fc5ce4852d883f524314153d2cb71984c4e44dad7bb1a2f78614155d0a52b422a683031eb50423001948375b1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5319465b59db7b6d6b2614b83961405bc
SHA1bbae7e5cc0ff66f08c01c8064d6c94113aba412a
SHA256eb2715331b3f13265b1ff164dc4c7471129f65b9b396ce97dfde3a333a933f67
SHA51256d6ad093932ca8b296b2c763899f493011cf2503d3552aec547101b473da4d8de5d4e31b4db8dec0f8d438598a52bf3b82c2ef825f4bf45b6390f00885a2264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2f41f62d4600e2ea487b39b687c0354
SHA1b28e6b8c6b0c90e0984b393143224bf6755b788c
SHA256179a85601391f456ac2ff06f2eca4976a990db785fc98b4640253f91ded5efaa
SHA5124b3afadf6b82b7dccfda8eb599fb645a7aadeace2fe9b383f220fbd8ec661a2689cfade70d33f04e898a9f643a6539143361770213e97f82853532ede7962dce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54df91855100894b0033ed836e5598252
SHA1a891cb0c65889e9c76bdf0d1dac0c1116989aab9
SHA2563b03d8ecd1754d69888141799401a1f0f0c529f96605d40116b1da06f7532403
SHA512e59ea6f68e87f6536658b1e0c39afe925bd9bc19ae873c498cc2c9b07000b65607f2b90432ca4b874f0f64677dd79bfb1c368e9e00f553236265cde25e61a3be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b565ba876552c1433a3e04493b438421
SHA117f436f8bca90e032f4cc934227d8ff10e1b4bc2
SHA25605a8f3a592317a8a5bff2697d68dae3d91693931b7a2a1796542c3d77edcc4a9
SHA5126a90612682b6edcbf43bbfe12cd86e71c71f138a4f7eb9621a9219d4ddb5597bbe723317768cbe86fb0c64d4dcbdc23c323bf1d028e283d3a08c9107d87b713d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50c2bc5c57bcea62265d7a3ddbdf0163c
SHA17f6cc77b330f0d17c32fc83bfa066af735e9b942
SHA256924da976b567d3cdf4fa4a1b7ee9c962e461a9eb7086197e55de6194954d716f
SHA51215388ec7f017918791089a0484570be9f775512ec073b2fc167f2e56f9bcdcdd62ff053edbca8fed93cba952ed51a2198bcb76eb63f9d847432fb01ca5e50f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55f26bf83621f676ffcb3eb5aa1d27107
SHA1faffd1cc55f5f3065b505efd60a2b22e2c1f2485
SHA256b735c046f9e62b467fcffd8a3420e06e475082a3850c48d8424b261d1688dc44
SHA5127c5809a08b77874d4bf33d5b50025ffc227d5588fd31aadca4c84fc81546d609c356b561715bef6545e156c311496ef07d96109a896291216a577b05a8e3e5b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54faf9325ebb060ffdc4c85e530522b29
SHA1811169794b881bbd82913c8a25bb53cdeca99ad7
SHA256a6744ec5adfd2c53f773320330bbfeda639258b4e1913ff56c45e3b10ad8a29a
SHA5124d49acc14249fa7a2364b7c3ba8d5ab6e2ec911da415ac7e1189b66ab356c66e730527d9639b09846c90771d8be89244f2ccccd85b96eecbf444dac8f8b00fc9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa6be06fa729e6e5e43f37f5b9e7e636
SHA12d4f093402e1c96a1b42a6d037c1f95b9105aca3
SHA256d87e911c537350e024ea982d8b0f423bd9beefe5213325033febc624df115937
SHA512c003c015f3bd2d9598c1dc1181fc3650b6a244ca41d875f305f05a5e025065e71923d74d5d449018bdb4f515b42f1d7420028946d6d0008b28b8c25ecb539b72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b55d8c0eba175061cd227ae8d03c72f
