Analysis
-
max time kernel
66s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 03:52
Static task
static1
Behavioral task
behavioral1
Sample
dd9d329564fc6c5a26e72ecfb49ea749_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd9d329564fc6c5a26e72ecfb49ea749_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
dd9d329564fc6c5a26e72ecfb49ea749_JaffaCakes118.html
-
Size
4KB
-
MD5
dd9d329564fc6c5a26e72ecfb49ea749
-
SHA1
fd9fe06c22559e0f4bc752e623d9d7282f2dbe45
-
SHA256
6aeb489b5a2ca455335321d0f98c5f5602dcf4ad743680cacd540472229b2be9
-
SHA512
c2981f6994cd7ef35a24ad09c4b9db80991a1e167a03f091b0fa94ecdb10291793c6bb7eaa1644892166d32ec2fe3524991c6b373124aec61ce3e559326916cc
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8omvCRBad:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000add625ba1c44e9a83696a89c7e6fd00d50466abca05be62d515634de28b036b6000000000e80000000020000200000002c8f8e6a01f4db58240d7a003e83da63093b2e26e56d3c46a5f7cc7968241fec9000000045897c9c4eca8fd524918a9e42c7c0df14989d7a118a03233fc1977f71c1e61b01bffcb55290ea209b0f8bcc7e4a2c860f6d2e2106f1a4843a5557e56a061f27c60b3cada3fea426f63fdfc001c9098314ac8ce9ec5c38ccea4f78ec9b5d67af9b3e2827de6ab9a5b50bb5cda2d6993b5dfb73d76fd4e5575e507c9a3875afc1e00deba52b526a15972bdc7857bd85b040000000e22a8234429570af0d396140504cb322091c15331a62ad1360d0087a8718cc7a1d4fe8e8f369528a6b4069e1eb68c809ff6753b867b1de2e36e7b72dec8779aa iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A3B8E281-7183-11EF-AA9E-527E38F5B48B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432361435" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 808a46789005db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d90700000000020000000000106600000001000020000000f21cca94fd271c537e038cdd66f01829f25ab4f9ab6feed58ca0c8dff25f7cbd000000000e80000000020000200000005d4077f952d6164e77cbb9a28cc8ee51db4139225ec6d97af311693b0cf94cec20000000754e23d42e73b5a504a056728b4f8f9ccb09670b4ec9d1f289791ae1336e428640000000393de26f703c9bb7c8378ba9ede2c76842fbf9661d3d4aa8cfd4233e58e0007c3dc6cdb9b2c6852182b9ba5d8eb031620269c8d540386a4e812953e329d9121a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2648 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2648 iexplore.exe 2648 iexplore.exe 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE 2804 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2804 2648 iexplore.exe 30 PID 2648 wrote to memory of 2804 2648 iexplore.exe 30 PID 2648 wrote to memory of 2804 2648 iexplore.exe 30 PID 2648 wrote to memory of 2804 2648 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\dd9d329564fc6c5a26e72ecfb49ea749_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2648 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507207178ad8c4876716445797f41105b
SHA1b9225bfa3925bcd9f0014b3bc4504ef0b6ead796
SHA256c4250228775bba5df5a5194f122402ee2d264ee295889de9b8c10d4fcdfd848b
SHA512569cd6636e919a24bb5af5703f5cc76ff38dee23dda102df59876388b98ac16e99b80a130d7b5f994ac582c64472be126a12b2cf9856f896e8590f8aad1bc997
