Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 07:09
Static task
static1
Behavioral task
behavioral1
Sample
ead25a846b93acf010bd1253dce7c378_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ead25a846b93acf010bd1253dce7c378_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
ead25a846b93acf010bd1253dce7c378_JaffaCakes118.html
-
Size
23KB
-
MD5
ead25a846b93acf010bd1253dce7c378
-
SHA1
65767117c8f95358f13df8eb989d04f3a12a4e7e
-
SHA256
10eebac33496b2ada7c25d09ec000fda09f13738f42fff246ae49f1bf33da562
-
SHA512
24c67d3ce4d7ceab32de2a68047ddf6f8ac6522b5b8d6e51e4f25c9ac17793381cf144bd687af5ab97872208c91b5e7039810b9b5edc0e85998ffeac57c274bd
-
SSDEEP
192:uWn8b5namnQjxn5Q/pnQiesNn2nQOkEntDjnQTbnBnQyCnQtmwMBMqnYnQ7tnOYu:jQ/027t
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{28A41E21-7656-11EF-BF23-EE33E2B06AA8} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50c8d0fe620adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432891658" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000009ee9caf622777ee3d9ff08ca3f50f53630baaf94731e8cc215143da187d141c9000000000e800000000200002000000089fcbba463ff65f2d491da301cb1047a1578e4179a27c79cd2a8ee00424e848f20000000e5176e64afad21817dced154105b1d06d1e4082278ce028b120dfb24945afe494000000096b50e4784d78f22d6f6743eaa637a812c152b87438e80d07492c72d188970e884ae6ee43482e61ff3f53e7be5d353d7ca5ac104beaff3c8803bac5dede76338 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2368 iexplore.exe 2368 iexplore.exe 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE 2160 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2160 2368 iexplore.exe 30 PID 2368 wrote to memory of 2160 2368 iexplore.exe 30 PID 2368 wrote to memory of 2160 2368 iexplore.exe 30 PID 2368 wrote to memory of 2160 2368 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ead25a846b93acf010bd1253dce7c378_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2160
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbf3fbd5dfc815adc17dac4d25936ec7
SHA187144c37fb79c8d6842adb0218fbdeb29d2f4fdd
SHA256c87a36e270eac2f01e4baa94aa63db38d53a37d27c30d6c2fce3bab0a5ba3175
SHA512b748221d36f4f6e4c93600f4e1ee0d35c8602b2edec1f07cddde477fedf63ec411c3b440fac2984a923ac49db0cae5f5d88f469c49ca66d26afc50f6db282834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d92c0df0c872434928a68d5d64f64e17
SHA102f5f7abcf8dcad6303a6e2820d2099617959318
SHA25682c06560acc71d6aacf0866bb0372a94ae9b8aa2d1feaefa4dbe4012b0d31a0e
SHA512fbb7a584eaa822d6a215c21ca5d79e35efa486beea00ee7451ce8f60bc809e34e979b5ffbda120c577168fbc2945a10cd459f16f35e2e325876ea00280a6f35b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56a45833922bb8e3802d305cfd013a89b
SHA10c37006a9efdfab9b58d34c3154913a7a3ed9c4a
SHA2561a7cb02ea34c1a5ec100242e1bcdfb176b7546f24e56fe558d4e358ec8084d78
SHA512934fc0eee7763d06b79b6e8038ea42e9c63580e84584e25d663159f6f31bec6379b858ec768a302e09d92769dbcb96311ce13cbfc69f9fa051bbfee44b84145f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f949adf5cd20d3a82976a571ec895c20
SHA1f4ca4adf856593bd7bd81d703a80e6af41d21ddf
SHA2564aaa2e9f171d95345e66dd06e51f2ba08f1ea29d4133c38be7760ed82b3dc374
SHA5121c582c4feb70ae03f9fac9bb74653997304116d73e9b7f30dd948442548ddb8e667ab69ded5b173bde7e8480ad684849c481cdc7b20d57356ec61896549784c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5232313cc5057bef49e596ef49cae3613
SHA1635722dc5a8caec65d135aba5d590a3ca5e389b5
SHA2561641ad80d6dee595a05910f7d83f123b95eccc9aabaf713c8e1c426576293178
SHA512a9851194c19ca6a76bab6e2eb171c9d777c5a10c23badd5c3c207a7578e70f0835682585ad21354b73bc2eef6a28d4efd37460c13cef7730013f2bd3073e8a3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d069a0597605d4f46a1d2702cf742a38
SHA163b96430f4b9c9c44ccfc06654bf6e1c587e4d69
SHA2562e0de7027766e9fe96b17a0717709a0a7f301cfe32c86720bdca36a05e811303
SHA512432178f75d71a0870cd5947cc7eb26ddb63dd72f8b9f8c8620a77eb75eac0b55f796eed75e1fac68cc139b68b80fc6dd6730733cd584b19f4335af6939cbf85b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4fca4c899f79a31fe953470882991d7
SHA154b18e4aeec28c7c99430cee64776909fe61d8ec
SHA256de7f2435a328de2b6cfa423c1e858d233508f2632f5a19101b431c4489897ae6
