Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 05:21
Static task
static1
Behavioral task
behavioral1
Sample
cec29f1e96eb5dca19df9fcbfe0d6703_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cec29f1e96eb5dca19df9fcbfe0d6703_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cec29f1e96eb5dca19df9fcbfe0d6703_JaffaCakes118.html
-
Size
73KB
-
MD5
cec29f1e96eb5dca19df9fcbfe0d6703
-
SHA1
d67d40e7c4f6496faa73c2a87e85890f55e20155
-
SHA256
56833a3c4b034d59b5d4af9cbb0f806be8b4e8078419c4303555f49ac591ee01
-
SHA512
b55a095248cea87e63e3f57ede7cd50dcf7e5c3578d3ff144805a2075a2f0397ea33508126a865b0b29169eed18722aa1f3c0d7913ff82c3d2d031bdb0e17d88
-
SSDEEP
768:Ji/gcMiR3sI2PDDnX0g6sV6+iI3KoxKzooTyS1wCZkoTyMdtbBnfBgN8/lboi2hX:J9nRQTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431761938" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 1075f6a81c00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D4448401-6C0F-11EF-8318-F2DF7204BD4F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000000c44cd65f63396c3b494a3e2fbf60662b6932b91f7ee57b5178e295e6ea6f576000000000e80000000020000200000008aca4b084402bec5bf8efa3f6c7b2d191048c671d219de5b14ef9de82e5d8e45200000007ee18575d53443ae5ed6cb938ce0cb3e2bdf8577ad16c54c0365d47af5d74100400000003b5ecbb82ee007945d0f4c4ee0cff691661a418db915c23d02f03cd90b7d4b060b5f3284033f2edc829d61ba3713a72bfea05c8c033bb8aa7fdd2ce9446bab53 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2892 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2892 iexplore.exe 2892 iexplore.exe 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE 2840 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2840 2892 iexplore.exe 30 PID 2892 wrote to memory of 2840 2892 iexplore.exe 30 PID 2892 wrote to memory of 2840 2892 iexplore.exe 30 PID 2892 wrote to memory of 2840 2892 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cec29f1e96eb5dca19df9fcbfe0d6703_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2892 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574ef09b49ca5fab973b6d65f70e9445f
SHA11d77d9bf7887d5d9b12851d9bfd556ca91382b13
SHA2564d8c43e8833ed4df1179e4a1aee6ad52a65f3602bfb93338ec4103db5b688a22
SHA512c85d6626cce8dd786379141c624fceceeb0dc0854ee67f8d1eb3b7d7406ad5dda55c298ddd0f1aa3eb4c0a0b2bd72b602394d9015a297f62e6096e3a2433ff95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f71d88f4e83c8844d6801583bcd324a
SHA1acc49833f4c05b296443cbea887ad9f634c6d9b0
SHA256e2e9d42d0019659601f30b812b53f0171b54f9ed106acaa356a6c2413acd29c3
SHA512a873e1a0dbf90705a40a986627b744d9bec2237d5ed9b87594067052f4d6454eee85a24c21cac3496c6a850e95ebabf02a311ac8748da72eb24a03bd730b2330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3186e852f9a6619887c96dd7e6ebf86
SHA1938f46586f8b06b3e8a253eec78489b062c375e0
SHA256c3e53a9adbb0f19639ffec57dbace35d3bfb5c602d725412561a8999aaea2426
SHA512afb978dd966c82074ef17bfde5430121c65e6f9ded2fb7bb3916624f1a0a98bec95799b302592bc35ad6b3b38b992bb2ec8167472a3c6d7582c3b12e96e0f021
