Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 17:22
Static task
static1
Behavioral task
behavioral1
Sample
30349d961ca88b6b64cbb60be532a8aa_JaffaCakes118.html
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
30349d961ca88b6b64cbb60be532a8aa_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
30349d961ca88b6b64cbb60be532a8aa_JaffaCakes118.html
-
Size
23KB
-
MD5
30349d961ca88b6b64cbb60be532a8aa
-
SHA1
a91c1d77c02feb1b78072711737ccd014a6b7a45
-
SHA256
3e7564199978fdd22cf2decf23050f1016b746c1657c8f8be654def17685ce53
-
SHA512
166b46863a0699fda467e305a69d8008777aadcb99e53562c40af553e19036e98d8064b635a24242fa4ac6c286ebc477676e299d1ebb4e6c34ad34ad4f46b989
-
SSDEEP
192:uWHUb5naR8HnQjxn5Q/ZnQieUNnvnQOkEntzbnQTbnhnQCCnQt2wMB0qnYnQ7tnm:l8EQ/LGB
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E3286021-0EF1-11EF-80DF-F60046394256} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421523620" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009b106788dea7af4d98683a8983feb7c600000000020000000000106600000001000020000000f29259d87cd91ac4185b9a5c14f69d17d41aa49242a41bb7a6a860cb45e87a7c000000000e8000000002000020000000ef3d4de91f43c0f52bcf2eb1b3a7abbc542990061abf7155f2b73975a118ba1b20000000a13e78f96e0594e54abad732b6fb4939a337f4419f6003adba6e40b2a591e3034000000039d496c3070bd785fcffbe1b3cede1260c9f36aa83ad0e29c2a3b87a0ca64456d48af929295078c5907cd3dee646cb4098127275678d2538f6f604c326c0bfa4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 5083b5b7fea2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2900 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2900 iexplore.exe 2900 iexplore.exe 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE 2420 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2420 2900 iexplore.exe 28 PID 2900 wrote to memory of 2420 2900 iexplore.exe 28 PID 2900 wrote to memory of 2420 2900 iexplore.exe 28 PID 2900 wrote to memory of 2420 2900 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\30349d961ca88b6b64cbb60be532a8aa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2900 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2420
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4b60173e41f750ca0b39770fe8c0472
SHA1f31883507c3f668e42fee26e651c8619b465b02a
SHA2564b4394efa0179a15575105820b1e7006d6250188a4e5f3eb977c7101060329cc
SHA5125ca905783d6c42cf6f9506954c92ee59008e70f503b9683cdca94530ce04bb171eaaf5469f2c2414b3606a41e5116338251e40248ace4fbe7ffe1b0d45444c5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad4fa2eae6378392d850e68bc5a21eee
SHA16e11be6ff55a7fa902446b52ea25a53e98bda11e
SHA256b0dd568a7a9efae99114dce6247858196f82ba71110e430627235b80f423c910
SHA5125102c59e69b78366eb54c1c6efb70833765d51feee8955da199834d2e8e7002432fb00875a8b871128951dfdf8b19117830de5640ea80f30e6e2e336f2051645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554d751c82ca0a706f5f5fbebdd122c58
SHA1029679c5ffdc94e8936ed38138a01abc138e8d22
SHA25623d9ac5d1aff7130fb4aca54097c7fd1e2e8b06542c43f5f4674c411e98f2868
SHA512b4e93da8cfa01e19541d17f8c69e64626474e2039bb1e2b98643b534a2229bbfbdc8a783025b1f25a54daba7bfb96a29aa3603cec197c859af2d5507e28f5c2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c4ea3ae0fe4a4370b97ecd74ed84b06
SHA16ab08a81db8fb863a850560f9be2b8cff738b8c0
SHA2567c1e526873bbb0267e4790d6a6847522d1e77f6d328570bfbf372a02ef011a46
SHA5126425920aad50431cd6245333f0cd0a1a594c3ce27d9549ed2f5ef68a7dd0f01380048b4bba72f5a38ab4a20d251a2391fa4caf0823782d829e10d45c0d999114
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0eaf2c10b122ef6f1594f91174ef764
SHA1e71a5236de23fbdaa50695b4e289b273060f123b
SHA256cf6985832b0add56a11852ca4aecb08595ccdcf1a1a5aa8d61d5af34f3b15f35
SHA5129bb8af3723481dd5a395b6b49e7e8a1a6b0841aa513b256158478bc12589807db9d287823f83718465e13e13e0db337baff2d7ae2a048fde37e5595f1cb20817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e943f3abadde3a2363dc55c1104f0415
SHA1cfebaba837cab95a18b5f3e87d401305b8b12513
SHA25622a1c7eb6781d19639475cef072ee476cfb90b8f21519a147bb145e7e57e2a19
SHA5121351ae248576eff639d1b059aee121a3da42d874f48c760d17975c64f9cda2941b5a61ee0f95ebcc2b39a6b2b7bcd217bc00dbf8b1ce64add55e9e8e3ec0e913
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553c2199c3b51ec8e780e60d60b36550a
SHA1e052a54bc80c1f77970dd36c3df44a4521a62a39
