Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 12:49
Static task
static1
Behavioral task
behavioral1
Sample
fe909d6306089a6f5b2213d46aa392f2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe909d6306089a6f5b2213d46aa392f2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe909d6306089a6f5b2213d46aa392f2_JaffaCakes118.html
-
Size
29KB
-
MD5
fe909d6306089a6f5b2213d46aa392f2
-
SHA1
704cd693e6532914811cf6cd4476a355d1bfcb0c
-
SHA256
1789374c200c8efe0590ffadaa5c8f3d88d6e4c2c2ad684bc0d3ad43c8cb9056
-
SHA512
82c7b5d84cf29fe860af59b4f5862d1a5df45ee2a5242fdb0d08d4555d32bc408697635827fee44eb07559abd1ae55fc32bfe3a2cc754c0550968472eff11581
-
SSDEEP
192:uWrMkb5n8SnQjxn5Q/CnQieJNn6nQOkEntacnQTbnlnQXMClBAfaZ8qXzF4My/yL:AHQ/crBIPqdtDOi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000c674a9f040c4f15a0c514b90e38664fff593ac8c1b033d334025468b9d1f7264000000000e8000000002000020000000f1bc9ff54cf4475139eec4d2afa317ee38303270f7de4344f4172399ec61918c20000000a9f0dc73e2204c17a47dd1d5cea86443c4d08340d73b550baa588b3c56157a7b40000000fbaf825eb7ab29aabe5927f38632957cf9404b77d8cb1519b3e551c0fd45c39f3b6d232b95aa81bcc8deb21e31f1b51e4aa9696c3309420800b9a3e28d52f7b4 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433776056" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2013c2256e12db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4F85D0C1-7E61-11EF-9733-46BBF83CD43C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2504 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2504 iexplore.exe 2504 iexplore.exe 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE 2688 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2688 2504 iexplore.exe 30 PID 2504 wrote to memory of 2688 2504 iexplore.exe 30 PID 2504 wrote to memory of 2688 2504 iexplore.exe 30 PID 2504 wrote to memory of 2688 2504 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe909d6306089a6f5b2213d46aa392f2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2504 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eaea73f3f9eaff2563523f96c270071d
SHA1154f75322584e4737d44791a3953faaba1bec684
SHA2562497299749d0ebcf41893f4d6f9b537cd231a419b028255598056cc5c3dd6fa4
SHA5125ea6f9d56111b2fcc5a3fb70d7f72e623c97ed1be4ea21a8ed09add56a6da1c6bb4cfd6c9fe957e16fb0adfb422833fbae2423f2eb1fefe2716e306680ca4bff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5698bc6ae65ee4e8d4554cb53f5a9e89e
SHA1d08b9c70eb28ba6b7132d6768b5032f780f43b7a
SHA256bedc68ad670f0da90b7270010a18eecd35be646fbbd0a7b59cc462906b546917
SHA512904ee38dc2374d5b62a31d1a49a0c504271772e0412bb366cc3d97dd52e8cd30e55f3758fbe2066df9f0f137673dbec24566d84c0db09e7860142c7b8d38e729
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c74198ba25503b3b32b12838f430c2a
SHA134c5debd066e499b63e5e2d390ad07a722a4136b
SHA2562d58ecc0b20284792a20ae2b13bc5330fd17ac581d7ab642623f365af255ec08
SHA51245dc51f231398cc790079684bc614f95455446080d86f4aca49b1beea6b3f4cce61d9f74776b05ef3182f926d8055c81fd7a8adff12e6f2d508565f5a7210465
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c8babde68364dca3de6fff41a0e9f1d
SHA1da6be669257b7b0014b362d4467dd86dd2fa7f25
SHA25672a77e50fd903da67c333fb52360f6885c5bf1c2f37cf3657d1448e52e6fba0c
SHA51249c8077aeb0d287fbe218b6a903772f5deb5aa565432a596a6b70916e18c54567c6a1b181d4082f7f7ffb354deb07d882cc43e9a28c21a580b4a2eb0d060e69f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545614fc0ab4d1d2b0dc78e1464e0e854
SHA18a31232d417ee6327e848805ae051b831d3ec851
SHA256069db8a63907a6a1aa982c45f95d0eea529d3390c7525bc42be1e0e1d0459b1e
SHA51276a700b667827b01eda9a1a46626a08d6976cba2e97e540ba8eea150763e1830f51c67e29a74026093d09ba9d4d8717575788856920cf7a00a32d03339bf1917
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f9d549b212c309b99180eecfc85dfc18
SHA1edca0068f5de417fcad125a59f2f488055edd7bf
SHA25610f8861cc1f36e113b6eab7dbd71a1ad6861ceb3b3a2d562542a4a3a9773b94f
SHA51239222391b1f940d229e7aad634ef6a06fa0efdaa23f72569363e20d20120c5d5f1ef699bb2f4f675b33a3932d6114830dae64731314a31b74ef58915edd5fdf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f354ada0c93aa7a96f071f3a8b2744b7
SHA1b4a1ecbe8474a827be56648baf99bc622439d566
SHA256ec65ae25eebbbe2ded6f7bc1073826f67a33691e388b8fd21eb73a1e27a7750f
