Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 22:25
Static task
static1
Behavioral task
behavioral1
Sample
acd32962c4b3df66d28d0cf3fb71a8a3_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
acd32962c4b3df66d28d0cf3fb71a8a3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
acd32962c4b3df66d28d0cf3fb71a8a3_JaffaCakes118.html
-
Size
9KB
-
MD5
acd32962c4b3df66d28d0cf3fb71a8a3
-
SHA1
3c6907f4b54b7d9c833eedc19be9adaa5a151df6
-
SHA256
e3c1a0d2576c6348a7d29b59975c0effc7053f6a40876692c60a524fa622cb62
-
SHA512
c819a5df1cbc8cee9eda077e4ab646a15d27ed85d9f06cf89e061f639a046ea9e98459a9fbe89a8ddc9999cb38dcb30d46a9e544cb3c9274f0cfc3ec18822787
-
SSDEEP
96:uzVs+ux7Li0LLY1k9o84d12ef7CSTUOGT/kzHZCDpr8CJrK+oCq1/XlVHcEZ7rur:csz7Li0AYS/TzHoVFSv1fPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F56FDF11-5E79-11EF-A641-5E10E05FA61A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 405b80ca86f2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000007c59384ea297d012728cd7bef1a6bf26e734e900657a22d0fb030da6844b5ee7000000000e8000000002000020000000c2f881e23645167f8b888435d207cc5d5895c598e531df2302e6f0ea653b1b8220000000cbdfde2d907b9e46187d2abf2eeceb5b104175f2b64053d439ade337e26af6fa4000000026b515bbe04e9da5002f3e2c520d930cc4a07c22a6d69d094bf9e8ebeadb34df17457cc919da2ea87027ad9c2cddac1dcefa121a30073c633cddaa4af9cb195e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430268205" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1464 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1464 iexplore.exe 1464 iexplore.exe 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE 1672 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1464 wrote to memory of 1672 1464 iexplore.exe 30 PID 1464 wrote to memory of 1672 1464 iexplore.exe 30 PID 1464 wrote to memory of 1672 1464 iexplore.exe 30 PID 1464 wrote to memory of 1672 1464 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\acd32962c4b3df66d28d0cf3fb71a8a3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1464 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b27b9cbce5c5b9c34b4f3aebb31f6a61
SHA1c70e7af43a6023744d1e1bc15f49ddbb5b131ca3
SHA2569cb025699243a19846349847548c065589694cba1d33147d3a118737aa27bbb9
SHA512c3b6d558aefffcd53f466520bcd8ee1aba7a8fec55d4af0f1f13c747be31b7b1150587b2e42619408e5d8d01cabd27527d1927679805f2471fd4c81e545edf85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5992cd60f95f61154697dbd81ec4ec77a
SHA18c3b89d603966efd0eb93214110d4290d8ca8459
SHA256c1330c3f22f90c304ca4be0e33d47862c7956552bca432427aacad9f3a1892ac
SHA512ad59a4713114c2d6f3a207168b5509ca3bc51d32bbfc4194d0589ebb5eb279786c6fc21a399ce24c1ac4ce84c4d3a6a47b3bf62d3db2fdd72150b74baf75786d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5598ca5438ad2a1d8fb4bd049bb1ea79c
SHA1725305bb049464eb985d079e26aec7081d44a0cc
SHA256d6e63122fbe9d10e064f7c1eb7a1ac4f73d121d569860db5c7efef26bf58399d
