Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 11:34
Static task
static1
Behavioral task
behavioral1
Sample
98084dda51998075d999dd00393feeab_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
98084dda51998075d999dd00393feeab_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
98084dda51998075d999dd00393feeab_JaffaCakes118.html
-
Size
157B
-
MD5
98084dda51998075d999dd00393feeab
-
SHA1
5cb472fca0a5a8abffed43bc33f9899f5b6233b8
-
SHA256
49afca88a1ef2d67c697f6e601ab3ac8bf789b0f59e6b4dc4979c7d49e266965
-
SHA512
306c5bcd1df0e1caded75c0c694f2351726c04a447e8c0532fb959943172c95130cd1ba07de8a8e42220e179104e132990c3855d25493eb42d9f40bdb596fec4
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0efd6593cb7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000af755c4e162872429af6f89595a2ddd6000000000200000000001066000000010000200000000cd1eafdbb25f8a42f3f88f1a882407d56e6f73d7231ce26edecbab9c065dc8e000000000e800000000200002000000017f769d301a8c6f263c280859729ef8d0664af94008662b85bec6c2f92dadd8790000000c64fddb413fc02881c470792b5d7d45a920bffc1a66535b3fc5e3693b34b544cc9ebd308f5207f521d9851fb944505cae6b71fed697bc4d6574f09758fb44cb6a224fd4579bcf26ad9a8d65850158154741ce503c03f8185e037d9b8e0d2a360e0c18211c714c3a92106332b2ab45ff0aa33e94b0626cbc72426ac4f3dd9ff06d94dc2d0c56207e2413c65cca291719140000000bb4b85f076e39bfdceee75cbbb23a3c86612db15bb80d7669838f2884344f9674b2fcb90cb675e1b8aba62dae485a71ebda77e5dbe9d8c9b1cd467926cb98623 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{96D80021-232F-11EF-92D3-66DD11CD6629} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000af755c4e162872429af6f89595a2ddd6000000000200000000001066000000010000200000005611329d39f281e3a8d13b947b64e10bb749d6ee6a3ba7e8bc72d21a4ec0e7c1000000000e8000000002000020000000da771e0b9073b193791f3d4a6a634d70858bfda5106a116f77a82d4392339ef620000000d2469a774d27a4c5fb63fbe37dff957eab63fb8914cf1e866c3f6366667d45134000000077a2aa5d775f9a7a490e2104a6554418ef02f8e942dccb4c25a70cc09817eaee627ee9e0500c3907c5a4d254497aac8aa75a46afd1ec78062824521137a5b8f7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423749145" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1420 iexplore.exe 1420 iexplore.exe 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE 2916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1420 wrote to memory of 2916 1420 iexplore.exe 28 PID 1420 wrote to memory of 2916 1420 iexplore.exe 28 PID 1420 wrote to memory of 2916 1420 iexplore.exe 28 PID 1420 wrote to memory of 2916 1420 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\98084dda51998075d999dd00393feeab_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5c13cdf11b21e12ea9daa2c1dbbd0d1
SHA155f0f298a555a8a36ef8f5ed7b395649a2a8c031
SHA256a7ea434b27d52528f8cedea84e03b12e880e5621ae2e0e3c59f69437ae1c0f8e
SHA5126b6df692bdac3d934d58f13fbf83ffa5ab7e68b4c2f6c5a69c18bd9f7f4166f50a443c99a52bb6608060ff5d12272302827f37a632df4a1c2b9eb2eca4bf01be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a469b2153565e69cb63a3966a173bfbd
