Analysis
-
max time kernel
122s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 16:05
Static task
static1
Behavioral task
behavioral1
Sample
de78762a4a56b0067d60ae0a99502d02_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de78762a4a56b0067d60ae0a99502d02_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de78762a4a56b0067d60ae0a99502d02_JaffaCakes118.html
-
Size
13KB
-
MD5
de78762a4a56b0067d60ae0a99502d02
-
SHA1
54cb9a9c9f621287cde98e8a2dcf60f42562e512
-
SHA256
14c63e5651d9daec53c0b716b66a3c497f36920db926d9c82f51e8503192e01f
-
SHA512
627e415e79a207dd8e75bb7889384ba3b9f7b186f2b3a0fe9ea236fa842b1fbf6c4fe61c5346730764b5e85a005bd9cc3d12813529d402ab897565cea0118a01
-
SSDEEP
192:bNPliPyR31Wc+ykVk/5kInwM83OIB/+XHNyrFDO:bxzW9tVk/5XnwmXHNyrFDO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432405415" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0917BFA1-71EA-11EF-9319-62CAC36041A9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007b88b8645d6de74ab21efaf0de98379b000000000200000000001066000000010000200000005eda30d1d0cb17e510312ea3c5889a0c239ddfe0380b0e5acd4924c7a30c6625000000000e8000000002000020000000658f282312ebb9517d33d34469e9dff13ff998198587e543e748d5cf6763437d200000002e27dbb728e3003d4cd24061658544b43e20ddba67cb7276d1300164225d928d4000000092601bc8dc582fecad82fd6d453e20dfd87dd35b0cd3da51b28a2a63e09c76d70a50fe631431d68e6b995f7f9c89902df80607480e3da9c21a0f24413863cc07 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00a953def605db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 468 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 468 iexplore.exe 468 iexplore.exe 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE 2808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 468 wrote to memory of 2808 468 iexplore.exe 30 PID 468 wrote to memory of 2808 468 iexplore.exe 30 PID 468 wrote to memory of 2808 468 iexplore.exe 30 PID 468 wrote to memory of 2808 468 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\de78762a4a56b0067d60ae0a99502d02_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:468 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5504bc93d3adc528972264e9202b3fb5f
SHA1d5e1a2bd9b4333f82814a9fa6a0c0e2cac3de31d
SHA25629145a3cf4692be19452b938fcd20a5ee876fa847d6733b903ea57c3a9420cde
SHA51250d983563136260b74fc3b2c97507a4e065a0cdf52394d5535504f26cbe2b02a4d780f888aa7e83b145ed35f7b1f620632b2f5b2fc1c45f3c36d8576d291d250
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9f03144a5fda11262a30610887cafa6
SHA1d40e4ae2a5772bce5a19eae71038103c7ea421c4
SHA256b9d6f47c7d74220ca7202468619e83b7dd1d065267b88e3e220f6ef6c54609e3
SHA512d7f491d52bb39c206fba25ef652857b83322b89f3da881c2d4f5f9e9bacff227c1e357c8e247290d8e3aba0c161499bd9512a253fae69b83d3aa86b8642976ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db27ea353ea653e19a8bace367852fdf
SHA1ed65182619d36a50bf29ce962073a2cb8bfc4e57
SHA2568607d1d0a8d7943e10947d9b4942695ce7f5e16d9f77167ebf402b7a6b3c88c4
SHA512459c1d06bc9baf9560815e0d28b78add30f8feb945907a0f2a261f1f535197ad57b8d7c5dbd414d59e44cee0c8b4a1cc7c1e94b7492cd5f589911d1a287bc59a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c8ca1139649aa67090c4324a7668471
