Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 09:32
Static task
static1
Behavioral task
behavioral1
Sample
fc017791fab23141a1c3f18c863c8acc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc017791fab23141a1c3f18c863c8acc_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fc017791fab23141a1c3f18c863c8acc_JaffaCakes118.html
-
Size
24KB
-
MD5
fc017791fab23141a1c3f18c863c8acc
-
SHA1
0ebf1bdcc41d160405d60fb2eab2421ccb4ec3f7
-
SHA256
5c2d3de011d8024e2972b70ddee7a2639b3c1280c488315e890d3b5de58d42fe
-
SHA512
7db98c42b3461c1cc64fc0a4357e7319e25584f1c758a198ca10e66a71a6730e28ca191f6425497d284d1ca7b66d1730f7fcc959818969aa4ac7bb7d8dc82a8f
-
SSDEEP
384:q41oDH9wMtt4HD9whtuhwFY79FIdOqOPs1ueqeUTqOPs1ueqeUT:q41oUtwvUqOPsYeqeGqOPsYeqeM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000c146f97f538c39242c8c31e7f8900b2031c7ac160ee436306ad7dec283eb2df4000000000e800000000200002000000060f6b485bc227f84332c8ed1611ac9a5fd4da54a85607331d1d4c7ce006044c6200000005056ef3e23e8c7f28879715ab8af3e47a1e6c6f3d35db18767d9fbbe03bc4e0d40000000500fec7c95011f634a9e08750f5acd9ff1c88f125ec7233092d8b33cb0dc5f71c422cd6e19dcc73d69aa5f6c30a9a02ef410c7f44e7ceed56cd98b08c1dfbdf4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433677808" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d9070000000002000000000010660000000100002000000002daf5722d3be29143ddab3a3de0e217627b68bf59581749730b8ada7cd5ff52000000000e800000000200002000000096ab2c42e4b07213bf9284b95696e06ad216088f920c29836ea8d78b88bb00509000000049d0a6de08544f0dde41061e8275d4f0aa489995ba04e3cfff4209a4f88740b7aebeb5303f988e39f6207e4556d89809259d877e19cd47c946efdebda4ba7e01efd0d6dd80850bd1e6b138ccdc45110cca5f30ffb6cc649adecb2d1980515f3477c8f26d2b746032e08bd376c3397feadf007b7c757502961d01074396e6d7774ef14536930b811bf66e32c741c584fa40000000440bc3e7c20383b8fa19ff19cde02948e817d7cf10c181cb01759b6ca78ea54ca2eeb03bbc85092395a0daf8b94628cc772e00136bb208d92d0a34959f3ba899 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8FC21261-7D7C-11EF-8DAE-C28ADB222BBA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30a3e6648911db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2764 iexplore.exe 2764 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2208 2764 iexplore.exe 30 PID 2764 wrote to memory of 2208 2764 iexplore.exe 30 PID 2764 wrote to memory of 2208 2764 iexplore.exe 30 PID 2764 wrote to memory of 2208 2764 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fc017791fab23141a1c3f18c863c8acc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2764 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ab4341d180082ac36d44a59f415b428
SHA11d3d9a7749010dc503cde1d8a543cdc9493688a8
SHA256d780653e9fabfe63e0b0141199356369545700c0c82d6fbb04ef26ee2f97588e
SHA512b100a32f10a8d50c2f727318dfb71b09f183823e4aedd24f268884dd3ca0b113a52b67effab43017ede5b1c77ebd9993df6960a94b11acfd8213e8747e938836
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518fba2149609f549c67325c964c8b5ed
SHA17828515d8dbdcd849a28194c0da9bee28ff18c00
