Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 23:24
Static task
static1
Behavioral task
behavioral1
Sample
b142b84f2c98e62e537f4d3f2970bf49_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b142b84f2c98e62e537f4d3f2970bf49_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b142b84f2c98e62e537f4d3f2970bf49_JaffaCakes118.html
-
Size
11KB
-
MD5
b142b84f2c98e62e537f4d3f2970bf49
-
SHA1
a2d35a3dcf7c584fdfd7f702024f02bc71bdb78d
-
SHA256
161b111fbde165607925fc8bf267306a951dbe87ca728040dc0c2274c7abf47e
-
SHA512
134625bcfc2fc2dce6edbb279fe8b5504cab96db6343f2f87199ebbea094c87ea9583c0f72ff9cf85c2385d0a8914e7cb7db75ab383e18409990788ebf4cb65d
-
SSDEEP
192:2VHlIsr03c98k/w1wvqyhBnBrnWbZip01BLOXuBuLbdU8d:sHlIcuc//gchBnBrnWbZip0BLOXguLZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000a123bafdedea2b58a3e886aaef3a065d3517fa0a27b3ca01a17270c44949a3b0000000000e800000000200002000000032140bb5c26bc112ce9395cfd3f86c3a534c8ed5a788f1f460781f5f944d44219000000047247c2d8f6b48ec14be69763086a298200de8155c36761862392769d9065ddf2734d9ef3a78e85cfb7c18cee7e5a4234b513ebbe5729517502adb391a468476e7f84992189e0920321fa79f8649460694c4ffdf1b5bac372efe6966b3905e619fc9da7bcbf5744f950557c22b6c8451c6a47ff6e3bf58d4591c9e589b716ed8834884f3492747a0b54aab36aa9ac03f40000000be3be87d04cd96785d924bcfa1d8df388f105b2042b95be38430a05c0839f46a1a678ef0ca23eb268258fc081f4b9e7d4cb77a5dfa67ccd84d1b3dd2fc1baa82 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5013f45258f3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{57D4BB41-5F4B-11EF-AD51-4E66A3E0FBF8} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "430358135" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000009e7b7a781b286228c51967041ac17146b29da143ffb0473fb4fb42a8c6a481a4000000000e800000000200002000000030fab6e9bb6a7d3bbb255533a7e119121110d17655b59b0ef0e28cbe6560d90b2000000006d7aae6834dbb3a9688c0223afe3c1a357eda49a1a0f12d365a3e0a022ee42140000000cb8f691e149894e1974faaef4683022d373c739d60192c2f14c8a268b7011b971c3319a67558fb2cb4a883f42184dee377cd7927c30f2b1bd901585e76a975b2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1756 iexplore.exe 1756 iexplore.exe 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1756 wrote to memory of 2448 1756 iexplore.exe 29 PID 1756 wrote to memory of 2448 1756 iexplore.exe 29 PID 1756 wrote to memory of 2448 1756 iexplore.exe 29 PID 1756 wrote to memory of 2448 1756 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b142b84f2c98e62e537f4d3f2970bf49_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524cd6da37417770bc03f7b82a545d73c
SHA1b1e91dc87c150c3b82bc779e7f3e7d8b2ead6a7a
SHA256e640545dfa9fddaa4098a0be0d7221d9928eaa56eff5e524ebaae0c798ee4f0d
SHA5122aaeddeadf4541bb9e8149fd82f7593a0a221036c470f33caf69ff1f5fd0481730f6cf60afbd0c1ac40bb6b5b7ae17a3669690fd85a6005f562d6e765f2f8bdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a62170437cef72557a0664f06ed5d63
SHA1e7abc2d74f118dd119e2c5262324ae7b657babe6
SHA256b547e899612b9b44099d64c77ac2ef2b94107a714034543962f4cf051571edfa
