Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 20:50
Static task
static1
Behavioral task
behavioral1
Sample
e9f237bed2cc7db6e5b26050fb01cd5d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9f237bed2cc7db6e5b26050fb01cd5d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
e9f237bed2cc7db6e5b26050fb01cd5d_JaffaCakes118.html
-
Size
67KB
-
MD5
e9f237bed2cc7db6e5b26050fb01cd5d
-
SHA1
0ed50e8e1d51ceb3c17a3f520bca3bf4b424df05
-
SHA256
d18a91996a1238c7f4e66bf397012fdaf7cc93dbf271fdca60da528a1ec80c69
-
SHA512
37e89a3e7d3a12ed7f3e8b8d81b7fb0032d8835580412bc5490b4a434763cc5a090583a03893707f5cbe92aab614f09f117fbd34c17eb6bca77919f0af07aa0e
-
SSDEEP
768:JiIgcMiR3sI2PDDnX0g6si6ESoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8sM:JUkTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432854481" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9A9AB861-75FF-11EF-B25F-FE6EB537C9A6} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000287116e64b3bbb41e5019918174e450ab690e95db82228cd75033faf2e4e991f000000000e8000000002000020000000397106c80ecb134f8c9eaca03f2179273442cc28387dd58a8a3fe187e8ee91539000000028095643997c971d5fa282522e80036a64b0a93968cdfe15b2bf08cce4ed54fd39e35ee127bc5e95ee658982cbcbb760ddeb48672ec810dc7ede7a5f6553d523b83ca8a4a9bf9db1ca02a178d981a80923c345461411d7df28fadff164b88d60fe33a87b5f1a3704085262eae571e2924c2ce7c7d66343d78c48ccf252543935370fa0c5816178d783d313e586b2cc2c40000000b317ef6c9a3b5341985f7e2db1d928eee07513fdd0fb61f2f76a7e2237874f0cffba7b2e7133495c039428975678e47d5a51a49cdc711b3dcd6a0db8f2f0588b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000d44968d6f6dcd8594ce348afd402a5f593ba1ef82ccf0d7c9a4b0945ff4ec18f000000000e8000000002000020000000dd44ea48ea8c59db3a35a4e9f15593e192e52767a6b2ce9bfa85516e851e520e200000005c4920c7418ee26b5136ee6478f90cbe7927ca958b5d994e3b52d1bd588ba50f40000000d497739f2744f476b4afdf611873eef03653971aaf0fe339e013f3f9340383b9e23766fe311309c941fd3a3cb67dddf1a4b63f7508b3d7106d952d099d1ab4b8 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 908bd5700c0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2336 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2336 iexplore.exe 2336 iexplore.exe 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1992 2336 iexplore.exe 30 PID 2336 wrote to memory of 1992 2336 iexplore.exe 30 PID 2336 wrote to memory of 1992 2336 iexplore.exe 30 PID 2336 wrote to memory of 1992 2336 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\e9f237bed2cc7db6e5b26050fb01cd5d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2336 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e6e2bfd375230359ff071ed50cf007e
SHA1a1485316c7e9f69f83cbc3f8cce625c3889d9f90
SHA256c34c3061986e0673f75568ced09ac7540eae5ce4e7414fbb9a948b13200d5420
SHA51252f1413f7b6a6a4c91c81c343b5c5225fe8919615bcfee9932bd0947b7903a947e9c9ab6a5168d70a0c4b21ab23ee949cc9f3ee98ac311c63f67c5aa18fc0b42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b507e96ffe61e64e70f9fa05e51c6392