SHA16788465e12bf26c67e18eb9ff15a855810e5ca66
SHA2566a5c72f82953e8cc60a908aefa05dea6520558ce06c3cd9cde29802fe2b749a3
SHA5123aa677148ba862983b0bad16e568b7c5b17d7f1e111d990c087b9159ebb84adf7302930fd0004a0295a64d872a47290c49faaf6d8e9fa6a0a61a6523aedeac53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5805b3b94c16fed887906646540bae245
SHA1b360d2bfcfefbbea30d373e4b90ac65f613aae90
SHA2561638df2698bb744ef8aec371063fdc1dc08a8f1fd08308b11cb3422054036bf2
SHA5127129917e048f02b712a8ef270bae379188e7c80f1520ce6b6625d58523980ad1d517578cfe7b8e8b5ec056a05c8f41d421745a9b6d442b7178970fed18eee2e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b245d270fedda44fe4993f3ad2e4a71a
SHA12717fbd808f947bad19bf17d1f3df7ac970ec6e4
SHA256e662432db47c49c44db6f2ab0e7fbc6fa4a165d2be9b03de7fede0ac7214d937
SHA512ebd6ef477388b08b1e50fa36903b27e5a4654f38d2da70f87a59c8560466c124bc461444662a5bd9f0854eab6c06222c723c29100c358d00ba4db1773fcf5877
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515c9a74ae9771c15d4b995b7fbca8938
SHA16c56ede3a14d56abfef5ade0339b65dc41845808
SHA2561505146f3c305b96c70f89fdc409136bacf84caf324f8225cd32dee1a66bec8a
SHA51240f90c971c419be22057d62cb9f40c5030e825eb3afa6ad7ca5bf622459a98e787a5456c75c1711345ffd67becac68cd59d9e4e0b33ef19f1184396a485a3b71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d682d2211714cfc5ad51fd06350beba
SHA1d29b7f0e6aa7268e693baa5f4cb77d1cc0056a16
SHA256a2d237d948c25796152eed9669d68d41d44a4fefb2f3b6ff178de119e05b8fb7
SHA5122bd02f427f7f56d1a5d85c0d259e4eb8d64fed8f49d448ce3f13b921b926eaeb1623b78f27e49fa5438c5e8d9bae2b27d39b5471ff0c358645bc6059cb972e25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fffc2576fb4b37d0f0e07566b4157ad8
SHA12e8c477746451decfa47c85cee6bd3223bec2f77
SHA256d0eea3ecb7f4477e524ef38996a783f3c5fbd8730ae32dd019d9f8d9a90788f0
SHA512286d9b1b7885d2eb2a2245fd6724abd10a0edd7bf21dcfa1c6867e63f646fb01dd8eacfe52ba9cebc64278163f8581581c59bf3a983c93d265edf030655303c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3d211eb249395384cdf2abf13295a45
SHA1d649ac79da2e89ea1db0e04b8d563eb5924ce2a2
SHA256b431cf1314994db2e3e83c780f048eb886a28efd0ab91ca1383691b83ef53956
SHA51200510e8204f4b3d8bee9766b3f091e3af1f47f288bfa15631c30547a6d753ce78ae438075b65d056ba540e177297e0ede9e5f245ecf954b47a92f123f4ce82df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e436c9a126c03e77da3fab79c547ed87
SHA168fb16d53b2160b40cc1cae01609de73ee52f2d3
SHA2561b451ea59912394802fbc590d358eda4972804c3d37ea84d2fd67b7154366424
SHA512028e8126f77fd07505b7d52c321ee97cb641033c5ede50356d57062df6c89c628a7c8fcfc1692fa376bde663d2eb47908fd9301453627c28da80c3030877ee67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5249c033380eb45b9e9615132c822cbde
SHA146bb2c36aadf52f232666132e173304e71178a20
SHA2560ea2cd761d7e3fdbe1edf486b1fcd75431773d18f9dd10e0bbb59bba54b56fc3
SHA512b230538700bfa58be2163cb50450517922a6a72c66375f8f0f9f0a726a9922ae9990becf554db9f83d49731b2d61bf8b3e758c41690c9431e042153701b6e777