SHA5121c8a808cddaaab9e94d275b1c11eef6567fe30e7c4f881e35e88b69eb8499c16469e6650b0d22368cdaab4455faed5d147933d72aed514da699dcdaebd04c440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5844a10d780c826cb3faa24a57d8860bd
SHA1df77a0fb3a9821c426126d4a1595fd62617ad30a
SHA256baac105e221fbc6399c78d5cbc7fbafa120f75316f1d699467b61182ad0c5617
SHA512035d2660f3ed17d93ad6557d14924c525c733194c22f987cf75a71e53b3446b29fe607dd1065a5d4f1346dce77c6050551009c810e1d6cc1b4269550289dee6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5f7fbe9338157feb47cc0bf4773c720
SHA121ab7a1670a1499cb717ca9ca7583618edb317f5
SHA256ed03aaa7576d4d82b362c1d0837b1d0907ee7990d28dd5ce92cb40242e5ab8e1
SHA5126366ea1892e3ae96dc7295f5ee4986d484ea8287f140a77faa69d9edce44b9678f967cd77243ba69b51049036bab7c7645b31f03b28e9930203d544c9919f9eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cda25225dcdb16901afc0a05abfef36c
SHA1832bc5dcfde2b33275d45086bccd4cecbb73607f
SHA256a4b557b99c85038b630b06976ff1d42f0b14449d8186a77118ce497ff31756a7
SHA512be0ae9ff304f98f444611f56e93b84eeed9d52326f1a0970987de759e7746bfb093f731a0982f6cb522c4b2cc9a849c3c693302e1037cc740e5a86fe795c4c7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d10e523dce86ba3672db51e96672a9f9
SHA18d9cc407cbea9ab4ba96fd5e0da5d23094d7e232
SHA2560bf5a9b3fd16338ed2412abb8443ecd71ff322a4d729e40ec4b314ed31db1f6c
SHA512e524f273165bd3656b3bd6bdfb02264149d9b95504ea991328c911a76e53b10bd7bb72cf5fc86783d82d15786c6975cf4e9cacad1ebc9b544597e39b9a80d091
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5912d42222ea687d64b98d6b8ed7eca32
SHA1783d43c08f985019cd3af97c9f7b3c54a8efb3fa
SHA25666040d34007dd811e6137b844556773d0a65252e054b990a94191b2fb29a6cff
SHA512879b3552eb1132d7d05c084bb25bb023bb12be12a517cf7a2754e6707450755b27b6d38a28f37265bce0cd4216152506efa5cea945586b5103a225ad35602389
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a07de36255bb464d52d883ea52c5771f
SHA1effd4f2fb88e4b6d032dc6f366084517acdd24f8
SHA256a1a442e97fa455b515cbb51b0ac4cd2e938bd0fbdd877b9939d324a8433de8ca
SHA5121c349c9bccb299d35de661be9fa7dc8986fb5e309ab5969392079e0431c4bffb7da5911a75241e4cca8a269fc4c0df7889d92c25bad1e513ded4aa1981da9ce2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eef3ec41adef98ce84fc645425dad5bb
SHA1335fba9dafc97be47e00020ef7318a67c454104d
SHA2561d3cf9b40b852b866454413d9f133f40beab0846f5f5d9a4420fb37c43d6e84c
SHA512b63e3e73efd5551b475162120c37d93af04096f595a6f43b02fcbffbc1de25ac9b4901573d741b7e4a015a155a0fbbf0990721c3ed3c11d063f5354756fe1441
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dee917437613fbe6794e323f652e5c75
SHA1e62f4bfa1d05339839ee589bb683d4b34ccc87cf
SHA256d7e505433335121c5d1b694f736535de472f3071841b5135c8800ca6973ab733
SHA5124145ad148ff834a0d965a2006e9e759941b4592ba89a014c5c1d7822999e328a2176b8d0637ccdad177de652105479d557e1ca2754e3c5ea4f1b86ba029fbf21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea04b75efa338ebc16e2d578a8d1f25f
SHA18bc6d577988d3eb2869184b0163a405f7165b45c
