Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 07:44
Static task
static1
Behavioral task
behavioral1
Sample
fe13984302a9c7a28157d9fc5dc15ec0_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fe13984302a9c7a28157d9fc5dc15ec0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
fe13984302a9c7a28157d9fc5dc15ec0_JaffaCakes118.html
-
Size
139KB
-
MD5
fe13984302a9c7a28157d9fc5dc15ec0
-
SHA1
a1b817876c0a71b0817edc79a581e95b0573315d
-
SHA256
c019f4b894a5867df6868425d08970d9c0230f0603fa88b564d66d1ee76d6f7d
-
SHA512
f6891b9c95ad4055ec7706cf6c509978b99407be34dfcd785a40dc6559030913d089559de33ed5f508bf9de09c215b2edbb840538206c16f7b27bbb3c7fbb037
-
SSDEEP
1536:ScbxIMoIBrYUlIzyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:ScNBmzyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B34574B1-7E36-11EF-988C-4E66A3E0FBF8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433757755" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 708c3ec94312db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000fd82154daef3b200560e8cef79ddfbf7cba0778f5954e16032ec9ce245b3441f000000000e8000000002000020000000442b404970bd00786580560a0d2193394eb150b86bbcd7c8f95290498db64a9d200000009481dccfc805055ad1cd3fdde1420c8d5fccc3c1615e132f5eee5368fe8e210240000000a1e8213d1637d196f5e6bc3ba567264bbceb304e693ba8f25fcac9e1677b0bdc26d1580f227636b16d9a0b4571c929a6708c52ee927c614f04241c9100a7102d iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2848 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2848 iexplore.exe 2848 iexplore.exe 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE 1568 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2848 wrote to memory of 1568 2848 iexplore.exe 30 PID 2848 wrote to memory of 1568 2848 iexplore.exe 30 PID 2848 wrote to memory of 1568 2848 iexplore.exe 30 PID 2848 wrote to memory of 1568 2848 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fe13984302a9c7a28157d9fc5dc15ec0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2848 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8f0b0f37782ae045b1a29c2c800e73e
SHA1519e3e044c76120cff55a006d2c7841a97e7067a
SHA25608f56d7bffbe24beab284a733d01a967c1bae001298e98d3ee96e79e4fced8c2
SHA5126cb8716bba97599d4c7babbc4806817c61f9d22e5269530a69a396636f6e6bf868de2616d7a257ab38c15d446addd90c001bf7bf29460a99fe8b4816ad7cb05c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5691b2095c9f710443ca35b066e4665c3
SHA17cb50f8a1ff65aee01dffef97476ede26445a5b3
SHA25685f6e2e8defe49df8851c0594aa5f9842437ec724d0fe6fe64dc2fc7703cb6b4
SHA512b32c5dea56909a4e297d9d9b76b6b13d206c73b2527a1c79f3b348c124ed5186e9f165c031c8e2128cbe965826cf2a801216bb0b214b8de0bed62a452eb7d78a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b2c468377b742297d138f04bf06a3dd
SHA1b17e711b5e67ff859929c209fb24d72778b70eda
SHA2560e20e73f87ed49bd818f20f8a80927dbb986d9bd22708d82c62b09fbbfd8c612
SHA51232551172145ae4f566ed696eb50e5239ca8eeb561e8605566753669fd9db9c7fdaa7f47563afe61e929f96b41ada82d58801b2d3ff7deff4d447a9744b9054f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555ad68f658bdd45b75a3454a6a003964
SHA1117210c2c218bfdba279003e916f7b26028981f5
SHA256391e03b33045d314df1ef5ef9167a09d437c3b81b3474dedae77632b9222a10b
SHA512fdf84ca3ace7af8bd591047805a7db6214c1b58a313eeebbfee57dbbba1f043490aa9d25ccceb7efe511466b39bbacf5d4082d075d9704dcb5952bc69cd53ae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5701e594bbc2c57a09254a01df903528e
SHA144edcaa4c5d54f5866c4de701cd8790e5cba22e0
SHA25625c324a764e2377399d97c9807c8a4169cd2a969656845b82ff7d38fd381e39f
SHA512d9e46089a38e4ff8b91cb3df4a9309b7fd219a2d8b53097eb0998af64229d53c17b570d6aca48895ac8e4898ca3ffc10ba0c7246ab9affcd9fa00b874904d33b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56863811dbb68e40a020985ee9966edad
SHA11d5d929253f99555aef49a94bdb8610809773d5d
SHA256f57467520c42180b12679f1678a1683c60d0d034a3dd15f899a190f7cb443c88
SHA51219f4acd4335b2371ccede2b8d80e6d83aa94f750aae3d0fa45aae5336836b9c32183496a7ff66db12e0f9db986f540cacfe0a39bda61ec7c9038edfe7496f4f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aafcce0a52d7d8f56eb8ed5fdc669de
SHA12a268f60d0e2e256a0cebeb8a9222bd6b29ffae9
SHA2568700a7e6a4b6362b447d0b7d8e4646b577ab09f5fc39add5ced1189bb573378e
