Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:26
Static task
static1
Behavioral task
behavioral1
Sample
6922c99c6fc23d821873663497440750_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
6922c99c6fc23d821873663497440750_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6922c99c6fc23d821873663497440750_JaffaCakes118.html
-
Size
69KB
-
MD5
6922c99c6fc23d821873663497440750
-
SHA1
eb2dca3caeef4126151910e31c307cd69423e40d
-
SHA256
4577be658bec15b997af76db58e4540292a05a5d5277cac6b7282b4ae5c7cb2d
-
SHA512
a6c708a46e4da96860c3a5676d4507ae27eecaccfe257955167ac5aebe2bd1ece31d5b10d0fa83ae158074a0aad63ef206c4dd8dface10d02826012e22a8e9be
-
SSDEEP
768:JiwgcMWR3sI2PDDnd0g6dkvSoT2Z1wCZkoTyMdtbBnfBgN8/lboiGhcRfQFVG8sM:JsvTmNen0tbrga90hc+NnhVJ
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0DE10171-189B-11EF-85B9-4A8427BA3DB8} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001835cd552815c64c9991c99fc757b4c300000000020000000000106600000001000020000000fb974d745f4c1f7b7903e062653df7c5528eb71343ee46245907a7ad75d4d521000000000e800000000200002000000003fc0ff0d38b12a1c2678cfe1109dc39a709b4c7fefe144281a6ee140cf2441f200000007482f421482fb70bf23a12529b0e0c467178bc344781933f0f717745809178164000000053876c0d8880bc0831355f323739b19a5fb2f9b4c3f64ff88063719ef2829cd2eb2a9c9f9fae972888e0107c47ffc0e144cdffeed319837e438b161c72e0f3b6 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0607ee2a7acda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422585837" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2356 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2356 iexplore.exe 2356 iexplore.exe 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE 1408 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2356 wrote to memory of 1408 2356 iexplore.exe IEXPLORE.EXE PID 2356 wrote to memory of 1408 2356 iexplore.exe IEXPLORE.EXE PID 2356 wrote to memory of 1408 2356 iexplore.exe IEXPLORE.EXE PID 2356 wrote to memory of 1408 2356 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6922c99c6fc23d821873663497440750_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5518e31fbf5ca551f48581802953d5039
SHA1a80fabf3d6dfcc6cb203329068bbfc22ea93424a
SHA25644cc6021b963044b6024131bdab52eca1dc595e2238af721b2919f65706c427d
SHA512abcb1d0595690e6f4aa8bf3ceebba3e82cd0e582af931a3cd25031398da5ae8dfeb7bd67945e67f6ad0368c0c7648b124405045bca38fcc51e8a0d0f617be1a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0fe35a28bb87312cc3424f5febbdb05
SHA1e01d18b909158a8977bb5177f06a7a49125600a1
SHA256111bb68c4f69a178a0aa0ffc4d51adf7c96d62824c8f2da2f4a577e8330d4d85
SHA512af5f114a8cc6a7b7cbfe316694d71cb518b9e4cc9be8e5c84f7ad2138f4c4c80d2b320cca4fa911c86576cd78e2eb0e9e5b335dfc7168f032ef974abc41ad6ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52a08bddbf17e9187998fe1151090ef57
SHA12095c7fbe4a80ae2c2395aeb526a5c3a91f5d13c
SHA2566ab413eec7801fb8ac0b7ab350a6ee258052d664db4089b5bfac16001427f236
