Analysis
-
max time kernel
139s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 15:48
Static task
static1
Behavioral task
behavioral1
Sample
fab133e08a1502134911e15325a8b1dc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fab133e08a1502134911e15325a8b1dc_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
fab133e08a1502134911e15325a8b1dc_JaffaCakes118.html
-
Size
103KB
-
MD5
fab133e08a1502134911e15325a8b1dc
-
SHA1
7142416c824f0e2affcbd129f7464d22e9d64ee1
-
SHA256
aa605f064c75781e2202431e06383dc204c97d6086ac8d821f5e31def8e04a7c
-
SHA512
29e7bd8de577fc564249fc53278c493bc639a1cb58eae305af4e54b4de95b4cc89e1db418115f993d81251bb88fb51bd5018eab5831ea1099149aa8c81b7772c
-
SSDEEP
1536:Scq+w/EX+rd0s0BDbiMbr1JCMSwFEhepNqQrFMOrIeMIPYXHVt2t8phXQKCw8IX7:SePy0Ia3w7eFMnI4f2iphXQdqga
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c400000000020000000000106600000001000020000000d1c0eb63f43667131f052a6e4247ccad93745c5e8dab6333175b39b66a0710fd000000000e800000000200002000000030d98956f28410f1a79af9615a27cc4decd10b5270358736fb92dc6bd5271da39000000096eccc00ba940f0778de67b38fa743f5cf26c19149ff9b123f59cad45c1c0b3e57c185174acc4d958c2bed6ce337bbb15a9bb7b0edc7bd3f5227c1b23c9b6bfe45a5185311db6af9af3457cedda9f62206ece3b36236b05a33f6581e1eb81e4272518c83f410877693088fa6812fb5fc27677c4170ad0efa311910e50e80583de24e2f94adbf837d363918800735d98b400000000da48a7bf76398e4d03f612bac2fbe2f55acdba97db793bcfe88cd1aab08e88dbbe95ae73f4f14602bf2d8057264f87d3963e5b2955f8bd3c2d682faf88e3ddc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90a0ce09f510db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433613982" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c4000000000200000000001066000000010000200000004970bc742d98962df22a7ed28bf2012b0e65defb38ce1dc6cbbf41223af136ee000000000e8000000002000020000000b2e4a2867be2e039cf0e34df0d31dbfbd5e4899b2ee32565e69bc8fa8dbc734320000000dadcd1f5e367d3e4b2a1d4c3f72cfe1b4171f0080522bdf95e39cefb0f33b399400000004dcf160ce08fb1b34cf2c9a53e2b283fb3ae63a8239da9c0c49e8d542f0109f5916a83a957d0a2f5fbeb7ab430d2379337eda32b449f20a63ff49e873eea1f32 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F48D28A1-7CE7-11EF-B60D-EAF82BEC9AF0} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2404 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2404 iexplore.exe 2404 iexplore.exe 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE 2368 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2368 2404 iexplore.exe 30 PID 2404 wrote to memory of 2368 2404 iexplore.exe 30 PID 2404 wrote to memory of 2368 2404 iexplore.exe 30 PID 2404 wrote to memory of 2368 2404 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\fab133e08a1502134911e15325a8b1dc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2404 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d262ec707f8f9ec92873cea3a9007898
SHA19db3042a9612ce65c49cbea7e721ee40c0610925
SHA256a576856e0efc35cd1712507c2192e5b69dc18a9df9c873c3898f13b0766f2869
SHA512105ac1b093b1cd9f05dc2822198676e201d5f9b115207adec89a0e24e6ce1a3c40852d20a1a140f645e12a055cd95165038486506451d92a7176ec529abbba9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7de8486417fd5572c50c7eb5b8d0a18
