Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 01:43
Static task
static1
Behavioral task
behavioral1
Sample
cdf9aa9771fa4991fda5cc829b53853f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cdf9aa9771fa4991fda5cc829b53853f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cdf9aa9771fa4991fda5cc829b53853f_JaffaCakes118.html
-
Size
9KB
-
MD5
cdf9aa9771fa4991fda5cc829b53853f
-
SHA1
158934f5c1f6492ad2c86e15c9cb377b3a449f7d
-
SHA256
87bca4a242f78c62b507b54dde07d87881950f06c67c8ef805b42c35969d6726
-
SHA512
1027db57423804c09d0e6699ccf05a3d552e3b895fd0bebe180ee1ce53adc4e99c7d1b74804a3ee212729fdf2e29bae78160412fd7efed2d05cb58ce26afc723
-
SSDEEP
96:uzVs+ux7vHLLY1k9o84d12ef7CSTUBGT/kPsKpUlVHcEZ7ru7f:csz7vHAYS/ILUPHb76f
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000bc540ad985ca2721f17b87846c523f67c326d294615f3629d8034847bfcd90fb000000000e800000000200002000000063697c39532bf8e846dee1398925a65942b9bd16fd8330c146c7459bbbb1ad5490000000417fc91633780b59466ded863ac48e4db787c2bafe3baaebe4995323bd253c5c915706cc0b5486efa0c034889c9a1693ab03c6e25264f15ebeff5aae75839ffb8af5fe9620e14c92b82ee9877e2e8526530f3f7d32838765cf7019d045c5d725c3be936cdeeca6d1f0400edbec75b0596f63b1a44448791b42fb9c1b8ab90befc91408aef410d57c5a306a974f0dc6c5400000009c4a88a89e983ed57318fa5479cfc602249bd90e2c3c1f96a99dde74a1f6cf55634456c3d5d145530a0c1709c21ec3d1d139b543ac7dc6ea65589bc0dc6a9f90 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0a3588010fcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000009132139d86733ccaa8c509b2bbbc24cdf75b24999e917403cd1d3a84d30a89d6000000000e8000000002000020000000b0e15f9bd256455eb90867ef94a0b377cbfa05ca172ae0c91676d744e20dc45e2000000019e6700398208c61a4b5b0018044bc6c68cb8ade84f822600356683ae5ded58440000000b540bb5cfa8402c75619d813ea887c223a4c620511b8fc989bae9a041cc4610d511084fbb8353a45f2b72d55e29d3fa30a00b99226735ec45d0df122923c6f1f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431316909" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A9BB4621-6803-11EF-BFD1-6A8D92A4B8D0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1656 iexplore.exe 1656 iexplore.exe 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE 2888 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1656 wrote to memory of 2888 1656 iexplore.exe 31 PID 1656 wrote to memory of 2888 1656 iexplore.exe 31 PID 1656 wrote to memory of 2888 1656 iexplore.exe 31 PID 1656 wrote to memory of 2888 1656 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cdf9aa9771fa4991fda5cc829b53853f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1656 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fcbe800aca0ff3590fd5e4eb80590d22
SHA187bfc078ee5c41b763c56ab22e8e8d87217cfb86
SHA25621f3c72995ae76d33ea92d25121e3e525691975f1a178775d1ae33e81a55e66d
SHA512bbb2389421b9e5b4fc19b8eeeea5e9616b5d3aff5a59092ca4a6fa06ad72c7a3144c36307742fd4048b69df3355f451f3bdf3b896c034bea53c05aad56251bce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f6b3e1c9790ef010956f6ebc985d408d
