Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 16:39
Static task
static1
Behavioral task
behavioral1
Sample
63ff3f0a51ab3ba4cf7bcc2cf35a2d34_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
63ff3f0a51ab3ba4cf7bcc2cf35a2d34_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
63ff3f0a51ab3ba4cf7bcc2cf35a2d34_JaffaCakes118.html
-
Size
16KB
-
MD5
63ff3f0a51ab3ba4cf7bcc2cf35a2d34
-
SHA1
2152d456f27f02206e6f0edf2b8047bf73837849
-
SHA256
940815ed6501ee0d51686dd82bde4deb2a1513a1eaa52c32c9d6f70333442be9
-
SHA512
029e6abf6e4aa5bf1c2031be4327bbc971867c3c493ece67e23909d7014fd30aefc4a2b1a887db3b6ece3ad3829e3fc08f231187d49092bb383bd20ef7d707bd
-
SSDEEP
192:T0XRba3vKB8hfO9jJaKB8hf5tBGrE2zpB0zwE8wxJflkJTI1A8AGGixqE67xaoKf:T0ULO98D2FByrlZe8Ai1J
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B93FBBD1-1790-11EF-852B-6265250A2D3F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422471449" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000008575fd6eae838741b65d95741eab8ddd000000000200000000001066000000010000200000003ffd87beb3235372ece3a8810b9b7974d161895c24db529b7f703929332d281d000000000e80000000020000200000005091a69b45d9ecba3dc2d458fe27b17df795d370d7ac0961e79834820d7cf6f9200000009d75c3456d49823d7eef33f0f2a2ae46fb2aeaa0018b9bb90fd35c1567be6b5840000000089408790211b70a7c0fd57ad908f136e2d94c62ce856410dfccd42ce7d51f3da0d6898fd35e6f30f4718ba5c5e16afba2cb7ffc4922830775a62e9a48adf4db iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a04ebd8d9dabda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2064 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2064 iexplore.exe 2064 iexplore.exe 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE 1276 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2064 wrote to memory of 1276 2064 iexplore.exe IEXPLORE.EXE PID 2064 wrote to memory of 1276 2064 iexplore.exe IEXPLORE.EXE PID 2064 wrote to memory of 1276 2064 iexplore.exe IEXPLORE.EXE PID 2064 wrote to memory of 1276 2064 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\63ff3f0a51ab3ba4cf7bcc2cf35a2d34_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2064 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD558743c8bebfe27179bf74b9d96a33598
SHA113d595812ffb14e1d0bf9840e06774dcc7014f3b
SHA2563fea8a04c0ef7cf2e278ca37db1d969e02c46c93c27b97e848ba6e298db36d51
SHA5129bf9be71a8858cf97faacb955b92296bcb32a776022c9a5e89ba26bf4761574e362866eba53c64d28fee4eeddada2894c9494aec39bc22747e3377a9520ccd69
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bb2a0e52ed34a460759f5fd955f66512
SHA13eaa84e8d9fee1b3f2a1680379da5a5ef3ebe911
SHA256150045462b86a7c8a7f657cfc6a3c6c0be8900393d75d371abb591e4735b919d
SHA512d50492336b577ee448e845a2c755e82a4f03bd822ce20f26319e264129d35c6471d8a8e403d498b42d2eb3446361840b0f731355f5f9e52545410d8dd4189840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD598b69bb42df14d8db08ebbd758ac7c27
SHA179321b96e5184d84278516ea44261d464f9d4227
SHA2563bc04e8ed2c8f4061acea4e3a5109f44e16d8307e618f2d3441e4ea15ccb58cb
