Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 16:39
Static task
static1
Behavioral task
behavioral1
Sample
dca0905b9f8011895e2ff8bc5cdc7de8_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dca0905b9f8011895e2ff8bc5cdc7de8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dca0905b9f8011895e2ff8bc5cdc7de8_JaffaCakes118.html
-
Size
9KB
-
MD5
dca0905b9f8011895e2ff8bc5cdc7de8
-
SHA1
7c5ad266db7cbe0c4076452cf83ff56847beef0f
-
SHA256
09c3e66abcee02f5b5fda8cf505ae46d940b55ebc4713391975fe21dfcd4ae7c
-
SHA512
fed6e31eefd20128ee9c0fa49d320ec252c697aee72a0f32de4fc3f07c4d118b6eb437e75d636fd1b62ead26d552470ffa3fcb8eeca9443a156d151168505e91
-
SSDEEP
192:aHst3Oefcfdma1Cw1cFL397NdcAGRoOQiP8G:3fclma1CvFL397TcAmoOnh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8EAD9561-7125-11EF-A567-DA9ECB958399} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000008d4f7eb83c4f6470b95892bc5c3854727ee9aa6a09309fa529a147b86120e655000000000e80000000020000200000000967b296acfd5dcc8e99bf079fa4061d59a562e7082a8bbab02bda160f5ddbc190000000fb232eb2ff3eb444c9280a76f8aa230862ccee9b20fd17b62c528587a4294036f014feaafbe5840a505b1af8f138a51209ca08abe42a940f9f38e774a63009171b1434f77c333dbbaffdf94bebfeb70d30027d5496906577a80ce5365cef0cf0344cd0be150369bc0bbbd8cdbcf5c5bbab57df93a83f3ed50191bef176e436deb1eab3abadce2e97b191ccd151c235774000000082eff8d2c29227c856b7db0630dca37a18ada7b674db289f1a296c674247e9b10b3714d754f91994ae9cbafad9a5be5246b039a587cd32f1f7e8662087fa2987 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 309e41633205db01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000030f592dde717c39b87d8c901db645554103c440ff0a5d2ac1e07f9ff8e6cb236000000000e80000000020000200000001bfada581f3e18154c83ce0b2c156bd3dff3f84f9f7a2a67854c9fc7a71d04d520000000d460aeebe51f4577b2caf48f6039bdb61facb4ba986f705182c12dd715c62d7740000000ec649758a744eab85609db803fee6d2645b318f1323ed3d55b3852d2518753f5bc195ecc77b4c6bfe5121b7a6d8a0357727022c5d01a0baa155ada89e146847d iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432321027" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2596 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2596 iexplore.exe 2596 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2764 2596 iexplore.exe 30 PID 2596 wrote to memory of 2764 2596 iexplore.exe 30 PID 2596 wrote to memory of 2764 2596 iexplore.exe 30 PID 2596 wrote to memory of 2764 2596 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dca0905b9f8011895e2ff8bc5cdc7de8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2596 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a910cb7d358ce079f2f45b6e19ce8e9
SHA1618b23074cae0d88e1eea83cb87a129d4e87c7ac
SHA2568b5aa8822273a1d7129dade0e424968d400ea4cc140e20d386a65319ae017a6d
SHA5127be9a9dbb9ac0ddc578f0748dca326cb6f2f035daa9a2f500db505fdeef41c65a3f526ffbe7ecae965fd8e9fd994d1bd2010df677ba7e1b3314d13a38a58fd8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5029c13b07d3dd1c528872da33ac65aeb
SHA1915784c79b5ae244814879814487aa2a330889bf