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b8189a5b129b2074d142dbbb89160bf
SHA194a873a88d4368526cc011081abdab021f403614
SHA256f27556720524c1a445d5869a2476d1824ff7cd5d8982146bea29a1c93f10fe04
SHA512c7283910d018f2c69a75a284708dce662de3c279902682457939b1b88d2b6b45e7c9301f987284d9f329fa6d39ecc0b93749118ce97e4efabaa28ddef5d5e254
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d3a2914a5e896889ecff271a45f3363
SHA1382b8d757ae2fafeefe991d8e2e1b39cede72b01
SHA256912e04b66b1b311a711064b451855623296e4d2f793ee511f1a16cdbda30c136
SHA512d0ff8a63aa1dbb20384351189bbafb1b17e17be426717062ed4846502307880dd981dbefb4f8dfa17017b025405f1f0c102ac727d026ce3bb8f043ea7e82d86f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59894dc685fa0e2e0ccdcf076991085cf
SHA14d66104d23efee53c0d73300381f1a96f3bf5b01
SHA256663219dd5d695f8559a6bd1e7553b5a235da439521a1ca55dc86273b42ce8e1e
SHA5126e7601ada300160b95e01ff7e1dcac45132e5588f4d0812bb73ea8673e91f9e38ba909e88ef9dcbd4e0f4732871136abd1cd0e896e4e75a9d8ebebe338bd8af5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5952ad8883b9078c3925b7adc1f929986
SHA1d1e1c0f43f9cd5c9c23193db210c38c8ca10d6ca
SHA2566d5896d2749ec753c6e1629bdaadf028c178264c6d65be21931e90d4b6601011
SHA51220630fa113c561c24037a1db0240eeafd326e496c7058618de010946ac96de915a8452ceaa5257b2c3c924fac8d97041ea56b28d2f21fbe5f2715bdfac574173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b33616543cd55173f6b6d7561cfda2c4
SHA1be3b920071e5b7143444506e571ac9c0add6ea03
SHA256063f67c15be38116608a2b00e95a67597984a4987dc90dac839e6746f1793b81
SHA5124514e40f4ad98200322e4ac2c2840953f1c6554f606de555ebbcec9c1aba9c1f2b8ba3ed6b43177fab71a2791b13df9c675e84f53e5c3b014ba0f4a31370bc4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c8541ff5f69f269a5de6b8871dfb6e6
SHA1cd38ed5c88388d61370ad8c2d28aa52ce08f167c
SHA256bffc36cdb451be2639fcf4853a696a6890ac220133e43c6a292dc1ff3f752ca8
SHA51292a735decfcdb9a7bec860672b6e058ff6d511bcd48209598930453c0aa506a50d0fea60fb8e8799c7c2c8cca80f18aa286fd9f83407d487e202e7238d055c85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb7220d0cfec67a8fc7d9f490a021a89
SHA1dc1b998a01621bac6c78cd8652282c054f0138a8
SHA2561797ffc991c2d910348605762f6d67228c518ed95be857358938e80cd2800ac9
SHA512a9986f28b7587475fcf37b94e53d5668fd0ef04f58940ca343d6347f039dadf834ca6a60518a173522a075d4708564ce310d13ad2b9e05d0017a9e3d84a9c103
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa08f8fdee9393429ae0e96a3bc2ccb0
SHA12310567dde23d73a20a06d32ef138fb066512b9c
SHA2569f860a64171dcccb7c075bed56d780961c7ba91226f14184e98f8ce140e930b6
SHA51235f5475d895de343ca8064971f8021f35f73a5945553ca5171d90241513000727461f994141bbe96d2c7a6d4d4bbe04a6092ea83ff0921701ee1506fd2b54e57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58487ee96054b750a3a7dea4cd6214ec8
SHA17c3c25c4bb0dcf53d2cc27ef9bbfc0f48bf4aad0
SHA25667f1b0071cd5441faa78df6cd31e4ee88d8e678e5f5e7e4b86e4fd6f84a3dcef
SHA512a8d586958f43fe9d70aa636d5046bf048933921fb2f2716d810fbbae77b35da42b846418a14c59aced1545a787c1218c42eef8e8e361de7084717a1cd4cef29c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b