SHA512b816c638e7e55c3398008f3e470f12bbcdc7ca798931922e0a2434574c6015549e9418c409de51d0fa0bb2b68bcc424805597044b30564db082593f3f3a19a1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53540e3e76b83c02cf2af2d9097a68cb9
SHA1aac2bdb0223901689385b4f49178b2c577482ae7
SHA256e7d96ae38597f0620416753aba51c4b8aad0ee8598ddd3b3e04d75e301d22a2f
SHA512f58fa9f069d75213b700ec8f58abb475b187fecca78209eebb50e7fbae6ce195c80204762a16e268627e061bbceed4b100e46a68b7f44bbe8d5aa35dd2dd8716
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ae261a3d8f2e247b6d08eb81d0e9fcc9
SHA1ab4af38ecedc6e029d70174fc62d1d2f67aa8898
SHA256a361dd153f374b904fffc1199187c1ea6dfa7bfc2e23a549500784a6311ff6ff
SHA512c4aa7ceb3edb848e88bce9ecc655eaad1381e211eb09f42e27c69b35e153467e2f9ce39b31c0068373b96c399a40f001f37c4d386e647a76cf15fb00c267cc56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52711c8f146830d25be73d4e448b91fa6
SHA1d02d500293dac23c79d798fbc9b486e976d67112
SHA256d2415c38f17cacc5cccffee75fdb705f8a9278ecfb1bb41b2c3a1f1046570995
SHA5122806c24b6906253127c8eb7c9402d66818577c3923c5a19641308be72ce5e69fd576461e6e91b10f574932d962b4cd8b2b9363de6ffbea93c5b3550c2f8f7903
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b162a512910df3cecf661416fa8b77db
SHA1056690a4e741f51ac71d2d4876eaa1ee14f06008
SHA256def79d2fd3998fd604ff37cc580c1b7f45301d4871f7e34ecbe54a993e461111
SHA5128c3d04577aeb02c368816ea4e31771de300590e1903d33772e80accf47840dfae49eb5cf4a06c3386a2cbaf2ae9055f4781dc0d616a02074bf1bc292b0e97a50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53829b42fce898b4e1462420608d2719b
SHA19319bebb536b855950c861faf2fb418902636139
SHA2560ccba6587a8ff95cabd93329cc334bb25cf4c20550fbf9de2cc3452e0b69dd27
SHA512bbc9f3438d9509f6326c70d31e7c51f2adbaba926da8bbcfbd07a12c3386dc3a1fe46d29129026e40162e059df2b053656eff6c6f25f8fd06d57b88016a1afa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5988df7aa6ca1516f2551a77dc19be6c2
SHA13ac449d5a750ca04a84ce40596c16eb1929e1221
SHA2561896f275e1bf4fd2a363120800155f287275b288f67d30520a21e299d570ce43
SHA512d0b1470841c7e5b0f9a156561da7f295ca00c91c21a6a793d51504c70764f8d1a5d2f8f0a79c74df1a5cbed812df26331d37e67274abfbe07789fba19b0665f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e2f75da766ee0789c582272282675fdd
SHA14574039da59e7ef48c2eda4be5edf34a80eb3620
SHA2561b4e2d36886f79aba3b9fc27e6d43671c274cab7b8fae8b4a76916739f96c5dc
SHA5123596e4ce9588ce28529e8a4b536ad96753eb7ad4f09e909f9210078ef4669207f7a5ca546444e785191e9fff5af31415e7edb08d8bed4f3d2f0498b98ccb39fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD517b0ccc1f9dd40aee363985da9b22fa3
SHA13d0a0350ee28de80a9c216542878da57f9b96fe6
SHA2567ba5314746e7560fde855d5b40785448ba30931ef0fb05942ac39b94c25b1646
SHA512ef7ce1a0683c20407579a77fde3f748e3c99e4b56e5fe980621a14e68e26fa4aa2de5dd6f35241ed9c8d1075c22088e8a7a93d054134e539f20287879e94ce7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56644760ae86322bc2de499e32b42e04e
SHA170759feb35bfebcdce296ad0a401b3e0b9bdd664
