Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 16:39
Static task
static1
Behavioral task
behavioral1
Sample
2ae63f73485fcc56493bc526dfc75db7_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2ae63f73485fcc56493bc526dfc75db7_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2ae63f73485fcc56493bc526dfc75db7_JaffaCakes118.html
-
Size
78KB
-
MD5
2ae63f73485fcc56493bc526dfc75db7
-
SHA1
b19e4e54b6b081b36654b81701acb3b7c1cbd93f
-
SHA256
d6914c64700e907a3c4a47c57b0ac56fd86e1568b70c93c8ad8e44725f3677f2
-
SHA512
433f90d58dade48a790cc672300224bf9e1e75dca873890e90b7ba366f5576d32583329a8c69d36663442c41368043d074a22cbe68d11e01200e63360bef0c45
-
SSDEEP
1536:RgZkAdqz8F8Ck2gDQXbOPDIp9HIIVR3BS/LoXHHu2aeZNqV+yVZmsW0mEt/:RgZdqQOr2uK6rI1fvxaMXO2ae8oKE+mU
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421434645" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B9538471-0E22-11EF-BDEB-D6E40795ECBF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1976 iexplore.exe 1976 iexplore.exe 1136 IEXPLORE.EXE 1136 IEXPLORE.EXE 1136 IEXPLORE.EXE 1136 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1976 wrote to memory of 1136 1976 iexplore.exe 28 PID 1976 wrote to memory of 1136 1976 iexplore.exe 28 PID 1976 wrote to memory of 1136 1976 iexplore.exe 28 PID 1976 wrote to memory of 1136 1976 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2ae63f73485fcc56493bc526dfc75db7_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1976 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5def160c037e814072af98d21913d3855
SHA13e8c1cfc541ade5c1083b9e376531b535074888d
SHA256105eea9a33d596e337feefb4a7b383cca557f1f293cd6b3452f1de9ff831ef3a
SHA512717e7d1471bae85c1fdeb86f1e3a7b5d2f6a0fcfceca98d66065bf549335cb8a6c2e0d562793bb343a53a9bbfd10eaa6a8524bde3219a448c7c43b036fa4b10a
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
889B
MD53e455215095192e1b75d379fb187298a
SHA1b1bc968bd4f49d622aa89a81f2150152a41d829c
SHA256ebd41040e4bb3ec742c9e381d31ef2a41a48b6685c96e7cef3c1df6cd4331c99
SHA51254ba004d5435e8b10531431c392ed99776120d363808137de7eb59030463f863cadd02bdf918f596b6d20964b31725c2363cd7601799caa9360a1c36fe819fbd
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5fea7d1e07e343592583d6489ab6bb51d
SHA10b638677d8534f09b54a3bc71959400ee2bd6fea
SHA256d81c0af732aae756b96fc7f95328926a87ad15e1f99c1db8322d21bc5be93f6b
SHA5127d4d6f3a8454d220c4b8b8b9311855cef7eefd6458d36acbf3720728ec2d3e0a2bde0dda9c0b77af2fbd6f8515850b2285be76dc00ca6c75b1bbbe659f6163bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4A9377E7E528F7E56B69A81C500ABC24
Filesize176B
MD5739cda208203c13c11955de115572b03
SHA17da6ce3d17d4c8a5a2daaef8859f16c2c8008e4e
SHA2567eb5c7bdf40316f55f3d2fc21abff217cfb863b6328a4036766bc0245b86a6cf
SHA5125abe141cc3e3fd2500befdafe85f58e9948b38e86781f54172b0a08e822995415127f5629192950dd25b769180a4983a9bf2667873831cb762facee75283f1bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5da600be26dd2f269b302cf7d2095dd8e
SHA1549abaf89ea6d46e953f815d9e5f08410639c689
