Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 20:06
Static task
static1
Behavioral task
behavioral1
Sample
dcf71ace7d2e41347773b2fa7052ca3e_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dcf71ace7d2e41347773b2fa7052ca3e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dcf71ace7d2e41347773b2fa7052ca3e_JaffaCakes118.html
-
Size
23KB
-
MD5
dcf71ace7d2e41347773b2fa7052ca3e
-
SHA1
f0c628ccf7152a47d5e3a4ed5b57456f9e599851
-
SHA256
264911148ef8e454313c10d2a7fe7678cbabea48cc5460f6fb46bc212757ec49
-
SHA512
d7457dc8c4a11187d2e7e7ecbcb28ee4da59ccc6d62f309912b1214b92bf228e1eb23738422f6718556244aa4e4ed7a2d2df3a39afd07af871c3e81a98082adf
-
SSDEEP
192:uWXcb5niWnQjxn5Q/BnQie8NnInQOkEntTrnQTbnRnQCCnQtuwMBcqnYnQ7tn2Yw:bQ/6O3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7DBB4D71-7142-11EF-959A-C67E5DF5E49D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0f25c524f05db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432333453" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000d0bc00964c0cb5d1fb1fb650dd6ae9332ec7898faedb9a17658113520620b5d3000000000e8000000002000020000000bb915d19980aee8c0713768f2ef3528274fc2935ec23261e474903b866151e3920000000c46ae123b7550f2ba28a135defb5e41e0103efdafa36a1762ab532d2cc53840840000000c269b92474c1f4470cd0914ff23b634003809a94c018a74d576d676e24d80f0b4d9f7c37d9d5ccfb457ebe6be9067371a837523fd9db1629da65f64b594356ef iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1820 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1820 iexplore.exe 1820 iexplore.exe 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1820 wrote to memory of 1280 1820 iexplore.exe 28 PID 1820 wrote to memory of 1280 1820 iexplore.exe 28 PID 1820 wrote to memory of 1280 1820 iexplore.exe 28 PID 1820 wrote to memory of 1280 1820 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dcf71ace7d2e41347773b2fa7052ca3e_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1820 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f6e6deb518fa041aab27578ef344a74
SHA10d98eb10e60dfcc658a090c6f89596c84dc38e5a
SHA256c285d201f694bededecc15a34b79d4bd99d2f0106877b457cfb589ae7423f785
SHA5123d2132f9ccad549773b85d6a6bc12c28baf03794f2b62d02acc1a73cc0e965d4a62fe98191846209f3f7f0fb19055433497edd37930546f5882f5d554c15e169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d35cc67a3cf1cc250fb9a05538750c5f
SHA14169b9bb5cfc952a2a9e53a1c8cad334ec20b14c
SHA256aa21c64ee4549c1cbac709c66607f7fd572e525c53c592dbb2f1e50032c68852
SHA512f655c15be577ca25cf8676030318f96a676bf7d816fc356d1740947dda08fe066d0a78046904629c3fe18a1c4b55e3743ecf4ba83bbcf2505ac514f1bc663870
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdbf8200b99abfe2d65f05c515b3f262
SHA1221ecbd625913ea5b620583c42845d33c65ed8c4
SHA256037c0d4793bdb35fb7b5a3d2c6d6d50b6e0b9cd7ff3efcf2789bf423f8004be7
SHA51274ea30ccf6cb2611dac432ea11a6a30a933dbe0df41ddbe0f9da21ec0dda7933b4c243806d2f9b5f340277216a0a14de99b2a5a4b59bd5b43f528f69f22910b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c7cc87c12f370e4413694de3c765702
SHA1745cbd4a7101d0363f9812906ef4e093693a9414
SHA25663f9d6a2964dfca8c1defdee210ccdf3ecd122899562cd94b1c1a4e7d65a08e9
SHA512e1ef34d77df8f7ac4dfb677baf0975f793166171c13e75570080a01cf9f28bd9a639bcc2b8f028ab0866b0736aee989877526b0d19d42c74db566d868eb1b840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4d328de742f527debefc7ee058f46ca
SHA18c68ad3f339eb937e7771fbefa2670cbe225b07c
SHA25609310f5d93a4364b9ddc84dffcc4e22246ac4b7cda3f95d9a496ed3a3b7bf87e
SHA51201a1bd3967510ed766106e0f29936e9a5af4ad3834378a6163b5d490b7397995e51f224ce5548207421a548cec5ad64f41966286466d091769b6cf6e2da8170d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597feffd2954eb71b8839de01cf95519d
SHA161d7117ce6b5d9bbcfcae19d31b6dfddf4c38549
SHA256edb9fc98c06ca579ce1578bef173612f650cda4dc5627bf44c3e44377d13bc20
SHA51233f1b8fd5fdb7eb8e7e45aec803432215d707bed0fe00c3ccf10fc51a12467959c50a02096f9f9ad51395be6bad9dea2481a2fde9335d7e171d11ac7f9feb3d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52a567fbbaeed3996386d824c2c02e994
SHA11efe31474411652cc5a1dff5d2f51f890f82cee0
SHA25640ea73d61d89cc8b8f2293da3d788f60e04d4e1344a12b93143bc0a5530fff28
