Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/09/2024, 00:28
Static task
static1
Behavioral task
behavioral1
Sample
f729e23d30e3cfe7ccdecec1eb9284d5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f729e23d30e3cfe7ccdecec1eb9284d5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f729e23d30e3cfe7ccdecec1eb9284d5_JaffaCakes118.html
-
Size
49KB
-
MD5
f729e23d30e3cfe7ccdecec1eb9284d5
-
SHA1
acd34dcaefaa207f4da063aa7c7a52a3fab96c4e
-
SHA256
1df71b9f4d21406d09716c469e902fbfa5f4132139854783c5e7ed19adf58322
-
SHA512
6ae128da88284696100759f3995c3c9a04afc698232d126fd737d460ac13e3f1ea5374b4ffd9cacc7392713352daa645dd7868912dfc72fdcf8dfdb4fe89f830
-
SSDEEP
1536:SFbNSr+fpK0RzyjO0XiOm/KiZfR7yuuOQ8Ymz0dypajT7TW64g7dnjK7+iu:SFbaOvFJmsTMXqu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5333BEA1-7B9E-11EF-BDF4-FEF21B3B37D6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433472408" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000009b48896467c809e88be8d22054a916978fed0399df4db84786906ba1edb3e0b1000000000e8000000002000020000000717ddc337c5de1265c9e32ced917333a9838d48f48199172ede3a6740bbc31ef9000000027dee40c8ef4b1ed2781510b4ea4f66904651dcdb561427cda4a9ec0feb695bb5213eb087badc5bdc24e7e34309e772d0c0619da15a74bdc1a408bb469df8e1dd414c415648c8b325ddf1b58f73bc50b85cf448c10988488dc1cfcdbc4c4ddfae6501865d62c75136ab9e98c1653e5221adf6fe7a4317264b6d369dee29df1cb15c404f828b4028ea12e80dd1f89a22140000000d3051bffb6dcdeb7dcfda7f04f51b3a85d2d0a1d510543f8e135c3ea8cbc6697567e65e7181aa0d339a9856c1f50c1ca4b2760ce1100626f286367d646a858bc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb0000000000020000000000106600000001000020000000edeba015df9cbd5e35b3f540d181b1f69e45373bf057a2b5c05f0004f0747705000000000e8000000002000020000000fb63b4f75b3a977cd05afe119086376120a8e097ea8a00488e3a6428ec887ad4200000006372fccf78140467a9dfd54d797181188af42772804c8b84510bcfdc7f2924c84000000005fd1983e4a779d3ba3d4685de6b57887bc6cb51f5f58e05eb3d5bf646514854a0b30f69bf31aebdc453e4dd7f891b4167572b3adcaf614d19b357afdf8a3ea7 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90323c41ab0fdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2852 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2852 iexplore.exe 2852 iexplore.exe 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2976 2852 iexplore.exe 30 PID 2852 wrote to memory of 2976 2852 iexplore.exe 30 PID 2852 wrote to memory of 2976 2852 iexplore.exe 30 PID 2852 wrote to memory of 2976 2852 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f729e23d30e3cfe7ccdecec1eb9284d5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2852 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569f8a28cd4e3405209277c3c0eec06b6
SHA136f429ed9c3d10aa97759dd73ce5998375d3e039
SHA2568409dce5e598a3e8b622cf711e43025840d8423c65952850489d75926a2b5478
SHA512f937e2585fef7e4358b0ce63172c870ee33a21843e11e6ef9858cba647a1f056d23788425700f0bf45800a46fab51160815b116f2c00075903316e2fb9353687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537d4828e50cf3c277904be347f8d9a83