SHA256e7e4eb0d29ca14bd167f7e62a83036ac130f939c22ce65da8ce612961ce06d8a
SHA512580e6e5c025956011c318f3dd3dee609de18a509b544c98aff04d4746afcc846cc9466950a0318a77f3d6458e21918e81317250899bc7b1c7421f5c46e6aa293
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592d77a164f0bedc70cbab6a612902be8
SHA1dd3a7a7c527e1af1e652939248166ebc37b14bb1
SHA256a481e2c7e8b86ed0369bfb63431221165f14dc1814d91701a0d265bb4bd88a00
SHA512c735ba3a28ad3fe93d2f219955f37142a0afec8d579fe4888bdd51aeddc60a3bcb850b69a98de4f9d32fa62766701e6123859074156a8deef2fce9fd1fd4aa76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58aed788c598bea7bb6f72e82f4618b6d
SHA1aa0d4affc15b6fe52becec7fa8e00e83bb00e234
SHA2568983bcca833f8cdea1c85f770efcc6ab5ac7e9fca4baaa6c8bdb75951b257fa2
SHA5127a05e8642c4d91ff95a46fcf2d8c7cf414ae70ca73332c911e73d8d845d2bbf7a671a2f173bed75689aec34d79fc83831a49a518a2f2c1976ee89eae6032062c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58bae0a3c1dcc8814889d4c1241b33929
SHA12d0dadb6a10e5aa2d481a4b7153512b73112ea14
SHA2567c26762e04ca607751e86c3d43052a68dde309fb339692987e5d5e134abe7d15
SHA5120a5f3da6c431989587ddc29d8d5f0e444206961228b2d7130cfbaa9877a3d23483d59832e386ce99447cc23a4d22ae3bb6fad0f60296946fdfd806f1a0f5c591
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513d6637f9b1fba62cb16158da7a450e0
SHA1454056ea1e46727b235cd250fcd39b231644ba87
SHA2561814321e77c484c4f170b050b333cd749e6ecb7fde4c25f81e4db40a047b0cc5
SHA512759d687a8deca12f1bb7847d57e3bdbf7be2af0a16ab8a1f07c5c0361796361cb731a9e3910fed497bcf21cbb10eb10970548d9ef36579574ed1999050e07865
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564f1bd260c6f8fd7ce646a5d38526d71
SHA1d0d979e80d5f8d97a1d41197a5aee1ff6ce59030
SHA256f8d6ddd75cb69d133fd40c779f3933ec03353f8fc38b53da64cc5a693956237e
SHA512cef7dc3c5c3b5eaebe2482ecd5deb5ef7eedd45656e883bb030a9abe4ee0661fb88c7f000311633fbf709023181b61e649a40efd7241db2c8e4a9ffa4d27154b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e08452907e75bfb07d977ff73d7557e2
SHA1e267b814d70288b08a598cdb10806e8a561d280d
SHA2568aa107d085a9396ca0d62c317ed851c10fc9fc1abf9a6198c1f087fbce364a81
SHA51262134b264371745100d76860fe77602329aae502a3c3dd166b0744fdc60baf1bccd489ec50c71bf4db4dfc3dbf763e08335c55fff9737770e70b01b61fbcec7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5919c44edf4cf520ca0da2e3edaddf6
SHA1f32c85bf2ed877028b011f6c131d1b855a9370fc
SHA256289a72b255d9fafc83d2962d96ed1c12a57d7a2428ff0ee72e49cb7bc6acfff4
SHA512b35ba84d46fa9f087b5bb1fb7783e338f52523d54008ce26ec5b49f874e2a694a5f7a8dae8372778b20b8d7e8a32d2c989ce93c138c585341e36a1b79c357346
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d293732a78fb543915e29ec107d8afd5
SHA123642f2e006fab6d37652c75abbef022e7b38f27
SHA256d2bcb279f63a6e66aecc9d4c46703ecf3de85fa707ce9655ced14b9a8da5d10f
SHA5128f3051d210aae4a187f9c09ffb843786f68776945452214176748799c1e7a118e48b5219cf81972dca4fae1cbced041ddb7eb3740763c4743ee0830f050ce3e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fe2ff5401e487fd1938536e03d0ac085
SHA15f03811a301f84f819f4dae9c857f374c6a310a0
