Analysis
-
max time kernel
150s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2022, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
205294ba00726f1caacdca1217f575cb675a55502ac54301710ac02849a1cd47.exe
Resource
win10v2004-20220901-en
General
-
Target
205294ba00726f1caacdca1217f575cb675a55502ac54301710ac02849a1cd47.exe
-
Size
727KB
-
MD5
f62ad0d90ec817d8ba881aab7787ae61
-
SHA1
c249ac53536fe5cec0d9e1dd3c1c6161c883e32a
-
SHA256
205294ba00726f1caacdca1217f575cb675a55502ac54301710ac02849a1cd47
-
SHA512
e4ec4f0eada7837b39e14cfa17f9347c67db0e6f3a6d8630a9262a1b2c649f5dd9f138604e559dce32235a05a8dbaf3407c7294572a01560207e0cf59c063f81
-
SSDEEP
768:rZmchlXKGREW6VA6joSRhFH+C9Pe2auEqainmngYWxuv8Gwmwoe9R4ZstojtfcWv:schl6M+lpDCUoHid0bIrlyR
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 3820 dllhost.exe -
Adds Run key to start application 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 11 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 228 schtasks.exe 4568 schtasks.exe 5064 schtasks.exe 3644 schtasks.exe 3180 schtasks.exe 3308 schtasks.exe 3336 schtasks.exe 1328 schtasks.exe 3808 schtasks.exe 3680 schtasks.exe 3620 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3632 powershell.exe 3632 powershell.exe 4664 powershell.exe 4664 powershell.exe 1084 powershell.exe 1084 powershell.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe 3820 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3632 powershell.exe Token: SeDebugPrivilege 1316 205294ba00726f1caacdca1217f575cb675a55502ac54301710ac02849a1cd47.exe Token: SeDebugPrivilege 4664 powershell.exe Token: SeDebugPrivilege 1084 powershell.exe Token: SeDebugPrivilege 3820 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1316 wrote to memory of 3616 1316 205294ba00726f1caacdca1217f575cb675a55502ac54301710ac02849a1cd47.exe 85 PID 1316 wrote to memory of 3616 1316 205294ba00726f1caacdca1217f575cb675a55502ac54301710ac02849a1cd47.exe 85 PID 1316 wrote to memory of 3616 1316 205294ba00726f1caacdca1217f575cb675a55502ac54301710ac02849a1cd47.exe 85 PID 3616 wrote to memory of 2160 3616 cmd.exe 87 PID 3616 wrote to memory of 2160 3616 cmd.exe 87 PID 3616 wrote to memory of 2160 3616 cmd.exe 87 PID 3616 wrote to memory of 3632 3616 cmd.exe 88 PID 3616 wrote to memory of 3632 3616 cmd.exe 88 PID 3616 wrote to memory of 3632 3616 cmd.exe 88 PID 3616 wrote to memory of 4664 3616 cmd.exe 93 PID 3616 wrote to memory of 4664 3616 cmd.exe 93 PID 3616 wrote to memory of 4664 3616 cmd.exe 93 PID 3616 wrote to memory of 1084 3616 cmd.exe 96 PID 3616 wrote to memory of 1084 3616 cmd.exe 96 PID 3616 wrote to memory of 1084 3616 cmd.exe 96 PID 1316 wrote to memory of 3820 1316 205294ba00726f1caacdca1217f575cb675a55502ac54301710ac02849a1cd47.exe 97 PID 1316 wrote to memory of 3820 1316 205294ba00726f1caacdca1217f575cb675a55502ac54301710ac02849a1cd47.exe 97 PID 1316 wrote to memory of 3820 1316 205294ba00726f1caacdca1217f575cb675a55502ac54301710ac02849a1cd47.exe 97 PID 3820 wrote to memory of 504 3820 dllhost.exe 98 PID 3820 wrote to memory of 504 3820 dllhost.exe 98 PID 3820 wrote to memory of 504 3820 dllhost.exe 98 PID 3820 wrote to memory of 3420 3820 dllhost.exe 99 PID 3820 wrote to memory of 3420 3820 dllhost.exe 99 PID 3820 wrote to memory of 3420 3820 dllhost.exe 99 PID 3820 wrote to memory of 2132 3820 dllhost.exe 108 PID 3820 wrote to memory of 2132 3820 dllhost.exe 108 PID 3820 wrote to memory of 2132 3820 dllhost.exe 108 PID 3820 wrote to memory of 4088 3820 dllhost.exe 106 PID 3820 wrote to memory of 4088 3820 dllhost.exe 106 PID 3820 wrote to memory of 4088 3820 dllhost.exe 106 PID 3820 wrote to memory of 5012 3820 dllhost.exe 102 PID 3820 wrote to memory of 5012 3820 dllhost.exe 102 PID 3820 wrote to memory of 5012 3820 dllhost.exe 102 PID 3820 wrote to memory of 4644 3820 dllhost.exe 104 PID 3820 wrote to memory of 4644 3820 dllhost.exe 104 PID 3820 wrote to memory of 4644 3820 dllhost.exe 104 PID 3820 wrote to memory of 3088 3820 dllhost.exe 109 PID 3820 wrote to memory of 3088 3820 dllhost.exe 109 PID 3820 wrote to memory of 3088 3820 dllhost.exe 109 PID 3820 wrote to memory of 460 3820 dllhost.exe 115 PID 3820 wrote to memory of 460 3820 dllhost.exe 115 PID 3820 wrote to memory of 460 3820 dllhost.exe 115 PID 3820 wrote to memory of 3664 3820 dllhost.exe 112 PID 3820 wrote to memory of 3664 3820 dllhost.exe 112 PID 3820 wrote to memory of 3664 3820 dllhost.exe 112 PID 3820 wrote to memory of 3600 3820 dllhost.exe 113 PID 3820 wrote to memory of 3600 3820 dllhost.exe 113 PID 3820 wrote to memory of 3600 3820 dllhost.exe 113 PID 3820 wrote to memory of 3284 3820 dllhost.exe 117 PID 3820 wrote to memory of 3284 3820 dllhost.exe 117 PID 3820 wrote to memory of 3284 3820 dllhost.exe 117 PID 3820 wrote to memory of 1364 3820 dllhost.exe 118 PID 3820 wrote to memory of 1364 3820 dllhost.exe 118 PID 3820 wrote to memory of 1364 3820 dllhost.exe 118 PID 460 wrote to memory of 3180 460 cmd.exe 124 PID 460 wrote to memory of 3180 460 cmd.exe 124 PID 460 wrote to memory of 3180 460 cmd.exe 124 PID 3088 wrote to memory of 3308 3088 cmd.exe 125 PID 3088 wrote to memory of 3308 3088 cmd.exe 125 PID 3088 wrote to memory of 3308 3088 cmd.exe 125 PID 504 wrote to memory of 3680 504 cmd.exe 122 PID 504 wrote to memory of 3680 504 cmd.exe 122 PID 504 wrote to memory of 3680 504 cmd.exe 122 PID 3664 wrote to memory of 3620 3664 cmd.