Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 08:58
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230915-en
General
-
Target
file.exe
-
Size
1.3MB
-
MD5
ba9fe6ef94fe7823b804a68264e901f9
-
SHA1
872d452bbba5d325bf4fd8d1579be007c969ccbc
-
SHA256
659f0f9e427722eab6a23d86da26aad8776993035e00bae97a8e41f5c937e386
-
SHA512
a25b1a243473e67149fd34b336003a7fa167b53b74e29e32ded6330756b8c4950210145e4cbf40a154d349eccc24441eb26681081c8a5e09de6d02f0be3a4867
-
SSDEEP
24576:iyqdhcP1YfDz/qEUJjOg7r8VTLSwKC+WHib3GJsuqC:JqdhcWbzCEUpOg7r8F+a+W+3
Malware Config
Signatures
-
Detects Healer an antivirus disabler dropper 4 IoCs
resource yara_rule behavioral1/files/0x00060000000186c3-34.dat healer behavioral1/files/0x00060000000186c3-36.dat healer behavioral1/files/0x00060000000186c3-37.dat healer behavioral1/memory/2616-38-0x0000000000EB0000-0x0000000000EBA000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a4180527.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4180527.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4180527.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4180527.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4180527.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4180527.exe -
Executes dropped EXE 5 IoCs
pid Process 3032 v0506329.exe 2600 v8179967.exe 2812 v2707760.exe 2616 a4180527.exe 2672 b4103760.exe -
Loads dropped DLL 14 IoCs
pid Process 2788 file.exe 3032 v0506329.exe 3032 v0506329.exe 2600 v8179967.exe 2600 v8179967.exe 2812 v2707760.exe 2812 v2707760.exe 2812 v2707760.exe 2812 v2707760.exe 2672 b4103760.exe 2956 WerFault.exe 2956 WerFault.exe 2956 WerFault.exe 2956 WerFault.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features a4180527.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a4180527.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v0506329.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8179967.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v2707760.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2672 set thread context of 2496 2672 b4103760.exe 34 -
Program crash 2 IoCs
pid pid_target Process procid_target 2956 2672 WerFault.exe 32 3008 2496 WerFault.exe 34 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2616 a4180527.exe 2616 a4180527.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2616 a4180527.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2788 wrote to memory of 3032 2788 file.exe 28 PID 2788 wrote to memory of 3032 2788 file.exe 28 PID 2788 wrote to memory of 3032 2788 file.exe 28 PID 2788 wrote to memory of 3032 2788 file.exe 28 PID 2788 wrote to memory of 3032 2788 file.exe 28 PID 2788 wrote to memory of 3032 2788 file.exe 28 PID 2788 wrote to memory of 3032 2788 file.exe 28 PID 3032 wrote to memory of 2600 3032 v0506329.exe 29 PID 3032 wrote to memory of 2600 3032 v0506329.exe 29 PID 3032 wrote to memory of 2600 3032 v0506329.exe 29 PID 3032 wrote to memory of 2600 3032 v0506329.exe 29 PID 3032 wrote to memory of 2600 3032 v0506329.exe 29 PID 3032 wrote to memory of 2600 3032 v0506329.exe 29 PID 3032 wrote to memory of 2600 3032 v0506329.exe 29 PID 2600 wrote to memory of 2812 2600 v8179967.exe 30 PID 2600 wrote to memory of 2812 2600 v8179967.exe 30 PID 2600 wrote to memory of 2812 2600 v8179967.exe 30 PID 2600 wrote to memory of 2812 2600 v8179967.exe 30 PID 2600 wrote to memory of 2812 2600 v8179967.exe 30 PID 2600 wrote to memory of 2812 2600 v8179967.exe 30 PID 2600 wrote to memory of 2812 2600 v8179967.exe 30 PID 2812 wrote to memory of 2616 2812 v2707760.exe 