Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 20:00
Static task
static1
Behavioral task
behavioral1
Sample
6870194c9c343bca2f94a826e7fa3e65_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
6870194c9c343bca2f94a826e7fa3e65_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
6870194c9c343bca2f94a826e7fa3e65_JaffaCakes118.html
-
Size
142KB
-
MD5
6870194c9c343bca2f94a826e7fa3e65
-
SHA1
21035f4e8c8143546882768e6858446b440c651e
-
SHA256
295918415891b683e734043e6d0475e6cf25cea85fe299b92b320cab7d446ea7
-
SHA512
ea6c6b03ae514b4ca2993aee503c351f0956a424f4d33282bb6e42f1d45c0a489b8726d914bc5717c3a757953898525596bc0af1f2ad50e7014ea722f587df00
-
SSDEEP
1536:AVWV061wBaidupVIS+yVWoQoXxvBqx7bx5zrG1dFIy:AVWVv6BaiyTvWoQoXxvWq1d1
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 303823b982acda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000092c13bb2c99f5b8099830bdd7bd7fc6f2be052340a34a489c739b7bb54053274000000000e8000000002000020000000f566936e8df3ee5eac0381719b1afb9b4a506aba5fb3828af66702b9333596d420000000b0bb7a5448d1659043b85cc79882c7f3d50102f07a459e67b9e193523cc59c91400000007dccc4bc7b94ac1a21be36b088b0c7162d707293e1ed0c58f6ec2a96a6e762d97e4270ad8525fd6efd167cb0aac269a8a967ead15416f7b9845ef87a012e7a29 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d1000000000200000000001066000000010000200000009cf9d97c0353c82f7e5ce0702c48a6b5bb8476fe55a3975058fd1bbd73fed31b000000000e8000000002000020000000220b85ff3223bdd7cc87b524318631829b44a7e35a7def9cfbf4d7c23bbb8fbb90000000b5293cafbff5d74773c1c615660d7c702748a1e4aa72af2d97f016c291b513a4417c42cdfe11ef1dcb0fe1f9d4acbae122b186b3a727cf5c40def85627b1dded92a1ff54d454ab573b042576f3af5a2b7df68faf24004e7b5a9ac886c1eeea2a63f82cadae17ae31d863c0c7495d0cd68771b5c463298e48c915b51a26ca07cc8cd4def91efda07f2e7661aa59946bb940000000a5284c9dffa1b0d4e54ca1d0ba7ef53db4ce8a1e301d98862268de2a62e27d9559a755f5a828cc0155b5d7c7ba96223c66a570b021221329a78485c597d25705 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422569874" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E325D391-1875-11EF-A346-76B743CBA6BC} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1680 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1680 iexplore.exe 1680 iexplore.exe 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1680 wrote to memory of 2016 1680 iexplore.exe IEXPLORE.EXE PID 1680 wrote to memory of 2016 1680 iexplore.exe IEXPLORE.EXE PID 1680 wrote to memory of 2016 1680 iexplore.exe IEXPLORE.EXE PID 1680 wrote to memory of 2016 1680 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6870194c9c343bca2f94a826e7fa3e65_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56eca6d38842c8dcb42cab9e7ecbbf896
SHA155275d27f08638eef050c2a021a72ff16ef24669
SHA25664683fef0fc5bf91871ada0993d72d23a3e62f6a16979c897253d09552989086
SHA5124ca19f8744d244055be51e7f717b75e0023d83b2c03908320b29d5e3ecd7a93440eb57346983cbd9d4cac9787b5c1d47776b0e73a749dda0e06dd6b14b33988d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a73dec451e74d4c9d84ae3e1520d8652
SHA1cae83fb08d3119f4d1032393cc0958797aa22c86
