Analysis
-
max time kernel
140s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 20:38
Static task
static1
Behavioral task
behavioral1
Sample
d70e90ea9698227e8e83ba66c329fbe3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d70e90ea9698227e8e83ba66c329fbe3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d70e90ea9698227e8e83ba66c329fbe3_JaffaCakes118.html
-
Size
26KB
-
MD5
d70e90ea9698227e8e83ba66c329fbe3
-
SHA1
b9445c4d99f645d89d759a7246050dc7492655ce
-
SHA256
8a834bb1ca1557ca0a0df7a9d38ef0f063f044f07c54294fdf9c5649bc6a6e57
-
SHA512
bc11956de4c59ba164b72b552879b0aac6b47ba2cb84408ed4f41743a1e7df559f797ebb0b52037239a3c1f6e85b28a0fabff9732eab5bda28cf7fbead6dc546
-
SSDEEP
192:uqoHrub5nsanQjxn5Q//nQieuNnlnQOkEnthZnQTbnFnQ0CJVevo7NtFFo+NzQ4e:nqQ/WygcmI8D9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432076211" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000ed7b2773e83e6310ba27009317f2f1fa39378fe9557fc265023bf8e2c532e73a000000000e8000000002000020000000330398d1e5283c7657a9a3be084a4449266ad11e745f7fe7e33b94cf56064e4020000000a271b2fdb35dc1a43adcce8bab32cbf6d12f25b985461c3573e72e7be25380cc40000000b936436db700fa5838c33d4ccbef8604bce7ff78bdb385b5f3f0f7ef5db0b685638ffa322a18a52ba79c543aff8d040fbd8469496f34115441f2688ec8389511 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0c78a5ef802db01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8965BA11-6EEB-11EF-873B-E28DDE128E91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2840 iexplore.exe 2840 iexplore.exe 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE 2444 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2444 2840 iexplore.exe 29 PID 2840 wrote to memory of 2444 2840 iexplore.exe 29 PID 2840 wrote to memory of 2444 2840 iexplore.exe 29 PID 2840 wrote to memory of 2444 2840 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d70e90ea9698227e8e83ba66c329fbe3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2840 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b7f023b14bec01fa02050794c52693a
SHA15662db85eaefc53c5ff356cb50261e9bf054b3bf
SHA256b995b28962d2b96feefcfbbf8c02b3a6153cabfa73f923d466fca63f103ffdb6
SHA51227ee8cfbadb9de303bf0c342affb5a3a7390958b7c6f5560b0b90d5c22f365a4d2a18db63e2911d0eef96398815dfb1b1bf551c717b2c7d11d62554bdbd82549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52f2543deea00c165017d92a7220f69c0
SHA1bcec24f8286bd6153311a8c2bcc40781e5f08ecf
SHA2564bf6fec89e1b46f6c57e414ff7a226215376620d87d8b25add331b6ecfc35ecb
SHA512809d82084f1cf71e14bd3dd2813fafe2da33b493bfb8d53197a181cedf36c69bd05644a4b1db2d9244c1573d42ab8f2d9236ffe29ad08f9b190675b46b611af6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522d148e3cc3e9de419bef42a4fd70c1c
SHA1ea5fdf9b04401a18838f77ded7f0c05425ca665e
SHA25630c8f6c236f5d63bf54206014e4a9383f4a90c8fe93b010310b1b7607e1c1816
SHA5126797abcfe3b44ff4452ea8337e998a840a3fb6f9f7f443150361b1fb3184ba710d91a9173f739e45f8e80ecfe02048959a7aabda926fc1ab3f02cdac36c61116
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be4ff46761c27d1d463ccb8655674f0e
SHA14ed24a7538b2baf24ed49c657b3b5450846307fc
SHA256533c7b758a08787cb3c897e32debee67d8ed2bbc1bda3d15fb66f014f2e13aaf
SHA5127ce75dd605c469456cdf4441de703ec61aee2b86cd239f412faf247950e58b19d9c93980012fdac6df3482cd51732118cb000cfffb22895a2c76dd00df8fb81d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597d3936c9bc3afe27b1bc91bf3801478
SHA155cec57519f9dd87a0dc72e4daaf24644bc6e526
SHA256b382ce27d8994bee551e2cfa956c91fe41dfff5a4685c1708079784db6e8a84b
SHA51206f820882e41820666b8e710a4ccb98e6e4049685383a180669b78f2a1657b4d69cda3565127a1b8ea174208ee0bb967f01ab39d64e2471b6ef858770f7fef5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec91e468fe3aac4d32a44786bf899333
SHA194cffaaac49b1cdf4421fdb454dcb13a429a4ecb
SHA2566a7c003413ed2830f96a751b7b3658d256826a2f2e5b5fb9cc45fd154e3de32a
SHA51222dc1f04b9bae088412901af5426057a2dac0d974944660cfaa29810101bf4ae7cd3024e573af443fbbe51adea68105d86ef69296cfed3019b705ebfdf463cf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513cd58253d6f9ab3ff903557198a3acf
SHA19b45714c789b191e278cb6765596c92b7c067a6f
SHA2564521330209de6bef0eaced95faa6ec7add231949473b1adb69d886247f97dea3