SHA136d86619ccfdc1e7ca5be360919e94dce605f1e0
SHA256b7c322afaaa34366ca409869870372877a0afcd52642866aa11f3a83c6042702
SHA512842f61345bdb3535f393dbd2a81ab588ea30a097db0c556f56cdd55c2200c9e1f7cd9f7242649ffdb2dc58881bb6170f7aee9c0e457524abfe47da98fcee838b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a013289b66a96849fafa8ac66d97845
SHA1380d59e5c4b625373361941efffd36a578162e80
SHA25613b6a5363edca94a7f9fda548b6742de846ebb44f602382b0984c73569908311
SHA512ad80ffca465b10d98c028d6351e2ff38fedf2561742e1eccfe2255fe5e8d5a8c1d947572b635365585b99a442f21befced9216541bf54c66a54dc1558035fbc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554a6200cf6f85504944e4fe7c4267860
SHA1ff6e794200c3a7479f1cd8951d4e155de6ad5853
SHA256f4518ca4da33816df6899d83e73bdfb0f585d52e1e73f8493b0ce7616927aac6
SHA512f060df89640c1ba3b6ec86e9114b93c0c2b527e2323bbbc502c1da1b246383c8c7e820770b82dcda9307202091dd998917cb9a2e91ba63f3fe5d933053cce0cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551d7c82f7ab5a08dd649aea3c7eaedfb
SHA1907d9682d1fb90e408894c2a68ab144da25444ce
SHA2568ab8db190d27bdc3e76cba0ed2386242c22ea8b4c5712853ab83bd9b1ac94caf
SHA512da82218e10b321d6460c2d2231780f424c9514e511329ed425feb88f4b7a9691ce2d72297fb28c5b12b426b69529fb5b4e0c90013ef32a39ab40d67738c3d1e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8469fc76a19d2db8ea6d6e8fc2768fb
SHA190580ae0e69c16317a0e8f85a1cf2918ee43dd28
SHA256277c9bd786691d76290e3d35c29160d7097bdd61fabf468e64d5fe5b026cfff8
SHA51279a21f3ca3ab29765513f20878167b94122be419af891a10f8adf92bdfda86a591ccdd7eeec9d305c60fba893478771207bc4fa525479fba8cafb9d9301328b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C02877841121CC45139CB51404116B25_9CE832D646FBAFC5C4ACFC523FDD84AD
Filesize402B
MD5a7dec022c8794116f0ffa3b954c5c360
SHA19f55c9395b6cd5e606db4afc5b1467035939d347
SHA256bca3baba26b21eb7efd914bf0d5bb0eecd9f5a0915c0b69a368979d98dc7a1b5
SHA5129b603639f308ee0114db4494e28c029b15698eda8ecf606d1d5ee6fc54e460fbf4da20d638219b50c682bf924e730ec7f80d626eb05b3e0de1947526eb1d2ed7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8B420DKQ\cb=gapi[1].js
Filesize135KB
MD5cb98a2420cd89f7b7b25807f75543061
SHA1b9bc2a7430debbe52bce03aa3c7916bedfd12e44
SHA256bea369fc5bdd5b9b473441583c46b9939232bf1f98c1cedf6bc2241c4f5068d4
SHA51249ccede4596d1e5640a9c8e8be333f9c18812d58f02b2b15adb54172df1387439e9dc5afc4ccd9d8f0f75f092318bed68d3cd577338e88ef4f9373de8a07c44e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LW44N8OS\platform_gapi.iframes.style.common[1].js
Filesize55KB
MD5aada98a5b22ec7188655c2c17a083c57
SHA17c3c2fb8744e7412d8097e28f588788d91b9cd9b
SHA256f2f09baa213dd3dd95edb5a30c7764e4a44d9a79c0831f90b1ad8ebedec9dab8
SHA512a780aa3b9e36f61be8240487e75c19a96fe26d54abf9006680a00af9d1d394e81e517f0bbbc13edff3a7190679260ecd56fd5cdd7c2d2f416ab8982c3277b953
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b