Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:35
Static task
static1
Behavioral task
behavioral1
Sample
0846ed6382871849e9f988f3deccd49c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0846ed6382871849e9f988f3deccd49c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0846ed6382871849e9f988f3deccd49c_JaffaCakes118.html
-
Size
138KB
-
MD5
0846ed6382871849e9f988f3deccd49c
-
SHA1
f071cb3ec1811c894748d8161c908bc2e2e6691a
-
SHA256
d92d6c9efc42f4c8bdb63444dbd821e13553934fb174b70e073c4542899c15ba
-
SHA512
2a482137ab2b504d82364ce4d93c5c329b16352e562af4ef77328622264cb3249d243d7dc9014aa12c43491c23d71b6a0cc1cc80af0a24d4a4af3ee7f275ebf1
-
SSDEEP
1536:SZpFpHPf2fkiAtQ+N/alPT29yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP9:SZlJ9yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80af6cbb6b14db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A3AAB6D1-805E-11EF-AB7C-F2BBDB1F0DCB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433994811" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000073365dca04f821854238a48c4b4f1e55d946a31c59e81284d38371b5e5c59f8d000000000e8000000002000020000000e6cfd428b5c202fbff3d577ccba52a5be5c3ddb57c2d8a5f5de26e39865fef5f2000000045caad9afdf4f289cdd90c7a5422da3cfbb3710879337c6ef4bc009345b6243b40000000353720fa304bdaa98b280a3d45644fd8b518511a62989a931aa01edb491c4204ff510bf40e0bcae0dff29825272d36367a21e050f173cfa83605a19a4a81426a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2440 iexplore.exe 2440 iexplore.exe 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE 2320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2320 2440 iexplore.exe 30 PID 2440 wrote to memory of 2320 2440 iexplore.exe 30 PID 2440 wrote to memory of 2320 2440 iexplore.exe 30 PID 2440 wrote to memory of 2320 2440 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0846ed6382871849e9f988f3deccd49c_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5721b17a956a750160fdc25f3de7e5e2b
SHA19f2db7238d8a0d425d900c1864656f93a1cdfd82
SHA256413f9ae5fb05d88f8f3a7fff5130f026e30c1070e72e9673cb628d52dec6c77e
SHA5120d63ed50ec36df2770c8081a6f0a1c7d3658f614e9165da93b01690bc61748a0e343e70d4314633b95e54a085893917989b8318cb8a74bf2bcdd3b26d7704d5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3dced685b79e98154402c516b9f350b
SHA1411add07dab61825515f6472c771a2ea6ace028e
SHA256ad1622067bf3680e6f9074aa4972f76c0369b0c253b60b5b6358a41e191dee75
SHA512257cbe7a91c037d6d0c155ced8a086a7f3267abb8616f6bc78dd27521c680a4788ec1422a9774506080d7fdb7214f2e397f84ec118aee8cd0fbf101af84c4e47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c088d1aa8256f8968fdb206487f15cb2
SHA1b4fc4a67f5c6947e2b56afe2f23dde57621e64b4
SHA256f4af4ebc6fafe6dc15977f3fb3a0aaaebfb97f36cd078b5987102764bbc47d60
SHA512706f53f415e83ac9ca83ffa2c2bef9f3f4642a43b445dda0bd50eba8716a1c64ed00fe65c05528aac8fa9e0e3a001a1fbd747ecfe0c526ec387ae79340721a4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52eb572ea08624939b8423456828da46c
SHA16c432fd4baf6ae1df9908db9e7b3cab34b169ec9
SHA256aefab5ce3bc1304c21aa5c934e0c7d4630a79abd422636d5e4785e5e3599a06e
SHA5124e3eb6f0bb6fb978200ee011b961422834bc57a308985f5a916e63ded7298df637fe1e14c4a5d149cbe43e44057467f5bed9183281d62ead18643d4e418af124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdd2324de2bde75c334e2f163080048f
SHA1edd3f850c5c1c9e16a3a31e927556afcab7db06c
SHA256655a11b085843e0436830fadbb0a7511cf5914e7b0a96eceef94576e97927405
SHA5128ba3b4b9903109b5ae2453e1b418d985f487140021a1ea292c74ac8f2f0e9119250367b69de4af9251ed56f197027ae352c0170d49d73c50e1dfa004c8d92b30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e43b26b3c60441d4368887642e7be083
SHA1fe55043b2b8ba930f0af69ba4562bc69aa47205c
SHA25656c7a88654ad289dda279acf79e11b5a07404ed708fd4c756114b7e5a869081b
SHA512db677acd22ce9871f07e27382298171fb8fe2e20aa3594964cc34ab014e84fe4b4b3a2354123e08d2a716b89a81074f10a6e0101f3849daf8c7f0e533eae9126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a867c848044c58ffe4eb609a42c3cc7
SHA1e9f2e89a3bb528d100c669a47d62b7406c8f5ec6
SHA2565c96a42c2fd8db7c2f553be7db3ccd70536ba3f4fb00b1b998f15231328fc582
SHA512aed638d17e6c07449c036e9e3bf1076c83f986913ef92fb264972a1b3c42ff744c0af1775a81cb55ed218cdfa3b7da7d275487a81a96de42e197ba2574786594