SHA512500a84dce67cb2f3bea4d34a1080cb8898745b9b05b49321f5dd169e33dab4586d5b1a2939c13730855f18f7f2377b741ad64a22be909ddf1b192d1d890bbd40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513b39e182c047d37aa002a03e30cee23
SHA14408612b0aeefa549422a8aa31cca8ceb5602605
SHA2564344a810bc2e104fe998a66c2e1a5666960828620f93d6dc60c731186ad6df89
SHA5121f921041ea84e3fc85fa6ecc620e243fc403866d21c854b71bd595d80459d2f09ef310b6ff7efc3ef93f4a7a22919696cb5f8664d623edf1c73cebd0c4111880
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b22c839c87b2d2f93d923c8e7604d64f
SHA1c7dd6410c5ccf10ac2f6f8fb48bbb8bb7b90b2b9
SHA2567cc6e2955dbb3bd1456b975776ed29852300616ec11e395ffda0467d1f1c4df0
SHA5121d2206ff8de9b0ba076f5562a171ea9b2933c4cc69fda5479be3ebf9091630ec6e86fe75fb824fab4501290151b9ddbda4c53db0da20d958f42a0283bade3242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585bac7edbfe3d966379365757276237f
SHA174407cdac0698fa4ab96b0fd785558103597b506
SHA2562ba72cd7833f7da190269a0c42f8df1edd5b5282681e7c56903581e6b040e4c8
SHA51297d9c766d9e229f53cfb3ba42e641aece1bb81f2cb3948fcc6fe71257684cd90b0129c2ad7f14c21084c1f189e8b74c98f9de3df918a887c6657ac670ee94373
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbd69ddc4bc264c62d5893d2f47774c8
SHA1ac0a2c5e2390280ae7cfd5735992eff1f783107e
SHA256f9e6a4ff921dd57b7850e790ee20647532ec4491df3d3dc702f8b1d3c0c9e187
SHA512372a55641f81cf5227012ac10d5b7b1a0f452941e04c65416db6c91bc2dccf628ff15527fa6e847347f8135216bdfc2f773d71adec1cc9a57be473babcdb772b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552f5b1bebd7cb7786c276809a317ee8f
SHA14df5aeae6dbc8798c4e790fdf60bd72ebc126dc9
SHA256e72b84a4a773af6d0e967f9a822ef9ebb8c178070583c5fa45528778655d4c19
SHA5127771a448166b261069dfb6cc817e427e045b7de95e87415b8ab44a17a233b24c07e30e74bdca553a733e166bfe6cea048b6918edc31b5639b44f8180dc3d0dd3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528e44fc171dcb3cc0b82d21c39fe7983
SHA18ca1ccaa859380f3a8b4ee3f1d5775ab6ee6c577
SHA2568afb6652b3c5ec67032bf7f25a1d8abb36594b1a72066d85c70f9f37499ea604
SHA51243faf450f1ed443433d75815f7deae3215c933b84fb636a364521500f023f27f1cd52aab82f06c93e662dcefed70df1d9c31cdede6982d77f77b7f5e03fe2b0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539e52193ba966c2bae27b267ac0cb687
SHA1803e75b04fafa95551c59e896c9ef35eac355c06
SHA256f2eb3ac5cfd9b253b76b480b339ef62391ccd9a12774628fe8616589a90ca48e
SHA512dc873c75f1f9e6c8033ecd7d6b97b2b773561205d28b3745591a58790495eb84c486f4baa3ec52b57a2a446cb3a51a9eaad29921e64e524c82ede22b59452725
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f59b8e137f9ddcacad4424dbd048cf0c
SHA1eb92afafe3ec5600f17f473c529deb71584ae6b0
SHA256dbf2c888b2424270362e3bb73906f494175f8f5faa6c259d148f593270883d07
SHA5120f104f2109cebc18437c8d1f53fea61b849bc5bedb06d1104d106e3696ef39feb3fda30a42a428c511e261ac38b6d3108227114647b1418449cde5eb78deca18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0d420b47cc4783d9f90e4ca6757be1a
SHA15bd957550d858ec04f143557a1af4d9ca3742440