SHA1ea0b009f4d504a9dfb9728d669615fb47daba92b
SHA2562da9923942021ac310975a8fb8bb1a1c55d2b637a1767145fbdf2fd0570ca345
SHA512e837068b2ec16597cd4b6ec551894e95bda076678b42844e3a6edbb9e0047d9800dcfc5b1c8ca1092485bb4f1914f25b8386186b497c68673ec11224b815091b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e19f36504fd50dc394d3d371cb6a0984
SHA1d9f22c460d93d7ddccb68c8f079fa15c0fd261f5
SHA2569e6b5a4d8ba75c2c1489f55a47e9cead274249e683c859a049e3f411437110b2
SHA5127008c32c140b26b803912bbf351331d60195d4d392625201907c2d52ac00e1393addb291a610278248d97e2ba3f4fd2045ed9443efcedcfaa04062a40f686b3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa3cdf331ecb7bc1ea7bd513fa11441b
SHA13012cc6060cdd64166bdea43bc44b7d4c8c9900b
SHA2563c41f024b8c60fd16824888b432d71a4428666d76ecca2a6f1de9f436ddb9fe3
SHA512fa65cc7cbb0acbb5749d2c43c92589661f644366a77904dfe923feec75cd62c2bd97a605afd86349b13d03ad704f74eccc270ab2d7fe1532619affc7cc7b6574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a80a43802a564646ad0c7e348a7a218
SHA1720dcc358164868e33ac91914ce25cac9f21411d
SHA256f273a2415473a6aedf44a496d6ed44b0ae11659b237ea2ea2f6734f8d9d49b07
SHA512403503933f1e88a20fcbde83ceb2cdb24e4aa38a1430d23da0ec7fb4c8ee234a4c716d91067c977e92e5b174de8053681971d0fd5f3580d9397ce6b8dc6f4e2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5abaef6c779d420995aeee874856f41cf
SHA115cdd2291f24e0b862c1a777e7a3b4857119b58f
SHA256369049617ad38e4a86105c8a9d4c7d59fb3fcccedd1e9e50aab737cbfb488af1
SHA512193ee6eb232369836866beac458a0c6ec57266e669e397add993a1be9b6a977ac137dffc68c60bd75afc9168384fed2ee2a603511caaad339f4d8f9efe832102
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea4659b742d0f2a1b104d0bd6b4c7b2f
SHA1992ed25b611858c7b4ec43a70bc95f54ad527643
SHA25682f3866d59001c673b973a82d4c4e0027a6e09608c821efcbd4f7b32280f9a6f
SHA51241f2dfdc2cd1e070b7c203991773336f5c1e6b9aaff41f50ae54bc4879f0855d3bec4129c1650d1744e9733d2e7286e7d362342c78a1115548f2721a1e48aa04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537bdbabfbdfb2eda6193dcf2190ac840
SHA174e60e4ae18bd169a756e7cda9f5bfcb08d62f7f
SHA2564be586f9e26ec15aca7ab2f72e987dd49645afcd4ef773f5279b181b0e495183
SHA512db5cc83f52754d2270a3329a81cd7c4483014c37072eb28510369ff8a14fa40e31926e7cdf8b27a8219f0868c360d21fdf8980ac2c54818a55c2a277fc5f4d53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5722e68637d0c22ff0a29bf50b2b4dc41
SHA12a8dd41432afa4e74bcff508cd252598ea5eb467
SHA256c3750e8991e8dfaa8c78d4daa76f1b7eebde283d73b61068bcd44be7afa656ca
SHA5129bdf9464ace1c27903a8f4f5e5e33f70d743f7ccd3f1321144196ca79f5492983bd81eac531dc502ae02b12fecadbeccecb2a31e8d230729a57fb8a2a69476bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a0f69011aee253556861890b33e4c17
SHA13c73780e1258cbe727d4a4fc816bf0aff31aa890
SHA2562f15d8472e9118c5a7e276b72e9d75a437ba9e2a408857ae21e0c42fda8116c0
SHA5122cc32d0c6d1503e41574fea24e798df9c2779c05942fa6ce5ea0217563481bc3de121cd6f16b468d5307a398e56c3760b3d8684822586f877e7f21c00dd574ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b900a77987cd811413ef217630d4da3