SHA2563768fe826a47b7ac82d14d0b093685d76b8249bd7bcb61488c3e52d9b4f6ca34
SHA51288ff76d4f6e5111e515a90f6599028db6142e320ae91fe5e8fe6ed189ab9db1eb35f6efef77940eee66f984442bfc62f464eb0b9c6eeccb6be0c97c5825d1d21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD538f779ae7e21321031ba0ad5b751a45e
SHA19bdd8192b1b2489dd217b60bb86f11b406429c5d
SHA25623b547a8388cc4689e2f634cb81d28c4ba30bca2d954b68cf52bd33686968d4d
SHA5125ecd325c523c798d48c09cbc0272ce5dd3eb36abdf8eaaf992279078f2fbf23e2f8e66df26c6b795028754af7faa08468fde06c43af018012ab5bf8af7a9b109
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5abc6da19a57575cb26fb9337d53e6765
SHA1966f0cded1dfae383c208d68441436899e0ae32f
SHA256dceacfdebb5e6e1867b1437dd87a1032f2b58ffd7b6a9ec412e5fc67d0dc2c54
SHA51212cbdde42facade069a3b50eeb386061faa97b91986ec7b7948432ed95ff92ee8b4890b5f6fe91843ec30b1f35e1e64c4aef2134575ac5af9f3a22661a79255a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57662ec2719c4e5dcfcb9867a9bec9516
SHA177569eeb775d6912871f4e367995c96e56383461
SHA2562e4fd3fc788d0c7e30d27dfe184b1d72f3344a0c09ecdffd68d01f920a8737c2
SHA5120553d514955e23136ef5d9a6dba74d2302e6fc75e2e6a9396e10fd52525cc5140afd0f92cca7fe6828b7a72fe7804d9025abc9fee3b081a9974a396092abf20e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53ffcefcdb264179a83dda8dc872e5382
SHA1b91d8cc8370a17cef4687c4de6975b2c63c3913a
SHA25678223ea4753830f8eb96a0f3a7451695b6c6459349a23a37ea24d6dd7a50a222
SHA512a6592999aa0069bdfec9fc942d024d164f9c504ccd4a93b113ebd4209b42e9dde20d9cd21467e57d196099738e22bcec01ae53f69647e0fa198bbaee603e6c2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD536685b11a32a039004b0cc7f2d17f87c
SHA1250ed3e81756c25151d79c8dd93b6f3dca7a84c0
SHA256bc4469925d8b2f93ffbb312c9d0e004a1a76651f47c5e1ec106182785c58ab51
SHA5127e3d8a660a2fa1b9316f0305da18e257b2f0f42bab34cc54ae8cd0dd6e79f30a135f28407327dcc88cd7b3f5fd77d3c7caf92438e2b016075874601aebeb0e84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD562203d592b7b44bc1150cb8f70c4b8f7
SHA19c53db130328afc811df7a4357aea737b8c65769
SHA256c03d9680e3f4f7d35af7d0ed95def828588a677d39efa5c1a9b53ae4ab62ccab
SHA512c5a9abf9ac6999e62ea5568f6a6072616b3dadf01fce44007e112423cfe67286a42e8d4277204f38553709d6fa877fc04ab72603630f01ee8dadb6fb3bb5ab0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d022b336f784e7cd310a09f62d960f42
SHA1f181755dd7f030595fc188ec34fe48fa51750c6b
SHA25686237ea26fe1906ac440d728b58b38223e08790ccbf6fd9537e1801a9b0dca5b
SHA512175dd9e24076fd3cd308b335ef3a88de8d75abaa0060c6b04f17b27f775881d5b40f8fadf2298f77fc408927f9f6c0eafac9f5c5e20a910090ce8549cd1ce4a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d106f640625dc799e551c5c2c852037b
SHA1f7c302ccbbe4428308958a4e6f5371a8b4cc5f7e
SHA2562d0e3e5d5aa9804ca02bc6253e925492283a249bfd45b98294103b75570f24eb
SHA51236811c7ba1773f3f8f5aaf9dcfe3f01e238b2eefb0e87054b5d0cb5e51bb2acd591db673c097f7c28873bc43352876a4c2a9dfd2bf9ee94e91d9d6115dafc648
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD546a2354fad6813aa32ae111d808972f1
SHA1c956f4eb1d229ba9b47213cff7cbc22dd0fc4cb6
