Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 23:17
Behavioral task
behavioral1
Sample
JaffaCakes118_084a228d9a6eab0075513e48641471d6.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_084a228d9a6eab0075513e48641471d6.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_084a228d9a6eab0075513e48641471d6.exe
-
Size
684KB
-
MD5
084a228d9a6eab0075513e48641471d6
-
SHA1
89b2d13d0c180e8ace69b5b8b9aec6098207e35c
-
SHA256
dc1b27c8508aaaf1ddb700faabfa559505814bc1ff68896e5497d9cc5e5a83f7
-
SHA512
cbd37a1c850e9e49fdcc2e7ded39b9a13e46ae60c1c72ed41a9c573d2070287fdd448d7860c5157cdea53a3657a92224da7b7553a99c22707d9a77a959263ede
-
SSDEEP
12288:fCTO6wDNihzKWLnPpnW/AlTXE0B43v++cw4Oa7JCocjmBufVBHB4uwIJVvkqEfjy:b6wSK2nPpKQGXN4SmqkqEk/s1NTSL
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 2 IoCs
resource yara_rule behavioral1/memory/2504-3-0x0000000000400000-0x00000000004C1000-memory.dmp modiloader_stage2 behavioral1/memory/1980-2-0x0000000000060000-0x0000000000121000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2504 set thread context of 1980 2504 JaffaCakes118_084a228d9a6eab0075513e48641471d6.exe 30 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\SetupWay.txt JaffaCakes118_084a228d9a6eab0075513e48641471d6.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_084a228d9a6eab0075513e48641471d6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443663339" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF7B3FC1-D84D-11EF-9C44-E61828AB23DD} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1980 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1980 IEXPLORE.EXE 1980 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE 2528 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2504 wrote to memory of 1980 2504 JaffaCakes118_084a228d9a6eab0075513e48641471d6.exe 30 PID 2504 wrote to memory of 1980 2504 JaffaCakes118_084a228d9a6eab0075513e48641471d6.exe 30 PID 2504 wrote to memory of 1980 2504 JaffaCakes118_084a228d9a6eab0075513e48641471d6.exe 30 PID 2504 wrote to memory of 1980 2504 JaffaCakes118_084a228d9a6eab0075513e48641471d6.exe 30 PID 2504 wrote to memory of 1980 2504 JaffaCakes118_084a228d9a6eab0075513e48641471d6.exe 30 PID 1980 wrote to memory of 2528 1980 IEXPLORE.EXE 31 PID 1980 wrote to memory of 2528 1980 IEXPLORE.EXE 31 PID 1980 wrote to memory of 2528 1980 IEXPLORE.EXE 31 PID 1980 wrote to memory of 2528 1980 IEXPLORE.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_084a228d9a6eab0075513e48641471d6.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_084a228d9a6eab0075513e48641471d6.exe"1⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\program files\internet explorer\IEXPLORE.EXE"C:\program files\internet explorer\IEXPLORE.EXE"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1980 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2528
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e6fabb87d8fff5723d41aadb4a928d6
SHA16d8c15651ca3f453d0cb0ac65a1cfd660e90da25
SHA25627e8e43181c6443782ad829d9a8e3c2ed7c77a6e05c46f45f88d6915b0952b14
SHA512c72b54786421b193a9557befe32add66485b3027feded3d0298f58be4de6528c9a672ab75e9237b822fcafd6143c2d4759394fc6124211634a0f7d9887d54be2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6df313e488f5603ed8d8bf3d1cdaa43
SHA1dc41cd713d70ce031d78773217854359308a7e95
