Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
ff2daff3785bfe0b2ded5a43b253396b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff2daff3785bfe0b2ded5a43b253396b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ff2daff3785bfe0b2ded5a43b253396b_JaffaCakes118.html
-
Size
4KB
-
MD5
ff2daff3785bfe0b2ded5a43b253396b
-
SHA1
106fc857c1e68516c45c355a627f42d81544ca16
-
SHA256
5b6565a419dc660debae9e079c9f38c934bb545e65c170e85cf9d6a1470d2bd0
-
SHA512
fd512a98da974fead636a2e1937b0439ed13a438bbf82c070f86fd8d272109cae56a91fec85019c94750b48c735c6856ef0e5aeb1b50e16c553443205c6d11cd
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oYHZWZd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433798410" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea220000000002000000000010660000000100002000000070524e70566052a09f4e67619ed4d181920df7e5ed83dc9def979f4efb192b3d000000000e80000000020000200000002fe584e8a9440ad48a6684b61665ad568e581aed7a7eb3bae180344679d3bd6b900000001692d0d064d6258ce531b4075dd29fbe455dcdc5a45a8d7e66faa0350dc11654a0ce21f7790cdd2ba8cf6820bf09834d3da783ca7d8118c3d597010248596510ac509db2a8d7f0101979641321d61d9bf0fabe549554375ce111b4ff436aa8002631af38cc0945c9ea755657232fb1e10f443dbd194cc1f0eaca43c3d82f61168f5961e719275c3df058cc1bee52219a40000000106f437755d8c8c2666de541a3eb4695c50fcc254f903bdc24bd0fbf8343f3653a7336c5d542a8f6dddcf43dba3b459867e081c9dd9aa935e63b1f51a9265800 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50760930a212db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5B89B101-7E95-11EF-93F4-C28ADB222BBA} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000296d7792831d0855803b2db9db2a2852118d3fad8b9f36a780f30dba1932ab14000000000e8000000002000020000000cd4472a3ada78a2542976977213fbbdf2a82288a60c5bbe27927b892275e6749200000007a1aaf4f0a7fa23dfe42a1174df3a46d78524c4e5316b9c370d141eaf33ff0a0400000002269ed5e545eb3d658feb828c1c6f26b944b980b86c8877f9bc34b61e9d7b23f9e3faf2c354f535060ebda49be780a23972482efea5ecbb546e94ebb10f2a06f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1688 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1688 iexplore.exe 1688 iexplore.exe 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE 2584 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2584 1688 iexplore.exe 28 PID 1688 wrote to memory of 2584 1688 iexplore.exe 28 PID 1688 wrote to memory of 2584 1688 iexplore.exe 28 PID 1688 wrote to memory of 2584 1688 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff2daff3785bfe0b2ded5a43b253396b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1688 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5397feafca3be6cd7cf1a149ee3564c4c
SHA1b695e24861179730912836720a2251d9ba5cbba5
SHA256a268deec81d850a4fabe7c37bac619d2b4218e805bf2dc0b96fc4b49690dff1f
SHA5121cf47b43b6df5f75f18ac56ef9ab2d7cf9374423924f631e956d533f5b4fb7a6b540db6d467630d02f9539275d6987ea83110c7c53febb95fb89d14a7f6e70ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e8b82f7937136c09e99aaa93491a32a