31 PID 2812 wrote to memory of 2616 2812 v2707760.exe 31 PID 2812 wrote to memory of 2616 2812 v2707760.exe 31 PID 2812 wrote to memory of 2616 2812 v2707760.exe 31 PID 2812 wrote to memory of 2616 2812 v2707760.exe 31 PID 2812 wrote to memory of 2616 2812 v2707760.exe 31 PID 2812 wrote to memory of 2616 2812 v2707760.exe 31 PID 2812 wrote to memory of 2672 2812 v2707760.exe 32 PID 2812 wrote to memory of 2672 2812 v2707760.exe 32 PID 2812 wrote to memory of 2672 2812 v2707760.exe 32 PID 2812 wrote to memory of 2672 2812 v2707760.exe 32 PID 2812 wrote to memory of 2672 2812 v2707760.exe 32 PID 2812 wrote to memory of 2672 2812 v2707760.exe 32 PID 2812 wrote to memory of 2672 2812 v2707760.exe 32 PID 2672 wrote to memory of 2496 2672 b4103760.exe 34 PID 2672 wrote to memory of 2496 2672 b4103760.exe 34 PID 2672 wrote to memory of 2496 2672 b4103760.exe 34 PID 2672 wrote to memory of 2496 2672 b4103760.exe 34 PID 2672 wrote to memory of 2496 2672 b4103760.exe 34 PID 2672 wrote to memory of 2496 2672 b4103760.exe 34 PID 2672 wrote to memory of 2496 2672 b4103760.exe 34 PID 2672 wrote to memory of 2496 2672 b4103760.exe 34 PID 2672 wrote to memory of 2496 2672 b4103760.exe 34 PID 2672 wrote to memory of 2496 2672 b4103760.exe 34 PID 2672 wrote to memory of 2496 2672 b4103760.exe 34 PID 2672 wrote to memory of 2496 2672 b4103760.exe 34 PID 2672 wrote to memory of 2496 2672 b4103760.exe 34 PID 2672 wrote to memory of 2496 2672 b4103760.exe 34 PID 2496 wrote to memory of 3008 2496 AppLaunch.exe 36 PID 2496 wrote to memory of 3008 2496 AppLaunch.exe 36 PID 2496 wrote to memory of 3008 2496 AppLaunch.exe 36 PID 2496 wrote to memory of 3008 2496 AppLaunch.exe 36 PID 2496 wrote to memory of 3008 2496 AppLaunch.exe 36 PID 2496 wrote to memory of 3008 2496 AppLaunch.exe 36 PID 2496 wrote to memory of 3008 2496 AppLaunch.exe 36 PID 2672 wrote to memory of 2956 2672 b4103760.exe 35 PID 2672 wrote to memory of 2956 2672 b4103760.exe 35 PID 2672 wrote to memory of 2956 2672 b4103760.exe 35 PID 2672 wrote to memory of 2956 2672 b4103760.exe 35 PID 2672 wrote to memory of 2956 2672 b4103760.exe 35 PID 2672 wrote to memory of 2956 2672 b4103760.exe 35 PID 2672 wrote to memory of 2956 2672 b4103760.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0506329.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0506329.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8179967.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8179967.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2707760.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2707760.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a4180527.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a4180527.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4103760.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b4103760.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2496 -s 2687⤵
- Program crash
PID:3008
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:2956
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD509257a93db5e9e482b3f3e84519ad437
SHA1e9fec2a85cd5b7600fd3318c5c95de07c041639f
SHA256f34e4550c3586565af50456cc23f9df88920aadf088fecd4e15d384c2153ea34
SHA5126c493052b6ea6363e3e0e41c4dcb79c83c90801d37358a5f9455c2b404e791c32b7d12c809f17140d6e9d16f6cae17ce4c3ff8f3328269c0e37998cae8f02403
-
Filesize
1.2MB
MD509257a93db5e9e482b3f3e84519ad437
SHA1e9fec2a85cd5b7600fd3318c5c95de07c041639f
SHA256f34e4550c3586565af50456cc23f9df88920aadf088fecd4e15d384c2153ea34