SHA25612dfe10afa1c9507ef52e68edca9148509edca40867360c4e82aa547aff54016
SHA512d48114f7d36126e379828d45a5191bf5df1fa4679c26fae03ced9676d7852daa7c4c9b8dd89969732bcb4d2717ecff7dec543282f690f0598afcd5bf4a20c154
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58375d3bde60e1f2a85980a428ba1ecd4
SHA1bae09a1010f4a263aa4f81ee33a1905c16e65524
SHA2565587d4bc87e44e6ce43fc530be0a1357aaa69f91fae75895c7bb0812c3cc1e5c
SHA512980277bd621754b3973c4c1da6763d70cac96c60516643050170eb1fa5dbc9ff9d09d7d3d9ae174b1e3ea17eb41412446ba1f00838fbfbe38ac71cc909d479ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b7c598ba97e16b3994f1c46495d44a5a
SHA11e5fb94b86c9b70bd5ef0876aa3a174b16f9e027
SHA2561dce5f8c178b811260c0532d2cab7a87d28f64b1f3f9327abf4d408038e3db8d
SHA512d0d194728a843e9b72cd4e5c4c58426d1ab57201600846a5d86e3990e36ecef6a0b956f025a446d61268e5d8b422d86645791b3f7e358dbc205342e7718dce7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59cb4acbf93cd8168d0bc63d5a764ea55
SHA18da07329b0df7f1aed7838ef9275d9a7a93a7039
SHA256177a0fb0d54b24988c50dd4ea214aba2154e4757ff0765924ea9a2bbcedd8ae2
SHA5122afb0b31df1bdd0de137ffe3b6940060da706fad539b24b728cd35c11440af1fb6023d0d96311835f98b2ea720913f28eb822b0834154139b62358e5960ffa9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd7f30cc3e0d59a39a63d3d3ccc51369
SHA18991f0ecae1011639f422c0e1dd622a2a07f3314
SHA2560c0b280ad67b8046ab0db5ff8c3edc67145884e0927a783f03d42c930a814e6c
SHA512b6fe2818d24d01c09ee8709e7497131eb61242c8a94f37f0ca6db3257560a37158b247d9ddc56e91240b805f057f5f748f6c6c660afa66f900a6d9174ceaf740
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52299424d0a3c176e2a9022cbc75d8300
SHA1e3f85584ef3af0bccfae51edbc35a34567a97b82
SHA25683530bef548df360503d29a2a5b8c94aaefc74978d0a1356584a27b66661c7d2
SHA512add5d02139b97176204270044c72de2e58daa5e50973b9c67072dd5764ce78ab9a5fa561d3b507bfd1caa587e6c1b91624c6fce50878362b8cbb7688e1dc73d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e39316789a54d38f6d76c3b39891d0da
SHA18e6dde4cd3d202639e233604f2bb268d28effd32
SHA25666007b2a3f6be1416bab7589816fb4f7e8fb8fbc57d3e595db516fff0c3d5fcc
SHA5128d5a68525061f489d7cc10ac30d331a75825d04afe91101be24f966315f3a6e93cf9023dffae30e7b9461575d8be76dd6d5c59b4cb965e85dfbb0595c017c380
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53657eda2ab62fa465b94b7b1cb45c2f7
SHA117e86c8fe31d08460308f9412e50701c67b4b25e
SHA2561e5b7b576db172253ba1fefc397166520f076e825237793e2bcfed727252f7d2
SHA5126c0a12057f78d680a3efec7e0c2da864c55d9ec20e241e004ae75b5c0af63135550fe84dcc0873d4f037c70205a3a5c93d174871a15cc1ff0b4aa30e4ba28058
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8a73862ab3c2a88aa74dc72d3ab04c3
SHA14c108dfe485f5edaf069ee04e2465eceef406a1b
SHA256133874e71c4ebfacf5c4a92dbdb49201ce4e513aa40bc96a8261a76d8080efd4
SHA512b48a3c0050672c8ae124264e44358d7b8eb001c8f9b75614badab4112d95a6e6b3116f62b4ff4b962f22e880dc98baa968b145542bc052ced8ab6265d3e7b196
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562803c42be1735642b71172f7216c0ca
SHA12137d9ca09cfce02b5d29fb3dbcbff3dce995975
SHA256618489882748d1a3cc99f590734d41a0d5a3527b3712362f63be32b765b85466
SHA5125e8378d2285b6ca09336ae31ca2e4ff28d1c366717e544895239428edc0c7333e77fce84729164b746e117d01426fba139a76c10e7d6601d3673e5c32cf961dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e096557215bd72583f030069d636145