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9b17fc544d2214c8f5e507d4c53becb
SHA12640d0eba054efedf23f4f49822901a1a98f70a8
SHA256cfbf900cc7f4576bbc904ad20fd60050c418006a3c5179e1c2f4fcf7a5ec537d
SHA51247c8170f0844b6a9ed68a160e6a22537720764df3b27b5cd1588464567f1750cde6d0b5fd46d432200975399bdff98e8ec4425a2a127a3418c0fc555b6d51397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f574d99620e3dfc321da2a0274b7c0b7
SHA16d1c16bde0e8a61926b7715ad3ff0853766b978a
SHA256ec632cb690309750d9e075a543891e73759d913b4892a67773b896165ec339ce
SHA5125c34fb04dff671f4893b9417211c6ae1235d8527bcf4423ab70ed4e3c1942f6f5d1c69c0b93f20f0b6b83b1a5ac4323524c25859385e66f6865b7ef2807d76c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595d9345e03bb855aa2ae558b35015e79
SHA1bb0aba7eb45b35c4a256d21e8cd0fbef87003867
SHA25623b46683b5e161db872086f397de7acf457e8bb830caad4512fd31c1e61a015e
SHA5123b8bd9367a1c2bdb59320eaa4b759decef15e5f965f3c10017d567530091f0c29491f15345b1247cea438700f28988c7e547b199bef067f4f9922f6181d87c4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d653d4285483d17adc4bba57eae677d3
SHA1b548fd7d62e6df1af1238fc9fe8b3e5088d3f5df
SHA25693e46da897413e2331dfa22d9eb6f05c27bf11c193704d2c63ed676a6e186ed3
SHA512a3e81541065250a25dc78141910bc0e56ecce2c37f63db30584b35d239ad2de79ab2ffef094d4dd1b3e82fc073822474f157a6f6763c2bdf93a64e02290f4f2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ca23b3ea2bacc0efb13bfb912620fe0
SHA11d6d270d69b338ff6bcaa7781b2ca8e5958d57c8
SHA25698d3dcd0319de25ac9daa89a076b9c29a16f2120c7d2346fbcae39b17ffeec68
SHA5126e1d1b4a262b0a1fe08956b1b056ea3938b1bbdaf2ee8565823708dc48d3ec4c7493e8bbc4af0ef7d3a50a1c7493eaca1416094c440c6a1b78a4097db1efb4a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5934dfc3ac9dcf21180edd8800b4d046d
SHA1b745e6596adc50d7405734728779849cb01b3357
SHA256a4a617e87a1e68217acb507fa6077b98168656444c465dacedb870197f783197
SHA512f97fc89b502ed818082f8cff18ade6ee730a527f4211d8aa8ceb60992a7418f912d70692b2987905cf58eb733d2e6aeb7877a70b3f49ebd13a93bd1143e91e5a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f23903d89d6a8e2020dcf7e43ad63124
SHA1b39001bc2bb15a170edda63f6178be4a9546606b
SHA2563127fc57122b7d02a0ac922cae8177acdd82a9c84665b1a13264aa47587ec93e
SHA5127bbae1e4998c1bf5f2e9a505cae776ec0260ad0e4b3ffd2c42932a00f86e8cab9f76fa1c9bdf731359b9ad0d7502be05800d02f8d3e90feccd25735d8cc1b20e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e034e6656d873c9021cb0ad1579386a
SHA1b2b81695e15d72a9d332b61d597cd49ebd20d92a
SHA256b601c0e7eb728e8b4f2af7a97d9032b9478b3a1d833a3641bb8248021013f656
SHA5127d6baf18ac132ed7010611e5affce19f425c519d764fb36a7ff1acb8765527c7839dcb2d88930651b426200a96ad8af0190831506ec3b0944a809d359512b6f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d8a3c0fe913bcb290d0b62e1110fd6e
SHA12b80ef0f667b36e303cdbf6e694f84eb515f7916
SHA256bc8bb5f8de72df534c86bd14b5a3deb1496fac3cb44b0ea48ae9fc471e165644
SHA5123513ceb7bbee9fecee8b5cac6538e749d1d6df4d9c304a508c989c8d534e5438a7594b356789ee7f0b4990e03094d764aa247e1d5dff5cd59622dd1a396fa0e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd2ceda1c02c84e2be1930eb41da26c3