SHA12250dfefa25310d5efc86564d0496804aaf1886a
SHA2563c351ff0d1d84db5608912a033273745ac5b56b71ccec4c3186280f67797ccd1
SHA5120c6df614e2743851062d1133be0fac4a3233839939c63657eb9bbdd9f52abb6755177c663b5ffb9a855d94afd5a56273f68dbf2f222eceacfd052d61ae52720d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbe8b9aec6d1c95df415af431e4bc64e
SHA1e62d81f6bd774efcecf8ada4840365c19d7b21f6
SHA256e47bb992722736d8e627a75a3e5c65e11d40222a05f0be0d2438719ab29c59af
SHA5120a4f54704d06e9f75cd3d10972a48364bdf7a6a8a5511c06f903f656caf436259c8d1632fba2af21fb67fa133cce99dda3a4f977c5bd6e925e9e3e4d180739c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5441a21656c947e059cdd54e87d1f648a
SHA11680fa9626d7d36cc9ef87ea5065457d5c8a14a0
SHA2564a56161971c88ed8df269ccceec79129cce3d55acf6cafe498ee8c540953fabe
SHA512ac752230bc7ca2bdd764e2a7bd239a0ea710e7a24bb25af1fe32b627306c7d3f0bf4fa1806433c2c61f2398b5317f33f4575f9261c469368793d7a4a297433ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50867d3a104f3d1bd99c1bf335b38533d
SHA10db2eafecc05fd389f3014de126834018d005e3c
SHA256aa55f11ff7ae5ad1497919af75ae8447693bdc251bd4891835b16e08ac25622b
SHA51271d350428d48f7272a8cf9a47af5209c4558f452079ccdd97fb51ac1aea0307beaf3465bdcaf71d2738d210842fbbcff7cf60db32d3bd655c66e811bb605462e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519cb9d671cff32ee2013b08332529f79
SHA14a58832711d88267329ad109bf41b71d35bdd357
SHA2560d006d6980f134da2fa778336985d70b7cdaffefeff60cfe5c834409cdddc84f
SHA512f9adbb4bf24fa219ad68dc17e0cb4e2700557328fdcac50151865a89b94603f86816d8ae90736a7474b0f9f285a551f10ef56655ae53229d6041056e8765bde5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dcfc57979874efcac6e267267173c9e
SHA1b678c578233af67a72c23fddb7084b3ab46a16dc
SHA256b0fe23004959b2f2b23ef0fd6fc8ecc68c3dfdf6e3d8f8377e2db92cecb8aa40
SHA512456545f79e3781a4175af90a6b1abed412fc45ff8f555650db8baeb2914f76d196cea9a25fe164152bd629ca24ee1a4d780e4c09d52a8cde24788df453b017e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7f9e5844ef8e72e5f385fb8ccfae757
SHA134fe6914bb1bb3ff242bc5c0b50936123d54c54e
SHA2563cbb06137d2ec9c1ff528aa0fac66d22ba15a3b03eca9f1110e34a181bb3d07e
SHA512fd154a2536d847edf7819c2d3a7aa75b680ba041e7ec265f4fdb0d66074133781b16f1d7675e661acaa43f4702f1be22215e481b4ebe2ece64bfe9f5bf960bca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54387fab4be462fc6b22a05f146a34300
SHA17d70d02189c1c82f84f3785b7cc9c28efb9fe750
SHA2565212a28dc367a557388fd6da911908e0c10580f072b7548792e4c1b5cce44d99
SHA512534192abe026e1225db9db1702480636ba5ef5777db15d3844630f3c22100e82507d70cf993ecfd35ce5e0fab47f6d600bedc60ea97647399067757603a4bf63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519e8afcd9020b14de878f6ff168374eb
SHA11f19e4d03828963d5edb251181230d90c9f9563e
SHA25640e3d31c198c9683e38e04bd51207d5f27ed2173e960b4249499a8598cae1c2a
SHA5126d0a300d4c1742cf38f848241365229d5124cc35f771977f23b21fd1b02bef44a39e7643a2e0780cc14ae38b64b66be00a2fb70ee7f1d030aefc8b0796b4a7fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59ac5bc063125465a74d2a4bd94396c9d
