Analysis
-
max time kernel
139s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-04-2024 07:42
Static task
static1
Behavioral task
behavioral1
Sample
0726e50aff46ee0fc7afac2ddc9954c5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0726e50aff46ee0fc7afac2ddc9954c5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0726e50aff46ee0fc7afac2ddc9954c5_JaffaCakes118.html
-
Size
67KB
-
MD5
0726e50aff46ee0fc7afac2ddc9954c5
-
SHA1
13265e7bb08e4cc2d34434ba2305bffe501fc663
-
SHA256
998f9c8ce46ef07e4d9375cdc12050d585fa7be7e8ea75f8c9bc49ef9844e891
-
SHA512
e6f0173e6c215c489cc57bbf87e0ec70d5d8550deb0fa92b887d888b7a9b71f9bbf9f9274e58a9b1becaaf116ac116f28f78de976db7d5a3af490fcfbd15f827
-
SSDEEP
768:Ji3gcMiR3sI2PDDnX0g6Rfv6eDUi14oTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQV:J/YPV1TzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420538439" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000000eaf2a6576249f2d050d3ffdd2517f01f0f3682aadf22e91995586fe6316563d000000000e8000000002000020000000ac3eb716f30a84356f3bac2545444dffbb1ac56f66892e259707798e9412a035200000006836afc14a5ed903ed703b50b46e104f278f2a7acc64678dcc79ac532f7ca5e8400000003e3c58b39f0adce25021df1842f30fcb729a403d5be88d93f0c54e70a51333f5a1a224c9da282ad5baf4c7cf549862a1b913ec2cff970c7f0e95b6486de06d7f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{13BBA9D1-05FC-11EF-9FA2-EA483E0BCDAF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e05fdfe8089ada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b0000000002000000000010660000000100002000000026db955cd8448c0a536427f23ca4c4b8b06936e25d4454f018b8ff9caea0ecbf000000000e80000000020000200000009c1fdda596dbd1c399dffa281b76b7c4e83ef0d11f570c2e10b57f7fdaf8b1839000000036d096529ccf9e79d71a5e2c7c96fc69a6a457aef78f8ffa7ced22cc7f6e38040a6edbec40e9b6577b93f33a0d4a060c40dadc067f3ff6e95797968666cd8c962e9f2a327cd659bd121150609645db6825306b24158450f14213742a25dd3843f12277af3663c35c6ddcfcfbf2922960ebe3daa3da9a56d97289c5d2f16c73624476d8583f8bca569e92c59ce362b61540000000d8854d8308ad473dcc1d76c82006e88aa9d645f00abfd6af94e9e7f40a9bba46498c9442dc1d5847a711316260a2bb5d26fe1f0e76f8fbf25df6c48b3c20d35c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2244 iexplore.exe 2244 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2700 2244 iexplore.exe 28 PID 2244 wrote to memory of 2700 2244 iexplore.exe 28 PID 2244 wrote to memory of 2700 2244 iexplore.exe 28 PID 2244 wrote to memory of 2700 2244 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0726e50aff46ee0fc7afac2ddc9954c5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551af5522678f9a29c2083a5fadc7a4f8
SHA154d2ef82f8b2de5cb1b32b31eadb6734b25da310
SHA256b88b08363ca05d77b50ab2d8de7731305397521a1dd9171fdca6ad4be60e083b
SHA51299c1de8de399b2e2562cb9b1aae4ceaf530802905092840bee9ce158d8181d31e60cd47f915e481fedbeea419a684212509bf2963eb9ae6505a5db0aa77259c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a9b41b519890b057d7ddec6ecf13147
SHA101ffdbcb024b2083c76894b1bba17d7ac9e206e0
