Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 13:10
Static task
static1
Behavioral task
behavioral1
Sample
d660f134a51bc39f4b205760fb7f7bad_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d660f134a51bc39f4b205760fb7f7bad_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d660f134a51bc39f4b205760fb7f7bad_JaffaCakes118.html
-
Size
13KB
-
MD5
d660f134a51bc39f4b205760fb7f7bad
-
SHA1
1764e888c0ff75d31661b67358b40624c2ec8d02
-
SHA256
0da53b0985f4ad84385dcc175a6975a9c46a31460021efc55ed1a3e339e670e7
-
SHA512
4b99a588df1519416759ffeadd6dd2173655a26b48a807cfc8e70761b3f8e183a50d730ac03074f61bee72b1e24db4d644f37248230d94f40f8bd59614247308
-
SSDEEP
192:GSs6oUf43S3QMTLWw8zuDkk2rkHxwMIfgl/aBvERf+06XM:YpMTP8zuDkbrFMS85b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 605619d3b902db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432049295" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000436826d27b4c06d4f1854558e499246ac4394966cc72141bf67e8e4cb0b9c459000000000e80000000020000200000009aededbdbf9bffff8412dea75a87193ac031d55aabb1f4eb19a0504f072b4c3920000000e647d68bc5be84844ba40effce8d92e6ba7c81cbf9fd40b36f117c9a27e859cd40000000ae0fa7685d6dcf77a12d8968dbf5360a72028097936f6856d1e3223126f8f1f613559bb5d11462e448cfbec461100ec112f1c3d4986734d69e824584340a44a3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E1C44F81-6EAC-11EF-9A84-E699F793024F} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2388 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2388 iexplore.exe 2388 iexplore.exe 1100 IEXPLORE.EXE 1100 IEXPLORE.EXE 1100 IEXPLORE.EXE 1100 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 1100 2388 iexplore.exe 30 PID 2388 wrote to memory of 1100 2388 iexplore.exe 30 PID 2388 wrote to memory of 1100 2388 iexplore.exe 30 PID 2388 wrote to memory of 1100 2388 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d660f134a51bc39f4b205760fb7f7bad_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2388 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551d0ba52a04f845559b21e4524ff0133
SHA11b5a3dfb09e6b1e7881e01070fc7644e1837cec2
SHA256b34a6711f71f7a8308adf5717c1ac7bbf1211310d9ccbd18842f4256b709b5a3
SHA51227a09634907413f5f46fd0f2d08fd8592b9c446742569e0c883ba66a71469a27a54455d087e530438d18da52bb78be3e8709a3de43c8981d6e1e4fe6c5d9b32d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5175f9f931d7efde8b57a4daea11571ad
SHA19a267fe0e90fb9fe880d88a19748f8406568f746
SHA2569c4f3368bd5f63063a13f66f31a1a68bb634ad58574bdbac1281169749984bd5
SHA512b252b923c7afefb8429f46b48157a1e84d6a6ea9ac1090a8dbd980c97250d3c540030f3b8d872959f2655e858fc8c179f0d5842e6e3298eee8c8a9f969c72a2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f78105c6956448f289cd260a4020844
SHA1c589f501112d5e6f653bac3938f1be54ec0d5916
SHA256a9e3ec7e4f75ec1238862939364dd8dd6303c495dbfddd6d02ab5414c6e67bf8
SHA5125ca1ff3e77630d34a532319cb26411bd3f6ddd6e94eb0f605a9407bfafc88b5b7fc63e58f44891f6338794d140c234c5ec30e82a5c8f8eae339a67c419f1ee87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56db572a5c041fd2b50415376bec70bfa
SHA19858f73c8257e19dde34ebc88066af69f41274c4
SHA256cf82f21bb106ffa1406e82d4800c41ee28e494a4662bd65bb6b381c9fe54c832
SHA51289ce74b75f2691d018b692c27c8013f880da3881d3431db0144689cbc0daf724af2191a9559a38204cbe7caf6fb3c02d41f09d7c51a788a152d5a81fa7774e12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51784e2fa7ba982b5412197290423dbb0
SHA1c4e5de817496ed753ae7d7da76a1b4498d4d790b
SHA256ea7d3a564ce59eeb135f4b453f8d2d68a3049a5810d2661e10b92d45c143509e
SHA512f6a3517d5ab8e0a2358d9d83b915a5c01156b9a718a73c2a88c1633f13916fe43c7775270c5eb43a6e476dbc3f3db3e853c6a05da3008739ceae2261d4b93e02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c7e4313e15b2a31a899d7206938967e
SHA10b007799dbb0cdbe3f457b20934a977534937812
SHA256445b415a36005fc8c3d3304bec1c2d0f9ab6fdb31b1d61da10a778516746adc8
SHA512be5661dfd5973af23c6ad664ad2032c5af4f39c378e8607ff3065d0378a9367dba0d040e1854e52a50dcf79a06cc4bfdc12b286c47c84afd0437962df1f6a29e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591c91a82bb8e31175248d8c968052009
SHA11a6447eb4d6f0650f0335f2d2ca5289c126413db
SHA256b02c1fb2b923e228cba15df3cd9bfdf9a8ff788abf4e3890100e84ba8b2080cf