SHA1396da32439fcaaccc8ecee6c494e80bbdf370dd9
SHA256747af547ea3f285bbe0ce0dce8e55ff46047abd32d01e30ff7eb8c6a20240109
SHA51210f3b527448f2c61f2025f658ddfc876f3732da8a5ad91b9434aef9c0b7de871005294f814ccb83c5b283ee11b5e524384922dc864a3cf021aaa67b63d9856b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55e84a82c99e2f878b5be2cb0be4e5286
SHA1826ee87b82b9f514c49e65ef008be2df9631faee
SHA256812fb7fcf1805bcd5de9f737b2c01c6ac10f24a2df60a1512f6f7aabe3b24ef0
SHA51276d1aa453d03f4258b03506303b75c4f03ccbc77c1072fa86f450c1227169acd235d8809093c991e6462a1924ffab19f932bdfee299dbf15d42167c12a2e1477
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52d312d1e482e4f5b8e5cfe73ac51df71
SHA14285197c75564219c4509cbcab2a5f8c3b38c66d
SHA256e81d8bcfc9bc7a0d002fa14c5db096eebda641311cec22a45215a3823fc6765b
SHA512f04bce775e656c9a7586a30ad1e2368723c7d3aec68e67a69dd8eeeebfc684d8dfc987b6dc82951865b461d5ee21eac97f3172253a38db5f7e445882cb9a66ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD515c10b3850b75ec4d3b428e05d85cb0e
SHA1665eae8d5e7c0c7bbc54eaa15baf54e880e3cf2f
SHA25656ce32190dc0bf0a6d9ae9c0f8d456dcfaa590d24846ba666b6bbd29b292a65f
SHA5129d1b529f9b70132fa2672ad7076ddcac642eb1724d659c0708c74c59cf004459938c598d0fc3e4e4156ff07851d5934dfac6df05beaeac09b943ed0aa2c37ab7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD595b13e9c933b18f2d6c9ceb728f2209d
SHA1ba427780ed585d0dca68db9ce0c3c6573893f759
SHA256271bc8e830365dfaf9677af96b2049db897da11b212840ae630b69924aa38692
SHA512b839a2e34f4df39a02f110b33089915a53793ac4dbc4220b3c9053e96466016c039d5a04cbea0f6a0e866a6bfa47b0cfc0f782527d431f670c47af77bbda1661
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e154c57b26e141a2c3acabcf5318f2f3
SHA1ceaff9b1067f57567eb8db22f4b64ddd6d80266d
SHA2564294c49195c0eb187ca0a49abcac8c6307c7cca605d7a5b9964fb3be784bfffb
SHA512dca88adf8831d6d18b90d8791d6b0f5ab5a9e18014dec1ad14547f877835c7b457a05e9aa5f5a0209f3ce13cdf1bd715dc457b2fd6d377739e16e8b0c5f3135d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52e968072e7e3e1587d08b30081d5ba08
SHA168e687377358ee2fa0345eff7b7f14ab538ee82e
SHA256f07f5af02630c750ee338f82de7a8a7bdfea0a0f0c54b598856ab479b0bfb32d
SHA5125b85aebe3e8d600847531c8473e992e47bd78558328635bc42dfc307052537bdf9c9ecce03eff700e92916e58f3e6977256e1f8a40afdaf23d06665b4a991fee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5705820ced8660c51608a0f290bbc92cd
SHA12e47f79b9acaec8a29589739c57ae88fe96b25b8
SHA25623eb5f2a9bae262e01ed05e26165624a7b4e6123f9d1b3457f158c5da744a752
SHA5129b62910b9544c3700fb8afee7dde20573e51f7a97cadd1f94111c258094857135fbaa221efe30f1c15184b354304ab2c8245af89c766e1be13550902e58a69e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a4835fb8f863fc0431c979752b51c944
SHA159903114833d76f6f42e6e68648c33f09b6af4f2
SHA2563f74161299becb7c3a67d340667209860f77c553ee5feb327b23d36bd5bbb1b6
SHA5123bd5e79bb558fc2589584a8a47dcb12eb9d542b38207816af7189dadef020639077fd83d402b1e4ba62e890aa8a9c58eb21656e7d682a5f389b3e63b5b5f69ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a782e737d4b9c6ccb6bbc585e1124de9
