Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 15:19
Static task
static1
Behavioral task
behavioral1
Sample
eb9db6cc8e640f7ab769e126b2cfa116_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb9db6cc8e640f7ab769e126b2cfa116_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eb9db6cc8e640f7ab769e126b2cfa116_JaffaCakes118.html
-
Size
53KB
-
MD5
eb9db6cc8e640f7ab769e126b2cfa116
-
SHA1
eed808f7eab3c1a2c1d435ea6e030c8aac624464
-
SHA256
c2d71b99e6d9d6599cbb57257f1f9dc5af659156438b918b66a39549fbae8a16
-
SHA512
86afa88f530a4155746729f8b15ef6d25c0c63e02495c0ad98d14cb9b96b55e3d052ebd9d660cef134c545febccae974c81467028504f293feb7f6ab5444fb53
-
SSDEEP
1536:CkgUiIakTqGivi+PyUkrunlYh63Nj+q5VyvR0w2AzTICbb0oy/t9M/dNwIUTDmDm:CkgUiIakTqGivi+PyUkrunlYh63Nj+qb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9D9BD761-769A-11EF-B525-D686196AC2C0} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000007b6d5b6f6bcc24f72f77231d6b1e684bc9b833b3f12adcaa7cf856c118506d14000000000e8000000002000020000000b732adb8bfe2dc8914196e8efcc614a94c58c10a611d94c81e82662593fadf559000000024d97a73cc047cf14d44389213bd0d342ef56065faa929652d29c55847e98cec7f024e1d373609ae4f04c5604bafed1b08841883c339492a517a22276432a6ffd0d8837416472d82d4d8407723da10cbe7667aad47c51f35b2c9fb8b72d373dff3cd68c4e17a5b7d5efdc0a50aa36ce7522f502ca93123fffd125ddcec13efb86446a4a3c140385b6f0ff3f56d5103754000000017280c834b10d8ff902fcd05c431bf58abcadc22cd822fd6c17fd3f5f04613be4ed429a57242c00fcfc9519cc77126a641632a3e0f5895dda01051a00f57a953 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432921058" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0169474a70adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d793ad506ece624c80bd99362738d907000000000200000000001066000000010000200000002c576063368376ef6c2ce207b4a70d652e8fcfa614e68e77bed92b53944cf110000000000e8000000002000020000000a28bd88698788d174f6bf752e1bf1fcfec2976642d90fe0ddb23556731c9f3a8200000006c9f56579958a28d4665eee0e77206caeb918c22b92006927348d2a66df8c0c340000000b0b65dac65cf4b22201fb784885d7ec9461a168bc0d4d3d0cff30e50a6db825676ae9687e70fb6167edfa0a3c96720c5a215a5dea5761c5bb66192bcf26eed92 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 536 IEXPLORE.EXE 536 IEXPLORE.EXE 536 IEXPLORE.EXE 536 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 536 2080 iexplore.exe 30 PID 2080 wrote to memory of 536 2080 iexplore.exe 30 PID 2080 wrote to memory of 536 2080 iexplore.exe 30 PID 2080 wrote to memory of 536 2080 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eb9db6cc8e640f7ab769e126b2cfa116_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e0a596da932075f79a3047eb2590f3a1
SHA17bc1b7bffa1af0fa8f973b52bc85a303ba8f1c12
SHA2563d69718502c424a15d835283022bed71f6214b0eb87a3a6c0b89ccf4f62320e9
SHA512386a0850f9d4f424edb64e4af25ac0b7127060fe3bb09314358315a960dfe638dfa33682d195f0b22ef241f9bc02ddd48210f2f3699399b20dff328cc6858c8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c805067b5ba9cbfb5e0ab4dcc22c8a0d
