Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 14:53
Static task
static1
Behavioral task
behavioral1
Sample
30735d0570f0a49fd5577389b9cc0bea_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
30735d0570f0a49fd5577389b9cc0bea_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
30735d0570f0a49fd5577389b9cc0bea_JaffaCakes118.html
-
Size
138KB
-
MD5
30735d0570f0a49fd5577389b9cc0bea
-
SHA1
7baa6570e487e78c3a4b858174d825224c264ca6
-
SHA256
58c2696d7d778f38c56049879b0da3ba92f71d2ec6b4c3f60417a52dde5fdf44
-
SHA512
efa36dd176062a99c621002d1879e987eaf2ac6ea03a0b837f47db0994a274ca51080628549b0e84a5878fa353e4fb2c84d784e88ae1bbb1c841d8bf6ea40002
-
SSDEEP
1536:SOBwP28/h9ULJMu1K2Bltwa7yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP9:SOjKa7yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea22000000000200000000001066000000010000200000009af458c217538eb06f603b534dfe4e50227167bba872483e0a2170a63dbec52b000000000e800000000200002000000041e7e8d20edcda41cb679d2855f887b23b820a85c507d21f9d9fad7882d858e02000000052eb963aa3f734c6575e620376858f7de52db1cfcb9ab4508927ad82e62beb79400000000b31c7dbaf4b31bad8dbe87bc37090b59b413fc2358ba110d6ab7af1865f8d1941cfe27f859406011205d8352142db6f23032ad639eef6c022eb33ee886901b6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{71B72BD1-8717-11EF-A528-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 007e3c88241bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434733891" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2472 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2472 iexplore.exe 2472 iexplore.exe 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE 2820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2820 2472 iexplore.exe 30 PID 2472 wrote to memory of 2820 2472 iexplore.exe 30 PID 2472 wrote to memory of 2820 2472 iexplore.exe 30 PID 2472 wrote to memory of 2820 2472 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\30735d0570f0a49fd5577389b9cc0bea_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2472 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a5768c04ecb978eb00e16fcd3a1bef4
SHA115a0b6f21e29f955c2928eea21c725cc6a69727e
SHA256077fd3465b1051cb0a9d652ab725090a3ccf35526387ec5807b5f7700267cb28
SHA512615af7a318bc14c9baa7d02eaa84db172b5a1e329c6b15a59c1110cadaddea71606343b1897eb9901ea8dad5a81ca300d41a2d018b9752d882a641b96bf2ddb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5218e6d7d165cece54f18a9767cd958
SHA131d10a0ec1a6ee323956a7581f3d6d7143e22656
SHA256455856a2e39fdf90f49c82e804b23a7a92552debf135e57d6b5e79c7f288b0fe
SHA512fc25ec2104f787e6e40f083efaddaf6aafcd1a6ddf9add24629ca8ae3a60f01ffc692a07b7dcbf048e4dc16b6bce2e57e7c020a3476e4e4c12191be4746ffc0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565c5804f802ccbe732a1cda67c01a28b
SHA1f425cdb4143551c3e230a476314ed028a9d0293a
SHA256c699b163362f50229b5b2edc0b1211ebd74ebe4b752753977ea27f11d86bbc7e
SHA512c4e67074e588c8234a0ff1897b5537443a96798cc0caf38118dca0a67b41a4bb9a74700c09912443caef6a664191c109f8108549f3dfafd285fe337137a2b760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528d0629fe851d55688d92e1b3de1c3f5
SHA1da4767240bbb80f5e9d5b8c06ed9beb53e4b1dd7
SHA25652931d4609a57186a0402858eb10d420294246354fd2eb2a9ec644fcd8f62d28
SHA512dd4b2da35c90052bf89575d152eb1f948c3368b7d8b12abae56b115a687e0ff4524ce0550193d07b8e14be1411a47d483724f36a76ef3a56d8af94f276261f80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58562bcfa1693f7dba0e3aa6139c86487
SHA1c18ac9ea76e75f822fbdf1efb2e06fbc00786521
SHA2564d09c6cc74e81649bef08f010a4d82b2adaf6b1982297246c61dc693d31fa8a5
SHA51296eefc3006a967a238ce9537c9dcc49becca116dc5f0501a7e0630de242a56dbb9c5a541ac4ef72b9fc83e2e3a89f5483c511fd8b1e1192ff1ac0b00e73360a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5355b373c4548e633abe2d2f97c22e305
SHA19328b2930195541fa0292cd16d750fb2cfd69495
SHA256c4e7817b62cdbc881b4a179f2214ac8691dd593eeb7e79e6f11f622984f4763a
SHA5129aa33f0e0eca166fe2f434fd0e61f30693e9c85dcd00cdb6e84cb329df9d610553c1a2d8afec034947511a9c6e852f0c39f9addebaf19bda7b8e5a97d18a0aec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf87bfe844bc88102e67e5668246680f
SHA194a3ede1481ba09b79fc7f2ed4f6092e2106b160
SHA256971e7bd564c9b3bdf706fd9197b4815b1a68740fa30cb77ecfc36078f8b54c0a