SHA512c81dcb5b1a7cf82ae91ceb852a06b44754a535c75329b9eb55fbbb63df065bfaa74ca400f96f7cd5b0a56ef719da555eae8e21f815c1f0811277fa5df80acd2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a728c49b3615c63e77dc8046768f524e
SHA172ab26ed9f39a0bf53b02d10759e71e826b7bf49
SHA256d5a530d18e5021426c24177deea506af497e931669cc2fd6428e36773b9a0723
SHA512b5df3e6b33aaac6a13cf58ed1ede5b9d439cb1ee63273e56e0109a6c30193f9133f9bcfd82d0c93d34d61dcbc1c9e247a550451b8066d7fc72f32eeb42158ef2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c5d55bb5a53b497f7ecceaf2fcd38984
SHA134f0353c2e8207d2698e01364ffb3a643a39af65
SHA256bf2fc2a201327fa9d2ced4bd14db02e17fe7b327469914b3e397e17bc12539c2
SHA512bd1b90155a9f0dc6fbdcdb7f1563c0f919d92b5186561b4bf5a6f7ecf922f090be77c6cebb16101a70171e9dc10e9a54526864593c68162a1691b49b274f4561
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d3c74035e4aaea8292405c4bc1f7b4c
SHA1897a232a5a5500c421bc5fd78c3a0f62f57d2f3d
SHA256b30714f22733da6d793a401274ddf586c632184a4c60463e7ac2653d25f4e217
SHA512b9cf01de43cf9b94175bcdaf425f09cdf644bc69a3e330c077d1a78808e54dd604087f9707ef16f567d0106cd24f3c111e154f20169d69fd5e4023ce1e88b2b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ca7105736133f3f60c165f22c8af284
SHA1fc5299e34c877e5960978ca55e16ccfa98f9313a
SHA256b60a62bc760f6f3eb663df58c35abf49f108614d9a0c3b9d52c86fe57653e54e
SHA512711a9e4fa20638833fb7a1bc195b73a8e7d0e8f461b69c01f4b7d00f241a061a70c79ae1781ed853f326040ce2a6184732b26a6161219c02b7de090bc0114f89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f46effcd0e0cd320b5081ce67791b78
SHA187710c485bac10f3c4c4203a37a4ded273dce697
SHA2565438210008f475ba966f403baf557236a862b1bc32a0d99aef6d68c465f5b5dd
SHA5126bb5583d2ed5777889a1e46d0afef1fccf7a52d2ffdd020eee09df0b4d3c55a69c061779ab5ca411e7346489bcad4523c9767eb5154d47fc501800d52184f243
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7af6a0c10bba26e3ba650f4306d3907
SHA1c1a35dfbbc74d8ce8778068d2299e7daf460b4d3
SHA2566a729797903e57f69d236d3fff76502190397c7c35f7ef785151dc96bfa8f541
SHA512e08653527f8623be18ddd4ddaf5a3011e97ccbecbb3fee4fefde6f77993609d5d36eac1059f074b1e461e55a6553cb6064344f46ffbe9877622f5b54c502bbea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525def2d610a9f5fc262f639454f39af0
SHA1c3251e76cd4d942f76ceba2e45a9b2e105c79f6d
SHA256b680b6e2b758f0d591b6ec7a524e105d0a872228beca9a8cdde05e08d35676b6
SHA5122d805955e309dcdd8bb3e295bb69224625abf89f7965662077a13d7ce75d6ce7c21f182ee482e6a6458fee92369c5856d081741c95ea1ca74448c4b0e74481c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a57c78427ca914354349518dc13fed2
SHA183eb2dbb5176fb4bfcf8f4116ee2c79f06884dcb
SHA256c0438fc831ab4801fd559f9796d2c6846de7f1c219beb62841a4ebd89a492e06
SHA51222ca8a2910bb748ef2be8c662897cf7f455ad38187928c18043be141d3f891345ff5382330a35c51376557c3e73c3235d0f923ff37748742b6a85e208fdfa4af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5382080e875e74cd03bf37c65e2655fb0
SHA15c9415c28e7edcc5fa9e40aba1cd35c140a27f13
SHA2563514d81944fc0482e0cd38bc69661b069309aba69a9aa0cbcd32378132150c3f
SHA51250863d83d9478fa964d356dff33a69c35227b0775b8c808c631a854bc2c78f1095cd017ca69a1170e90539329db3643335f0f255d9bd5be3444314002c9fefc2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b5636fb0d49b66fd3a54e67336060bc
SHA18419688101e183c73a3d270ddf2c11cf56160e94
SHA256ead0b32a40e1bfdaec17afa0318cb799afcf99e6d562e019158ac50c0eccc417
SHA512910638cf3281e4d13833c45ff6e2ca20005e096be334e0d91d645b1cb255a708df5bc298cc6b0c4e7eb349cb149dd085cd1d3af1e627dc3ef0f0f5a6e53b803e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec9986aaf3def82b9e9b5d82402f00ac
SHA11bf97d56a64bc118e4909b55c411ee49a509eb7c
SHA2562656d2e25fe146f114b4efcd26c6c0ec19252c6d0eab7f04f626d38fb0824518
SHA51220f30737ef9535c5ae744a2ba27fa64b270f5a5aa13435e434202fcc70d2a60e81a9ce9d3e1d42ce41c0fe27bf7aa40ef32d9fd6337f8491b98046e82da1627f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59766dd60367915a07cde896564866fdf
SHA1660622bde8acd45db3eb16234aee2fa256fa496d
SHA256c1114b92d4f3264cde19f0d56001f35aad530c7588b078dcee14db400fe72170
SHA5129fbe27fda8521f02ea33affb8b145d664a7d5ba9964c4330b46dc1ca85145aff7c7984b3ac54ebd25ebdbfd2809b2f9ed9af5ac7ac3a425bd81fbcf2f246d5f0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b