SHA1d9faff1e9e43adbd042c8d0d036cd8041e6182f5
SHA2568e1cc6650d89deee1f7c9fafe7a89153da51bc9c7d30c4eff4a086996985c2c8
SHA5125ea0edc825655f50c22838b936c44035bdb5760d383141b0053f39190d54eeb05d556bd12292cb31850688a4176ea720f799811d5ebd3cb49d2e3d33998a8b0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5913cfc388eb51d37a068709b65c63928
SHA1965239051aa9ef3217961fa1c6cf9c95ae9bc689
SHA25614e46112d01ff6878027e41f9aac2a7b1df9f498e3a72ccda19c40658ccb8a01
SHA512c97b04c884a9fdb6685bf107d08a6b1139fdea6b210a54671e59c8d0a0309cf7b928981717ea6930b0ca6f04133e35543f8e9e3408d97dabb5ad07b0cf2638ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55df01649a4d3040b9fb7842f7828cd20
SHA194fbce62e42b15cdf160afb2d95c62ef2e0d71ac
SHA25669f2f03c242e97ba9323ca62b6929059b15c74b71641998fe9c83b0d995c8b52
SHA5121d2e911cef0526e1c5f87d6e5b40124228d1b1a79c5e23922e5bf867effe3d0566b6093135b73742ec5c77b9e420e39b6e8184ef6de69ba58f1707f2402ca619
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b155451989fbcef701add718a9940c25
SHA15e640a4a3e08ba5221ea6c4cf9c52e3d8745b22c
SHA2569cbac504f9e3e99876bc5ba043497f9679406df1f756cabc5a7ebbe363663d7d
SHA5125686b1c1bbbaf0f0cbaf4898e858781cdd12cf198fe18570723bbef727d942d8e278f88b36d6d7c467a06764ec9ebc2fd9a1413787e77a535b9d41e0a03c3053
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561d07a2e17546bd03c9da125e7049741
SHA122f1355e1c04dab8e8e7575ae1483e61c8e93531
SHA2568ca353a51454754e7d1371f21d9a3ad6a2b75d35c71557701e06bee6ffb94687
SHA512e6efef357e163df45a96f5b10627971fb21b1ee16ecdd4386639931ad74f60c64c0b54974646841aaa2e9e3cd5465b95c1967bf183f87507a2867249b2dcee60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecc8cfb40efc8ec89131787e2e5bb26f
SHA196a408f5af826a9cad6a8a526271b410ec12ea2a
SHA256fc3a216e288e0d5865a30a202e8f9d6400c25580b91c3f73119986bcce13d5b1
SHA512eaa3d52a799c6ee6d90c54578e975965af6ccd806e7cf66725dfe8f63ef05b5e70e682d7f1f16296b0970f5b37a1934fcaa642d40300eb770943351a0bbea959
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f1feab3f5bdafe1048aac8cb82d38aa
SHA1ebac92a3cb2455f89f97851a95b3c48f726418f6
SHA256977f161f327b3e9c282f829af679025dfc3016261a392f6f636238228195dc83
SHA5128e49e29515d7b4950cb467374999ac48d9616486d474260f8729d348e042f522468a3e0ac21d29a4fae70fc24b103f69299d7258daed0eead2c994f4a606d193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54586f465ffc43f2c116dc6b5607ecac6
SHA17a46762c1ad12c5f538009b403c94dde8f2dc8b2
SHA256f2b2385147b0097e1effbd8974908f833c9993c331b2d88c269ac2bee8f46c4f
SHA5123a1b6b8d5933aa7e8236931ab6fe839116225246f408d2fae25005d68ee7e3abd3fd16cfd060ebc64ef30cfab9be75b0537dbf245448dea4cfa1c14e26b5ba7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c38135d0c1c03a298bb6e322930d16e
SHA1021ef93c1be89b9fd572ee897343a236aeaa0282
SHA2560da3c647a644c9a00dc205c34df3fa96dad53c0023f8138a7eaa36e895f79412
SHA512ea0392ee184777b29cdef6459b484ce95828530ce7e2144dc2f0dd97c89aa1f01a60d5911a7756703ca6696ffcdabb57bc39c2e97105afae5a6f3bfd951c9ab0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b