SHA18162788cb400479868bd0ab689d3590a435ead39
SHA256e5aefe151e21d4fc3cf68bfd001d5b8517d51e7169c3981905017e46de9e001f
SHA5126574eced928c2e66bda5c6dff1e03aeaac647d6536b7f1d3bfbc8ab2446d5bf2ddadc2cc3a7c2c368d4c04f9d31bd96a98e132c8ac298efa65649ec6fc1cd152
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e78dce2b9262e14765d7d3733ad10323
SHA1c4201eb8c4e5d6320a851459197d6e37f6124453
SHA256cb08754297ab0a49801b3e807cf5367f95766da26ed4c9e7b23a30d96e4077aa
SHA5129aa06b43c0d5d00a68e80e3f2d17fd6acaf38dfed44dbd733b4b302d846fe11e146a4dc9b728fcf5a23c257328d7ed5ddf9f221c2dc3e5cca046058a3d2fcdb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4e002468b84bd20822156d72fe9034c
SHA16d33e0e438864b1d7a40b6fc9284f04cfa94ed77
SHA25613d746578d3f779c729678f9eefed504c564404fe5afc38c1c9340eb992c2ddb
SHA5128f9e1da8a2ea7a14d6b56159f30b0f30338c32001ca0c5f19857b1a159d8f9eef2dc9883fb993b65bde2eb5fa62c450c5e341c59f5acfbc306d410cd1b57f1c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3709ceafc96edf52aac84f7ca76c537
SHA19db2609234a4f47854541e6793f86d7be1428547
SHA256d7aed087071be4983aa1e3799420a3d634ee650c8300c1c1854591d06e3b8700
SHA512d3cb1948145ccef3cf9db0427749c33af8455542fefa9c6efed3a0d3292ff707a7d85bcd795d08921719f8d77206fd027fcd32843d65d44d1448327ee310036b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c89c99dce0431dd2ed2a3829237d8e44
SHA13a45afa4af11e6e49eaabc693bc9f9f60c5967d3
SHA256557289ed98e012f901dd4dde6b4343c3ca22b2ca6801fd2ed16d174ce1a1e36e
SHA512a0493df7e9797449b585e49bb24a82cf3060b0dd28082d12999f2292942512dd68c6b2c9e3374bdbe3d7b34398a233a41584a006e4cbaf20be94563303a252cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4d8e1f562d9136e4f597886e0055545
SHA192b587ec3c73ebfe0a496ce32874c5b309a50468
SHA2562acc431b8e5d6fba2b2749ddaba48b2e53bdb3c9ebaeb8150cb3ef76590acda6
SHA5121f1704b0f6d25b66ad5ee4876fdc90765a007ca13694a39f556e78ad1da576e5dea3c8e635c91629ad8a7a7ae09dcade469edefdffdd6da5c0c7d5e47be6e0b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545562d09842e0c03e63dc8328a701c26
SHA18074e969f713b6fb3c15329b428eabc51ff17136
SHA256dc7ee75b820242debd561b54af3f8690c9f27ee4a2139d47276a68a2cfe79295
SHA512ccc9876011d3c40a498d13939e5f59a3011f2d53e78820b33c982924221c3309aa92d381c94624c10fe37e70409cf25587173efeb7272b56f573fe3f7b65e241
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50782517c5fcf8a75d8c9d3b1d2e52443
SHA136ed9045eec2f34b83866bab37087c4bcdd181aa
SHA256fc4e7aed1569e149b7de3e64e8dad1d684514d3428008116f337bb8b7b743261
SHA512ec5baf1a471f39cb40348a703f5771468562e2aee0dce8c76fc0bda97bbcee9898ee0fbd5fae7b0621ba900a2b39f46e9ff8fedc14bdd28fec32fb1e0be1fd33
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5262b99e56ebaaddd1a839d61be587ecb
SHA18dfb795db249d64dc2a6e5203d400c883785a454
SHA2560ce970b538a18e1fb763f98fe17f43086c15f44c96c1cdd84af446dd8ed8b576