SHA13cff8df15f0886906a79d80c8a62c6b8316e6aa5
SHA25675d42789300522f6f643d93e966810cc07499e222c42f66b86731ea51d3691d7
SHA5121b0aaaa4a59928b37326c7a603c9400cedbaadcc4ffaef7a32c38c6f64c82a706b072159ee9a50f6ec9fa68ae67e09b547a6d3046f86692ef27e01b4dff2d6e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58370c4c9d2fdbb2f0e534aec5df00607
SHA1d0a2a486c9b3ea87ad12afc2204c69a81a23a25b
SHA25621768094016bebecac21a236bf6a4e6c922410cb871ba95b9a92f4ed81a2643c
SHA512e5aac1c3f349083ca9c5933ede6067560422bf4abe53abb9e8f8e02892043dbd443d2d70a07041dacec40746ed009a3c7925ba4751777fc4a88b873d5cffdd83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53d9b12a820f17aab5c95cf2ef8811d35
SHA119847c59e6188ed20251b5bc2361567bcaef6764
SHA2567c95953a66995acd88873426b3c60ebefc028ed366539a699f99ef27cff0b2bf
SHA5126a2ead90b039443383fc16f5a85c70bed78830884a9aab16f55ed3782a971b741fc19543ec8e5f26992b00fbb03bc53341cb7f7cb8ddf9bcc31bbd40a8a3ffc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f369e19ae39615914de53387de00eda9
SHA10b85fb2fa721faff1c495d8fd3f44dcc1338027a
SHA25630b85a97a0e2d65c3df1fe2081466b6f08c8644e6418cf23ebe3cbba1117c339
SHA512279a34306e7ef538571fefc5ed0392e5d2b5fb9f3d0bb07d560b7f63e9c466e32caf587820a188afc8f59338ee7a617acd96624025ea8ab84d16caff33df7e39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ee3d7552ce1f4d4b977004e0cf561157
SHA172e922c14def89bfb3aa39c8c0e28fddc3fc34fa
SHA25652eb38553acd6b653e330051f84d87231bd98ed0e8f2310c2515a43185981bb1
SHA51243ba071b9a0b0f9c9e13a0b77e1de1b798037fdc6c9a707c572e457b22b10290f23063168e1d43344ec9bf7bdf473e2b89d1f6f3d927d147c7565b1c825b048b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD589d8263e05e04692331d493baa5475f8
SHA17e3dc36dbfb8ff03eb0a69b2efeed0c35f96e702
SHA2560fbfcd7b0c427f70252c0a64bad947b9debcf42b821308d45b8c711970b8add3
SHA51218541086b98713b061cd755fa147c64aab1f5ac6f175e02396de557ec88b7c5127ffccbd6fc0ef3f8368c983e8d816967fa0d500f2f21e4ee65449359ab46fdd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5796333a608e83cba4a94471c4ea943a7
SHA100e727e0d9623c44ea7804ae4ee6ea19d3c1429e
SHA25642b6f711468e50929cb67173862fb63e8116b698b224ef2d499fa8d10e9b320a
SHA512d787d462e489f0b17560add0dbcecdc96716e3698dea0569c80719ca0090795c147baf02a500f96986000350dbccdd47b88b375a9f447aab28b697f7c05b27da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f0defc8a5541b7a1bc607f6835766410
SHA1176f74ac3e79db3bcde1eaaff9235e98cecdd01e
SHA25692f14202672436cef502bd5f907057882eb21ba8179edfdffe1ad4989f9e8d80
SHA51213d9ce45920fd547fa7d0faaad73f6a0caa7e709ee40ce61c2d51db85ace5c28b8696664b023075bca86bf15b7672d91de3d76022a17d9a5fcce291342a38001
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56331ec286bc1853d2f4aac153adb67e1
SHA14dfd712e94361150bc430c9c621b1bad94bf71aa
SHA256c3306e3739cadf5cba84e36317d95220ae8d3ce1b249c86c2a8986e8a3bbb5b3
SHA512d2f58c44b7abf05fb5290d75bc6d2a627b4e91f0e147b99c7953e89fe2ec7fe6d305e06aa9657bb53f0cf88ae3b0ca2cd9f6717a9b09935b74a23bbfe2273118
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b