Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:32
Static task
static1
Behavioral task
behavioral1
Sample
65886fbbbcb42c64583b52c8b7315fae_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
65886fbbbcb42c64583b52c8b7315fae_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
65886fbbbcb42c64583b52c8b7315fae_JaffaCakes118.html
-
Size
27KB
-
MD5
65886fbbbcb42c64583b52c8b7315fae
-
SHA1
bb4bf05f45db6f74f0493aa4fc7a7eefa3110bea
-
SHA256
6b2673600258517f694b0f2a8d3f479401bfcf1432c0ad25778050e9a00e7db0
-
SHA512
aa7a6b17482c5d6e6b5943a1f76062358bdbbd0bdd0cfe3e5835219c58b40915a131fecfacdeb4b71c3fdb66de85fe062b906d3faee8ae7a6b379d86e4f89610
-
SSDEEP
192:uw7gb5n2N8nQjxn5Q/HBnQiesNnSnQOkEntrfnQTbnhnQ9eq8m609AqQl7MBMqnk:FxQ/e7kWANSWF
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0198df9e7abda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422503412" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{24B783D1-17DB-11EF-A1BA-6AD47596CE83} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000008fbbea22c6a5d29df407298c793d7ebdf0d4db6ee5e3dda09d91065d34e71a33000000000e80000000020000200000003dda68f3c1f59b99427400bcd50cdb748e17df67d142ef32c59867bce6fb928320000000325dcce398913c0fb0dbff4ab66b441c00533867c6c3112a72e5709eacf6541a4000000027311367eb754d5737b73367aa372c1aa695ed65f6ecf2c2b23bf3013813319eb9ed3770cf66abe68bebc11777e082ae57207885b1c1c94d6f98d0d36d6dce6d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
IEXPLORE.EXEpid process 2928 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2916 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2916 iexplore.exe 2916 iexplore.exe 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2916 wrote to memory of 2928 2916 iexplore.exe IEXPLORE.EXE PID 2916 wrote to memory of 2928 2916 iexplore.exe IEXPLORE.EXE PID 2916 wrote to memory of 2928 2916 iexplore.exe IEXPLORE.EXE PID 2916 wrote to memory of 2928 2916 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65886fbbbcb42c64583b52c8b7315fae_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2916 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e7e1a976afe833a5faa01a12640669e
SHA15a6c976b7c3ed6b3903cf0127d1c23e88cf6736b
SHA2562622ed73fde14f57c46e788f2eaed76040a40e6adf0b9a1e74208f1807050ba3
SHA512115c00cbe9322d23ebe28092a3cc191f0ac77f9c9493395505d23ee7659de173e0dfd31b7ac62b9b67de2e173b99bef895cdb7cbc6b5ed7c15205bdf2e8dc5ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4f903ee256d7ff0b2713300e792d2ab
SHA1260a8aefd4bd8ed1e231885d2b3ded170893b50c
SHA25608642ea79216cd58d89e70f5b7808725bda58de8032a3b521b1accbde930393f
SHA512f39a89459b8cd329ad0c05b4a36ff3f1f21057c504881a2f8efb2a346d293552a8cecb74ff605fe55c596b06711d694b30bb0aa9243f4afe0fa2747b7f2ca76f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e5dd63b7312380f79a00f06907f92743
SHA1f4e087be83c48df6ccbde7e330259700bc6eb8fa
SHA256f684c427b78f97f98bc923efad21b0ad19b0506c52e41d195cef41db99c9ddb1
SHA5129938e3a4e6d7df694d3b82b60d08a28a80b3fba6cacbc387e8482f7e641eb356cf2b6ab6504f432910f7b95820fc57da0b1d1eba467d30bb41464a4a44fb0a57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5d78cd658d1507603867629badf1fc3
SHA13d45ce05c8c900c64b155bf3e89c68761e26a4a2
SHA25638193c66ba2e227c775e91b77d9a1eed9a04c21e21689cd544fbe4b14d3527e7
SHA5128413083fc38bfc60df8e37203b61c914d51230bd526e860ba54f519fc0da06cf359972293abf741b404cd873861625bf9ced41deb7469d7f76550a42ae3f4124
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5967fa3d5ebad3bba6bec95da2f4f1977
SHA11a1319dd816eb7bf21aa4ac1f7dc0408a7d277ab
SHA256916abb2d2c14cb4623cc31b93e0e4d74b51249e9f89b6a1a2b985e1b52b68ccd
SHA512d832c1a740db29ed53bddf1caed1bc4f46921a2f83375075fb04704f1fbe18062bcb271b60c8803890c906fefdfedd28b7dc8d2efa5306989eb3e7f957f5d788
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5321016bcb52a0e011f7841c8b29dc553
SHA1957a101eecdd73b39c0aa524e266bbef475db6bf
SHA2563e919a7c87ff49dce217948ce4ef94bb6489fe15a9010fef617fe8283f857414
SHA512b04c7b7b6e5a3e836a91d25854ba126d62f5297062c4134c9df73c8987466f0b58a9382e6059cfad0a78e9c911e17aa2c41a357b59591441e7868070767ff7ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a3d23453fb368f8f295a3f12f708ce2
SHA1c230b02e6190159c8e222c56b6573a03063cc0eb
SHA25689f7f9e2ab3c340807fa005cf633c9fcaf16456cf36b89240f4a6e59e6c3b6ed