SHA1866a6e9a9135f9b447bdc38587330109a2c2a9bf
SHA2563434973028f1a1c6629957643fa426cc15eb41b061908e71842c996b7128796e
SHA5122289f835ed2c507c030604ab827d1dc04810755d07350d1d6a744467a166b7dff3acbe7490e6627869a08c066aa8c9c8a0784ae89c7b38016660b2629a1bc242
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a765c794d77a231e094134a202b455f8
SHA17fce47c5fec865383953eb89290e3a1a07931c39
SHA2568feead8f18c7612a07a01de4b12c38bab10cef359e557c3885998322a5d3eb4e
SHA512aebe5961f155171e7f22fc54a762ecc5b59ad4c737fadca97c1ca85b0baab047dc539b0737131df4674d4d9816182fe3c47a91ca02bb5c7baeb70d7e132c8ec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53aae25f3b12a7e2d967b49b01a94b34a
SHA12486cd6b43a71adacbab5de5ec6ad86f7c92940d
SHA256118470dac7f4e92018f3d021a7ebd77954764204b3cd6a252eff1e56e927cac3
SHA512183bfeeb6a03c59332e4eca0e9f2c170071b94c5f3debc9cfb70dbcf7b95d926d4a9368336649a57d1e70954ec1a20cb78082b7830d9c9af25ed55ba669ffb0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50936c595a6a9e4a2aa996789ae70f061
SHA191d09d07fb14b2bca2b865ddbe6a70a467678185
SHA256c7d10ff202c356050b25276b10e89946f77a01b889f228e5528e0c98ea3e5bce
SHA51288f13ed9b61bc4b943666291c02119e71dd325717a06adfc12e75c0685a5121acf44344e3bc5e80ab1f1ad44eb32f4a84bf9fd70a22b78dedd2f098c77de34ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54975e9ed7e380b368b92a4298aefe3ff
SHA19c6ad62607d60185e72e6772c43867723178a9a9
SHA2568e00a09112fdcfc637a48c65832db3ada22e33dba2e36fa2204a05d642981dc7
SHA512a76e481929ac3d58f4c380cfdd02aeaf846908ee045388bddc0f776bbc8bc48c8b64a8ae874e10da2371ce7cfff4ff840327703af32c88085542dcc6e933acc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4c059e6d2fdaad74cb6d5f8950936bc
SHA1a57f15ab97bd5047547c96e90d8d2773ba296e4a
SHA2562901ddaaba66b67300aade617c61684bfb4e4e341dbb5d2c7b5ed02a3185c3b0
SHA5121d766629bb070fc64f5a5be7404a9f4fce734e6186039163bae350e7c8eb051ea41bb7f94402d7f0cb97a86c04e34f8fc1f5eeaf5d678bae0f08f20556dc52f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc71fc1406a88da8cad0cfe7ab5e28c6
SHA1059090a3d9ad5e242651ce1556b2fa1d8962f6c3
SHA2567d9ebeb39fb8487f7eafb927cde9ae45afc0b7ad89f75ab71aeff9516ab4fef8
SHA512964b52d4b333d329ddcb3894a8180362b2e089b774282bbe33c3d685a31bde133bd3913169e3c7914a19610a9281d433d084c263f94cd6fbc361999c0451f3c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbdccd9f937da50d2724e09efcf21a3d
SHA13a069a977c62f69286c3e6381966b94d459cb3d4
SHA256a7fb1c0e9ddfd7516e7762bde290405ba6dabcbe301a9c5d145e679d0fec18ae
SHA5124437095adcf7f9a63f448fa8dae80415f33c7e75fdef293c82a75612f0856d87a233ac7586dce78c4693646f23d83bdbb08939e7b1545feaca45dd06903e07d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51de1a95585a1e4e6f8869b40b779dc17
SHA1ecc9e7e7f84814544cd4436e827c346a3e0e30c2
SHA2564815086c1cbd041f021fac81ce706e5d747bffd06edca9034e6f2bde4b25b554
SHA5122272f4c79719c951c66bbeace121014f3b799fa5a7e7a9f3c30343d7c08f4774d2565cc424b24f131f831826f45ebed44bf6c5274efa42b67de044458975e326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f848b435c82d553e12fd42f79a2905dc