SHA5125ec12de39e6bbd8d395a5476e3b62e2412f5c29750c10a9df247b1acd4db7f5afba250645e98907d0da8190b0d1846e1b80561e0562c35c751681e2de16cbc1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e330262df3aeb5b64230a8f38e0159aa
SHA14ea3fd264981760bd4102bd5db12bad9f0a3ce7e
SHA25622df5ba829363b28a85211ee3f8e744cc46121b4f224fee9eab9a01edb2edc06
SHA512cd6a013ec7e2028aab74d9390bd318e61f6abed7983cf7bd25e44af9592a031338105b6ff04679505007328305add8edd16f029d18ca3fcb07c6c52384c6c051
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcdda25f4455034aeea7c61e157ccd7c
SHA19b02dafba5c3d345f24cbf508f62b518dc50a944
SHA25643b2f845a8687b69d0c351af73957d63693397627aa8960e6455e38f1e1b352b
SHA512592f3bb7b19a07de56974c67e7345d5de331ff2c726f9be663c54dc1988b96730bed2f31d74d298e93caf6942d93d73321f7004a5e1427e9f5e3f5c1b5a85b48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c04f47a9e8e36e0563439f7d2f02498
SHA18f7a848db8161b655c8166ccd232052861628a1c
SHA2564d25bf26600793ea5d767db53dc4e7954ec87575e19d1674595a86b706159c38
SHA5129c4c3b3c4c7a8e93269903c39c2da1b32e943ea5aaea830803f7c37e1ef1ad35b23f7b7d1ec582ce1853cebbf1476bd4b9361b349c468eeddcc2e416c06b2017
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f67a3a9c3125f4eeff4edfdde1e5cb9
SHA1e5cd117cbe3b50eb0273471ee173629c558e8855
SHA2566d309bf8ab7aceae57aea7c10d90c92ddf76a540179fcc88477537fc82f36301
SHA512a10747c4042d80ec1a917bcd48491637171940f6f378fe4e6ee024af1c0254c404ab5afc6985c8c712afa132a4455f8c5ab548dae98623f301e4b0c119cde7dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bcb850e743068bf3aa5339eeebd62260
SHA1fb2b289686c0432ebe55ff95557125eb9e27d6f0
SHA256bfa5ed4440b2afd3294195706fc99c210aa0ac0972fea15fc811a5d729ae6676
SHA512013a30499ad44f83f6aa0fb92dbf543a54d98daaf7f4a46f47fcb42f119068d1a8a642c15ef38145a72c447c1825d1d39f372f9739c27b5f3237f58a260abe2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507d2b13e9026422a750d2f3e307c3e9f
SHA1bc38bf1bb584be2e08ac039620760b04c1ca3a4c
SHA2563380ed93739107f50f9937b57191e504d779a37fbb73e011f418e7eab07aa05f
SHA512933cffe1ead1e64bb8801e2c9ab34c8e3d755018a69bc9b965ac96bed9ad213ec2cb6d2967dafc5447ba69245f8b7189390942e57c87a8ea0461708f65f169a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588c2abe49bdd2519f9649d0af17ae531
SHA1b64db7b51c4051ae955208aee9236dc87679452b
SHA256ef929c4587f54c70a9287cd172cdb0ab1008acf85344df4c87d7307733afe328
SHA5129ac2a603905d0de4583866b6ad184897c9b554467aa2439dbc7e8755d0cac19d237cc7e1cfee200868b57dcf3a88e6d3bec58e662371dc0165fe6390255fbec5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5919629dec2c1846d5bd4010ce965360f
SHA12d9525f9a8636c8cda827c40cfa67a5d1dab8c09
SHA2567026c0c5434c094a41a080e31ecd18ce2ae8408d5019ffade919f6fafc409501
SHA5123db978029b2c1aa11eda43b139409d0181e03edf786b8f09180a270802d36f2e0a3925f397c4a05dc7b7e0d1eb028f982c727d3317617349fe10cacf6a759756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587bd52f0f4056949bcc00686360d04a7
SHA1c23eb7f15171af9b497692f09ed13b7155c6f25c
SHA256577283778547c18497e12e46da68528155159e3f72fb44228a8947ff18a16744
SHA5121cbb188e8ec7c1602d7281286ae015cf780e7e62d93ef85e734d2988b4bf63f825f7a3cbbe57dfa1eb5a41035bac5abba703135344a32f1756d701c5d50c56bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535b05ae2eeffcfebc1536b3f1e67098b
SHA1e162b32e2f8b623c009537a71e0ef3820d546fb7
SHA2567d32c26b8ac884584af1d72eccbe3b5be256bb3b8fb394a1cdb393c0f0232b3a
SHA512ecd86a59d15e15bf96f9b5bd0798dd7c1e73d8c54b9b2c1aa7b85d56da63c2885a85a0a87c6f9df628072e6816db838bdf965366802c030aecf86f0781d746db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4d7eea65155c9c0efceabc007938a78
SHA1466743ec06500ab30038b8e540529ca63bfe2432
SHA256ca97f14644855c2316ef309d53a3bcf51fc6412b7f10e3bcf62555c690f4a94b
SHA512a66afe5333debd824d5e73c78b8ec5700bc9104728fd86ecb6bb221778cda7256d62db09562b57ef259dda3705b75a05520bb6615cd4c83f05ebeaea96d1aa4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e370feb105fc353a59f1721e20b69ebd
SHA1af5b96954cdac7dc73bd3a7a6c75938fee28b361
SHA256d7b5ac6439cf62ea4016e296d255b293c8fea00aa3088069a45e0e215560ce65
SHA5125c6b5a838f5b79cddccfdfb9ded96b9271546f9805d4f590b5a61daa6a40f34e2d14633c64fb7dfb881d3e80b6b437125fabbf5b705f15659753727e04792779
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b