SHA512e1c2dfb4b50b7b09fbc80a248372fed3b6c15a530dc960b917846e095888e587c239580eeed6e428b578531dbed9a8748024c8539f0f3a8512772ba8e0af9cc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5728dc9ba924b3e44d922a8287e1ff47e
SHA1aff7cc9e7fb64607e399c5af04df942440c790f6
SHA2565a086a7bb984226319ad43f44da126c6489ff062c82a055a8c54bffeb6a1586e
SHA512b204bc6a982b78d4c9d6d8ca1c3a62a7dc1218f6e15efdadabd437f9b102e8809bb37bad1ef7502390630c1244e8354678936a17877053b12971a59f884efdb2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506c7c8a47998bf02f1f118731600a643
SHA155f20d0ee40daf106b4afc2df63a5f9fa1155b78
SHA256392ed1a473a2c074d5db80605f0eefa09475c9d38897402bd8c878865774b0c6
SHA512b8245953461fb9f27d391eba6a3e683d0a82c64d90f932354d3402fe1d7523aed7e540d5ce275d3dabca48acc05460bda9e8eddc8209ced8e20970bfa39e79d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5820c03eb4aa1b0a0688c32e2f0e2e464
SHA12701389a7817f5e3c2f782d32e159f383b3e2257
SHA256fc238922e278b4ca13a9cdc2c5d6f863e94633e8904ad93c4e9d8ea24536bc68
SHA5123550e9df71606f94cac4357d0b589e7462d15585ce5a5c3bcd2593e659ed6907378bb2a87fa310f2f8d22356304d4c2d220bd91f4ce60bfff4513167116c0b4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b424aafc38258a5867eedf709fffbf9
SHA163e5de3fea10a4e652c7060fce0dbb1aaf12475e
SHA25679c8ecd11db919573873117158acb397f52c3cd0595a44bbd9b84ffb05a2e2cd
SHA512b26919e3ec6d9c00a0a5610ae4fb609e14838df8bd97553e6d9a100c65fb1e960ace9dbb0b8f35a034d9dce1e4591aaeee9456c9778b2321c22f133d16296623
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b45ac6b3b26110a19ea5dd433a91cb5
SHA1d27ec9611111e78d12b2eba5943c3e7cabbb6b5b
SHA256ce0e86037f188c932f15252edeb966fcf3384fe47532ca43491b23b678c52400
SHA5120d2cbaf6e1dd0e962e2c0eca865ef016d90d500733d062acc3342e650f5a1ca2a635fa179bbab5d0755267ea93642952abcca5144a7256b51ce8dcf257610ac4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf303fc23c13b428adf9c6a29e093682
SHA110e2cfa5e57612979fe2659adcfd46e8e82bf9b3
SHA2563d2a60d55381fa434113944b87556bd762cda22fc542843a41a1b42d487a547e
SHA51273207425a88db720159b3e2ed262c134d5ee40fb1622a54c50a8108fb00a616c44325894292eb4f8cec5328f991561665b841fcd232ef423fdda976d7b787b13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584c2807bb31e67954976a673b4abef61
SHA16a3405f9f01d544bf0ae45dbf92496b4178622c4
SHA2566305de3a382bee24fd5a83a585f5f45bcb3f1e8a14bc9d58f987ed72183b5fd4
SHA512ad7688d0bea62ed3352b1f1952d0ccbc1d74e6951c03f2ae479acf8016a3327adf75625f5e911dbfc432b6c851ad086d96f9a3c296b408f269c7ed1987d77702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b19f1053fa26850e27e7fcf9c6b22985
SHA133c302f996b5a77a049c00e6492fd1768df9ab9a
SHA256559319667ce6ae80b925a96cb7c6b02af959b7a24e6b8e787f80684684784f80
SHA5127448eb47bae074f67c6e3190454710203d792b1a57d657f3e9eb4f9edf7ca08ec50fcb62e7983c6c0580ea2c646a519b9f507bd75b61b22482ce69426a8e36f5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0WBLVJY\print[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b