SHA14b3b2f5af8816dfa6e62b6996c616c934a343331
SHA256348cdbf4ce78e60b294e01561b4faefd32b1eb154ef94fbe5c3ffe1cf18a8986
SHA51218b1b87b6ae26c51e976ba16ca128a71fcb4e95eeacabdd22e8aa0ead24340c19a062490a765c45db5201fecdf5af4261dc0678b7abddb510283bab660fbbb90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb4b1ed5e9fe1750f59e8cbbd671439b
SHA1ec0cc62f29ecda5670d4d35dc3676137ab820b5e
SHA256b62a2bc2569ae361b66da29afd6a261ad0dd159a685f3002695d9fb902240ba2
SHA5129a3c0b1e8327c4a0e926842c9f5a0c2131c30cd43b55a981ef5906ec5a97d051f7c6344cf2fb233ce47e3a5fd690effde53605a594ec9d3720fc9f3504423ded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58854c1998a79f7b6c45de428d563073e
SHA1006836e78cf2ff5a1711a4caf16f6d674f2e28d4
SHA25689fd8c3a0855acc52de8913d887da927cb616fd5e6c142252646e57c0946d73f
SHA5127461a145ecaef9282526f073dfdadbfd218229bc3357f3cc3ebbcba4871c353fa38ce4e361dd1956e11340a80f7f95ee2abbbdc35d1915766c6e0dc63efbdcac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4b1e84fd1f696eefcf30320aad4d6ac
SHA170e34fd87f44e9ee6e3afa51603e6ebf52ed082e
SHA2567feade0f03ebc92a9269e8000c5c38f37c027e4e33c8d46b9ec786939b6c7811
SHA512f1a0ca8690c7794bae7eb8dc4750cb2594c96f7581952c97af13fb7f49993e3898667804313f62cd6015d4026ba699ce120d744c606ce0ef1c771346ab71ee46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526b0937487a61ce9c12ba43a73916d49
SHA1c83892dee736b72c2269888163ee32e6125910a0
SHA2568c8b17874a61e7c43ebea158983e8c9966f1993145a74345b277bf3d9e4302a9
SHA5121c51d9480891b733557866832dc57a1aa8875681d4bec7c1f4509069ac0158e8480c81200551a24d4504f1984dab948a7ee6a9bb015237c211929df1d60caa97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568475c14db954141433a502076f56225
SHA1beb513e6e43080d4f1d481153af5d96ed8b1a528
SHA2562adab6795ccdd3afc06b4253c98d7ae993c09ae9f2b8348d4886be6e05b974d0
SHA512875b11b1eb999a878aa6969c40dcb1e5fa154b2a060f1bb32302a372d42d596ba410e1abf3336e8bfabeef0a1229ba7551ad8539b8fafabcb8311922cac45865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53925331a43af09b12e3efe1cc1ed8cdb
SHA1fb428e99062544f583ab28e4fbc92436bb9a2081
SHA256953b3b719c24e21b11181d8af5b17a4e73cb03bf08c775b9a6a21e492f8f1d0a
SHA51220a50297c62d9e6bcaafbbdfb498bb0a2d338850b5476c50fb9ed5b9abbaed08b44918cef5c444b744fa27526dba716ce29bdbe9daf9cbb7118672651344db5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517d287fa2c80539b1d67aea6f1e06482
SHA131b21eddc8a19e42b43120ee97a0c061c4621ba4
SHA25675f6a05ebed5000565c54dd3c5572c12002f373db717027850fa5fff7f325641
SHA51229112787dba33609c7435c5ed458902eb8c7ff8a8945ad764098bd6c8b0160faaf9c9b70fde05bc050f92017f71f0887833e79f0061ae5fac228e2b52fd67873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6a42f4375d247b9dcefda2b607cb2ca
SHA174faf82d57d00c23d06a3b676a3212df9635af5b
SHA256d6e590d4a8f8af75c41c8d258ba7def90e81811144e754a06e81c284c177ff5a
SHA51297427baca4f254b69b567fda843b0a6ae69a39a20d43e1d22985d8b00d46d7d0d4cb7f0714c2c3bda649bfa341c5b7559f798187f749ad4b01e15a47c98b2e5d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b