SHA256994cd8b914990183eef2ccb75a0f7404c2f8cbd6d67145e4812e303ce5b39063
SHA51216a86ad4407b62db125cc797943a2e03f033b0963311ddf4f246289458c6f42fa4ddd2031a5c600a9c286f2b824b7551eda5289aab10dab1654a9f69b8cf94f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5239dc8221b5d27591a4c35ab16d22e9e
SHA1834fe47a790d12aaff71de4ec2febadba6474c05
SHA2560f2871e9289daf16b53394b39962e5d1c3d7af7f70201986545d01a8cddaa64a
SHA5122f587ca0d0a41d65a95200c77a58c165a74375facd0a653b862c1708e81e520f3d96fd840dc7e146975ff3d99b9d3bf3ce14ecdd74a7f9cc76c5f66d153cb2f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD551810768c23f76c14865a21a60535884
SHA1210068893e739a8dc0890af52c395583f7d7d829
SHA25638afd2faf43e48693e72a0871581105a9fcaec1065349a73a65f3025907f49b4
SHA512efb9e8ae381cc788d88978554987d83530e9c94a1242170b6b36c147211b969458090ec9da620091755efb63aa7ebcaf377e80362e69053936f843894a3e3e39
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52c746ca908700031c63f542da233140a
SHA1dabda9d6d36715fb61ce23349d9fd5f0d7ce1070
SHA256537deea6d95e13a32eb22c29ba69eb463c09183b2010f175847cc267222cc124
SHA512ce775eec63dab898cd1fdbb48186157a12eb912cc39fc6e409307a82765b0fb5edfd922070ee82dc160f53beeec64119c314363d7b630dda3148d41983db0dd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59865baabd6a0713441fe3c832e641c5e
SHA19747c444b308c2462055c2bde5b6ee9862f28f4c
SHA2562f2bcdf0849007cd02ac56d24578c84c7311a16aa75e52080d867fe6f0101687
SHA512d6764894b6b69996c20b0d56770430977b9b1a08435fec6f48d45b8b247b8ef989ec01af079dba14ed6155edd0fbdb9cc5a9855199adbabc9b32de5d31511395
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59715a1b727dd42065e5b0f1ff2803df9
SHA14112194245290daab07d52cddc532b382c1d29e5
SHA256b7939507f03927c2a970b656b704cc3222440a9c63a465245f9c4de29edcb96f
SHA5122b82da1dc4310e52f7d26e0444066d14afe2e12240781aa75cc04d4e7d19024258d9848f8cb0084b3868363539edaff2fc1d8861a68987e8682c6ca8b448a0e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0aa78e141b934bd64299f373426010f
SHA168e5fb44759160c85fa19003b91f319f3abfdcfe
SHA2567649cf6a8657f2879214263939cb6cb164dbc0b5c0c383024874458a6cfd1296
SHA512b854a941791cc5e19eacb949faf6c419eda17e3b8592146180621ec3c713ab7c8182604f658ab662b6999a13e0bb98c879220ab94de7aaa3830c0baf9ceab331
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cda010a161c8424271353bcf54bee49a
SHA1de5a038a1cc5386533215984ae204f5b732061e1
SHA2563cc2517f746b6e669f7e2a81f774035708d2c6e8bf68b98c9e4a45916788eaf6
SHA51236e195e9b999b8c3cbbb6970b130323f8ab0e101ab5f32fd5ba2509360814096dfbee06f213e70683fbe0f83a07c270c12bae446f64f90343c3bea661798eca0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582401168bb2635302b5ef1306634748b
SHA1d4ac13a097e316223b7d6b20efbc1db9304879cc
SHA25694c1f579a286e5202d607223d712ed50efde551f44f89d3f30118fe5043843ed
SHA512d67eb098a412ed8dd044005269d6f91430b9b0ff746e3c9c787d9e1f63c7f40c593c63708114b99dedcf2865f492817067e257e79bdbff2f74db7300cb05fe0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d140c74e77dbaccca8f8eb56cfdbf8c5