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb48ff4f2b019c85c7eac7acdbcb015d
SHA1b543b4b5c530da9b790e7850e15b31b8c556df9c
SHA256e42fb6910979dd3e8f0a322231d0b6364ced7a8bd5448ab84bf6925a039d1269
SHA5127497e0ca1361a0b9dcf78fdc3f3f0d84fcb0f705711a3bbf8dd348259f8b905b3179ea6996bef2e2ec24b7b4ea0cae7eba89b19aab21a05edbd774e37d8d6606
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9547613953676f166389c3d13a9fac5
SHA1d0079adc44bc6fdf8031d07cabf3d14d77201087
SHA2564451efb3dd4e4d69df2e77bc397cad77d3f528b74f8fb638a529d1576023bf37
SHA51227085a311d2f7219300cbd9621b95c25143e46041beb9e5f4f520479ae5984f7c5f07e199b1fcd90fe3e1d2eb81bb477754c05a7a201c1657763620f5fc178c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6285f3afcb142f9a5e9087a9e8821f8
SHA11105a532b173a254e064d1d66576400f4875832b
SHA256ae8b812995a77502001501e3b4da4dad35f98d1adb0422d09a055d04b9842508
SHA512850a112d1d483cdced14c8d894f0cb0ac3afa02a9d6d9e7abcebb348d36a321e00a0d324694e2ef3867cbfc70342eb3d1480b5d949faaeb25d42c13c7728df04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5d54f0d46565d72f7de3c232691634d
SHA16590fa6c8b4d4f6a5323be802d889bf553a86297
SHA256565102b64a52f5c5834341a56a4b7a07d7018161b21b59166165a86f4328458b
SHA5125f1747d87bc35a79b9f1c8ec0fc33cbc0a08efbf119e66171b0d75dcf3582c6c1d02db7ed2c540ea2039c8733b3a439d1f05b0c1fa374a68d0bd3e9ccf4e6888
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3aac32a3e1aeed820b494722926c8b4
SHA10fab33eff96f86fed0583b5af452f4d69a7aacd1
SHA2561a1e89df38c8059264242ed679d07bf20edba6081caecafa080f411d9eb3f323
SHA512f72e902282febf9f38cac70047cbad1aa00a9ba39e31ee469765e6249ae83223c0fcc2e812b493e0b82b41ad861f9de0366b2b8a614f5b66ae04de2fdbf953ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548ab5a19615e834c8918d8b96921daef
SHA1c3a0274a2f1ce99e6864a75cc60d8d55f5a855f6
SHA25662b1cddc463de843a9ed49bff5f04d8d436cc6ee30305d3c58a4f5de4df70f51
SHA51232a4c41bcf60798edc0d64a97881305d6c03e876c5cbee36437c22bcfd9d53f9f4207a6826227e738211b4e480ad2c43a320e497ec40c2e4c276a35d04122b60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b69cf37958c5ce091ff9dc254a75c23
SHA1ef78fc2b021be2fef4f0ba1b87a28becce865891
SHA256604aeb613cc2939acc599d383fa05699e7114235b67facd7dea56094264d4e1b
SHA5126a34cd46d34e51d3ac8688a6096e99f48a60dfc731fa32f64e7929a94959be235cc745fdba7a5e22832d1f67b3bb04f80d780e5052b0dd4522353e3949d87b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d68cbbd2ecdf13dad0ab2180cbcbd95
SHA1ac014089f25cc8b99ae42d404757c8ec84760792
SHA256994d5f71b1e2a11d34abbd6105f0e1e2b09979994028aabd95b44c3298927da9
SHA5128682ece6d884675afbea357839fb146c767bbee076f9f93a880be3048fc3d701900953379c4ce3c46dd8f6f34bbd482574c3a6183cfe6347aa6a3202475c3af8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5975530c1914a6e245fb65b42d33b77e3
SHA15d0187e9e75757cb0aeb0a1502e43b7b960d4bed
SHA256ede9d22ea4fbfb741184a257516f5bc6097a6a12ef5e6f0fb79076802701e59a
