Analysis
-
max time kernel
133s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 14:32
Static task
static1
Behavioral task
behavioral1
Sample
796ce66818abe224f94c663824177fa2_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
796ce66818abe224f94c663824177fa2_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
796ce66818abe224f94c663824177fa2_JaffaCakes118.html
-
Size
36KB
-
MD5
796ce66818abe224f94c663824177fa2
-
SHA1
753943afc8dd1911c9b2e0ed8d8d7ee039c879f1
-
SHA256
f8d2a3b46fa02dc1f46d8ca8e2fbcc8d0d873a4e090e8be77e0a4e30ef1519ca
-
SHA512
b0792ae71a1db46d1dd71e7fa1be866b658c28310d66505f276f5c513105351c11ac972f64215c1bd209bc4e5a00b612f3b02e8751269b2b58982c8708c9a534
-
SSDEEP
768:SXWjDUpbEBgI0MDma9t+En/EWBpiiKP389lAq/TTYzRlmYq7HhPOlP:SXWjopbEBAiKPZq7HO
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 101babd242b0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422982236" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FE11A3A1-1C35-11EF-88AC-F2AB90EC9A26} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d10000000002000000000010660000000100002000000095a6e50a73a1202b7b9ffe01448d92c4a81c072d1b1b2a0ff716496ecfa61747000000000e80000000020000200000009ff3a71924d9acff37ca93766034e8901ec8d990d5d0265756fdd88dee7c6d1f20000000eb66d728a1c6fbdebc2234eb2ee31400c9fc1f5a2c1d0504acba296e2862e6b940000000f0aded8945fa88666ac30dccd0f2bc22d7120c7232006def9b2951514c5c9300a65bdf25012afe67d6def124605a4af293ad456a64c9da253e367c9e7322ae6f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1008 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1008 iexplore.exe 1008 iexplore.exe 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1008 wrote to memory of 2424 1008 iexplore.exe 28 PID 1008 wrote to memory of 2424 1008 iexplore.exe 28 PID 1008 wrote to memory of 2424 1008 iexplore.exe 28 PID 1008 wrote to memory of 2424 1008 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\796ce66818abe224f94c663824177fa2_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1008 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD561818fe0aff645887e330bb28adb02ee
SHA1183c37377f83e2899d2400f8275d4bcefba95f99
SHA256e9819957238f8d8a02c23181a73c242c51946ad0320bbace7eb9f78df5b3a7a9
SHA512a3f90fefe7a60675fa92f9535e54d5cc814d773e829bc205034016374a7d2fa4cb32897c3e4beb02830e0e5107c1214c444fab532adff82ed07b58dac053f528
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5050f8f7dd023e61286551cfcab9d5c03
SHA16ccccffce2cacb921a9bb6e5922e98e806d65e50
SHA2561e33bb2cfc86bb063fe08eb14aa945056b0def6554600c51d91d4bf436b77e9f
SHA51265c4a14fbe0f990d2fcc3e51d46cf0fb38fe79c83ec58a130c8a447173e502826c7a6d64372ec27c268ef9b1f2ff7d4b9cfc282ddd8b0a49e7517d3f599284d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5922f0961f41a74e322c12a891cd4dd7d
SHA1b7e66eb79f1531192a2aec8a9fd6f0f1ba21ca4f
SHA256ffd5b9e194419f2265a864d86969648e7e2138b4aa660f80b45ab561331495f4
SHA512817e06f0b07e333c423ee757f00d6f7758efd709466f259b1c1d8c701a063b6bd552c3cf6804615c5ba54ca10f664d0da47f4330a12f0335592c1a1ba45f3dac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c4f4ae518fa2b2bf4d7aa7c47cf5ead