SHA1a25102169e084787a99a3655e45f319319fbf051
SHA256e8d58b1310dd0b502aa4d84f358bb28567bc13febcb0a7db4caba6b780158948
SHA5128413919ee7d0984f5ec3710142149a84b060caf825fa4ce243a16c7b7bb84ed4dcf96801dcdf8b0091108678330945efd3d76ca9efc95c6753a8a424ffcf34a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d69d7185272bcdc5af30a2a936e08606
SHA1d99d9286460176bed751ab8bb30870eedb9891ef
SHA2569e9f06c5e92e6f5c079ea823d7f2d99c2bf3fa633571aa63f3bceeffa09a5b76
SHA512080d41ea202d02e0b4aaad834db1169f01391bac74b5cea777c0c44b5a58c128d2bd1fca0eaeafa2657854c61a3e8db8db49931a82cf63e89d56ea55e7a69dd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4b0bda79ef2cc0cd3a43935bea1d19a
SHA1a5c40ea8c7835d2aa96c86691e0b39716b7cf7d5
SHA256e1b2f91b44a052b76e8a4a51c557e89be741039ef3a83673227543d5ac9d7320
SHA512ad1df50d9ecb0b692e140a2da819c0e318a17a5b0d86d8a5332171f9cec4b3f788541a20a148391b74a09f9531c310fa8eda325620500db7fdc1c7676a80c3df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd9bc01a9ea6c0a3bed9a749e2dceb0c
SHA1386dace6b7957c41f7791ff3a14e19fbefaf0917
SHA2567070b9a0cd9016037909811ec3ccac95484658ed1611259aca04d1a8037dba0d
SHA5125cd9493baa5ab5195b352a549b9968f66c49def0a79f34b1d3907615d55456796648b7295ae9fd72c9fe383a1744644dc0a5e6a37e55e6878d154305a3f6a6f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6f0f5666f3df9eecb02fb19e32e84b3
SHA1cd9f5e74399cc11e7299b2838c97cf78095fe0f6
SHA256926fec72d4bb261e12c8129442a0546346aaadd4780469c7f4b567336eb6903f
SHA512101c6f7e9d4b2be064076508e6721ff7c599530bf697a6b4bdb4ea345ff162decdef51a2fe75e783fec1473f8970afbc2ec581ec4f26f87bc8874b5a9b11c7f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556f7390ca0330830a09d1d620b232e1f
SHA1371f08876503b2b5465012730c14ba7d1d9faa41
SHA2568d5851f2603ff1ae6725fabc08ee0c6dadb2e3e8921620af709d365263d0608b
SHA512dea5eaa2bfdff32e1cde4984cfebfe46532219bfb44026bc1bcab8134de1a5dfdeb936401640a30cf0bcd51b9b49fdd9b471e42e579922fa339fdd7a941d3873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b399b2e1de04946b7d162bf5deb1b395
SHA122c49802767196fef2726bf8506d3e31fbb9a072
SHA2561c70b84c2ddb7225a5df41aee2eb9233232f7d81cccdd9e3cf0918102dc6c223
SHA512f230ad1a5e15e166e7c21b120f03493bc88e8d769998968e8699cf0ba4ca9692f76c4f8e43ef259cd01ad6f182d53c48b0eb31ec6102bfb8d53b81f3c1573784
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbf1b09acda6bb28e953c27982fd0e78
SHA1c4c3f8b46e5e5796c916f5680289ab701b4e7833
SHA2569ff9e53e01e9e0486afd3aea1ff85c2e1bedc00ef64438fed5957388eb409c3e
SHA5128ac8b347ee378013826f26c80e6e04398841f1ad870bf885b96d93940bbe20ff3e7a01a6f89a1f42c6955dc652055a8e99577d9cb6c38a72d8b5677a931a72df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5963a2d58d39de9ea8bcfb186563d0d0d
SHA1475a52bf473a4f6eb8a4b1ac4a65dd5cb6b992d8
SHA256d3a2c017b4866f96d2e0464b64848672f0c9ec66ee78a2ec5bf3f9965c88e766
SHA51226da5146311619dce65f9ddb4a650032fdb37dc748180f91f6eff1c4de565ca076bf2a5da08236f1c9d63f944d940adb582d8c40c78833da1acb4367887518d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a057469cbaad2f444e33478f2cd3a29e