SHA5121caf3a7e6781d273459457e488f2afaf25ab2e5f8f7b33fdcd3b22a6020b1b98c52a7c4072566fd51947047e76680ecc0617efbac3712c09ca8dd8e3746e22a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50917a9833a3ba8a7c183c9bfcc02743b
SHA1579f8cfa526090983877b8cd750d514caa25c1c2
SHA2567cf737a9e8a524baa0004de143e68824414eb9ca17b8609951d14f93cf80f58c
SHA512c53c5736a3e56f848baec806d37feebad24b0be8caab89b057c20f2aabe61e6d1293f1c46d900eea71b2910c5736156917879069ad3f027d1ee6dd2115d5271e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507615ea9dc8fe87a517aab378eb4a4b6
SHA1d80a25d86088a97ea864886c2a4bbfd5b6efd5fa
SHA256d5ec8e9bcb0ddd55d2e2ba16ef7de1cd1e5b2b8ecb4f6a33b444fa2fb8e6c3dc
SHA5121b00899e8c20d168461d053d19bd50ef5ceb9acd9f280c1bf5cac05e4996640dd297e83144b8b700a4f92260cf6755f8dfe9e0512ce7d028c07147cd987ffee1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b55df939736adf43bf6ab835c1b8b28
SHA13818c831775cdb8918fe3414c282ea1c3f87a5ea
SHA25612a417ab1e1a475b54727f75f5abb9554f0dd140e69963719eee040c6c85535a
SHA5123baf3f560737a2ba8bf34fb4057f89f2c071bbeee10b94e04f1c6ad790c483f985d28ca96523a9d26afc2a109877ece4d253dccf6716f41d5853c7d19c5cd288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cb0ec78ef324237b39f0fb06582481d
SHA12f8b31378b522c0832d36b115ae8c74df9231faf
SHA256bfd51decbb46d039bde9029185c5d66a90073c1876f7e2f199a8caeb87c6da53
SHA512fd7ca4d35508f9424a9784c58ff2609843ec7fb6ca8468a95fd59e9368ee5b4ac60d57ccc5bfaca2f617ec280cd57e2a846cd1067e5ded0993e29bf5410eb23c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523db831ebcee507550b3461f8ee4a5e6
SHA1936cb00d925e155c487f66bd4c38f7d017e4df29
SHA256c1c1f15c8835025893a081445adeb7fb69a712fceb3837f5984dc3bc52ddeeac
SHA5126a8b93e880cfa4657016170fd36c2a3e86f89ce288b8e8395081abcde61caa4f9a58b6295156a342788e40e5d6dae4930ccb9433f17c108820f673acc38e39d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510c2b14c158a663a47fda5990dca59d0
SHA16ecfdd78b5641f6b33f5a4c8f21cf73cfaa9b2e9
SHA256e97fee7bcde28017c96cbef29ac27a06fcac802132c53d3cd35d153337f11f44
SHA51214138aa0c3d244dbf62238c08b3a71aec1f9607f65842d9d93a51d74aeadc4eeea33ec4054b86ea4522a97a112374e13d963548fc4dafdf165d879d671865da7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e98d7e94d83fd483738478236989304
SHA125b479466458047256dca3d96a109bfde3abc706
SHA2563cc286b936f87817905833f097b0b78ed787566a6e9d852ae10fb14ab55b24b0
SHA51293cff7b228bcc8f4f2f7b01670d9f8797bd12cb4da0e1a2eec7be3f0aa641d0bc984e2163dd44c8317af2026649cc8e8c23362d60c43cd3174d3bfca2254009b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5189239efbfcfdecada80a082c7d6814a
SHA1587ef18c6f13adb7372d156a8173572a5c231aa9
SHA2560bec7c17358973e960c06e137f538c2132d69bcde6721a5a3c479ddb31dd0e93
SHA51297c226edc07b407daadca7437f9fed72de869d992844cbc87438d9a17887084c7b545c2bff13d0802f35553f0ea0ff0f2919e6a0cace3400aeb5ad1a7a2fe83e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b