SHA51243ebe370e43d24f92cf2299593cc8e808978fb904bfd7ceb80a319fba5771e238e011965aa0fec1fea0249fd5432c58ea95b1cc40f17728b65109d470a359ceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dff50d3ee4d5d9738ebf38e4b6b981e
SHA130cc307a87c54e68b1f0c88e74f2c931f9bcb88b
SHA2566c6ccd6ae8a2e18a0a409e23eb71160eedfc32cd137c4243734cba86bc21dbe4
SHA512dbc1dd25c243fb01d78f8d2f447a8ea94ee93da5b35ab772e7aacb4ffaf3b37972b620e6a8c596cb20e118d4198d36c667bd594705876fc9539fc7408b0d4bdc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de199d7972d0b7813014ff6beafa8074
SHA1f80ef17220bc7071a6c432c3e77facd141640bef
SHA2561c1ccc4120978e0fe725aa9e7f6d7e2a14d845f5ed98e4478f0520bf83a0b44b
SHA512eb054541e172fc2d0fee8e0a1b3cf3a8e013a1880de592b5c1021ae2e2b7c9ddf6197396c285a5bef4d2833a3d243e33d25011a724d76f0b856c6feba19f230a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550625ab66c884f3742562d3daa9d270d
SHA1e8a3b90ecdde59fda163dc25a9ad7253a8b3ff20
SHA256eb4b62195d8472ba33a474506dc4b0897555123fb29cda9f34704ddb168ab00c
SHA512c53abf516cca13c426e277c6d560412a9920408a15e1588c3770be7ef40f607c834a9f54b8c92bfb5cf63d18a255b6ac0cd023236d10164554f7a77e70300e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5c20bab835dd302139cc395a7e1e899
SHA1aa07d7a1906d0ece2b315c794787efb181428df9
SHA256b647057e06c680697ef4f81599d96b55cea5787a1680152b4cac4999eeb9c384
SHA5127fe4d62962b306378256022f329a3b8d648087004702923692e48af9fa5c120839d527d171729c05e5f5a2b2f5270f2da01ee2be0e5ea9cece97a421a35f56a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f9df300571ef83861b63783585b8b21
SHA1e077752d2cf99aca3ed16033089cc7a5610ad895
SHA25606d11b33a9fd608a2addd245c3b4f9877382abe443963a1e762bf8c6f306b168
SHA51245f812558828d659edc887709c910f91b6859e1d2bd6dde1d60611bed6168fb205435f688999200aa4317e2bba3a34a9cff93f4a7598ddc6a7e309422d97f09e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b1977d434e32d84e0dfffd3385ba6dc
SHA12b886741bf3e38543d6dd60a8edaa8857782de93
SHA2569d363dbf424fb3a6997cce5ce48f9581befdb380a89500a4067c0cce44763376
SHA5125b09cb122570ec5c2b9798721e70676eecdd06890adca41cf7f37f17e6b25ba21aee841a4cff36620b73c53864151b917192aa085f17506b13045de0f6da2bd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b85a1fa605c1336db5c3eddaa7fa07f
SHA1dad691d08a603cffce79840c46998ea333024d3b
SHA256b555f1b0e9e2f4907b65e2d864b25af8b4913df00b693ff1e524aacf1c50fa25
SHA5129cced7883d565875029023d6497e228497ba00a1553db79dbe397e91b167300f565a989ef8e699c9c8a5d4c08ee0f9da02917b185ef12aed2d880cdcbbe06950
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c99dbadc25a0c167519ec764df7eef3a
SHA1c5c4b82adb0bad3e11b07547c4e39381a6ccdc27
SHA256e49c7776f63a583702ace642a262c36907527f29f5fe40be2e08d134fc1e50ab
SHA5124e05378c354fbb3b9bd2893992d4e2f347dd6ca69afa3812af6c1012709445b1ecf005cf65076947d508630f6960e85721fda4a69f2b531b8afd52041c32aa0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb78cda7ea916b0e72ba866291e4240c
SHA16af7816cf68a0b2712afc7454997e76536b85b37
SHA25686dbda06d3fb8213c31ae207b74d2e63948e9adf8fac3bef52e0fc036261b74e
SHA5125ceb0aafe05fdb2057486a5311e1b575449bbd6b11377d0f599e72ad2c5d5a0ba111ef4554d2a01acf44b79f980ece0b54d202001fb6aba69d5906cea2e9f996
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56674be395a61642686a9cba8f69fa37e
SHA11f0161b6ab10e3069fef9b69ecf0317db5ae3bda
SHA2568bc5735e3e810ba885287e04b290ad0673b709d12a50cf7d1873cd7596a96bf4
SHA512690784a56a05c69c37dfbb8836f14b7806fcef268ede33c77a3a22321e5f869b5981031ee334d08d63abbd5ca7c826a5a270abe4ba2b1a8bc709d21b30fb571a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeb7781c269958a01617e5edb220d7b3
SHA1df1d763f84e48d6fd65e58b73b7e10c7fa770ff9
SHA25655349724c7a5eade97787b3f3a394fb233a16d36086fb8106de9c0143248403b
SHA512270d48b5a293125856c91188e03c97ce144021b107e2b43e055d73767da636a2011736bc6fa1dbb8f967f38bee9095aa3bfdcaf2ceddb136e8d8a94ff306b695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f21ffd19a759b7de55947269403b5bb7
SHA1f09ce7db0a6a052f2c621350e76d8c8b13edb801
SHA256fe3690e89f997c001901035ab581a9b87d0974814e37ef5fa83d68c3bfcf4ecc
SHA5129dfb53d2e84c3889325965ad246a1cf3fc8159f806117a0f1f1b957a0f5c347558786ea66f82619cc07827327e790d3c27bc43f93ce79a9c9b4493cd77e7d30e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b