SHA2567bbd753c32b172543f2b1022ef0b1b9e966aa7602936ec3dccbf02a6aed16a9f
SHA512ea517e94ad33f69eef41115322ea0266eed864b9d22354b784eb84fa9ac1410453bafa0922d35aebafb0ce5a6d0f9c98ee1cd90ab8a34c873df7f759a509aa7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5feed74c2c25f03ff7cbe7fbce563911c
SHA1089332af3c79d26f6dd3bb98466ef6e28e53862a
SHA2560bec9876c19ba83456cd3e90ff28700fd6d051520d73263809656a2ae777d3ca
SHA5124d3829ed8e559bfb2667b2e3ecdb02afed0719e975f070fa8f08faa0d095839f26c163c0746f9ca33b8102324d415679a89f8e0588c39bedda180a4f2765802d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507ce6170d9c5092dafa0304d2d54649c
SHA1c5ec120b57905af4d3abf3152d8914379e9f2553
SHA256b24fe85b84d673246100885415e86e5fcd7ca7bf845599524bf79c0f505740d7
SHA5127dc1eb5e77dd4acd67c1ad47f258104f3fd7c091cef6bec5a5dfd696aab6e247e6de3126b760f28b74926d14366d85c59a22189ac80caf88ed80895d0301796a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b85f9847ec82ee6f4cd5b34fec084299
SHA1bb845023395fa97cea820fbedbe76887885c90de
SHA256b96c292475294e8753342c032fc293c0645d21cbf196b6b0a0108d6dfd1be9d2
SHA512f2da9abd123a7f966a4491b0d35000bfcab6f3989c3ee293f79f2c9034942937f8bd01e55b99055daf8d699069662298afc5ef3a6e4c007832f92b662050cbfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560555e7aaba61c937720be2dc8fce877
SHA1f0afdbaede7d239c7129ebfc5ca1b5901ead5034
SHA25687b5ff97104e4668676c2d1290677be038435b11de153a11f2fb2af1c3cee1a6
SHA512a38422e6503a0e9d0b8d70e09fd70797b34b59f44f671ee3e26e0c30e8f5ea86665863e28e626161be7a96f8050be3892467c2751661b14bba97792c0fca2332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594c82097f7862df66f2a3df6ebdd6279
SHA1e406144e20711acf1c4a6d568dd214492c184722
SHA2566e574929d203e7d6877af3a46b2ee8f59ea73188c8972ca0de8f60c6945c1028
SHA51259cbf6a3e05093b215735464e540b3644e89d4d00415b9c840ecf1f6272d04c9ed30318257695e6114c24bb8cb4ed4862c2e76dc8fe930a98d4662ccaa018d36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6e884706fb83de3466ace17b66b0e57
SHA1a01622991bc0c8e8868e88cc48702255b05ead4a
SHA256573ce1982196c49fe5dbeeefad45d1b698d27e54be0e0837bae5f7ac37e08433
SHA51234168cdedd3a83892a9fe887728c068e18c0b98cd5885930ad3cf9d7f863019fde41c4d7585aed9c47bb0644ad6ae8447c170266ca685bd0416d781e9853cfc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf1d70e3c21eaa8f0c283212fe4a46e6
SHA12023104f980f8ac6fe1f722aca55dae569db2631
SHA2567ef6ec889cd3e6f13e331bc6e9cb7a974cd25bbd69b1b9a432396a2f2b901f42
SHA51217375123d94fda5c8279b4f8eadf33e8d98f0d0e5603171b72c15575f05ece0bb9b8fae841d5c1c1f6125631f26acedf717ddc859804833c9a436ab8493d1586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52384b748c99c6ae5cdf1dfca8a0ce3b4
SHA1e71fb902c57db83523de899b851108370ffbe1d3
SHA256223e1da21d463c133d9cbb3f51e62231a21f869b6e244e483e6eadb474a8fb6a
SHA512ffe47838738da0c4d37cc30ee440f784adb0d9b60cbb1f0556fdab960fa897a39693bd821c415c16c15557dcd51901b5320d9ac08929cb5ffda734c91378d6a7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b