SHA138737833e8973194c7fdfbc314aae19633b0158c
SHA256f35ddf59ebaf393484370765d5370686e47559235dcaac008e84f337831233c2
SHA51270fb39da676a2d3a6d99f3d4461e69c79269acffdc5f52d605f29140394be6bb2cdeeabebbf826eae2180719b0d96c7c208ad7995e14948dced50151a0a0a882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f25a73a394e90c82355cd583cc3489f
SHA150b629878052646c7c75bc98f157877b15688dbc
SHA25657b29ebe1c193faeaddeec100e349366fb4148b3dd6d131926da2a3cea5323ae
SHA512ccf06a9112f5c601f5a58e90299f403344cceb23f386a2ddbfead79d5816f80c4eadf670adfd47a503dd3786e126bc436b1667d2144115a4370f8da98d575f92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e68d2c1da35fbaaac00bebdce348143
SHA1e31146703a27953105fc58c6255e14048964c315
SHA256cc6a9cd7c1b774518f89e1f08410c411cf606a75634c2b44289247cc4dc974da
SHA512e46465ff9e1fa01b57d5c7c3eaa4e2b098693c12bf323e8127f3c7925566923d1d7504d0918b93aab23f6568ad6d6ad914eeefdd0cdcfd17e65ed297d9529cb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fefa833b261b28a6cf9d9abad86e3f07
SHA1ccfe8cedf0d8642de1fbd8a55c12c3ee7690621c
SHA256da1893ca9e8203f57b23b6f5de83d315e5a83e19a811a32c50cad5ce9a43188c
SHA512ed7db8867ae113f1e663a178a2f5e9c4a9d43596628a82a0879a241c3e1d5f56f99876f6bb28e054283cb774ea731b6bd08779734ee13382f437f2d5135c0d12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6f54b60c4b53db44bd64d828c73a7fc
SHA19c167b65536628328f4aacb571c45673ed64c059
SHA256e636a0005a58e72c1457966078a2cbdc6e482efaa06c1b920b9f25ed1b5632d9
SHA5129415e6605d3ce944493a044864fd316c2a5ac16239ab84df3beec82a578e54a464c71b9a1b0ebfa874c1eb2d4dd36612c5d2db4cf708a5562c7174b77e653bea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ff746c73a2d77a8dee4dc4c8ce8d4b4
SHA1cbeb2f3ad6ca824c69d40dfe9c6c6b6f5c017dda
SHA2564634314e0878745ec2a07bc818c28b7f146ee59dc04f542f23e52842dd58db16
SHA512b78edf8e21e1599b0de0e07daafb947cf9650fd2a3e18fb5103c540fbfe3fd64cfccccc609f1f51a4168658fb243a120dbab79f56c30776e37c8cf5cf53a0f47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD579137069c5cae20a1f01aede0e980da6
SHA10f0f1dd20b8594381460f1343476bbdb30972509
SHA2561ab328d9771f837ac0ac3f4f0eff3a140bd2cacac53a1b297f578edc607a9bc6
SHA51270ad5b4e45952a30e77e14c514db40b7b53d1fa9aa3dd8478ccd8fb043fc32fa1594f2274b39082baadf8b37164b02d2dc0ba7dacec4a4b8f5c54813eadb70e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515c9f5f3eb25e142480cc9721090354e
SHA18cd3af03e580bee62ad2e0635b439038189b75ca
SHA256f302a9294ae9145e21548df1f93abc1f2b3d8d33e14b0bf2ab35ebf10b0cc31b
SHA51232633dc49e39971a7044dcd6acfa9d62a0dfa0bb154665c7f7ead1f621b6cec881b85a3df20fe04d535183cdfa40ca9a21307a56bc0bd52ad567e2cca8e300f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537879c79587877349c8202a30d7dd1ba
SHA17521cff94e545382e50ac9d9d902110af38af8e1
SHA2568bce62f54174a11c0bffddc3e1673d7a18cd1763ace595f4117c7fba32fc7531
SHA512f098f18723111687e08268a2cd4239b5dec2756c2c435fa1619848a7fa98e0f78c9759bf6d1b48395695d0fc7c2ade0321616c93261cc5aa3249e370de611ff5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509f1fd665027711c62458d18f4466e12