SHA191e4bdf6d2095375d742893734cf1bde590dc3e7
SHA256fe3de088e13917004f7341cb240f83ac3e0fd23b8f29febc42e76565e5fd98fa
SHA5123075ecf85ff7245dc20ff3b380028665696f05c395be5a0546fb482292c98d04f6add0d36609b605daf49ae7f1c202fea83296ddde74536e9c18fed855ca248a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5749d9a45c8f688b88edebfba3b7b849d
SHA10ab00f5ae968b8f2883ac31fc3894d848ba7b01a
SHA256323a05c03e824d3d8c800c3a4d7c906089cbcbe9d07a9ec9e5739ce5ceb5436e
SHA5124eabbc8d0d24ba053d1495dbdb32ab0fa34bcd0aed21b9f2b3729e8eb31cb1d8ed334220d9d9236d08504f5368eb82f308787ba7d608973425eca1a03aaf22cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52136d2251c340d0a5c3610b3e2ec0e98
SHA179e216541c4f32bbd01d94de7e46ef421c569737
SHA256fd177a1fc6f4e33c089b1ebba890d3f563fce22eba495c84dc862b107abfffaa
SHA512803db380e0c10e0476edc8e17eb766a2021647f89b09e7ff2dfe056a5195d493f31b00e046c2d7ff01c8149381201993e399fc7975468134f2d8a04f894f54f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ac096cb52c512a811ca9f0bebb43e37
SHA13e47681e8d76a8db63711ef470fbd46d4e2bd3a3
SHA256ea821aa70a16488b7b06af12d5fe7c739381b2aa73b22056b972d69a260572a0
SHA5125c1f1b05574ded6fb01355ede11f25d55993114bc7e5086eeb20f2c3828a33880c347d409e42220d4454e65abc2ad01e55046f33b843be45b2a8ec82f6d16fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d4868fe2ad8825fd62b7b9829368814
SHA1ca30d9240491cffca54639156ec319984fb991c4
SHA25686f0b6025516ffdfd675c5f4751e144be660487508ea13ee499e103c69c0ab97
SHA51278c4dc991508eec602be585637784e8fbc1c35c1d64d4f48b685915c2fe54b0c5b3cc64909d118e23958d203b6f154321bea62e21a5866c41d5ddedd0eacf511
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2f1f8c4f73ee48fac1ee3a767c5ebce
SHA1b09beaa2672478fa9f28fc0a66abc0acfbadb40e
SHA25626af82bbabec9702567ecb271dd38ac175ffbd35972f7a65077b95b93202dd89
SHA5124dfc1a94a4c8fc11ec4c6e7c062e0f9d8b2233201297c27b360f378878e8b9b66b68123f5f0fb2d736962fff6fe3d82a34c4ba75bd95198991cfa271f2e10054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597dfaf779609b2c9088539eb35010885
SHA1daad2b970862d478ba8c13db1464d14703ad95bf
SHA256fb2b4f67b4b985eb2a04ce9064e11168454d492c72151f3e92811adac690e331
SHA512c8b8e3ec4d821dd6d73280d7a4e1d9486b5df455715e2dfd467eef8c172c59feab309f71188ad58407f8bd6251fe485ce688f719621876775a71bf38f6e2a834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de852de889b7bb84c8dc1cd7c435e30a
SHA1bfc7a35a8f2cb0d732a3232eeea687baed6d930a
SHA25675572c572aa70a4ce94e9c81e22a57f4731428b9e19c910dcf4394d77bbcd450
SHA512fe5c4c59ec22053a4c3cadf49bbecc772f732dbcd2fc427b870cf34d1ea7f606cdf96868a8a723cfbcdc3a4feb7c6f0e727eb448c1b4303526105eef75755194
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec263f2882d6c10ef112be7d51cd8486
SHA13f871306318e6e2a7ac4abd1c0719cee66da667f
SHA256a777ab6297670adff899dfcabd6f00193aeefcdfb22531b3cd1a3d707a91da91
SHA51263b0bfc6041a12330fb75966f93251c6070ed27ab23efe0d321d5923fd2bd2b97fd773ec245dd022152290cbf6bb6e72a313a55d831e23e2efcc7f44a6d209e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d7d1e65286fa6bbf74807a0dae7495f
SHA1b314a0a3a905f8e210643d46dab0e916f2f981bc
SHA256a17a05f89c213e42db69689cb70266f08457931e59f43f572a9c0fec718cc706
SHA5128609400a0fbea66ef18d5ca5704fd732ec2fccb6eef011e3e9d50aef1c10ac506265614638a64210578300a305df7397ebfa88faf209a058136990b8527f7dbe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b