SHA141d1509a180b1c049f6979ae4876f1d30e2d4fce
SHA256fcb19924d4d66b1b656527d26c5e36cbfff77ac390e861b0b4435e4b41267682
SHA512f7da79db5abea4d4b81b5a964ab2b92033ba91ec1cc605f1aa3b907891a13fbdc70d808e53e1ff2a1c2d15203145b40a124264b4c71caacac0a45fc7f87b58fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d62f74d8cdf2046ddb56bf63fa7c90d0
SHA1ca93de274661b4be05ade242a5f442c0bd23a9e4
SHA2569c3613ff4c9136d3373bf195d584332adcc3e86704ac8b9ad1cf207b4de6c6c9
SHA5127631a68ad3f78a0137516ff95824aaafc31b2f906c153e55a255f6152a63eb7ffa82bfd44d0aaf5baa4715407a530b18af766ca0afeb7053cf3d5605aeddfbe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5928e0c0075d932710b6ebe753b9cb572
SHA149d0b8adc7a209082eb67ae95c8b4eb8ecbac1b3
SHA2561f4c2ac5835a1980a5e5c59f83e9fbe03b2e510603985fa3bac1854deec8d3c8
SHA51226d0d2e37ced810abd64c968e47601b1c0c1fa971d135416893e61c25ee01a26f9574ebf80252e3ef82afbeac7e29353b91a45d62b1bb21982debef5533cae43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b5b9019d636feaf53b9a3277f2e419a
SHA1e7f39bbf2c9e07af62b54c82d9e105e6438e498a
SHA256e288d055f300c4e90beeec4684aad73db6a0047a2a3598255a504736c322ebf5
SHA512da33f72a0dfdcb3f06a2a4305b1fc66ff171bedeb7dabf3079c0975a30cda91a24fdc074ab84099b6fffe5820934ed7bc03cd34e3dfda75a064d80c530d0db0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7a602bae5f414eaabd3752b447dd1fc
SHA124ac93bc090986be961e959ff3d9cd019f26c3df
SHA256cbae49e858b24a6491df126f3130718124b4be2479a8527489737dafcd14fec3
SHA5126f49711df9426b0b0fb8b77af39e1331c632fc904993c5138a9fc87f3b68c3842605a0aa1b9e7edcfabefc5f762e235b58358d3eb03b09141d61e256a9e4beb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55858ce656b03810c551d25d68a632b3c
SHA1b14d91fa15c46620ccf493ad5404b12b4d7ed7d9
SHA256b8b22f3a49cf79fbfd0dac58ebc594565aad1dbd48e490b833c47a622f405732
SHA512a88dd6ba3a242832808b0b8020cf2cce6b4d2d419850053c3b75c441de4ee741ed8e42c56ed55d22e8da9d204dd74c1b75293c3f01275f16cc2785208ef4f91c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581cc4856d0567bc3d5dd7bb8d7596dc2
SHA1a161bfe6908127df9b75f06018385093704c3953
SHA256e217fa352845e376bfb033aceb85a218755b4cad2688b5154ad8cbfb0b0185b0
SHA5124ae1715e9e37b8fb198d51d5fc34301a49e9e3cb2e2c5b66075940c0dcb1a7e6455e74aa804bb95198f22c0a00dce58a7193e83a787a3e4ad6d6806de7d1ded4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6c7058a86fe8762a99bf1cd254ec4f0
SHA1a6df0b948b05afd9d9ce0fa94b98953a3797e8d9
SHA256e594594d3c0a1aa31eecc51b38ac774d079a93766a30f2a38ef69c64166b896c
SHA5129e4daa41285a05068b6afd93d34fb38571d75c0791f2bf517abf42312bbb87f5761a20aeedd1850b3453fbcb4144c53592b5b9519872dc6de785521b00b7b595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2e8976bbe104a427082f19fe48b7a7d
SHA1f779436386adf4bbd23fd9d7305da8a8a508cfb2
SHA256a9004bc906d538f6dbdcce04d57ff84b2358875b42b3a551f8c0d26c6192f104
SHA5124ed5b2588d4086a8393bf17b83a9a8cd3d77bc7952e543262703562a6d3fecf5bdaa3bec968e1f7f7575b6c1ac8e73a5a70d3461a37fdba1706978c38d4a6b9a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b