SHA17994accc646b74f337a44ca0b9d4661598ef3614
SHA256049e8baae9eef582f26b51b9d2315d922d342ac48521db95126946435bcc4925
SHA512a154d8902743764b737f489ca098eedaeea043416717f2e1c964b0f3dfd8b02ba66f69f9df1c693e93bd7184b94857a35a26a48931d1c7919a0ffa42622f4860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5697e1cd931c4f985f4bc0c8525cf5ba4
SHA1f4461ebd5af44e3d67e4d1e37bec33ffcc540913
SHA256daaca0044b30a32f65aeb4a7ce2a0f8602c607bc4bad71d44f0ba30f11ebfcd9
SHA512579caf6be85e772307c5b5246fc9b2d496055ba9483c38d6d2709fc68cde790e5c06cd6bccb89e45b2d460b708c74318ce17a2dba59f3abf4200c98e848744c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa065939cac516a0c68a90c0b8fa296d
SHA17dab89b6f316f6c406a370178efaa777a1aea35e
SHA256a2d18a0281e7fe671c3a6d2f4c33ccbddd33b7e4ab50911348db6cc2699dfeb8
SHA512c8d6d2457f241dae240fc0eb84c2a59e70099eb0d1a3f2d044a0e730c14236c74a2ce044f287615e128f55a2bc801f65bbfcb4604bb5db438713bba43bc44778
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d4b0aca5ff33bf2df6048eeaa9485e4
SHA110c0a64b34b9131d39b4a0c1d1d6831e9ffdd938
SHA25657f9c12cd881b62bb24c12aa0d164fcc75f59eef85d0d54b7fb71eec8ffef72a
SHA512a9fcec6943a8c89f9f0c57151a3568b7c0bc365880f911d0753305fb5e794419f352f065dc9e5126f634fa6da2ea60bed02d02624c5260145557208208f68e8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d14a6314ed35bc0113781cc54130bc3
SHA14c64c9b90372a15721a48e0d793a6eadbf7bb89d
SHA2562b13326f2f0edc620388b2ea664bae977bffc05483f83cc9812152ed06f045f3
SHA512788755db87a6a0373ad50c9ad8fe78a7807e2175b855fa33770c63c1c37058dbe98fdd9ab1e18b9bfff6cf631d58e8c5184f73b72b57817b44313916f092fc5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD568c0a7e5107e3ea648414d4839bfacb8
SHA1a22666ee40ee59d32a9ed1a3ceac11e522fbcba8
SHA256a0dd3e84325918a211294f8e3446f3fdae9b273da8a2ccfbc07a47cc231be4d3
SHA5125cfc31f9b1b0f018a56f2da4965a07222df9f1806d45d38a7671bf6826fda9564b66f486d32ad47e664f2294ce602a661901b4f46eee94d6a9e304df2188b5de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbca810c4f56fd1d196fd53067a9443f
SHA15e0889501dc6ed11248294c699afb069cc28a1f8
SHA256dcea6449878f07cce4d4c5f5cca87a6e81d0ae3617f0dfb6defd401e5729a33d
SHA512929c7fc738f1bc6c55bdbae8e82f44fc92e57f3ef2a32f4e5c817a1dfaacc624fb3e5089e2b83f873987aa27cfd240da161f78297365bbf0cf44551fdbbd4321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb995a66688c99f7618f45208cd8e5b8
SHA1fab7e84ee048dc067eef59ccf7a67b13d06b334f
SHA25651c8e44dd3567213d4ddaca026e759b34d1dce8a4635b2df9a36b5ab88dd0a7b
SHA512df4560c413006796b6f627c7d3c87a5fdcc325c81b8e8036ac545079fdb6dd95a149e7b5b2136d22e648af51503fb804cdcd6723f78783bc15372b1f221e117b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e343778dcdc510095b15c5f0a86456fe
SHA1a336578cc915cf5c5ee0970fc9bde4c842ccc8b2
SHA2565412f0ac7b6502a32d51bc6c2bd9d21d81f205d72d7f1dff052bb1bab6c3090a
SHA512608c9530e83590797eeab7f2cf92278f02009c63239dc69b1d12011edf157f01a422a0858d9909fd88775bf0c90e6469a93dfe9ca8cb69720e5a59e5667359e3
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a