SHA256b52421a516b0a93dccd3d9ec27a5664fa03971bb47b4db0a0e74cb0d5e717175
SHA512418d7f9faff3479e8856dc0e0c7fab152086968b6a34b884f21974aad0f9ea5972dabb84f0005f3cf7be53e01212e48aba6651ae855cd4c7b29445a9481fc70f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3a71d2e1e55a7eab8ed0b349b41433b
SHA14a13018fcc8f7a9b9408b33f5e5db08d1e03e7be
SHA256a11bf85b39fea2867ebfad45b9034b5c09d9739b6c1e64f524b51ba8de0fdb61
SHA5123365d93bff396ec1c0c69f9c894e81c82d896a3a4cea85c19a8a50c467a4c0700fd5db297654436758174c5e1238437898257a90a4efba85279d52ac5d07e69a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52711298abfdccc9de38e13e32b61796f
SHA1994559d9846b98d7a8eb9f25ca31b962ecbd96a6
SHA256a01434cf86b9592b11fee0bbde17eff5390898e4a07d51e83b2c26b2c9df8fc0
SHA512b6918cf9dae5365d3488914e7b1414f9ce84dd79c3abeafc1bd46db5a0427cc8643e4cc6d7e5620c7e3bbaefdb2bd1c18dfbc00b56b09b4e8dcc69c386c1ce4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5528aaeaaf411e9cfeefc60e00fa50ff9
SHA10ea736443d372ae29e35ca128bd4843eb497efed
SHA256cf00863f38cc0c4d43924ae1d467d054783feadcd9e88c2267aa77e201c77528
SHA512609aaa9c92bf1b6da7ef03fd8df68048f9dfa1e8f5eeb2cc9bc4e3d16fedc3bb3df86b8c4d350e0826551584fd4d15df4d8f5b23c712f35f4df43e77b0d87462
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561e3e449d7fe9c01c4d9202bb873d637
SHA1b0e723e8a0b2529adf5a686ad09b6bad4e44e4fd
SHA25612ae8ee5d0b91f3e5c6a93fa733b653aecbbf8134554e4eb9a80dedf070e5d5d
SHA5121f519d31853df54746625394780d8ddaf6dfd18dfa69276d8ee945d72eea89c276bbb0bde45b6c43acfa71c10b6ef9e35f4f4a08346a0ba96effd8183fe81cda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555f51c3c7630e04bea6bf7b48ac4dd4a
SHA15d64246da8596fa1def3a7ffbc4651ab4d9bcd1e
SHA25681e59716428acc931b841aa6adcd7b1a3bd3a853813600dfb6157ecbea2d73dd
SHA51271323e27bf2bd7972d2c0ee6ebd34042e1b9948f35a70648238cc280a827be769cf341d814dcf3a6e43d06b6da851fc8ae03c648ec201149b6eed7887959350d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe1b17607f3adb64a51cf875023c1d99
SHA1793c03ec48ff5d97d81067cec502c12859a4b5bb
SHA2560323d948add2877f57570680e7c7087c83f25d6b7197d07ad4d55ee8f245ecda
SHA5125a9328e3fd6afa07a259b9155b81e364e4d02d31b3f39ef4ad13e29518e484ea53bf77c343c74ec207e948d2b930ff71fd87c22c8dde0f4aca03a24ff3249e98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bd2684b5dcd50058ed9053df548eb61
SHA1cda52d5979b0e0e02b4615419bf25c719625e0c1
SHA256dc743b90ee0371aae4a17cadf512c9bccd12b90c9ab15bb247817ebc3a10276c
SHA51216d84745349763f515946861dbaaf3633054a5864cbf90980387951eb99e73b5156d92b4900202ad10a95417875e6e7a1798e5425a2e41646f41afccf0ee465d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9047c5f8ca17e6d290dba754eae45db
SHA152fd748d1d3a65f3de633d3dbf04241b654dab34
SHA25652173cb06c5b141cc79aaa342840f3203ce19a5abe2d48ff0c2590d4d72e9c61
SHA5124c734fc74998f159a1b3400b52585319daf9836fa545f299ac012617c2273d66a425e6803f6529a151126ae92bccb885cf1967d218b220e799973394ca27c14b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b