Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 09:04
Static task
static1
Behavioral task
behavioral1
Sample
fa1d3630a018e26f0b68d5e4bd79eab2_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fa1d3630a018e26f0b68d5e4bd79eab2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fa1d3630a018e26f0b68d5e4bd79eab2_JaffaCakes118.html
-
Size
460KB
-
MD5
fa1d3630a018e26f0b68d5e4bd79eab2
-
SHA1
0bcf933cfa3e29d7e8a96ccc7cf3c49f01978491
-
SHA256
461803dd40edb07e43777f473fcd891868280bd40c87fbfe95037c2a8bd191fd
-
SHA512
c6d91862c44b6bf4604f08bf701356d2044ca59eae5c914a562ebbb1afd7810e3b5881b9db3fd618b76ed913c0f2af94302b21edd0bc5afb3be8234d588fdc72
-
SSDEEP
6144:SvsMYod+X3oI+YTsMYod+X3oI+Y7sMYod+X3oI+YLsMYod+X3oI+YQ:W5d+X3V5d+X3V5d+X315d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000a4cf4b7aa90456c83612646bfbb682a4b7bc9b6e83ddb1e001d299aa345bab5e000000000e8000000002000020000000b35d94b058a712c10974f6c8f1d88c890476fef6df0aed409e9937fc69af22609000000042817b0643af659b2fba470c5f586744298a9f687d464c9b01271ea1c12570593d706be27102aa4c9646fa3808f2b2f6eb8c82b4b1e3c381f35dbd6472cb9e9e8977f8685b0afde1d2b61458e79dbe59b2873ad893f1c142a0bf45f3171f869a049639da89cb7fd9618c2d4f4f4975e04145e013ee00277c2cc929fd1824444eea876526d34c01d168cb0c995c5d079340000000068640a95431c94d7064bfa91768470565b44873cc525d2a9405073d90d729537cfe7e05f0b0047d4bd75fcfc2a11848cb08e703ab93fa3c2a00e39dfe5c4190 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{71DAC351-7CAF-11EF-80FE-5E235017FF15} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0ef614abc10db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000396e559120fd37959bedc105bfcdaa7461e9d10f2df8f1955e88f366504279a6000000000e8000000002000020000000e34aa745cd8dd8b547077316a0a5ce4957458022498eb775c4605197a7dda22320000000e4506716c4214d4595ba437de5cf7d77b53fdeff89484c91468c5677650b1485400000007e0bbae566481d756931fed7e2a98d46cce7a388ac5dad9850d7792966da584d381f777a9cd3292db85529eb9ad81a568014502957e85b645d720d47f380e579 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433589712" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2272 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2272 iexplore.exe 2272 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2808 2272 iexplore.exe 31 PID 2272 wrote to memory of 2808 2272 iexplore.exe 31 PID 2272 wrote to memory of 2808 2272 iexplore.exe 31 PID 2272 wrote to memory of 2808 2272 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fa1d3630a018e26f0b68d5e4bd79eab2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2272 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b3f4b10a79190db0d12522135df040b
SHA197f022c2079c117f739cb9e94aebd21343b0b031
SHA25688cb2b5458693df10e871612132cc279ea74273a757b4ee6067300ff30a990ac
SHA51247def686f7b98f5f152e30d45eeca00f81320f1fc71b3e9c873cb144088d5ca5acbcedf3ac6bdd77e3a26b1c989782f0e5fd4051dae2abaad3acf947d7746c53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db1c87d5e8652a4e1214951c13e4632d
SHA165f1ca47da0003fad3b18ad7c6d7da0b5c25e924