SHA51207dea35f4fab9b2df54622c68658cc514919630620c5354638cebef1b0968609d3741c82587f4fc06e168e65860f8ee74e83c038f94e4e1389b964a47f0bbdbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c84cf945f55da06c810010b1826ea7f
SHA1034c41d502144a16a11b9ffe6427707ea200e8b4
SHA2564df0e25ac65ed81b8529828e843d826635bc0ccc0e098255701feac101596c45
SHA5123eeb76ba5b19a17d842022f8901665e206abb5e6f54028f7c3da424f738c9c1801297a9cc72c3c92a24aa215959e9be679d3f6bd39a2525b8802bfc701da811a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdc81b444b754567cac22279b0365a9d
SHA1951bf86c1ea0a4561ed304026165b828f9679225
SHA2569724cf3188fb25e7d01a3d1ed8d4a351cd8d7278c6ceef98f931ac2b0a29e461
SHA5127fb95ccd0174c8e7d438bad005a0d1ac1eb9c942b556af00476c5a9547da5b9cf55fbf1c8f78f6189a04101bd5690ef0abc86154523c8cc287c5c9620b63d92f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591e7788b2feba5dc99c64a8138cdc7e3
SHA1496dfe200b3ac283889e262e14819033dca6c156
SHA25691459bee0c055e49c2da6d9811d9f2f0e8c59d8ea956a78f7af89f96e1a9a3b4
SHA51201daf518b6903968484b265a792f286cbf827d26e7118819263e5dc93c24fadf7244fa7a00f697f0ce88821b6589b0b31285299d2256401fca337a85b46fd36b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce463bd5ec9dd961db01ddabfc0b7715
SHA1ed6eca22315ef6ce34b4f68c0979b58d4b25cf1e
SHA256630c7c71d2ac94c8cfcfa357b8fe375046906a11df216130fa3fdec887705b4a
SHA512689db2c71bfb55e975c4c7402d683502b1320315f3e0130979cd9ddde1e0a6dbcdfaa0d51700a4f822d2048e527a514e461078d8e36dba931d9f929da0105d25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595066ee89e19af008440c3a1ac627d40
SHA186ed0b93c9273b6667e348444203bd56d0733c34
SHA25645bf944e991d23e2866f37fd3623f9a06e62729f5a6ffdeeffa29a0de380424d
SHA5125d8368d661c714bc6fa042a9817203a28359d019c587323faed41ddba4de36c17328224fcead7ca32209bd180d4c82a687e5db143d3ee6d0bf833a9893d17419
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503c7a8ff1509a64a4a362d7e2563a275
SHA134dfd31e5140f25992efde26a8a89ea68c6241b5
SHA2569111570b3c546e3ae02905a128567814c1ea5c1e635b9b8d5c47f46eedfc03ef
SHA512e139afd73a2aa252ee016f3bc1836f9867963b22149f441d6a03accbf35a61d0f44e553ee6f7be56dce2204072784e9f7c62f38ee33d51a90add71e56496a093
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599af96a4aedeca1855046d5550c123e6
SHA143071004f38aaa54b0b8b2605527d5e9b8107787
SHA256e6d5d815d3b130e7a562049495adb0974eeef5ac056bdcd947b6cd7cc1cfa9b9
SHA5121d245d09816ab3b49bdccdc3c2abf3bab76b3f10030e6e756fa0696d1b4f2b2bb0095a8d42d31a086f77175d472c558ecc25c490c02b09ec7ec521d33d54a30b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576b8b244deccc87a68d03acdaf829a3e
SHA171ef9bfab91a074404711e3cddf84fdce92b6c99
SHA256140a40048f420c8308cb55ef1b6ff2f76f054346e472a900c7db3b3d5459bb58
SHA5123f0a647003de49e9c6dae67a6b83348aee3ada43790396b1a0780fb50136943a23af0a8c4fc68ff5bd97919c51b35f748ff44ba633b95aa4c291c24c1860a8c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576d8129648658f6d41c858652434c045
SHA19e70552483c8f9c709d4268e1282405bc235127b
SHA256908aadde3ba9e2098afc9a4c62ecaabd7a2e912f0a1cabfdacb77c767f52542c
SHA512f437fc6c75e9e700178878d85ecd444e184a5a61feda62d29e0d0e9c190f0f4e351842adacf8a00f8afc94b2e797d573f37072b839c3e84bfa2d35e0f6cf751e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD554c6e828484adf15c873fc0b73a3ca57
SHA1bdd7d7bd1b78f7dd967420cc49d498dbf3e8a6fd
SHA2566b1061a57ad6dbb6ab0ac84b54cc955e75669eedad4c888988133d0af7cabfdf
SHA5128862b5acd4679eb47fcbd5401236a166dd20af2e97b38c72ed06bd87c6bc0a0ecc10d444b811f0752f4dea5aec753fd8d3b4e396b4fd9e7c2e63f686e457624d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508381c6052305e40a8c71442bd081eac
SHA1a212c8eb7791523f4d246e466c1f400a2a0368db
SHA256395d2d55629d1d85cf88dd799bcd3a7c3e0fd4faf611ce3d6d6889484ea13eb0
SHA5121493c396d70270c6a625382ba4ebef7abe064821e83d8f6b7413bc0e697c698644a91c79a06c8809ee3f73c020b7e24bf13b9042bdecb708a3d164cb1bb51ede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f3aa69554e21a72e1a15a34b1facedc
SHA1478612d3351c7ac859679c744e29f0eb5fb5d556
SHA256a6779c240a83ef8a576f1c93dd80915b14e1fe412895a6a920a6a8fe9f00c4be
SHA512e4f69391f438cf458bb762fbfd0129cd6f5a585f0c799809f8151f66aa4be83a0bdd8fa494fd5409b9131eb9a79d3284ee1a6ff4fb65d3077ddb1efb36a54f96
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b