Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 09:58
Static task
static1
Behavioral task
behavioral1
Sample
eb17c7edbcce47addf49f9b8876acb50_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eb17c7edbcce47addf49f9b8876acb50_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb17c7edbcce47addf49f9b8876acb50_JaffaCakes118.html
-
Size
139KB
-
MD5
eb17c7edbcce47addf49f9b8876acb50
-
SHA1
dfcb0312b9a2cd730a9dde4a5b7f59cee729aecc
-
SHA256
8351959345713c84c540138f6bc122c9bd7f21650bdb735aa0121a695c5e44c0
-
SHA512
2f1b577bc8e38071f574bbb740ac5e27502b64d6d54d18c9a3152ff65ca84dad6de8053717117101aecd0581f4436ae909a149b085582c7c23f7d5d4dedf0e6e
-
SSDEEP
1536:SwdDyElntDyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:SwA0DyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C9E8B271-766D-11EF-B4E2-F64010A3169C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432901806" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 4073f6df7a0adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb470000000002000000000010660000000100002000000074317c3884fef3bc9a61df0bce837d593d7660f20ab46f95eee7f7e83176fe08000000000e80000000020000200000005f2e87713daa9e53daeead77758641f7c10ea1379499651a07a33c051f9cd45b200000009243e8af5cbb8e8acf23446a651aacdbb1ce733e40e28d11840210f522cc1d45400000003c2909a30c39a6bf1f67e11bb19207944317c9a04cc7ac9c7f744f7ae01e90ce45445733eb613a6926f4b0019ad9d9d8d84325164f1b1b9cc42d273a4b1fee84 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2756 iexplore.exe 2756 iexplore.exe 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE 2680 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2680 2756 iexplore.exe 31 PID 2756 wrote to memory of 2680 2756 iexplore.exe 31 PID 2756 wrote to memory of 2680 2756 iexplore.exe 31 PID 2756 wrote to memory of 2680 2756 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb17c7edbcce47addf49f9b8876acb50_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2756 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b2a60232ab29b629556424592ec640d
SHA1810058aae1a1bad6f55ed0d8cffe87b56f9be1f5
SHA2561ee3a59c13a56a5ad77aefde95e16a104fd1640d8f3ef797acdd8e09ea131470
SHA512c5c9a0f88e95f7e68a9d09c01ff857811eee997159f6a1ece31cfe2295e9693968b01564ec75efdf3a790c4f604b0cf68250550f3bf19d7b987998f7fc0e9f08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dc9092e21c09715371cbe8bc503e8f1
SHA1dee706d54de70b1754ce0a30dd1de60efff4aaec
SHA256944c7fa37e4c95e086f73ccf4991c922419ba7ae92e5543c0f9a068faf9f8c6f
SHA512f8c91f4cde2ee155abd65906da3f3935a505823cc99d2ab9c38c47ec647ff8cc76160ebee41252049ed90399bb7b36b6dd60e7396f0a5560dd9a01d177077b5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574caf3bd15576a5ca402c43cb750a2c2
SHA1105710aad720e710ec69cedfbc9000e2b94c49b1
SHA256d6f6e2e038fb63588b2f3cd4b6ca1f3461fcf8bbcf112ec236cc25ebe059611f
SHA512b98c1f28de720499394f2dc0dbac1e0d1644b6958f82415347a7572c36ee08460e0d084193d50cfd1bdfd7d97fdace1bdfa8f4aa1dc3e2699202a9be3ef25b3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e8b40bb25c3a19871b9c32648de30af
SHA17eea59a0ccec67e21e7dff55b61280bf0235029d
SHA2568876fed1938a6a64b926cbe3039e1a358fcc0ddfb32c39ba318db0c13a79f8dd
SHA512195f5266c0d9ac13756bc83fb68d7bdb0db9b965da3e8ce217cd95a30e33e7d7ca3ce4b1921227cf109cb09784e46b2b175a4413b13b60738c169a99dcb9ef15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55051241e4b34b1adcd520abdabe4245c
SHA17bb7bc8c3599d2e7957e1c70e01d29de1437ad1b
SHA25698b76a801e7a1c66344aec2fcc0070a08d879e332626e14a2c1484893ece9a55
SHA512b5049bb34b460358161242374949132ef5cc6c6a9f47760548f54456196d077eb237dc4e64c7fecf94f2f5c5444254873f6c3fe6e572d235a6dbea840f93e47e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52938d7b003abc26b78d4d8051541a851
SHA1d7fae16dea551082f363da7fbf11a51c96076f63
SHA2567981d719f70df128217a2082bbfdb390bb926478755b8b867da18d8ab8d9fcfb
SHA512f345babde83de15076de9cb39fe654b112a66d6df3d7ad3c360ef4b357ffa01aa31696fd9681430fa58bc3b497dc2741eed2021b171462f902acbb30f3fea9ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f90c0b2b3596bc11675d1720b285a47a
SHA156efdb8da0767b1644b5759fb80e36cd429fa4f0
SHA256e2c506e9723a057b713f20ab4e3bed0eba23d709a3265044035705e4dacb9e89