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548428225c6dee7e173c09bf459337a6a
SHA11ca9f09e15ebd0e40ac19abfd331e38284237c43
SHA256f2ad04a214c5731d4bfc0a3bc06842fdf97c8ede477ba412e442ba7c27f57a5c
SHA512239e4c38d27e83175a2533d87c4947b343e182f3094f754bb91db419013b701015d9d81a94269fbb675e96af8972f07f7fb590851c4c0dfcc6f0ed5bda9e55d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56827a37c8dca77faff0e424183c1eed3
SHA1942ff5963621beba735ad65f22d75193982f9461
SHA2560f57dca61e865c4b50435f2e31eccd77dbcb6ff9d516aa05ac334a5e90c8ccb4
SHA512b65f1532092b60ca4608d363e7f78b5375425a317593203a71e2e97ce8cdcba48136c914a0d55311407bb1f987b5faae84221224fb931bf6656f1c0496462be7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e0387e686c425d02f6d72d6572d7c13
SHA125a7f04cf2f52871d05758d7244db1574b7f7d76
SHA2563b335a7e7b71ebbd877f104a78cac6dcb11396f79e9b066136bdd169d2fd7488
SHA512ffc108cc1611f366ee609fdff23691630544097f271c6ecb07b444eab9c04b72bd80eef8884df0e336b55833bfd1cc0ef05cc2ad7823366ce5ba52126c1a5a0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf989c884127bf9171202f2cf5b98f21
SHA18c40a26127852ccda2e5f6c0eb7a377b71d32261
SHA2566824f7373a63d13e8a765659264b02d626a0dd279df2d6b230cfa03dc34f5fc7
SHA512651eb3f4e7d72ae6a15f327213b924ea47d9b2540b472eead5d6e7ded008e466619e69b2dce54aa4459740d7fb3a5907c69cc8f94d3eb31b2c28ebbec8c25d37
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e7e537ea8b28b2d2b3ce3be6f51b151
SHA1532adc4b31c58838aa2c6310b18198f95e2d3903
SHA25689504bb0ec3b396e6abd32035854b5e664caabf52d1704522bce224f8d2301c9
SHA5128c453baf687de661d45192bc761b57a334b8a4697eaf5029191c9921638af65b8145ea36b91cb661ff1e06f3ad55cc7ff260b369c4cc6265a908baed32c45e2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52406caa337b42124427e23d94877913c
SHA124b0a6d7e1b55fd7bf9b789b2e1b8b40dd6cfe8b
SHA2563106ab2fd4bc1b3b1901aa19b623b65e2712f7580f165c052b2f40427fd5fa97
SHA512e4d2a641d503459f9bb5cad286dd8547fa436744480166f033f5837e776924663609bc635851e7173e61f2852aac1cedd436d5576459db131acdca04614dcf74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54f0e083f88f2e7fded79ecb4e876a4ea
SHA1f73d4d32f2cb20fafca645ce72383147f39d2295
SHA25658dba7c9a5197346f92ade3bc820f3ebf5cfc0139370df17a3a4d344b7c0f9c0
SHA51209b542a3c4c1d635406fe5e50ae1752b86f18ffdc551fcf011b0549201c15c75b2604ffbcd7e005a09484ff4099590659187ab8e583c8abf2c7daeaeea489acf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51614c508889081a2b0c8da7f621bff1d
SHA15e261076e7ea7c410621fb7b8e66957ca383f469
SHA2567a55979f628c3b6fb4b1e7ccfd7a078048c939831e28d8f771611175eca16df9
SHA51299f5793b58f139fc03565db3998def1782183d646045338216813a618acf9b95a7a5c98a8b8698825e6f0533a8eb70f8c0b28ea2f442167f30366478e3374067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561a7bec9cf54d57b2341f22944813b96
SHA1ed4e3cb941e6789fec5689eb753bf4253fbaf683
SHA256d8a7733182a3f75f4cbc6b73aa9ecdbdfd63db2d1df155e1d3aaf35e436e7f20
SHA512f5b90f15992499643c727c5e127af48f61da4ece79b5ae36b8c23e87f3a7caaaf913cd154bf3342237c97951e17370fec57bc9b55fe15d7f24b9b84de2a793ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6446b00c95038416b0be0c62c5a7ca9
SHA16f2d7ec9af616f1a5bff6d5fd6610c3a00e30b49
SHA256d2fcfa40abaef696e0f7457f17d97c4bdc4f3377862a1c1592032b74657ffde5
SHA512d35cb67687ccfcc22ba0188a9c0aa766f9e2a04a08b239ff7128f857c7af1c108e94d7c5ef4ac78bf1b9517370c805f831eec95516cb5e44c3e2e3e47bc0c5ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3c978faf153a503913b5ae68262954a
SHA133f45709ed85b3d5dfa18f38d1b33863f9b1a89a
SHA2560cf4ff6cb69147aab474b966e17590155c82eb83de028834205d24a9fee11ea0
SHA512a036a80b3865338b7254afccd31a96c376db13d08579b12ae9e4895bb94a8f366ef5707f3d33f8562985b3861ca3c845755a5f667df9110feb80b89456171e13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7c66422111b549ff140ae2680de6ca9
SHA1f149962320affb380cd5b44291c2d588ff3da9d5
SHA2561c65d669a2ec47ab55663fc9e545bf02d2d987c342004d587b48d2055a71f033
SHA512912aa73439c5ce89f98cec9add41db5b9e1de05d5a9a377ad3141457a62a010e2f1b3543ac9976509d342cbcc26aadb4510b8794808da8cf2c4224cb1242d8c2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b