SHA13a9a52b20daf38b9967701fd02142ff0a9401968
SHA25685779247fd8d6720e4da9e09d30681c88e9fd3770a433ae62e2e85b30ea9ac17
SHA5123ce0187793dd7cc09d3cc3b264d420eff73d19238895d53c03fa133a334ac79fbb22f16a4b5a228cbae97c4fae3b30a526656ae9b0fa4cbc3db42c1b92532bcc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5039d5b6f4f080d1faae829f030aeca9d
SHA11f574b5c9a12dceb70e1a17d0c6c48017a004a2f
SHA256fafb923abc149541e8c0d701cce83774a142258526c1d1db988adeffe4922280
SHA51267df10d3a603dbc548a2e7a9bff9cdec52ea9f7a6a6b18cdcc51ce8e718f9e4b298cbf15bd46180fcdc1fe879b77ea7463a40672e35dbe8105fe5a61ce11e097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1d76846cd1da8dd04e5dbf100f8687c
SHA156d94a55afd244cbe23b15a5c6132271fbeec3e6
SHA2567cedf2ed9b3fe051f787d40c1b2303e85586c8ab1cfd240d6def8be8c5fd693f
SHA512cadc8233a32b63a7e3fbae7d52aa40456be3dd512fa8fe8b6545e47f0dd89ae9d776540bff80631106dda82f2473513c2380296250921aeaf71db34b95ff8173
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfcdeb55c61fc4f61f56c2d4a5c9b74b
SHA11f733c3dd4f06d18bc972652e31554d5156d5396
SHA256c3edfb954e885658371cd05caf3b3bb22aebab60f9415d8bbb9b4f2ec55f2a9b
SHA51207bf2f8345db791cb9109c3c24018da40fc18e1cead0c3373a0b939b6f8bf43a2f070f733e18d753fe876af9155502a5346dcb66eb6f57210eb643c902501b8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bd5b6f6a6755f082364df587359d7b5
SHA123b72eb225b8a0f409a02b4307bc70a7361609d3
SHA256de5fb5f1ae7353ade2d3089b8d14977dfa69be3942db0a982cb673c7d7129e4d
SHA5126ecb9d0758a0dfe97d67051df6d177884348a84d961a749947079ee8941b73868608d81a62ca76e1575313656722d998959557bdcd130c7e68fa330ab8fdbcaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b7316ddba0bd6c7e842f3fb833329a6
SHA17c134614665adc316e733de3623365634755b53d
SHA256d53ad9594fcc7a23219544d93cf42534641fb74d759945dbc719dfca37074bd1
SHA512b9bfaff0db3d332e3f34ead54b1609143168f917d67445f478124f85019833ea87248a10c6b8f8be827a72088c9f6ca8fe502192bf2b311a63bbde0c9b6c8264
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dafd814eaa34a45cebbacd08c7cf380
SHA18254ea74b58002d9d889b4927b0c7ccb3d8e704d
SHA256c9815c9f31f277feb1a1e2d474afc4402afc11fe318263ddaccfc002436a5a3d
SHA5120b769f998beffe0e53ea288914a8d644ce4254305bdfe694025771a36568bb9e43ec8cac635857bd43de0b42aed95b0508d6efb8ebe38cd5b08a40b4b2263dc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e7a1cce5fa854865abd87294175941a
SHA1489bd16cf5599e072fcdc0280ecba4867254c326
SHA256bc584bcc4f97ca20c2dcfeef923fe67ebc8edc7c34cf3bd7cddcb948ab4e2641
SHA512e34cef21c1e9358f68b19a8a4f17d0658c55b24098851207e3bf0e53336ad80769f08080f0372c7c9ed06e95e026e09b37b8bebfab7e81eec886c47f3e4deabe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e4fb66866a579baa64ef6b6c4ef9322
SHA1fd8989cd63b5f5e63fd6e848d82d1251381b6ca0
SHA256dfe5de19fb0f0c1dc5ac7ff41fcac5cf6163352f73ae7169b4a97de278beea66
SHA51218d810141671e7da819765a35c5947a1e6f793cb97b5961d868306020a6291d114db2cd443fcaf208dac7fa5c498808b987f278478dbb75a19b6b3e7801bbee2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2d47a4993ee368d5daf163f89527668