SHA512d9df25417183e3843489fd7773bc61d0206c21c52f445bce8d6e873d84fb2afdb1104120e6818146d50f1d844a002a9ad6835fa9a0de58e41230a0b60d7f947d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef5ee435c09e8b8f800f2bd501a2ba4e
SHA1c8299fde5725b5a4fab059944bb0301350ac62ee
SHA25604febfd0b6536b078f7efd4bd0c6fe023e7f7ace488fa50790fb2dfa653f54c8
SHA5124c155af858a2b74e64c99b9825088159fc8ccd4a6e93b8243f2c693f8df793668797a7c54c6ee0ea5b75f755e00d222c9ee0c13fb8a1532f9171226b3b34cc82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599e843d26376311f4542c2db63d1e344
SHA19c7d9556c3e38d3329b40c0afb7daa8b8a4715cb
SHA25675026a9e26391846679e200396318cb4947e0e0dbdf4ee04725bfffa6be465a9
SHA512e0f3ed312ff2cc82947b253e8076c663564798cc0c4efd671c7e46d87bbbd98bce57c40e63639fa31a488cde1a7c1513792851b762318e257edbe22ff2a32920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6ddc5f1870e929927be535d85acbe3b
SHA1886fc39f3914d7d06857919c5b820d73734a5a6c
SHA256f9442486ffbba4d3894c072f2219de9b14bbc62cdbb2bebecd995d9344b0da48
SHA512fa8c7df049509bfd6ed8d3910f71bd75f4ed42587056d949174664b8a80dbbe518f42e1adb1ce48ab60db540592ff443bce80ad1b2adbc31ccbd1f19c9014210
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514431675295d0b72c2ffcbae13fc6c0c
SHA1bf917766a43bf38c8911726b3b5a97aabcc3486b
SHA256791393bac16d553bc1396b5fc98dd772429db00bffbad2134269bd9f6e8f1de4
SHA5123cd1016aba3f72fee8b649546bfa9db0ade7b105ffcf6501ccb41896c736dd516f44628531ad3e83a2a24dda209cb33588c32692480455fc45cc669663fc3b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531653d2ef91c470e64aa177594f419b7
SHA1059c6ee881c4d2b097802e525f0a1990e1908e21
SHA2560385b78d6942c86e2792ef2f9ff7e830bbc376205b856778c84cfe1318d1a1af
SHA5126101d0cce1e4326c38e6b170071151f4a66d4a5f9e44d186589acc97a06db760105f99f3da3e1a4d196f4da97f2cc4428cd248f47ed483d850991adcaf19828e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582e90d337603cdc16d63399aae221e86
SHA1addb470ac73de51566a73e933aed2a27e144b90c
SHA256a71bf17f0c73041aecd22b437575bf250322379ab8aea39cbb6f88bb00b19fe9
SHA512478baa70cbfbcf86cfc597db1df14d98313ce94d2cccbb2e6dd424becbdc5c6cfa650e098c48c728d2669c7a5ef67e5ff351ab57cb03cd0f1a55226ceabdb3a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4d8a1db036ba3d710ca8a7f8236e609
SHA148079df10fcebb1c5fbddd0c5c9fd12f409dd962
SHA25693ec0e61d58f35bf9a24da540323be705612ae27bda6ca8a1264c4916ed9104d
SHA5127ee1baba4f6bc12734cc99c4107de410d30b0f2972c54e0977382ef044b554893cb50288b8716c25050f9802aa0bbde82e3ff0602a8920677b4d5c8a873a723f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c379fe6da3e429923add3807d93ad586
SHA1716b0d6e43b59e036eb8f2b96905daa3bdda7def
SHA25623ec16167061d4b15c341993415ce83546a2b0c12507fc3f784c756c8f6e50ec
SHA5126bdaa499605183f9c2d8e6d6e33ca77304963c019563ef5e89913c81205926761e14684fbacb3e00051270c3b6cdb143f7a3b60f16ca5b054b5239ea9b019991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544274897cd2665f16b280f1c412f6ae8
SHA1536708336339541b56a5cf481ab77fae21104e25
SHA25653f810ebee5a7504adef1aa7cc87ea318b324e86192db7921ce38d49014da3ca
SHA512fa1e8905f9f9a47923109b581e7b99d213dff093777f1e66e60f8dbc6cf1a20f6a772a2ca5df94fe46eea52c36135ae211c2b5fa5984f682b211b2fefd458437
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c01e7af8b20d3f4e8a8932b0843892cb
SHA1ea6640da61a3fa9cbcc171af61f1d27e508d9d6c
SHA256ffd7f53f82cd18a677938eca3ecd6c3d962c5b1dd98fcef680e810a4db7f4ce0
SHA512cb107d664f45004e7478f5fd5e6963daf7dd7ea789d22f8a734bf3d1468103e9726919b0614edea737cf96797b4c8167bfbef00e6e2c98c3e93b11093ef69635
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506c8576efba2fb015cde58d0632ecbb8
SHA1468fe0524700711bc61af267fa9201082d4f1e6c
SHA2568afbc58cabd4d5b788d5344e0fba44c596ea58a1426ceb6ec63501d0cf05bfcd
SHA5123fc78df8756efc111c3dbe413353d6360ef00541a32c2641ada1192163037bb5217fbeed197f8a37f7d0bbe9fa3793ebde3dac83baf7ba8a8efe4759562777e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a2bd3bda2567fa442a0f48252724aa2
SHA1f2dbd65ea4cfd094080d297b91791a282f4bc9b6
SHA2564c583f5a31a24486027e04f9642ac58cb916b1bfc2fff404a83261b007509b24
SHA51218b349afc971c9ca7bbb2636822bf1776d08b1e79293a687c17607da996ba79e46d4623a4723944ecfb9906276015042e5b04b01c6987376965a17e4d6645dbc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b