SHA25648d4856654dc8a1013c74caf4e65de9a396ae33cb6cf7c01e1995d8f722d98ff
SHA5124358398afdbaf1c09b71ea9d86d0e575d010f9f2fa0f94d6be90d22eab7c0fb48a4204dd7d5bc013b42654656ba9d4148fe7bd319b33457bd235d40d95315797
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d32eebe3f3db0804450c1f07129e3a6
SHA1920372e0ff7011ec0b3a33c7d2a60e95b4ab00ee
SHA25675ad5728f42beb7e4bf6e90dddb07d58b5bf9a1bd4d6cfd8bc38d2088771055c
SHA5123b14ede99b810257ee7c7a48e9e1ac396e92789540d71d763c881f99056ee5b34388467e17bd401bb5a0359006364dc7470bdea11e82c02da0fa42ba1df6b896
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1671ffc959a2f95661124af550d509f
SHA1f76836f11de5f3b07483cfc2fa6c72f913bef525
SHA256078cb3192c5e360ae7343c8cee49e487c4efc06e50c1ebde93c795ed89f62152
SHA5123523b3a812c4350b5ad5aa922b2974d9a0b56af0a874cf2bbbdc5b1deae98cda360089343b561f77b977d81b683265c910785eaa8c7053f066ef08f0ae26e45d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59962abfa3cb0db47ffa42b8a38411d74
SHA166e27dd9c01d7e65a79a0757038f079168ed3876
SHA256e7b03ecbf0b19618b73db49a9b1d105316c3c38521cdcd2539a02e8a6893101d
SHA51210304eb8457ec8a939f67547a3be61aa8b4dea01f8198c511298fc0050f7560191ebaa3136afc9a73ea9653ce7e400f9e2bdb73cc0496b0a24564a3dcdb379f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570b99d33a045d5ee71da9d99c44806a5
SHA102c541766b16819be590d9c9e20bbf28a336f0e7
SHA2568aa949c501c883503262195b84cc3e3514042b7a6a18e28f0d8137c962ac3f7f
SHA5124fbaade1fe41bc09cd4f39265ec5c5fe37d812b638eeab9b9b0cff7437d53c46d4d6a4ffda2e19491c43517fa89cf6cdd6b9e48098effa6ea52a90754b16c757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efdd9ec153e42951fefcf9338d579875
SHA157b3477645fbe2740b8989ce484aa11c58838aea
SHA256653aa1066398378c8baf63bd9ca06375cd716e182eb1f39a076f37142dbf5b1f
SHA5123eb0ff790d41b77ec63e7bc4dde3f7871368d60fb9747d19cd18dc3166b1ed41834002ba862a5a6b945ab1b4bdddb4827d68a0081bf816bbe3d2c25854250b76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c64d30bdd0387d3943eb0ce4e2630068
SHA176ef6db87991a8740a87f373af643622d1920c86
SHA2567db8a20fa31fff78c5bfadbd766b407036eb319413113c51e357427e9fa1483f
SHA51255632b6ba9b352975c71cb22b925887fad76dc6de73d3357e313a822c4a038c6e81012830c6325cf862c5bd049801dd378e1ee5f4228bfa7ba7b74d0cabfa0ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544a75673a7daf7fa6cd979e92ea60f9a
SHA141d9534a5d56911565b3a1074b86a6c052ec3cc8
SHA25648e0ab8b363e8494690abe7bad6faa25af0da4f550cccdd691916ef37dfdbde2
SHA512f5a14ecda3589f8c52fbd7cdd71953ac8fd4fd31f94662dc8011e30c09f1da5fd3b5df1d395a19a259185e656d33bd29410509a628b24b5c27046d42222591ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533b3dd78d4af47cf0d206b2edda69e3e
SHA1716031ff8ee34a06798e86a0be81867d45c19b51
SHA2567b6697803cbe0040d73001b8b105f2c6c1407632b16a13e158c662cbfde03dfa
SHA512bd3f1d8cd465dbf1e5c0cb9995c9434bd3f8c47469893e002910308f5910a38d80e6abcf0d6501ae95901ad19d8bc2e3c82722e97fa4bd4eea4528f17b5fcbcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5283f923d5db046cc60618ec3b9914960