SHA256eb41fb11ad15eeee90c29d985dcec3c4901af0991fc5990de2d5540e8e534737
SHA512d0e4bf5b1b1aa44bd8b92a4cfed1ba9d118a0fe634cc3930abde742ff5427e309f9bed266892b45169560f25a13c3fe1a4e76f45ab7ed15720df516c3a00a475
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55a39d08262ac42cec2afe17d4bd154ea
SHA1e3213af3b6d297ac1787b392a09e940eccc72559
SHA2565665cb9c9a1900c75ddbaf4cd644f2fa5521720fb2804cca76e974b869b00147
SHA512379e300a9f1aa425eb654a7ee8d24fe2a7284b551e4f49a9f010b5422aa5f1a57f26a6f6e088d835424f584c85b9f25d4cd93d9aba371a270f5915f7326ae5ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52f61b03ef5eec6c7faac26303c9b6d4a
SHA1e5f5474b72fc24b8c6d02bfad1c6e70c8ccf8dac
SHA25683cc6271d82c8ae01ec388a5f7ca530b585547ae03adac063deb30e809a405db
SHA51255964d61b028f6c82a2b7d459e0eef4819f57abb5e2585b5ca3175320a22a68cad6b7d7b679153bae60b71e86fc429d95d76b4f6e03f5462ab5aef2ba2e9523b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59b8b975f0dd1fa576438072fb5a324db
SHA145df376549bf9fa12bb99718285f261ef3631b4b
SHA25695fef993116b01abb3502706c13cf2588a59ac0f409ede6878c38f6d706a1290
SHA512806a6f2cc74f91d953f297fe58d2f50721476bf05bc54d23072b9e59ca9f2302f4985789b3e9c624c0be5d3dc199d0002e5ef5cbd0807cf66f6e02c72367748d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5035e0bae0131ba1c3f4e4b5687eb5df4
SHA1f1cd54f9953b8afe205f6421aed4bf00e09e8df7
SHA256f91b009f3bd0192018a7efc27faa02fe995194d1a33038b8b47c7bec9d85d23d
SHA512ec8a768132d644dce0b597c11fbcd47d4687c9c1015982d28649666a0a1dbc441eb4edb1197f0152256e1c9b27ca82196b40b9a592d0f5031bbe484d7237f781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50f6b709294a906038b50b9e0e8e6034d
SHA12fc5426589fe351b882ea0f9b4f027874f6a20e7
SHA256d9d2f6c081bbf1f3e2a622789d7fbad7455d9ba08d50a882c944a0780b73c55a
SHA512956faddd6f678a16cbf4ac09455e24b7118f9a56d2395056f02ee7f43eeb00daaf192193f129d5b0d867a186a4325c5350360ebd477092cfa8a568a239aca942
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD533fb3f60e8388584173f86cbb6dab389
SHA14acdc049c0ac51305a93614b95eb950dcdda96f2
SHA25635a122c0f279f5cd7749a9d9a4146a3b44f21332dee9c08f0514dfaf9a9387fc
SHA512a93bf1521ab3f215d928b58740d73fd102b5fc628d740e5a8783c85a22b2f1bff5788502434e2e4a8c76852f225bb52e04852eb976f0b99af45aeac65341ddae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5429a6a0d58e030d1a2c57e47cd56da96
SHA10ce5d81334d3cf6a07a6ec01b3a755733718d97d
SHA256d959193c92612cc6ce3ac284830d191c8873d926fdd8afe35ec2198bfc647e3b
SHA51283090477b60fd1bd75287e984ecc321c3616f605a42fdce17c8c6aa216a55787c023a9459077d4b4d593dbba3e5b84b6d4191dead1625ad9d688f3996e343901
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ff6bb0258e90b7fd54fc57ff87364463
SHA1177fadc64e5bbf22aa597a79e6afe5136c83d10e
SHA256e916dcd6b765a1914c58f89238ffd22e1c218152dcbe1e19b3394aac47732296
SHA512949dbdce87bb7bf3150f70917b286f7f9aaec959ecaa3a8f452326439117acfc920dae59aca69e1fdd09f407cdd30d7538f0a188fd48bcf2cd14c2fe2be8a97b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a