SHA1f659ab8f2856764f4f68c11d885c0e821d45b2b4
SHA256531299b2645037cf3f0c58499f6222d70a9a5333937240c77a3142b2ba9335c3
SHA512a2c518104bbf68c86c28d38bdd4c04c1bdf4a6f6fac86d8ba74e5b511522c0bb863028658875260374714fa905a25bbe9e9c45e4f6a9669b7b6d25b15711606c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53be4a003793932c24acda742a568f561
SHA15557059e1e36beab90e7170752f3757a074c7694
SHA25614f2d268491dfa3e431dcabb8645bfcc7527252b0813da7e4aa1a4158a6c22f1
SHA5126f7144b99aae16dda3dfaff01e4aff071003142ca810df178ef123de86dcb967db10eb4764dec25542f00e4b1e0e0f63e157436d85176541866708be3b9ae9de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552a5d1f2c57f4292d4549c1e0d7432d7
SHA143892120d92035570ad7c0fca25d6104fde5f3ca
SHA256fcb6b548396b90386349922289a79549fc0a1897d15457833bbaf8f47374ea80
SHA51294e8ef28906265230ea0cbcf0b394961e2393b9ff71ddecfb9bb1c1b2823cdf47b51817bb14e09e855edac24cdbd7907f5b7bd97a31059cd7b83f67ab1c27bbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598119d7c1ea796365e434673302a85ef
SHA1440c29b2835df728f7b4556be5d492e720fb3d2b
SHA2567250428095e37de5ced13b04568e889d513b5b2b55a654d46090a9be790967a2
SHA51216bc522ecbdf7be1a0fd328391a0705c571658a2ef2c402895ddd22c12ffaee092e2e3242bfdbb284ddd97782d8664e524fb44156345a6cdb2de2451e0723b46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeadc4d9e62098960ebd18aa18045083
SHA15f1b2f3bae6c08469fc9007fe18de4946d77bb16
SHA2568900d760b2125cbbeef769d8d57756dc888a29042b7aeff17816f2e175dd2484
SHA512c4e4290313a9675f95d6ebadd59d0f6e11a56fd748c7a66a01f0794cb1f129db5c37ab34c73dd5bda960810f57ba5928cb96326a1e35f34741e4ce06343b28b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef2e539b9822724f907a0b8f57565fa9
SHA120efab2ceb74d92ea94afc3cb1656e22f24295b5
SHA2568a47697d222a5aae0c19760367355d5faa2cf133895ad849fca1188d1f4b02e4
SHA5128d19b65c14643e9798c57ed30ac44fa8da9d59640994ec632412118e51678f96e88c07855b270572a190d480d8f8689ad5f9416e11168beff74574d28e390cf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ef5650a601f208e58c1277eb75dbfd7
SHA1bf06e40cfe7793925108eb6436bfc96c743867d0
SHA2561e7794ed582ecb8b5957adb753c3d63d651e97d8e723be3f0142a47f7a3069a6
SHA5123c185e8447e99722bb110451ba54cdc39df2a08cc07abd020d81bdbfd4e6dc073c4c27d7e9c7e55b203a1c1dee1806a39f6fc8d57e0c1194480d5fae5276229a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562f32361ce62701b4897703c5e1ac1b2
SHA1ee1a1194ac06f4a30834e5947a5463bac5514268
SHA256a3d289b41c08ca706f017a001d16a4f5d702ceb6164b596c7cfa02082674cd43
SHA512e163001b382a7146819d29875e7205dc5a0a803b0e1122f3caab115abc5996122b4f219ec681bcbd73b948400d4b8f3e37824414dc860f3b5ccfb6ec1b6f6c7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ffd17b04352234de562a171f10c9530
SHA1f10068d7407a550e8fc8baf5523f54be54ef51c2
SHA2563f0a8c2ea88eeef95c590ca84dc51b4d32332adc0db960d5bb93307cf3b373da
SHA512d167e2e4116e97f4696776dbb570c499df5950b6b266e8ca84b3ee7747d095269f75959e4e05e440ef5a2cf9e35b548606d1cd5cf8a0b37f290ee6566416b5b2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b