SHA256c4477b6057b1c4ac8a7438ac441b7957258857a451699350470756a85a901ff6
SHA512f54ad96906dbc0ae757f67b23a61141019d1b64ec001f73bd082d92519ecf2a918f21662cca0b38969df4fdfe679f5d7cffbd68ad0d35ad3d387241d792500a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd0b71ecf41d097296671ba0649f2792
SHA1317bd4d6485857baa56382eb845623c53124b07c
SHA256a90240bb4e1bc649b9985801927eee87f8c7611b5d416087607ebf2938fb4151
SHA512967b827db288c94650346eb880d4a01af1022f28be5a3b0145e4aae15fb66976ab69978bc7f7d853c1f4a6d853f4a8d1909609f1f364eac62642793ac76780d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a5a2bff16f3d7d2e80e32b3dbff39a3
SHA1511df6e7eca8a52d6766895012dd41ca816e4692
SHA25622201db248a5c2511ce5b7597fe6a24e5e739b65371fff1f014b74870d01a6f8
SHA51266ad5f61a8ca425bff8d62c2b18bde52a688b4adf76c52de941647d00909fe03a45badfc0a54cfc7fc57528588ac285c3548c0ed8d15f749e897c27c1a871846
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9b0ee86da9681944ab3417aa052fcff
SHA1f29df482727a6974f69e967fc320afe8ac8d2327
SHA2562ad2f07fbefe4e3da146cf33e5110757b4c13eed055dde3db929ba9ed01eeb2e
SHA5126019da7f05263d29a78aeb63644ec729ebaf3ab57fa05e2c1ecf3dba2f19f8c7105015199d0e8bb7acc4bc610414b618d94a3e4d34c8ff9944d9a38bb7799152
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547411d126308ea17195fc0760407688a
SHA1682177fbd83faeffdf206c71fd2f05300bb54dba
SHA2560891122dc115a6fde083c3ae48afa41a51f76f8366bbb0643264a32e356db695
SHA512af0500fd18b0f92b8609661b82ebb2ab25609eb4207d4c9aeb9cdd9868e58f488636685f70ee01de148541fe857cac43bcb99416d05b46d7ac60f7fbdaa25dd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5022e525833bad1293edf35dadc828b9a
SHA1a103a9a478fec16b20dee1613edf659056dada8c
SHA256fd9c65795a11a61fdb3a9a549e48cded285333a66f27db28ccd4ad686a1eab9c
SHA512426e6c37261cb515b26259f811f417bc24718cf1d84a5b78bc0c9f3cb6f18430d73eda96c579deae95c2ced8f098b27c8991442eb6fa92deaad582478ccb15d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d9f429f0457672aa6f6b5a00b666aaf
SHA1e78bf40c1f502e6c0bbf6e042d5fead2a8a44aa4
SHA2561658c4a3a3e077a28ce298a44601ce2c55b70049a63a8855c18d71ef28981525
SHA5124d09a2e3df13ca4946050cdfaee15484ea5ce541de44438126f67b1448be230235137faefb9bd1b41a1bf52367a3a255610ead48e7f86c5819c5570bfd32f7a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547ec290c768c61c8081cc5e8e1d93a27
SHA1d51cd34abc6b7ff653b6483bc3cc12d7afd675a6
SHA256b0df3b4eecd4ed4c60c2def1915c6b3e5cc74212c69ef0dc6565f055e198c918
SHA5120d009b89cd978634666ffec82635d65fbd8b6da60230283b9a49840d3d87d758b65c3f017b3e0a51d012e91835f1d344de768e232a0347c2ace1d31dae0812b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c338e8777975ece0a76fcc75a8f29178
SHA1cdd34644e5c57be4fb4c981898d57eb16ac43849
SHA2560dc48f8e07bd778a444cb3fae56d4e41418445993b2272e310ed0d66df0ee246
SHA5121983bb09cf64259cd25b94b17841bc7048860d36da1c948792378eeb74778bda47dfe30237b749e860f57478160c0c3c41f016ffcb270d7a8e6901ebb534001d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e45efd94d21e177f84f632dae18cda8