SHA1788372fe5f8c94453ec5720d981e3316c3a97b51
SHA256313489e7ddeb36bb45732dfbfe446be45240b7444607f4d60f0060eacc021a49
SHA512ee6f18746d425ad8bf42590c4632a55a0205ac2d0997766e8f2738fa07e11fa8e4e606cc504a7aea328f91debb6dadabb63dd01e9a254e4b510957fc275240ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59504459e798347b8a06b8b652c32ad20
SHA1cf98723afbfc1c65447c0a9bb7497fda932b80d9
SHA256768c81abbfe6145e33051a093597e96ba3a998a21701e7e1dc553bb388b160d1
SHA5121f5f74dba7c9836a9c34d7dc8bbe23940677d88805ef2751f3cbebe21fc44145a008e157008219d3b6c4be2983cb2cb51af161cdf4d0cde3ae09a06d15cff55f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a87a4b7b46c0f69bd1ab5d47f7150b44
SHA1cabcb13f24c228f45f7c7daee232f2180f54d06b
SHA256810de7c44bcd45339d4c30d278b55f0e4e8ed8949947f4becda224e97a549996
SHA5128340a0bee69918683ab9edbbb623d58d4195d3f7795feb30df962807731c20d92645a6e4ae9aa7917a58fe8bf4252f826d6ebb7603feedbb66369a6e95256756
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f215370d14ceb6f2348879d03986052
SHA12d9ed376900aa52e6bc5c7ae5bb27d5a1816bc24
SHA2566eac4fa8cf5cf3977e0e9fc095ed3bbc75ef78d86dacc965e9e01944ffe78d3f
SHA5127c615c1b83ed77dc69a0d49145a55b87fcdae2ac5ac9b41a18f17d7e204075d291953d38d66f0b575c6baf81a220711a7da622602019208825a80f206c614ff7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5f18224f0c217b26a69d9ef6009a46e
SHA1f38b9d69d55fa414f046a14eee14a488f8ea8e71
SHA2569e01ff8aec5a8c655397796ed3eec54715bef5d9c79e6cf335be012787f333d0
SHA512fecdaac34bf06e609878df2ea9a8fec0819cd9ebe7c2837f503904ca98502eae65ee3d991e7849f19a7e7394aa16290562fcd5aae4b9985a1651dcce1b4c3719
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea5bc6217776b7762ac553395a3f284e
SHA1d149d539fc3c6c790212a2ebadd48cd27c701af3
SHA25614506fd338e21e6ddae9da5cdc0c3d958b94e61c5f110bd29bde2eb578a7b4d6
SHA512709eec6f852fdd03a4aa5bcf9d3a6b6c509f20f76eee208667acedfe587199f14ad07053f543388b31baa0688edc24eca1a552f4dfa5d60ea7bc53059c76f37b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52200082a55dd4219917133c90eff225a
SHA16b7a5d5abf648f619e57b538e8ab207b1bba54e2
SHA25695a667ba3b72d46efa00400a17810cc055d14ffa9451fd93d3d82c6b8df85b29
SHA5123d2cca1b902c640f93a0e4ed379ed6f446722189c5c95bd3ef17856f2065c0f3b5e643b52d9bcee0cacda2a6d790502476fa561dce490cf055e3bfff519d5592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0a1c0b84057dc6906405b2b311d0bdf
SHA194a63861e9a567ad5b162678f21b8bc87b838aa1
SHA25629a114cb8f022df786f95d3cddb65750efb083d3f3fc9ab4a5fe4273c5ea4439
SHA512c7fb6865486a5bde8e3ec0c9baad2208ffc949e6e663f9477478a6bd4d709f80954d2fa13722626a90236b3615ba92101122f451ed4e26def690d94f410ab693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5ea3ec9c934821b0cb74822a4d92980
SHA1d458dc6f3dc5e94811253f3d26f2acafee97fbd2
SHA256e6650d1090f1de36680a444c9377937b025c8b9cf4fb445426d4e82e139b7d6e
SHA5124c060e736b78c3bbd075aaf6347eed2dafa9ec731271563258ff044332bc3cace87f53ec5203cbe867cca814f2b9f023d07049d7d777aeaf564ee98afeb3c6b4
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a