SHA512629853225203f1da9d3b1c1eebaf1efa8bdf40e6e8b5182eca3f72793638dac23fd9026e2393e32ad86bea7b1304cd4419217640ac751ca80d12b05380763be7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571aeeed4c01973f593344b5accf3d21d
SHA1bc6c2ee05bb2025cf2d035e0a3aa54c47a21e854
SHA256bda26b9f226728e02234738d52228a0356bdc4a92c0c52f795ee28876d96735a
SHA5125a2879cf0d4792cc147cfcd3c3b8e506284f44903500a0f07b5ed40a7633f52c0aaeb5668c23d839a5be334d98162a2ec1983c8cc9b103cb8d6b564aef716518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597bf3896ccacdf1ff149e2097117d1c8
SHA15582f35bc3f0c09dc33fadfb0f442b9ace1d946d
SHA2563aa966cc975a19b36bc89be47bc4744e80b9c9571d558942259bd6c064ee41cf
SHA512b6f294ba8f7e5dbbf635c1cb28c2d4ed7a89f9600ea87859170676edba6e7e6892d4f34034fcf052083a98413f8b965365247036665a98d73a229dd6b269c9bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542f9bd8f2b4aabbdf9b6c5383f7d32bb
SHA160c1859a064eb09ae4bda93647cb8a8368373323
SHA25625e6d6b18dcf7e6fa86f48defc5f54748a382be082b9897c5efcb385c2469c89
SHA5124d8e861db0666a883ec6dcff7fb53ebba39d4551f3b6d6ac16c62d2895173232f66f86f69d31d811fb5b4543b29c83e61cffb89284b8bf4cee5cc368840c0859
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f29da2c0eccfec0170bdcd26f3ccab65
SHA172205f461ddeabff8bd13fa273432015ee76f7fa
SHA256e056f1612ae8048951cf3eda57e126e43e46841aee02d9db3384559bdf309480
SHA512f84c737453a2be36664f848582693ec7cb0f94c63398797756fc4c6d7ece04f690f0f7553ea2ff6782963f4a25f4f16a77d63b19d068629bb7d70df51439f79a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500b3734512034ec2790fc880e24aa0f8
SHA1b3aa4108d0911e3bf16f8ea136cfd780e69e0e6f
SHA25686e97569269a00d06534927572d4d97d4c078d2a492e23ea9444a1c83d9b567c
SHA512001d929d05e10083b4fca846b2ae8e34a2f67af9404705332e2c36a575e963960de6ecb233771f5d92a41901739775de9fa67c60732a71d4ef49934a5fb5229a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5d3e3b49289f1dcee8353753db3e842
SHA13e4a54de13990aa723ee0bf48640b2b77c100630
SHA256cc25b8c3d3fff40d6208971efeddbaa64f60ccb84d698fa09d3fabda29a1d29d
SHA512f56eb9f16d261e6ce2c66ac8739f9cf4048bcfa4225c87af92eee5d74daddc04772b1fe489aa6845990a342ddf21192b827db8d9ff2aed6f6a13206cc0d850c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b599e5e458c30870e5c7cf3d018e596e
SHA1434d8bfaa64299e9a263b804908db7d84bf8b0d4
SHA256000e8e28ac8df15289e952283e226132a08e599c9bbc8d982710d0c7fcbf3fb3
SHA512cc93322b9b1fee1a4b0844ea8bea810b0150d94b5903488b0495c791aab3fa997835c63dbd07c21e75acde8963efbb401015818f65e39256b821af3eca27de3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c087b93e0f4c5977a81931332bbf2d6
SHA1f1a85bf22265b85c2179e6886ec54ac57e5a90c3
SHA25651734ed976480ae1a9f8d9d077a99b7c1f0ff776e064ab7f3d40a7b55108f844
SHA5121d9b5cd169c986435c98c1e105658a75e7d68173123e0fac3b6cf9bc32d3a6c259f7acbc5ffc85aa106a24b6188155a83292f34315aa26fe31a905d6b7c3c1ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5096b349c6dd3281a2c9fe5909c83c1d0
SHA13f31542aa1cd73ca83719a4e693ac6a42dde41a3