SHA5126c493052b6ea6363e3e0e41c4dcb79c83c90801d37358a5f9455c2b404e791c32b7d12c809f17140d6e9d16f6cae17ce4c3ff8f3328269c0e37998cae8f02403
-
Filesize
835KB
MD504e939a13b189294533ebdce997552ea
SHA10a9dfe382133f0814b70a9ae1628f20870a0ed93
SHA2564599eed37d4171551a06241cd92d156b49d31659b67bead011c5043c695135b5
SHA512a94fde2a64e00ce0290634654a51b75ad9f18f60a3fb33a843c08ddf56038ad1c8e664a5e7b625608632c28b3701894ad09749c6ad3c69428aa9b08156d36bf9
-
Filesize
835KB
MD504e939a13b189294533ebdce997552ea
SHA10a9dfe382133f0814b70a9ae1628f20870a0ed93
SHA2564599eed37d4171551a06241cd92d156b49d31659b67bead011c5043c695135b5
SHA512a94fde2a64e00ce0290634654a51b75ad9f18f60a3fb33a843c08ddf56038ad1c8e664a5e7b625608632c28b3701894ad09749c6ad3c69428aa9b08156d36bf9
-
Filesize
475KB
MD5f1a39e08f920abfc959dbd4e44420483
SHA15ce4907a779cd1761f43305cad7dcfcb1b34a5d5
SHA256a0a9e4ae95e098fe25c18f138c184735343a3cb59328724ecbcec349babbf279
SHA51207149d66d021d9e25608f90fa027c747ece92b14f8db61e67f14c050a67188f222d6332a90fe9c407504c0815911c137e2c8e70e59cc145bd9e74df6de9b8d96
-
Filesize
475KB
MD5f1a39e08f920abfc959dbd4e44420483
SHA15ce4907a779cd1761f43305cad7dcfcb1b34a5d5
SHA256a0a9e4ae95e098fe25c18f138c184735343a3cb59328724ecbcec349babbf279
SHA51207149d66d021d9e25608f90fa027c747ece92b14f8db61e67f14c050a67188f222d6332a90fe9c407504c0815911c137e2c8e70e59cc145bd9e74df6de9b8d96
-
Filesize
11KB
MD51aca405aa21d6b3c99f1361251230486
SHA1f45d2ba1a2c15f3ba2891cc4d592f92cb2c23946
SHA2568340df43306c56f726628d32ccea82595e457c0139e3c58e958c15d4a808a23a
SHA512292192f71940ee64a608ff4d2c47266344da421fbd84dfda12693725a88594cd1cc9149c4190963c6ef2cd91c9d7438bbb2f7752c1c97344ed057c78b0469534
-
Filesize
11KB
MD51aca405aa21d6b3c99f1361251230486
SHA1f45d2ba1a2c15f3ba2891cc4d592f92cb2c23946
SHA2568340df43306c56f726628d32ccea82595e457c0139e3c58e958c15d4a808a23a
SHA512292192f71940ee64a608ff4d2c47266344da421fbd84dfda12693725a88594cd1cc9149c4190963c6ef2cd91c9d7438bbb2f7752c1c97344ed057c78b0469534
-
Filesize
1.0MB
MD56d94d2a56022804ff38d21ab281a009c
SHA1a77f8a965bf6354382548f808c2008a123525ea7
SHA256836cc3bc3d6414eeb2160d35da9e87bb893775ab657d199555566eb4d955d099
SHA5127836ea2aed65ad160bf24874813e74861615da33eb9a9dc50294e852bd25b80eda94c83eec8370161d97fdd237db90078d611acf22936f315a4771f38a4b5507
-
Filesize
1.0MB
MD56d94d2a56022804ff38d21ab281a009c
SHA1a77f8a965bf6354382548f808c2008a123525ea7
SHA256836cc3bc3d6414eeb2160d35da9e87bb893775ab657d199555566eb4d955d099
SHA5127836ea2aed65ad160bf24874813e74861615da33eb9a9dc50294e852bd25b80eda94c83eec8370161d97fdd237db90078d611acf22936f315a4771f38a4b5507
-
Filesize
1.0MB
MD56d94d2a56022804ff38d21ab281a009c
SHA1a77f8a965bf6354382548f808c2008a123525ea7
SHA256836cc3bc3d6414eeb2160d35da9e87bb893775ab657d199555566eb4d955d099
SHA5127836ea2aed65ad160bf24874813e74861615da33eb9a9dc50294e852bd25b80eda94c83eec8370161d97fdd237db90078d611acf22936f315a4771f38a4b5507
-
Filesize
1.2MB
MD509257a93db5e9e482b3f3e84519ad437
SHA1e9fec2a85cd5b7600fd3318c5c95de07c041639f
SHA256f34e4550c3586565af50456cc23f9df88920aadf088fecd4e15d384c2153ea34
SHA5126c493052b6ea6363e3e0e41c4dcb79c83c90801d37358a5f9455c2b404e791c32b7d12c809f17140d6e9d16f6cae17ce4c3ff8f3328269c0e37998cae8f02403
-
Filesize
1.2MB
MD509257a93db5e9e482b3f3e84519ad437
SHA1e9fec2a85cd5b7600fd3318c5c95de07c041639f
SHA256f34e4550c3586565af50456cc23f9df88920aadf088fecd4e15d384c2153ea34
SHA5126c493052b6ea6363e3e0e41c4dcb79c83c90801d37358a5f9455c2b404e791c32b7d12c809f17140d6e9d16f6cae17ce4c3ff8f3328269c0e37998cae8f02403
-
Filesize
835KB
MD504e939a13b189294533ebdce997552ea
SHA10a9dfe382133f0814b70a9ae1628f20870a0ed93