SHA2561d6ce30aca46032e4c9dcb115bb4ddb7a3339e7b4499bcbc80980a0845ea9cb0
SHA5128290319a23b5192e27c5c07b3e0300ffef48d641b7cd468055ec4130dd64b59c72d2f77950fb577b415ecc470d8a310296b61853c63c3c64c3226740acbfa614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527d441ed25d66353bafe67a26df0cb04
SHA1f6fed15d70c19c53c295ad1fba2b000d20947cd7
SHA2563c8bfb5046cc5615f98a4848bdc8732cba05947b43ea893031df64386d0202a1
SHA512e8efbb8382f2ed6cc77d44e4fb232609c0efb1ee21cc9c8198623c827ad21219dedf945a38e65b90d34149be12eedba77abb358a867d8c5ec3dd86b7f8ca6592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3107840deaaa5c06b90eba3890c105c
SHA1e189378b6ac26e412cc24ed86d009ed6f7744bd1
SHA2562ebe91f853edf0e365365af995137b06db8495220785ae825f55d828612e1cbe
SHA512e42991d7deeedf7ea8eba5c059ae9d6392f60218945a50d68dfd673bc04a09ec2a4f49b068c59560c0ff562eddd3610afa594076bd16b48ddd297e9f5ce45c70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54011360aaae6c88446ca106dccf63417
SHA116372327011a2307e913638dd81b911875e8aad1
SHA256a3d64de66d2867355190a2d786d2fab1353c45016365c017439e3d9f2413af46
SHA512b9636be03c0a63b46f4deb8744baf6f594b401c039603df35fe3fa91c7190e7135fdf8c710f28c932b94dd9dbadce693a6bfa26e1f7bcae9533e0018d7b73041
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5031f59669d02c86cc39b73beb0e26c4c
SHA1ab6be49c685913ae4da7c58f924a5f559f863e00
SHA25633ebcb19f7fecd927c9adb6535366d40dbb81002750121e7b4c3210840ca1afa
SHA5123b3cd2f80a60c75bfa797b08e8c8b341c812442d4395c03fd45f1c07df32e9360977768b43030daf228d3ec330879f4262b289b0e1d46d7c7e8da77abdaa32f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a92b8dad9566fadff113e1a6c118a0bd
SHA1ea41a9a99216bbdbfddf9d08cc148baa67e59821
SHA256181674d28b40d7fe510d4ce3a3f9f063a6a56570213a9b30a59adeea27f5a01f
SHA51268f1098dafccf0501a423cb307a75c2ec882b6eb8109e5457a7ae43f62ebb3fe65330878a24c9fe2bab0002b3e8b26e75f6794566871520f33b57434de5b23a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50395d96f9f5013feab277c4de451eb35
SHA13cd7d8b07e23e44a1f299c3e5e8c248e54225fc1
SHA256f82120b4d68a944cfb67400f572429aa969bcc0d66bc4c8856dc38af79abbd27
SHA5126d32bc18f347b34d14ef0c7a50559485124968f8add6acd8b925a6d5e5e67c8567b9ba8ba2ce86596b0da36fccb7bf8a4ceac353eaf9895618c86ea3adce748e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bb9a960b3ab4c83a900c0f8416256342
SHA199f8c5082435382679c1b72e2f639e0a06f9a0b5
SHA2565d54aafb285b3bb59a6977cd7d11bd6cad41e5d9a5b1c26db596ef82d7e40e6c
SHA512059a94d6437261887ef3ea8fae9f87aa63af10156a4cab8a45664e23ce0700d192ad060c4d105a5faa77fe5e13638a847c15b7375f69c3499672f80ab07be551
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aae5d1dbd3b343aa8bc4e0151c85f61
SHA146fc161e5e65565adee95550faaa3d11b774b882
SHA2564444d994550f48ae4b11e07fd1453ecc24dccb3b6830b4aaf2e92e7e59b6ef85
SHA512f7bacd4977bf74645912ec4963414e0ae6de6c0ad836f60229bb50e00e3c1c1818b6c31e0aa069c66781e5ccd08fb1eb15561f26617ae4d1757e004e8cb00953
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a3c0cf52bb8887076ef5be6ddd700de