SHA5121103dd57e07fd335a52c452264ade60bdd9c2d839a3caaf40f7738ffd67b3bcb9778616f94b7331ba7ff97e350a60fd952c9564e5c9b831e549e2b9c1414330e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574f9ba5fd0be93dba24e5878def95e40
SHA13aafa86035f27236adf162cb7a319828b9f6e56e
SHA25659a4903cea6695bfb4d79d1d1e92428e12ec11aa0615c6dae76f05063954555b
SHA512a78ba54d10c3a9e002b2905a4edd80e1ec76e47d0d6537862bd1389718557ed3610576df18dad6fd0b8307e134ccfc1aa67634c3536f2680bcdf4b0cf359c2a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e725b333688c397eb82f7fa1850544be
SHA1167e96c6e108651d80a39437be1a55e29ab224c1
SHA2569d0d9b16010003033abc25c365fa55924f6697f4323ff1ddff951993d25fbb0c
SHA512e89f452c0ca1475fdd492ae8f263b26ff1ddeed6ed388f6ae08539fa1f8e97839e724d59ce4764988e3899f29734efac5dad88e6b137a9496854f24a692f9ce5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5523a692147aad6d39ce53089393572fd
SHA1158210e587e7bad80427253e06eed02758de3547
SHA25695633c250a0e1e853554926c78cb10db2c5b2d40f12a48b7d78e03959b891600
SHA512e10d7a364480a82deed46f0e426000147eae38dd8909b68a59ab032d29ae632aa60ec6b831d1d07c06a7c9d9b7858b9c33ca3ce2714622e276a245234123998f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f740cf7212d0c11bb33b68c171d5074
SHA137639b15ed22e946e2d96b46ff188754549801e5
SHA25633f0c25de5c02955fc5c4c0dd383afcb1fe2a03e544590a66e83965fe04b713e
SHA512bf5b84454e39fbe7bd8366406fd630635799265c160af65039eccf159ad99aff7a1beb2931bae6e693dfe19ebedd5c92c66c403351e34728d7320a0181157b3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b08a8746a6ac1af18eb825319170d9c
SHA12aa0664db446ab4c9214dd396ece8e0704fdad73
SHA25676acbfbeed4e743381c3aefe37333597c4ab6fac32f0982b45e88eae81b9095d
SHA512c77d483d4e13955073146a042276e225a972948ab187ed4cbb918e18476fc0f8082f4d730e5790169e44c99efc34c9516cdcee51578fa38f6d4d880c27074ae7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d57d4f3a1d4cadf3445c08a3c76f1600
SHA1cb931d411d2621b52f9a3a406486df07082ccd20
SHA256a4ca22acf6e090245765632e5a85f4a02af939fce7d8f79e41ca223c31ba4b90
SHA51230cb126ae6257b7b52ff13c3694caf76d4ffc41dc405820050c11b378369e6ccdc994891be40b11f37b80cd20c1bd594568ada25af7cb06328ff1e92b10b4b8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac1aff4ae3f91c554453cb94a559ac63
SHA10b2c957c1ef397f465c6ef8ffd9900c340011e40
SHA256ed5cd7b7423412a5e9b8eaa1580bd1c009c24a78359ce150f35b60d6b0603be6
SHA512dc404c765077f84bf445c20571acaee78a5ea82b4251aa44590a8137d355a67ba6f37c0e6f9133bc20977ab10142b8c2fb0739e77dc138e46c5f74950d89eb55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f690432a9bfbdba3c0556b21c08ecd0
SHA1ebff9782ff1f19c3624807e874bf8f1efe8f2381
SHA256d3f06e3919bb3609d08969f7de0b6def2edb551112069e76f1c902a6277543a8
SHA512a3240d9e7569a35c5d39f228c532b3576b24c1580990a0e2908d4712d619e9910d48732a2bc947e03b75a12d9a462fcd3c87db9fb2cae4eb2f65dea45ad0d61b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559bedad2aa12032e5fa046ccb0db627f
SHA1de180f6384be575e3a2670b0bae702686bcab47b
SHA256eeeac3593612842b90f46cd06d6f6639f71e419b1f5dbce19a847f6065093cd5
SHA512d7cd89d90ec8931e0c9d9beadfb072de5abfb8e458437b8aa856cae10eadb4b7cc6178269272b1459bd097f5b6918e8c0c3baa1ca1b74ad8fc8c43cdbde20ee5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577692583f6ed2436d2aa858b2fe1a635
SHA1a7e5075ac289f6b362f3042b67570c7d51eed98a
SHA2567241d40119fe4758e5e049ac1ae7d065714976277fba3b0d5fff1f3f5bf60310
SHA512d6af241e0c7a685955519473c8527bb3dfdfe5e7a5c6b901d1c7d2a14aec32baf18ff8b41fe6b993630d48d97d809a0b052c19862b323884d0bfac058d830d34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5515d06775317fa2d6d9e83f8ff9f651e
SHA1aeccbdd55acc3832263fcaa1f9436798449bfa21
SHA25624cd01d0e73190701b6125d24719ddbaac22f6666535744eba637da8745e4afe
SHA5124e5e8d235172b547920eda2fa978a972408e4d84c031e9b28cf3e956c8d3b7596dee79e67621dd10320418a617780a0c707bceccf498b5e44feb27da991aa130
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53410c569f07d214edbe7cb022b687887
SHA1541d917c6896ff7b32e0cd461adb042bf60c7bc7
SHA256aa5f49788f8aa2d764268a978346f987902cb2755bf3bfddae2d16919efba9f5
SHA51201a231681a0af566c4f03996d3505e1a34cdac4ca650abe6f7476a097c73fde92edbbecc677565fc4f4a6d1447b6722ffe7ac0ce71587a2c680874e949b10f02
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b