SHA1dda60013026d89e7255f8f8eda230132205db688
SHA2565cb71256aad194ca68c5c6a042e7c26b473b11ae35da16f320a9b49c39a78e08
SHA5120360032b6c5084426075535770cd4e9b37e063d4bf4a838561252c5902dfa009122e257025dc010d70691bf83bf5c4928b8a325913538b325a26f61359111106
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce99bdd58382d5db3b4955e77258427d
SHA1288851014345f4aa907a5ff4f51523f357607d4b
SHA25628650c9bdc8f3862002dc24903ee91f85dd2bf100d88a3081fa04e497cb63f35
SHA512b84f367c65dddc649482183b54c731336b85e771e10bf5539affa9b977107cf9c1b9efc17d345e3977f9227b7e229cd6921c6322cda757ca7eba7efef2732c77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6937d20d6e6a55ef1f147b4ec61e3cf
SHA1d6596ff8256d926070207aead8f43ade7ce929ab
SHA256078f357a438ebb816337171829d8666bb1f5a89edb3c2b41b812c057e6187049
SHA512a51a3fa3da51f8679d0422eec9975caf40e0fe2078ddf3e061cd2677d9ffb3e2fadd21ef80a9f1a2fcf345cbbaf8d65141c0b48e9e58b56c07a6b07fa06f3ddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522468e472285432fd5552ff4e77add64
SHA1d21ce15eeefe216dd10cba4c38189c33468c510f
SHA2569ccb6f948ad35abe5a81d90dd16b810dc87b57f25ebfaaf1541a4f3e000926a6
SHA5124569583d3a22fd69028e8202ab294753d6a8d8155c55b8138c6863a9766aa71c7300625b5505e3f41ce4e36195d985601ff73018462c46725ee9c0d947b9a5cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7a16e143dfee68f376c872ec422df20
SHA1fbd4f7fa923d929e52107b659a98546e4fb42fa5
SHA256151f40233684291574b7f5c0c4a584e9f7bf8f65013100a9f46667456e08d2ea
SHA5126c5c6ee36a38e697ebfbb3ed4821b3d4caffa4d30410c483562cb87aa5392ead59a3768661f1296fc49ddb537854e65be261e4596e1311db4805922b11721848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5464aeac8319ec534f82ef360931676a0
SHA1bc38dd9ff5c182367d49b88748a7673f72cdc94b
SHA256682e76e179608568913528b5abe7af1204d4c88c1c3eb5b8fc58c7ac225bf02b
SHA512fcd7bf03b7d0fb47dc5eade9ccba5042d5df5e02fd4f5aa449ad36a3411fd6ec19ef48b478210dceb3842b21b6853096985c81cd1639960f999f8e232d108bd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577179bd3c1576c1f3734e43b4abaf988
SHA12ad08d5849814d476deb330456e6a0fb0cb8f867
SHA256f26cacbea3d8063f562e62978e3145d6a85e8bf3813644b1c3c39af360d71e85
SHA5122880d9fd64f9d969c3850db487a0b6dea596165b2cf022244aca02e35e3d9cb4b42fef5432a5e9579f4448917a29a26b9a8393c75b78f511f13a778f83762ddb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f043d80bed4d7d08bb0fd077e2300d65
SHA1ad428efb82b4abc50f220cef19c0188f96b20391
SHA256b0d97ccda8ad85b50e97f5b5cf9cc15f25d56a7a8d16192dcd14a0fdc18d8f26
SHA5121b390e60362c673cb966463dfe2595ee343af5fab121c3ec7c30a4b8edd831aa4ae2b130d909f91ab0f4d625fe9fb515860b89869aee405187ba0490f8bff65d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba88893afa79106663b31142bb1583af
SHA14779ac05f8c7b11eb5449a521f96821479e04bdd
SHA256420e443df4474d6f8dd885152c6234201e04a4dfef8fe8b95872928ca693b0cb
SHA512d9d9bd497ec6a86ed4c289b748bab75394c84a7b1a234452a3959c5d4411b3e58665dc90499a2815a8b768e0289088cd4ac8eb4b78d88dd23df93dcc4345002b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b