SHA256dade34f1c1300beab5ae4462cdb3aab06ea011d3773d25b96ac4f3f6d6b156db
SHA512a08d4dbbca67a22cd4ad575a55d3f8d60e48cece0d9aaf77c100ecb5cd4e4fcd415c9fbec3d40e5ea1f05f477e7bd454d2aa8788a901243174190e5049b6da41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5262c6a98b608240a377305d9bfa351a5
SHA11ae2d7052ce837ab48d8c2078d8b58611d09cd0c
SHA25663163937f2e9049fd83392c6c71cbad716afbd2bb2f512bf33404069a752fe23
SHA512bdca84f71c060777953f9c4450adce2f6d5f3e9f43ed65214308040bf963815fec6434a3db063c6c8f67c5077f4d145e6303622449cbd4063e505b2e00b54781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55c30e53ea271fdeaf08b36ffa5aa9be4
SHA16a48b80219bf039935958722213a6e10d3030404
SHA2561d0533373a45f2a274b7c9fdf9683405956fdcccac4705a4102e7fec0128f375
SHA512dbe7e97fe07d880f8de1bc82b4f950f97434e743038ed09de4e8ab310e7bf45a8b7f5a2a46624158173cfcfec18f3f9dee099778c5efbc338f99b9e268abc743
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5dddde40588333293e3b589e5a140fd76
SHA1fdc4d75437042a545a957c31486dac83964a3b13
SHA256a67d0d20338789db4c090749a6bb2be5a5f8d5bcf28cfca6ef4919db6f4155fb
SHA512aec66d4eac537fd2d68d20a08903c660a38ff3b030572d4f12a3837fa0d2e013faf1db5283f5892609c0dfbd89575d5b950e016eb9845c170404ce0476d4d259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a6df410e68acad514091d59cd1b93d1f
SHA1a417f911484eb3cff747001103c8acc0fc5f8c20
SHA256db818df488184cace374587b3078285a549036a934a598f62764fc7377990a9b
SHA512f595b8f3dc4e3b4df02e4cef92b522b4e8899b1486ee850b4d1bc0dc740eb1f3e38debe8deda8f860a842b4f07ad23931f9114188dff80866c2ee373a5ef08b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD513b399538727d51314b8a071a7c10bc5
SHA13d934099491c4da3a9d9aa9ee1432f0ad47ac485
SHA256ab77ee98966776ae77da7be67671b95917ca9f99deb950d7d364861f2d6987e9
SHA51287cee8846e93f4c119084f6530a784aa29a5654d4c1078d9da91446dbb18384db4a35fe453a42ff33b1aebf12dbee6abcafc0157c31405af5a9b9f65ae853126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD574f6ab80e40fdd220f42566d305d3a7e
SHA1e76962d693affbbea7a18cfcf69ad8fa59453a98
SHA25664c45116d4bcc83f15a9993f20c1e9e71f3f5c2f2caacc29c4555de2070d74f0
SHA512e0976a664a61a73b81d11dc7cf0c80f66755f04316dd0a79a03a752ffa23b793d4b568eaa485b100aa07a4dc38c59a7f14e63e1308ac7a32cef515e470b993d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57ae4589146e8de3353660575de0cd19a
SHA17408c1d4c8b1a910a7cc4fe798b605e76106b428
SHA2569dff1c060e746cbc866c1630107e5f54d9e69b66fa0fcb7133381deb006a32a7
SHA512d06bd6229cbcce191d32d3efa89a63bc074b7752b5c866be47a0c383b5d2092ae083b4bb9c5ef46b7b97af837fb810228d3216e87698dcc4df9dc0df9fc0b17d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e34f75a5c951c618bfac48aeac9202e3
SHA1f538c65ab6ecc0d5abb194ac81170e929e6ba572
SHA256f400388dd07f59f4ce7d7e2e776725d1338f3d4694bd7d57f13e2861d2069acf
SHA51290206f845fc880dcc1751d596a5cfc218df903f165422cb6f45a3745a062dbe2152f407e147393b4895f24dc0594d7f5ff140f12f1880937a555906588e15359
-
C:\Users\Admin\AppData\Local\Temp\Cab2482.tmpFilesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Temp\Tar24F4.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a