SHA1de5d419553a8458830d947fb8828bc63fd32a65d
SHA25695121fc8691439b4da6f9645cb8529badff569e5d774a7d67dab95ee4b49f748
SHA51215f91beeccfd318f0bf0a3f889dd406e0eac42153cbb7095fda6e1f278a628cbe4f7e96a2d8a536feb2e7dc4ed5e97d473130f091bc62eb1573db099377f37a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529a369133f01cad40086f3a6c69c5e90
SHA19b64eaa402155743d77ec03589d1c446bda40245
SHA256a4aa1c49e6a017e495bf0f718e01897bd5d57027bab01ef76d70de7e97eeb334
SHA512aafde7f844701f25bc59dbffdaac4c6ee9336e7d3c59a74e33d03e2d07b53d491bfa100da71bb2af04f4227f432277ce979fa5ff10d95d9963cfee5066daff8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e925e1864d49f54e137bf3584fc8ce0a
SHA1147efe8427816ef243fbcb382ed3158e5844f620
SHA25624669cd65ebadad3524ad3387556ef8f58d7a06e575727324cc4ec571c571760
SHA512d68bb1c38bfc7d18b0a4d7904e6241b7b19f6f9ad1fb688165f305c3f7b214ba206e28673204ca6910f586313bc4de385405d3a8d497d2474d4be1ea7b5fc5aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d76b9847cd9a355bc7df9886874b6217
SHA1fd4999ef06ca5de3af943fa98ea7909b56f3b78c
SHA25638bf99dd0b79123d517cf891dff00067ff9f6e56649e9576c4a4c2724b32b369
SHA512b83814d69c6ade0f2d7bd606baedd062875cb15943b6b633716d206c955b7c953366c9b08a3e7984a8e980274c44326ab1c957d1da8eb7f28b4ae02198d0ed67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc19ac5cd2e906adf0322ad220e6c862
SHA1b4114488e2c4a71a399396df5a6a75cc821cfd51
SHA256cb2981722d844fb9c81e658dbd1fafb23ae7477e1840c897d4caba9f32d4f09e
SHA51295e9fb67ddaa6b1529e436679381803dc6dd8db888d0f766a3625da4fd5c94031a217b7aef7c6dfa87e4d6733b65c7a86d7fc672b0d6d0f6b0cd76aeb72cc4ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54787588afb5baa02e44b1b0388230476
SHA1af85324a05d459d221aaed279f3a7b7b5c463b31
SHA2563820b4601703e7271efa892c068b639ff3a12e2785bcb4045ee0d56aa47eb03a
SHA512798fa8ddd731bc0835f5c7c2589f468e834dd22243e4d1deb8e955d5334374a05df7b07c28f84d3876029033dcabd0da141ffef8ae4c1e769f4305eb4925b2d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529fd7cc977fd046c865dc095368e22e3
SHA16b09eb5584a1ab8d3503121142939c6c2ed52a6d
SHA256af2a367ad3e70ca4604c18eb83f038cc4062b97d9e215a298762179f1e7ebc11
SHA512e75e61a98e0131ee50cf12f2e669e1c92476207afba16d4ad573250b134ec26f215fd0ca34ef4dafee7ae7f1b7b5fd2c6e2fa90454103ad54d8dcaeffc54810f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51115e8c46e48401e68ec6e63bcbcbe2f
SHA1dbcf4f317a9819cd0b2fa1126197a48755e71f0c
SHA256cdb7f1a8dec29004a49179dc5cb2de66c857deb3ed432838a37c99325df07a1a
SHA51233496d84c122f8535c6ca98b54620cdbb551081943df27d7c19adf88e8a89774c77a514500599260710a307fe56d3a67b30132ababa9005262d23257a886eb74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a027fd445d684dbce7943cdda8636561
SHA19d0a08190cf0348dbb4a522d357ec186aada32f7
SHA25615e24f2c81b38f50ed47972177eeff201cabe16e5d4647ca5d223cb046ac9a0b
SHA5129decaf1e126f57d01fdf022cbafbc6e28862e6b0b1b2fd962b83bba9351a0cff934d43fee3e1f5279dbe14da39b7fce0480c10a603f915e81a17983c7517bf09
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b