SHA2564599eed37d4171551a06241cd92d156b49d31659b67bead011c5043c695135b5
SHA512a94fde2a64e00ce0290634654a51b75ad9f18f60a3fb33a843c08ddf56038ad1c8e664a5e7b625608632c28b3701894ad09749c6ad3c69428aa9b08156d36bf9
-
Filesize
835KB
MD504e939a13b189294533ebdce997552ea
SHA10a9dfe382133f0814b70a9ae1628f20870a0ed93
SHA2564599eed37d4171551a06241cd92d156b49d31659b67bead011c5043c695135b5
SHA512a94fde2a64e00ce0290634654a51b75ad9f18f60a3fb33a843c08ddf56038ad1c8e664a5e7b625608632c28b3701894ad09749c6ad3c69428aa9b08156d36bf9
-
Filesize
475KB
MD5f1a39e08f920abfc959dbd4e44420483
SHA15ce4907a779cd1761f43305cad7dcfcb1b34a5d5
SHA256a0a9e4ae95e098fe25c18f138c184735343a3cb59328724ecbcec349babbf279
SHA51207149d66d021d9e25608f90fa027c747ece92b14f8db61e67f14c050a67188f222d6332a90fe9c407504c0815911c137e2c8e70e59cc145bd9e74df6de9b8d96
-
Filesize
475KB
MD5f1a39e08f920abfc959dbd4e44420483
SHA15ce4907a779cd1761f43305cad7dcfcb1b34a5d5
SHA256a0a9e4ae95e098fe25c18f138c184735343a3cb59328724ecbcec349babbf279
SHA51207149d66d021d9e25608f90fa027c747ece92b14f8db61e67f14c050a67188f222d6332a90fe9c407504c0815911c137e2c8e70e59cc145bd9e74df6de9b8d96
-
Filesize
11KB
MD51aca405aa21d6b3c99f1361251230486
SHA1f45d2ba1a2c15f3ba2891cc4d592f92cb2c23946
SHA2568340df43306c56f726628d32ccea82595e457c0139e3c58e958c15d4a808a23a
SHA512292192f71940ee64a608ff4d2c47266344da421fbd84dfda12693725a88594cd1cc9149c4190963c6ef2cd91c9d7438bbb2f7752c1c97344ed057c78b0469534
-
Filesize
1.0MB
MD56d94d2a56022804ff38d21ab281a009c
SHA1a77f8a965bf6354382548f808c2008a123525ea7
SHA256836cc3bc3d6414eeb2160d35da9e87bb893775ab657d199555566eb4d955d099
SHA5127836ea2aed65ad160bf24874813e74861615da33eb9a9dc50294e852bd25b80eda94c83eec8370161d97fdd237db90078d611acf22936f315a4771f38a4b5507
-
Filesize
1.0MB
MD56d94d2a56022804ff38d21ab281a009c
SHA1a77f8a965bf6354382548f808c2008a123525ea7
SHA256836cc3bc3d6414eeb2160d35da9e87bb893775ab657d199555566eb4d955d099
SHA5127836ea2aed65ad160bf24874813e74861615da33eb9a9dc50294e852bd25b80eda94c83eec8370161d97fdd237db90078d611acf22936f315a4771f38a4b5507
-
Filesize
1.0MB
MD56d94d2a56022804ff38d21ab281a009c
SHA1a77f8a965bf6354382548f808c2008a123525ea7
SHA256836cc3bc3d6414eeb2160d35da9e87bb893775ab657d199555566eb4d955d099
SHA5127836ea2aed65ad160bf24874813e74861615da33eb9a9dc50294e852bd25b80eda94c83eec8370161d97fdd237db90078d611acf22936f315a4771f38a4b5507
-
Filesize
1.0MB
MD56d94d2a56022804ff38d21ab281a009c
SHA1a77f8a965bf6354382548f808c2008a123525ea7
SHA256836cc3bc3d6414eeb2160d35da9e87bb893775ab657d199555566eb4d955d099
SHA5127836ea2aed65ad160bf24874813e74861615da33eb9a9dc50294e852bd25b80eda94c83eec8370161d97fdd237db90078d611acf22936f315a4771f38a4b5507
-
Filesize
1.0MB
MD56d94d2a56022804ff38d21ab281a009c
SHA1a77f8a965bf6354382548f808c2008a123525ea7
SHA256836cc3bc3d6414eeb2160d35da9e87bb893775ab657d199555566eb4d955d099
SHA5127836ea2aed65ad160bf24874813e74861615da33eb9a9dc50294e852bd25b80eda94c83eec8370161d97fdd237db90078d611acf22936f315a4771f38a4b5507
-
Filesize
1.0MB
MD56d94d2a56022804ff38d21ab281a009c
SHA1a77f8a965bf6354382548f808c2008a123525ea7
SHA256836cc3bc3d6414eeb2160d35da9e87bb893775ab657d199555566eb4d955d099
SHA5127836ea2aed65ad160bf24874813e74861615da33eb9a9dc50294e852bd25b80eda94c83eec8370161d97fdd237db90078d611acf22936f315a4771f38a4b5507
-
Filesize
1.0MB
MD56d94d2a56022804ff38d21ab281a009c
SHA1a77f8a965bf6354382548f808c2008a123525ea7
SHA256836cc3bc3d6414eeb2160d35da9e87bb893775ab657d199555566eb4d955d099
SHA5127836ea2aed65ad160bf24874813e74861615da33eb9a9dc50294e852bd25b80eda94c83eec8370161d97fdd237db90078d611acf22936f315a4771f38a4b5507