SHA25624673ab0d36b07504a5b8c5983b161bcadbe75572babfb9c10580ad3e83beb83
SHA512cbdb1402b8db4d756471749cca04c8af3e46b955430c41ba0d961ff0d9b3a56e50542b623825de4d271183fa59ac63e0b12c138535b810a91cfa0c834f679a60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5116933caabe432937e30a633f88c162c
SHA18ecac673930697b007d7d5e96a17ce55857f7229
SHA256a8a11ed088a95711cf39b7fa8f733d667569bc4bd1361434bf2f517d81be1933
SHA5127d98f363f03b1580c1027f8b8274c4912b6c1b825938022b121809289bb82100eea7ffebb3fc045686bcce6c60c275a8382a2bac96cb42eb043639df4632b87c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7ccbb73ada0b432d9e484a5c67d4c7c
SHA1bd5ca5f6df77e2de4bfc11ef4135779477a72396
SHA2564bbb863291f5072a572d289933173d8751bae21caf9f6a4b45d71ad7bd0b4402
SHA5120aa0de373270b5c621081578dda624b0fa02aec04ceb88c05487b5cc4a099f9528f15f0df1ad03408bbf8935bcc7bd9439ac0234e0f3cad727a5aa8e04ed8daa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f95cfed1921d16a74aa2974584b69c3
SHA1e6c133d49622c7df32027e52a8057a394109f119
SHA2562eb78bd52010a8980cb938179d258b134d89e0444ae1af748be037f6657ee226
SHA51261f004ae276bad7d6873d4cfad0d19f1c0f37c1f4f033c57101f7cb44b031c94a13d50fcef0af94a7fad4ad655b4d116ad008d97dae0ddf5a0446436ec16d75d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564d37df5c81b436e4e03f90cc13222fb
SHA13a522d9a08fe8f86a4845b280f31f9c9b74867dc
SHA2567934e0549f6393ee96efebae7d5dfa0b148fbe6aaba0443007e1020c92556378
SHA51202aaaca98bce9e9890de488a26594d4ca4ba7e58f23495dd3954d7480ed344ebdee52894d793216c055202e8c4b57c40e496547679f655ccb2732aac1b992c17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b5c71d51afc36ea2e6555a657ae5055
SHA1e35c078ceb1a14afc486c659ba7e72416cadd9f2
SHA25673fa5ebbe197c972a7fc03c42776cf0c3c84da0c618c359a1a42c71e6904b9a3
SHA512ce573db0bd81158b62d7b4e5486631d2d9d0e576a70cab698cf32265c31d27c589123f0862a20b12a3bbce624cada3ee50c2aa9d497697cfd198a43132c9c490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD590175b82f27252d99a56b90c5892d9d9
SHA16675cff38b7901f3954f6c0a8eb7494aec015e16
SHA2569fd4199878360b27aae4f4966ec4d95380670e3f98ed25ae5379cacd7f455006
SHA512646ca8687e26df09df1f45d9992ca1472d4b4f7c820524e2d88a466c3318f3ff144aacf04a0fc12aecccb673947bc5d3b63dbd7cc42b4e6152cd3d2df99deaf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576ce465d5c9c3e2f1337987bcdafa2d4
SHA1ea11cfc3adec7ea68eddedd1500f6e350dc963b4
SHA256cc185006d626ef1b7e2bab5940f53343843ef5d49cf2f250bf69fc9c7209ad65
SHA51297b3d21e8023203e66c21c1c462ac9640e8b2d2306d0466b799d09fa5bb96316b0bda9e082bc01dea7946689d51033ac2dfcffd9c6aa44155c0ab09649ac3bb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5621169b9cd5edbc96ccb9554a5a0b54d
SHA132a02407ed8e4d7cd1caa7300f257d9754ab9442
SHA256ea9f788494830849d6b6ee1507eaa0045fa1476fd8ac371d0fe26790196c52f1
SHA512b5fb6c7319adba1738124957f16be59bc22c014ec00f84281711db984327f77300918c09edf6bf4d997c301e6b480db3c17610aa5955bad9b8b28f933186137f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a