SHA51239df408437a434200effd1194b4fb4a89757c74491c09cd5b6eb16f6d4607e4ca08cd576c51e88abb608e1a72c2811683f79a19be366b5041df6eec581ded5e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e627a3d6eb06573f728e9107f444188d
SHA1c5eaa14699422e650f8c3c38a058d9a4b4ae937a
SHA256a216994d035588783134b62915587f8f39d6a550f9833eaf12d9610cd8e9a711
SHA512aba06c05841fb7f530352c9e4650ea56e039eb12fd61461f7b12c596956cd171f1f1732d1f9994f158e5afdb9152aaff3960a92a4ff34f829000fed79467c407
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556c62852527ea8580ec9f849ec36c090
SHA112d587d13bbd4b588f8510426258618761b27212
SHA25608c4e011dcc326eadd21fcdf7d1b2c6a317b0ff00ae9dd374c6ef7b0a0a8e30b
SHA5128132ede8de2d5fc6594c96b466b32af742b3a471b1c34d93e61516682887159cf9764001e24581d60d73fee6982da963cf61cdaf3e3d32779fecd2db7cfee97d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56efefe0c17bc13fd775ca71f7ed379f2
SHA1ec0c4c236832c5bc7aacf0ff1dcddfd39ac5c861
SHA256c88dec0e674ea21c23e901c0329558100e239426f5b170467095c2b73f014b5d
SHA51254c0bd098fa74a5e4c29748198381b818d18fe539277a7b3cd62a2e672a2ecf2313e9f0fda16e5f2c9a4f9019f5872f1b8ffc935114b0bdd624760ecdbc1ec2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bc51843598ef6ed6a09c745b8c40fbb
SHA147cc383de1cc223fd85f25dbe46b5dde5b45c75b
SHA25652595a31149b52b218cc41bc80f0c83d1bd7b728cefb103380a3dcaabd1f4353
SHA51237e305a99704554364f46b20afda17b01b29d0b2312bb1cd0734ffe3b60dfe133903132da66b377e3ecb3ccf8179c47cafdcbf1109f9fb25a938d91d89be1e02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d653f7c51277d9f29e96936d880714f
SHA1ad80c003f6bef2df86f07e5afa8f2054ff8d3f8e
SHA256d46c67c05cf22419b85ffe35ef298918d39f9ed6d3ad3ff4ec1ebcb69dc85d3a
SHA512fa54e468ae64295d9d1a18f635327c60a6b5641dc575b8eb0b3dafaf34799494b5d518cd3fe0068de91f83f3965d0009659ce34893b91adb61d9c105d30d4c02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cab1c4b3095365cc0f32dab456e16e34
SHA174d34977b8e0ed9df2bef4189a3ab39e079038f7
SHA256844a9d13547d9b92f4d6ab2ef5e2b66b738695999a251e986b59cf2e88bbba60
SHA51227b072e5b9eea11250fdaf78e0e0f3c6abaead762a4ed55f250e05c26760f37161e7916d84189230d70d7fbf190c0b8f87f737e6a9b941961f08c5bbe0cc0ad8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6f0ecea22fa4d728dbff81401de5b19
SHA12cc4fc3a8d0828d8b8a4c5ef7635c0bdf387d7f6
SHA2566743f36fea84ccdace7066e7e3365892fca177f2398af26193e3e77d63e15efc
SHA51288385be6db67fde9075f84ee16055f146f2ad67df84c5caa32d831c7505864d85cd8ae931b297dbdebbb3006ff4f97c875d57a295d26af517141017c02fd854a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50649b6f5dcdd9900e2e3a93675419976
SHA1ec88a7a771e4c93effebd86f4cd48a0927268ad6
SHA25607b2083255767a3a0a7c4e72b0c194ac56c2e7cd937ea85add1ec1afa78e3f27
SHA5129e2c6d4fc010ba0d76aef5cbf5147e83a048fcbb4561aeb833180213fdbc8019bda10946f702a1521925d76a63c7b49b01ce1c2e01f30a9a0503fa65b6e5ae0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562ff1d7014190899bbd920543cbab5b5
SHA19e2bca9dcfe154f766ac36d7dcddaa3ab48c6e57
SHA25682ca0cecc2be9616b9ce02737aaef270e414d9118c3440432c3e4a6ac4bd0335
SHA512ed3e3c3cfff98bd84d508f486d74bfa8de0c3a5ebe9644b491b6b5c5eba5d5b20ef2070ba36f6dc66658d9874d3cd842bef41d2c7a5417579ff368c660ebc9be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597ad9489cf6809b6b2990fda749aeb48
SHA1020e8862f93f21f9ab494ae8573dea4d12e386b9
SHA25676ffb79cb99bc3b50e32608bddbd794f78ceee5e5e402c88faf9acb44dc08314
SHA512186aeaabc0282069f448477d64666030cf36f607031f2f1b916f1440b40535513ff16c91556ba59b86033df1a1f1e3d22b2bbc6408517df129c243f48a93834f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ffe675f501cceff306e3fa95cb83043
SHA14cd984f7bdc5f950532f9da540a1db7a986c0033
SHA2569d792dc64a842c6622aaeecc0fa56dd2ffc0d701c73fe0665ad0c95f4bbba868
SHA512ef7d0f4e5d29fcfdb4694ebb0a9397111d1f53ab8f50d4043440aad90604528d7e26ee148dfdae476844a0f5f2c05c40f819fa608c4c46e40f326aca695479a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52dafb363ba436b5ae8de9949bc25e959
SHA1d62ce391031953c27136fc5b299443e164f5e5fb
SHA256cabcc5f399a2fb7378b2ec420ba0330eb2b004193b0727e7871a7f69955b3a1d
SHA5122f25932fe2e4a286e71cb56c8b97ece9edac50fcf77e239617b8dc5b981dba664459ee76523986f0220ce216c6e79927f6c6563c8fa304fd915a842ce925afee
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b