SHA512372c278fcc872743171d5193406f545389b5b710200d59d20f4664ac5b2b6b44b88fb726836bb241e9b450deea41fcd542ddf3ed8f246737dd27208afa514502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531a3dd8761bf7badb38717f29fc4deed
SHA13e21d47e90be61edf2f99aef3dda793369c16b75
SHA25692486e2ad741c8e4499c7ea6d1f8a673bd41b6c04f448c78bf22d06c612054c8
SHA512ccf2af6c093ef6da58a58c765075cd12a26eecbda84604455280cf2738c0a4c5ffc8ae6f8065292cf416bc95a85400cbf66f1049dda9040380e1626bc542d99f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5135a77fa91d19bee54f4bb98afb84912
SHA1d2286b4ea9f8690625cced8a956a3023677b65d7
SHA2568e76b98747d0d805e11c82d387610b3fd928c8511feb985d87b80daade029a8e
SHA5124115d93737678efac2da4dcfe2ef9a90d9fed94bc461c8fc8a474a823e44250aff06ddd9f5d5414da2ab25214804071b66564f955da3d580fff7852ebab3253d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a0d0665f16febd6475029791619de04
SHA1b7f4eb3a2dec87c83179d16a561fc5d126107915
SHA256afb4e16bd28103d17bdf59b878e2953141aa2654bf1abf5f284300793aa58efe
SHA512c85681c3cc9a1141bc05ba525f96a788b77d45ccf21ff0d90973ef31efcb4a81e91101b94887194df7428a2a6951db683a997cd03e1d7a8c6bec11423806bfab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505479fbde239f8946dfbb243bea9d19f
SHA1bbfaaabc0b08397ac09a1aaddc03652ce3699863
SHA25664b0513537aa884fab9a0ed7e38efe6ee900a1e5244910dd2320af273dc34843
SHA51224f639cf01fc70d392e7e1fd14c6a095520750cdd88fcdb4ebf8f4f1b193630dca1497501f7431bf3cd25853f9d334f62d3fa26663980b7910740327a05d335a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59151444e4dab10cd22878ae5ca80caaa
SHA130a0a0e6180517a7f41a71b31e0d6ae4d3c34152
SHA25654073b6592a52b2cfb566e12c560f8ed3a8a87ba9bdd0bd41bfcc9fc960fdce6
SHA5122c2b2a67e49606030e69acdceb50c043e87c3f302f8740fb1ec0adb8a5e338c03b07cb65eb060d1e7a2a180827998038a59cf0d58a21a83a182647cdf8574e5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50880cb27fb8ed38d01c70b784fcbe148
SHA16b10a0ccba6c35c8818d41e116b50e43c47502f5
SHA25643d7eddd45f65ed65236fb4081be7d57a3cb077c0fa14062cf27dececd96a39c
SHA5124632567dec0621c5f4cde7df070d96b3457d8057160ea824035375043a38d730d4aa2933b6a589b1e2ef522f17b1a5de997c8ad4b6b405f70e7582489f36e1e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eaaf608c54efb9d741451a4d217cd82
SHA105920f29c624f617b6fcf98299488fb2e4eb98c5
SHA2569b9f5366aa1b70a06fbc4a12a8592179ab9847c08df54b41b1c024976da7c9b6
SHA51267ab4b70d8ae7c2e6c45b39e48c3304825272c83feb82810992c4db9f98ce16233729c1de55a8c648b130d881850b18f85526e3e2c4c0fb755760a1d2c58cbd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589ea7b2ae07bb06acaa8e17051ceb728
SHA10b700cf4a2834c0b62e40da9061fe6d7f40b6a3e
SHA2566b5231c8d4bbba238fa23002cb8fc320527353f63161b2255d01bc0d42c03400
SHA512063f8795880a33417d2d34e0228f41d1ee89d3034fd26b9fa7be011ef72ccac05ade3b5429464a8ac7957747f74c4a9c5db8f9156dec1a13f2fb8acff1bf79b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef2adaff03c200e17416f51556324afc
SHA19d4fa1dad60a7940956e294bccd793838869692f
SHA256ef86fd2747a1350772c52bd852c5be41d2d41ba8aa4feabbf0c3a308c19396dc
SHA512bc3bea59505854ef71120d2de370e57918acf382ba21c6e4b360401a2190af8c8b29dc639c58876e785a8a9bf257f6e2206eef11c05aff385a541ab1e0aa39b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57801a7dcc4b4fa34f69294f25a81d1d1
SHA1b74ee0cb9cb79cb08ee8534e64ebb17897bef863
SHA256ad07f326433227deccad8208dbc1719327806ea9269d17725c39f1b41c7afc63
SHA512ef250011e60943309ca1dd7373e9c4469b93d1631642c8bb42d911fff4b654d7024b2f417021f3b6c9c1e6494c5f76b98df815fadf75f0425704f71599b97b35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f37dc3d88d30fd093f16ce5a7d8fa5b
SHA17ce401fd5863d742a4dd16c1156e6d8ef5081c81
SHA256799cab628cea4bffc8cbc0f83c4ec6683f5e0e82e9082b8d1992cbc3d7dd0430
SHA5129ef5140216256c3d34b917f4a11275de468b5ed162f801e4b73bd39250e1ab6194d9778b6668ce9ee2153455fb96c6e75d69d4628d12736765e10b2dc5cd7b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5011395cf19740be3116e5f14814aac15
SHA1b4879fef64c768787d4381ca7136622a9e3abf81
SHA2564129516be1fd6a67f16d77b7908aacbc4d418ad706da6a11c9d24fd124eae7f4
SHA51220059e7407878fef48516adf6aab35dafba7f69db28cdd6eae91f9b6b5cdebb40e3902648fca7cb09f4cc868de51f0cf6363cf29d82f701e067871c173f47e99
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b