SHA25613a0c7ff337131fbc315f47576508e2b36149abfb6dea177277d1f81c713f68a
SHA5123b9915596d99d7b27517ffc5e04869021bf4a06c6fedf3c9547f67698c3fb6ac981e7a11b6718e18410c0405c6d028bbbe1314b21cb6ce0a90ae7019cdb65401
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fedebe2df49ceab625bced3e20992d6d
SHA1d6a75d565b66a379da372feb81c5427349965656
SHA2565389616f511e55dd622538dcff4a0b5b299c39b8c18f853bff179b086f494da2
SHA512db4a10401b04b5e40c15b522443559dbc20ecbeb325707a2a4f9cd79b926ef616ba37171be7504621f1515e0986885ef9f1df157ddf5b29bdb7371783b3a0115
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0d5c0c957ea29bdec97ef386f1ba5ef
SHA160a6eaf94e674eaa8685a5e6f50d8a0f5991195a
SHA2568ab958af238d6fbe40d93e1deaaa993caf002336ab2f4e876bb60024895551b0
SHA512eb0cbf353101834220e859456fb233765e8c48961e3eb25002611f90b60c5548006953a58f84f8e4adcc6da6e795aa1052dc282619587bd0cd50a461f70d9ec6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b431d38520466aaeae3d53ff6d77639
SHA1ec0927fca37758381396bcb238fa9d145ec1c047
SHA256ba120cdded68a04169adc8362a2d52bdf26b70d2f9cb846907b12a3a044d3f63
SHA51253bae6363d6f7be7cb55284146ee7e8e0665a6624d17c54b61ebc0eeace321b2443901e70df9bdad0e0975f63bcbb57a1990bdc75a5b56e24506e76c6f277c4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5df81ce295d4b85fbd200e193289d4003
SHA10f4694755243f0637b14934d743cf96d57147ab3
SHA2563409c909e89eb46008331b2f7166b9d5155812e76e1f306b19ee00e664ae3b9b
SHA512baf1dc7fc29f0a2ab0a34c7cd98480363d47e62e36c6943d054d60b9a8a5abbcb1880c19d18bb5f9e1eecdc60e3294b79cf5241ae4427afac2ac2689fb7b56a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5c36fbd9192b585a71f7f4b01c0b74d50
SHA1f261148c12bf59667ab017f7b9645c663bb211a6
SHA2568f22c1eabcffabd0354b37ccb280f7350c525d20db6c57e1cd545ead9ae025d3
SHA5129e1f95b3c1c104d9d11c67560380e21dd83ca0c9de56241e0b04fef19ae147b8b93ef0b6f6b28c9b9337dcc7fad6ea89bbdf4175560c15f7eb9c2b7860b49a64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5e8bd410624d19763ca8f9fa0f178da7f
SHA10e082813775c5dec3d62e430b594d870d2286897
SHA256c6c39e25ad4da3afcdae586b68f24aa62a97168438a4bfeebc3318d51e88af96
SHA5125018695c5bcef73882b8561ba1e3d15e6804b6ba8ecff7d8e6a468237b7d7095eb7c8fae479d83dbfd9f2c6945c40d228feb1c781156b40f6b3fa392e49569c9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2BAXCDV1\owl.carousel.min[1].js
Filesize49B
MD5186d86b12ef82ec067ef688d14baffed
SHA1a936cfbd349e2d45e352bc3e0b24a0973e8ab407
SHA256105e1b4db63c43261ea5123232f6504b7c152be51f1398019fa8d7de7554ba38
SHA512d46e450b22a61f62b8042f89ff117f94804fe07b99698b226141fa90aecd64ece93343fd6fff4eb4f4fe25308a978a69e080586f9677ae2e915c5e4db4df27a9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2BAXCDV1\owl.transitions[1].htm
Filesize64B
MD5f1b98b4b21b505f3c97a94b30218e26d
SHA1dc78db861db16ddc3db9779b8f13a33876f9f3af
SHA256a1e319b2b07694e26389e7837caadf313f897aa4f1ec159686eb23da7a21a806
SHA512a4ed34b37eb5e653cf429774908faf43451ef9d76597553e8b1c9057abbd5e467a55894407e60a93a23d3f3f68c5d5768d1cdbbad85144e25d7db7bb2d83388c
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a