SHA102165d58612a36ebaa66cb918dd306609cdaca74
SHA256268216e5f356926a25f5f7e3ac0b2b431fb1b5e1e6f979aaa76a128485262452
SHA5129de02ad975176bb8aa30cb81e5f5ce58d77b8c3cebe5ff9534a7ccfc6177083ed9c80458f2c268e0f43dbf9f6280fc3ebf4c377cc8abcb43a147b7342890bd2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53269318aa19444bb6a218a50c29f3d5f
SHA1a365422b5e686e4f0258e80137b89dd4b91ed0ca
SHA256533c21750d6aaa0603969644c9a4db5b2f1a521398d31d9e2426148cd540cb9d
SHA51268a69121c22ed677de6d100e8fb2b51cb6cad630d886f4df099b03c677a1fffd8d5d0b72cba49cee14f569a9b42d2fc8b4effee830a6ac195caadac104eb2bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53025daa0044b21a8d5cf8f57f0ccb595
SHA17ae9b6ab1e6c2843396984f3323b7a246ce8f59d
SHA2560cd60589b256d0758be36d342ae8b68dcc4331e7f7c981cff418910d6f8f59ff
SHA51272c888e436ea9c66d958721deaeef71a4d46ac75fd0dbc242fb7bea2ef3a2ff442a8d34e6ea7ff67394b45a4c7361288c176f535449ccf214bc43fa54cd16623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5823f6ec154d054c91540ca5c88b0f0c5
SHA17724ca5e794007813e53f68b95f12f14d1f54213
SHA2567f51d5a93669546d816fa108e27a1aa55f01c1f57af3408c07bb5aa2e3cac5a1
SHA512b883c7e4af8a982c220cba57f96519a16fe3f20636de5472c68640f649b5972fbc782a2ea2534c8969e875be467e96bba5ceaa2ecff57f1c0cd5a83296798eb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543d3c6f2099a4be6c3452886bb709e39
SHA18b74f448e699d4393c9b93e234f9d0df96c1e9c0
SHA25694ba957a1a5f1879c3f18a8d0b90373f083cf073a37156883b126f88762059bc
SHA512232950e98fe9cdc36879b3ed2d5c721906148fd08070fa4bb408d62ab8a61338cee1b75db27e1f3697282d40ef4e2d50dce7cc7d09c6c66ec359cbe50bb96d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb4ef3ea08c261df47567b53c5bf4a00
SHA14502a08223b9e814336c2fcc46ed45c20ef73d15
SHA256c00a0ecbe3af2ee0bd339c034f6e35f130f24bbe11727d78fd69ef94560073ab
SHA5125ed26b85683a4e9ab7a40e35ed996702622fd22fbf7b1f7ecc1402e1cadbab3e7fe0c32fe336c3c4cb789c5c153acc946c5f873e9caf66bd34b3afe12d734013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592e240ac7a3e4d22e1aa3225fd1b3e8d
SHA16f008ac9fbfaf7ec5fd7378d8b2a6a842f2eb16e
SHA2567275dabb2c943c1b7d24a2fc94b3741fa6b3e4e250e2268afa6fa602b64581b2
SHA5122af364148fc83b54cd5a9e5cfe258918e43bd77f102ee56d9b840db6ae76b32b48a463e9f86a9ace05f6bc88231c1a288f72a00223363ca72f6f8127940277ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c5ebb288f19791cf264ec7d240b278b
SHA174799b2d4bf371393b5881a424ecd4530dfd28d9
SHA256eedb34a28ef9c55fe774e112ad2eb488e9fd8dcd14f40afa2fdea49e199c2077
SHA512646bb099b11843f66bbf6eb75158e133522f52d2e6167f16c340a5efdbc9d5c31faee12a4c0ecc97ccc3d2843ac950fe14f269ba2e166d8863385ba000089d04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59efeabdc98dc5409d14c3684167d3aed
SHA1fa3d22a4d22ec3eb27f1923e39969ab6c633f281
SHA2563e0475c7ccf5b7c35d7acae7af4ab5ab3d519b68e52eec82f9ef8b94f976c666
SHA512e7e981a2d3fd9a9be31021fbcfb0133d8fe9956fd0254877feced654530c342ea19efd720b76e6f662684d1b2d52db9e4757f6a466ae70d1c632f80914145347
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b