Analysis
-
max time kernel
153s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 19:50
Static task
static1
Behavioral task
behavioral1
Sample
4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe
Resource
win10v2004-20220812-en
General
-
Target
4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe
-
Size
192KB
-
MD5
a184a7b2cb20fd894e7b2c47fce2989c
-
SHA1
5a23438166d4720b7380a52a23e89ae584a935d9
-
SHA256
4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e
-
SHA512
b0f48cbdfda6ea7c14ee7bcac699e4fdf03431fc942da692680aa14ed3b4ceb2a1c4682a0d8cf8ec2c9f158de5d1e6aaf3d8a71eae40947f2e8f8906c36f944b
-
SSDEEP
3072:DOm0VJOSokrwInQrLS4kZxPQtmnU9Ri7TJAc1BkHy8IA9aVsV2Bq:Km0VJOvI6S4QQtOU9ROp8/V28
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" soena.exe -
Executes dropped EXE 1 IoCs
pid Process 1488 soena.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe -
Adds Run key to start application 2 TTPs 29 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soena = "C:\\Users\\Admin\\soena.exe /e" soena.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soena = "C:\\Users\\Admin\\soena.exe /o" soena.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soena = "C:\\Users\\Admin\\soena.exe /m" soena.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soena = "C:\\Users\\Admin\\soena.exe /v" soena.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soena = "C:\\Users\\Admin\\soena.exe /w" soena.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soena = "C:\\Users\\Admin\\soena.exe /l" soena.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soena = "C:\\Users\\Admin\\soena.exe /n" soena.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soena = "C:\\Users\\Admin\\soena.exe /h" soena.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soena = "C:\\Users\\Admin\\soena.exe /p" soena.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soena = "C:\\Users\\Admin\\soena.exe /s" soena.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soena = "C:\\Users\\Admin\\soena.exe /i" soena.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soena = "C:\\Users\\Admin\\soena.exe /c" soena.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soena = "C:\\Users\\Admin\\soena.exe /q" 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soena = "C:\\Users\\Admin\\soena.exe /z" soena.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soena = "C:\\Users\\Admin\\soena.exe /k" soena.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soena = "C:\\Users\\Admin\\soena.exe /q" soena.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soena = "C:\\Users\\Admin\\soena.exe /u" soena.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soena = "C:\\Users\\Admin\\soena.exe /b" soena.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soena = "C:\\Users\\Admin\\soena.exe /t" soena.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soena = "C:\\Users\\Admin\\soena.exe /g" soena.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run\ soena.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soena = "C:\\Users\\Admin\\soena.exe /a" soena.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soena = "C:\\Users\\Admin\\soena.exe /r" soena.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soena = "C:\\Users\\Admin\\soena.exe /j" soena.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soena = "C:\\Users\\Admin\\soena.exe /d" soena.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soena = "C:\\Users\\Admin\\soena.exe /y" soena.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soena = "C:\\Users\\Admin\\soena.exe /x" soena.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\soena = "C:\\Users\\Admin\\soena.exe /f" soena.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe 1488 soena.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe Token: SeSecurityPrivilege 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe 1488 soena.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4948 wrote to memory of 1488 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe 83 PID 4948 wrote to memory of 1488 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe 83 PID 4948 wrote to memory of 1488 4948 4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe"C:\Users\Admin\AppData\Local\Temp\4b4f04f5923ffb6008f9046a20373fd4be81b1a45de8235830e4ddd2d9c5a99e.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\soena.exe"C:\Users\Admin\soena.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1488
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5c2962024bfe0d4abb2173e6d4b6776f0
SHA124ac58cad06eb011ea8b6dfb8c7d6387df01ecf4
SHA256af4b2b821d2ff0d56a5308e251715de01f91501b66e7b26f84cf17f18aa7899e
SHA5127fd116340f4ad6812825e16b492ea318f8989f9800ed097bcd2f8ddcd0b1132b8f91445095ece832342e752c268af15ec97e6c460ee06cfe14b63a67f0c27645
-
Filesize
192KB
MD5c2962024bfe0d4abb2173e6d4b6776f0
SHA124ac58cad06eb011ea8b6dfb8c7d6387df01ecf4
SHA256af4b2b821d2ff0d56a5308e251715de01f91501b66e7b26f84cf17f18aa7899e
SHA5127fd116340f4ad6812825e16b492ea318f8989f9800ed097bcd2f8ddcd0b1132b8f91445095ece832342e752c268af15ec97e6c460ee06cfe14b63a67f0c27645