SHA176eab249637886a5283fb25217c96ff046cc9d2a
SHA25687ab99799258222682e1d98e56d4f4ee7f717e2f69af6321e2eb75d2027c569f
SHA5121cb6516e8cfc0a103073157c74bebbebb1d1924583da314247539bf796292cd0373d785c3109f0191755d10ac4a0e5c29f5628b4b70b2786e161352aeb923774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5274f9bcbe0a6d2c594e8e6e9a2e5057b
SHA1b77736e7dfbed26f1e41b3315fb0be19bd478b77
SHA2563d866e6f685d59157431f0c2568326bbe615ce8ac75981f572b6dec1768f8260
SHA5124a862a5c70cfbe3da3f4df812c8194558784f346e8405729ace2c6699ba91b410b287a57c84cf68a6ad161c41f48ec109d342cb80e9ae9d22ab9e4d654a6a84a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524cb17daea99134c0390292bf9860537
SHA17b86237b8707b4dda99e1751249c4aec94deb7e8
SHA256d8c9a7831dac28a33c8528b246bf77660edb993bc637b01298ce755b06b5de7f
SHA5124c4b038c4b315d2a542b9fd287f0567ee42512a3649080f00a189676f65c27e734e2916d429438886a5b7f765b3275041454cfea3dedc670f8165de38069e92a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe076a1326a2ae7dde0809b8cec0457b
SHA11a192fbba79115bc5c9f242b43dc4d35f14e193f
SHA25653e0115f6e58606ddcc5d591dbebaaf15b0eccd0b5f2af31a67bc46dd39aee26
SHA512f8fb910cbbec2bb55aa12d3c22e1997775cf9e96c4cee949dff90b1fa2f5c766ae7e5362036319ab1cf8f10c5c2084034801f207601ee534112f20aa881661df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d9edf5f4371f22bacf9067efbc01c15
SHA142680ed488b88b7754023789ea82f21e44d0deae
SHA256227c95bbc9510ee48e4972f6068b70080f68201f823b0ad3464b85eaffca9b3a
SHA5127f254382b53f32a35c62bf88a059ce0e00041b8d45a70a9d1a0b39b5e9dfa8b9333fce8c6fac38c35818e2aa4d5f266fb053ce68a572c8220ab9a95268f4432b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f0b2f916c3b79a7b3f5d0fad8d6cead
SHA154409229e93a9341fa1f9021ca015fa834bd3376
SHA2567a2a5c2656e7893ae761fe2010fed9b2b0eccffe141a263d2a517ceed2f2ded1
SHA5123ea538293a8f51de40b5b53d1c4de97963e8e0fc525f9af352d37691af5ca35d0e2b76ab7d0556a93511717f5442aa3e7075e2441b22af5caad3194230ee4a69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5518f186896e5511a9b553d64259f274f
SHA16a3b8a2131c84105cad34a2561744f5d2f666489
SHA2563a875d43af2a83cdeab1ae9c26ac4ce76e490ddfab58da3ec83205013701b2d3
SHA512a73ef5b6169fa31f46cb9e4d97eb608e3dee5a0fa633ce5a5327a3fa55f0378ee27afb61f0e426d04099074bce51b28821048e17c28fed70bcfc475944441c6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5212e2a5357498be9673344cc72ed2329
SHA167bfe3f06d2028b39cc62a28425b23dbdadf73d4
SHA25685f92e8c868e195876987bf3a95d08758326e534278885bf34eb55f454cced0a
SHA512533edfb147e7b9637d3441204c6b283cfe790888422b258edab859214f04317aabeb1e1cd8abd7ada5d1d7d6e70f6ef18d948428d4a09456a91687f9b9027c17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5262a9d55275fd4e3bbad1f9bf20b4f9b
SHA10cc0895937a87e868402684e7203f2c3c459d6bd
SHA256c927f5f70c0ee2fd09b8cc7b20f5be15bdaaba139d021de064107b291962a37d
SHA5127686199a81a680b0d4061b204b8c4e6503ecaf37ba8d7d2e3718e28294ce25d36b2f49f9bad1506771f68337e9c4a96c8b3b8574cf65842a1932bae9f3aa918b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b