SHA1802aa6d99c9e8ee78d1a8a51ae3ab05983b48493
SHA25602df62f12583a283bb78ba2afdd25a7ab78361377747914c287c632a7a9f522f
SHA512862821043acd426d0bfc288c64ecddf22b4741b1b4154a2d320ae0993d411f2efae28368b1bbf5344a1d3d978b1c696af73f652129e22e33d26f6b7d4b97674b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac966b6b8886d2f3fd02dd2da9c49a2e
SHA1c78decb192e6d04f3366911cb16f88e6754419c4
SHA256ebe06f1cf353a34f8b543015da20a9096c143e0ceb46c24e2bd8dde20be0f760
SHA512eb839d2457bcec5f6a40bb8cb890b415a0152d03c79d0e6d39bb8b89d2d177a4b610388abf277e0af50b32d31ea210367ac2c3e01c6e02b1ba78f98650eee045
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522b5464c847f444d436d706107ac3932
SHA1e82d92cd12a0947d6909703fcf3c0f54d33ff372
SHA2567314d782a91a87e32bffa7374b14daacb1c31aeac870e70cd6d96111108188dd
SHA512c4b30325399a31813d997b8a76dbeec9103ff5c8f16e75d8732d85ccc482f46d1ed1664873e3bedd528ee79e2ca51527338a2f9fbb47483fd71f3db0e41dc9d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d67ed05aff6c5dfc50f5f86e522e88e8
SHA1c87ceb42b4abac94114a6f327fe1ce6aa109d4d7
SHA256826cbdbce3bf19c4ba8b73076d45b9f7da5e17d062e9888c3531db6972b555ff
SHA5125f7ceecafeb9ffafad16d89be2d8221369ec7c3115ca93efab129ab5d125e990d1e850e1c0289cc94ad3aacc3ec44f78be0be900aafeb84d369cee8f28b9f902
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59fceb98a82ef0524b102cb41b35fba36
SHA173b3fa061eb2a709c60815ea2b6a29b5d226cb39
SHA256ef2e354dd60b6d0f6a5491fe1a3d0447f6531063f9d9a04e766b67e4db53f5f6
SHA5126656015cd12c20e8e75e3ecacaff3d383403dcc6546c0c2e1fbcdb543a732dbe510794d330560454ecb39fb4074f1ce2633c1355d90c37203fdaa13aa6a9cc27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD536bbd07da5de959bc0e891fe6687b514
SHA1315c1bd96b35b06f3db48fa96c339aa60691e332
SHA25611d78d8bbb8d73a3a3f3b6fa063c29ea6134356051b426c796939ff878f75615
SHA512c12b14c586b20a66e3b773398f2b0451ca90c57a73bd2dda5e842fd74ce5ff38e6a8386861cedbdb344847900da447991c2a1e405fc616516120e221a2fed229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52942e9a051c0d5cec9809ed521759400
SHA14ae8d31934a6189b3ce36c21f626bb226892ba23
SHA2564ed373cca81872eba11e222c2f25310070bd3345851c3819830a3873352decee
SHA5128e711368ece8112ce10f463a9ab9c717c1c4ee1e056127898cdd92b522414a5696890588dd7b60bd0b9f9a6d4c2015d4c68aeb1bfb511956791fd95868e36797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ca8b3b49f41866e3b45957bf13256b48
SHA1a02efedbe7aed30c057c98ff0c249623c5ecd774
SHA25638508435ddc2b64219bbe216702cf6d2b7672d975e6395ef33888233a84a4ab5
SHA512029705d7d65e0ed4e927f33cc21a3934d8eef587fc864703c9fffdcc551fbcfbaf59319b2315be4de210b1490918bde7044c4b915db3a182bba3db9c1402a3b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9866164add9581dc464923398de8848
SHA11f6c58ec4ba3f62341c0e0ca88c3d898c3cc073d
SHA256aa700e534fb84bf446848bd2037de96b6af145c2e8b64064c41e9b093df603e3
SHA512f3df9a4d38bd3da025570cf6ee9aae053fd58e770347efca42495313edd1c5487c5138b72d832e49824965236cff21906d0ea22a341e6965392ca36c6718f1fa
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b