SHA2561605aff76107408915d894b8861e4d188add81f0712ccc8b0cf80a3c2ecf78fa
SHA512d234d0c5c0c2c0f681cee1bb50d98bb0ab5564c5b29b334c28ffc355c49df82ae96b23f287e31c7771108e2496654b5b418b3f605b44707dc1514c58d82605d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542eb1e48fa2ecd19133499815d6de701
SHA1ac9950c80d7cb5ddb35cdc8ce16eed828f91e973
SHA256e6595606efcabfb0878f383648f99aaefc3eda03d302832edfb049d7a57a75b6
SHA512f2571d5dd18df46b67d24787eec15694fd9104202fd35b62dd68455c9d859e282ed5dbb187267c426e357dae49066e8504ee86e716138e8a929a2dfada2d72c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a16c5916a78bcd3e10ef33a84c337ad
SHA1f2aae183c76ce70e909089d4f290efc85241a509
SHA2567fadbf39892e2e6ac09fd4f77a011273428d696897a86ae83a8be25e3a38f0ba
SHA512f3573d77d5b56af619104b6786f6b2c916243e942fe36ccb7972a27ed16f1289d33f01770ef2af15bb289ec1fc3ae9f5ea9be843970aad659676c4da802c3085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58112fdeb104e2194252b59ca67502cde
SHA1f3d25ddb1fd49950826696e3092e41af6a194f67
SHA2563db8fac0ccf078b1c06ae45a59d60a3d6f2d8db4f51d90793998ad2b9f47eb76
SHA512883726a46c85b17fd69ce5c1b53a36f56a3a26a4d7c15fc61fc5eebe911fee380827ad0e1a6cbbe774355c4042eb35d5630b67d6b025f32e67501e8b8b28276b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50fe753402ab3588109ce4348c7918891
SHA1f9c3319e79f276043a2cb9ac783a5f997e5d9151
SHA256973b5745cb948dfdd632fad9032c43d0df114e45313e8c8a1eaf0bec5616a611
SHA512d791fe38db5c664c557ca015c980d5d25cb0a016417237edfc0e04444643187635f61814878e6311a7dcddb46136465960389690deeb3b8007648c3378580968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be8d208d9d1938f5e910046ca9e33d47
SHA144d32c10c2f0cb89cf370fa83ad738b9774a4e5e
SHA2562ae7f1746ba7566efedd049bf6e85984df03c90e38198ae1e237e64ba4bbfe08
SHA512caff429047d313080a1eb11ea2e061cacfe30ebf2c539cd41df81bcfde3c77f62e2e976e0cc349039c7bb2d8bcbfb3b1d40a63e8e07dbf63cf896708140aeaa3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51ea91ecc842125e2fd5eff00cf5bdad6
SHA1f454b4b1b0cb909579fd72f667b06c0a954a2829
SHA25632414ee71d727684049b8a42f115e0b83079230e550ef90e624485ce1c945315
SHA5121fe392d61f30e17abc315ff783d2786d739a2e5299c3e694bc03627c5d8489895b8d546618cdf61248d4406ae628e51028b7520e99f99e73963a48e7a6bdc73f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501bf536e6a8eb5c4088def76bd3dedb4
SHA145a97baab29f57d722b9e022f54e282fc7144c92
SHA25693252dc625ae4a2a1eeee08b25f4fc55e2fbcc2dedc2caf148ab2a64c6caac93
SHA5124d65278c34723b77183ba7ea8699bb33f79a16cc43884660141e2ebd4f9ec39c5426446d95ba55c4e16990d60382257a6ca867160fb1e7c24186cbaf4ada9e4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0d28e23e4756ee0cf9927e46bb88288
SHA17de3d2a9f3b53f9920f25ae04b8f993d381b32b4
SHA256042aef845ad1a6cb64c76b015f358accf59c350132fc1cd6b49be86722123634
SHA5124bdeb64a1b6282ca780245aee5542359a0b324ca562f3c4c43d256a1873704e69b8753f813ac5add95a7c03c303a283141073614d4bb87e57bb902a004675713
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510aec5495f396192bf4c797c72874d3b
SHA17c87e5595386975a398441d047134a3f5129d1a0
SHA256ceba357f1bc2e5c20271f6ba3f04c853e67700eebedf4cc8b97e44a4397949aa
SHA512f4cd4153aa04688fda5367e00d73eb5f160952f8b8b4fd735bc69edbc7929e53da11757832478e4b144f1b0e46ca5a04b747d9cc54691fdda7f55bbd30ebd752
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc4237f66e37dc45fb14ecdf136bd348
SHA16587f83c1ee1b689adc10212f619ff7fa453899d
SHA256b6336385edb4aac7bb618925149705eff57092ae04fa36332bcc115cf8f414f5
SHA5120369c34959da61730e56803e8e6c06f5a0416cd42fa23de2ac8982aed43093c5b40694b68287088eb54cd381365356e50efa0567503eece2a63cf721304168fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588aa125b9ba23fea25aaa1a7f3d12633
SHA112804451142ef0668f31a37e57bd5dd4259e4244
SHA256e912c7fbdb8834735903cf80f599f5573cbd8a225c58c50a74e717dee420003d
SHA5125fd7cbe450b644b201190df4100d86c75267841aebf711ace7aff1e3cb8590530486fdeb36584e31d48664464f4a067a01670888642af1664345e6e2de17afa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548fc7da41e4bfdc6764bb49350461e0f
SHA100c49a52125940b453b0ee3d470b52857a5f73da
SHA2566076e52a196e6cf4050e9302085eb306838e01a3a1bc574a12773cdd3197c0a0
SHA512be3fa4544a02ee22082615afd4f258ea1ff2cfd0c5ca1e96b0313fd925d057b1eaef7fca2b6f66378a01627bb61acdd2bf8b47de9682c4c9ea3cff368752fc47
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a