SHA512c045dd3f836f3dfa0bff01961f48a3111a67c9404c8963d2b1279142a6f40092599b85a56caf5a571de6f78634620b45cbcb79b0a5a6ee4cb0d5588628fb9092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571749d9ef546d00a20b1586622c42bab
SHA13e1039971a1054a5cc148ee3d4f1974fb287d911
SHA256a60ea3765c2aa421032ecac74c178943aa97eef66e0328d96c877ff1a1b5e783
SHA512600756b46754ae752d10011366bf83bb1d45943abb7cafdf7b7b0ccd59023183ff3f9132598770e1884d2c88adb5c10f8a826cdd6c6918ed9402a94648af37f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553811ecbeba01d2607be3cb603f45308
SHA15879bb2e9fcd0f76c2f26583c03dabc48fb9db0b
SHA25673ac39819791aa31365fd4f4acecc81caa6d42a3a757d9615366fa2efb6ba488
SHA512c5d659c5a8a4d1f85a8398ae36a1975aad80cf5bef80887105d77149bf58338e1e0749d559fe3b796f4ebb414173d76565238f5d411dd83ea696946e374550d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d68e9b985b6ca223ac3079b6d9cdb40
SHA16a9a31fcbc081b9c6c858205903ba880c7166421
SHA2562f7640cb9f28e9865064b1af60735441f6e0babaca46116902c03dcde0343b9c
SHA5123f814ff6af8391e1471b4c69fc77d6a936c371804313aac35ca231516b30ba9420a1e98f7823408d83ceb29b80ed852cd59a55eb94f3eea4614c7968e4db74ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4c2460ca28aeeda8bcb84648e1192d5
SHA153fb3710389ddddb0dd717ae3225d4e18066707c
SHA2561c681754ecb53de995456d33bde99af4b0b03520e00192209dc7985bf1d5fa52
SHA512acdae38693424e9bd5f7d13ebb0aada632628790f14a700dab58c35a858157bcb6db2d6499cd45dc85ee727c7873b61eb0fccc8c7167944aeec68832d92c334e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d9e719f023d8fe7b1926a17cd21279ea
SHA1bc94fb20d299b766848838a7379cc48f3df778ef
SHA256adbb3fb2eb5b5470bdb22e241c858e66e5f80e8ea0d1cdc34c98c8f8b798ff39
SHA512455fb4a908f9415fa5a61e56fc6285f30112571a50e08101a52ce3238e66204b82191817268f67df6675f85a2d19696651994869ebc005578164242652458ab1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fc2dc5971137bb03efa7cd78d144f937
SHA12f59f084d11e00997ced51c5017050628882a00c
SHA25610315607415c8d4453bd056be04bf80a4334520d06bd4ed21ed595406025c6cb
SHA512b14fb9d762fb679a7f6948795352799b2997f99993831b108e68d0f6e8380628edbe345229adfe562510712c9fd8854ce61d96a4ce27bc6e5019ff9573d0a334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d61f52c1c20667b3e344f3bec0e826f0
SHA1b0980e51063a719379d4a21b7b0a6db8a8f355b6
SHA25632dbec31290e1a71146a36d72bcf22471adf6e56ab48248b33b830846c47f035
SHA512b7be60e595c2f0fbb99669ccd367e2ee4363bb1dcf9746b672cbf3176b9b4dea1c0cef5d294bd659a5baa047e4b649cd2d52ce1ef474c1f9e7d093491a3884cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562dbba2cbf40d6ea06e85b6a04a401e5
SHA1a1a352ee37bd84c865d76b0bb100e48c04de9e5c
SHA25636700023b9211185ce07e1ce7acaaa451a6d694891ae130e82d268687cd2ee94
SHA5121507f18635cd074326e4e7f92664905583a321d81831deecc19c3b7e74784d0221250136ea7f9e45abc240ddf53fc1dc9333d1126b31c37b123c7f82287c8d2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cf1ebc08c0874d9356504fa66ec4d3b
SHA1914d97d0e74681d2efd5e35c52a6ee96e3fa873b
SHA256b77c12a6776a54a07b488e6e9a83bc4812259bc1008ddef3aba1a560738436e2
SHA512ccab71f1330544fd00f75312c863d492bad6133b3c2059b1371c76de4c7b6f5b282853bd54865cd32e244a47fcbf40f5e71f75e9227c0378af0aa1983ef374d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f31d818d39e1f8be4b99958ffccbd4a3
SHA1410de852b1bffe9034dd4dc228d52abbbdac2931
SHA256b37968cd94b6842e7a940192fb325409c7f6904dae2fb7313ba94bad0842e453
SHA512ae29397efe69a46b1dd9725d2f6a190d3b952405154e26154187aa810b17d3480068f205d8e69b8d00461ca03202600fb3b5ff152a598bf3ffdb30cedfe268a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0a478660157c7bb7e095e6dc533b7b5
SHA1ad24bd4aedee217089843c76ce7b9d64c907dbd0
SHA256b307d4bd96020e729fdeb2263f1c0d831f067e542e57a481b67e798b222505c9
SHA51279b9a7dc63f6f59e826c19fe31ecde66b0e4fe3559d4afec575af55e1fe01a9534328c0714b0ceaae8ec3c7c1ab3a10925560448700a9df573aa12e065eee3cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53cb8f3278cb5ef312447e481c3843fc0
SHA1da3e4bbf3e6cd7fc37a91ba50bb14a64d64eb922
SHA256107b93bc4186c5f74bb21927907709ef3525d14a56c66810d0517c2b36a5f6d3
SHA512856c0513642cd1526004464eda523aa3f425bfd74c1d32735d867d02dd44588b1140b4cefdf3562e8f32458ec1737efc5be585b2719dbf2cfd1e0e1f511e3c2c
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a