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\205294ba00726f1caacdca1217f575cb675a55502ac54301710ac02849a1cd47.exe"C:\Users\Admin\AppData\Local\Temp\205294ba00726f1caacdca1217f575cb675a55502ac54301710ac02849a1cd47.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"2⤵
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\chcp.comchcp 12513⤵PID:2160
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3632
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
-
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:504 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3680
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3420
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:1328
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:5012
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3336
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4644
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:4568
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:4088
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:228
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:2132
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:5064
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3308
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1060" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1060" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3620
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk5319" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3600
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk5319" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3644
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3180
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3152" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:3284
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3152" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
PID:3808
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk2003" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵PID:1364
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:1604
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:1860
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:1084
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:4032
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵PID:1936
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵PID:3984
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
930KB
MD5124356069f149cd486f358c5d37a3ed8
SHA1612ed976d19b280d8f85a9a391a0857abb907c31
SHA256067c4ee315775b2a6463311f7a7562336d68171e75191df63d78a6b3131849ac
SHA5129e85d0a1b4c947abd9b34bbd45388cc6fc3dfea8473b682a6ea786c9cf63455c24ce0376651b1eb0bfae975e92b7a024e32078dacbf5ce53247c1bb7f2b44c6e
-
Filesize
930KB
MD5124356069f149cd486f358c5d37a3ed8
SHA1612ed976d19b280d8f85a9a391a0857abb907c31
SHA256067c4ee315775b2a6463311f7a7562336d68171e75191df63d78a6b3131849ac
SHA5129e85d0a1b4c947abd9b34bbd45388cc6fc3dfea8473b682a6ea786c9cf63455c24ce0376651b1eb0bfae975e92b7a024e32078dacbf5ce53247c1bb7f2b44c6e
-
Filesize
497B
MD513fda2ab01b83a5130842a5bab3892d3
SHA16e18e4b467cde054a63a95d4dfc030f156ecd215
SHA25676973d42c8fceceab7ec85b3d01b218db92564993e93a9bea31c52aa73aeee9e
SHA512c51f9fd6e452fbeeedd4dfaba3c7c887e337f01e68abdd27d4032f8be85def7ef3cf0c77bf60e425b085b76c0539464c6b6e5e805a69397c5519e8ccf9fffccc
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD594532a9938be29bc492d3ddf573d5915
SHA108cdb8c54c78f61a4f3810d1a862d94e9635eb2b
SHA256fc0f3a478bb78dc31c57e6bda0ade6b97416af46453799b1b5430d42b15115a1
SHA51236d098f681c30d135a303b07b2aac282c040854d8601d7b402d1184dc262d25026dc7b3b5801fd6b6061b331c47fd763e40d09d3b3c9c3b3e16a410e17c8e93c
-
Filesize
18KB
MD5bdca9012af368cb3e8a9e4ae5ef5fe5b
SHA18c3c05c9787476ac9e2e2d788459f1b0005ab212
SHA256e7148a475245aa844c36bf333ac59115c9fe57822bfad01c5f5564d79931f125
SHA5128ac1f573915f0e7e2e0b5fb1b055ef202cd7edcd7ce03a305160baf07fd63e53120b62bb51d8cf7623b29603f0a2e7f586c0771cc0c55e99edd2f7f540ec9bd1