Overview
overview
10Static
static
10Bunifu.Licensing.dll
windows10-2004-x64
1Bunifu.UI.....3.dll
windows10-2004-x64
1Bunifu.UI....on.dll
windows10-2004-x64
1Bunifu.UI....ox.dll
windows10-2004-x64
1Bunifu.UI....ss.dll
windows10-2004-x64
1Bunifu.UI....on.dll
windows10-2004-x64
1Bunifu.UI....ew.dll
windows10-2004-x64
1Bunifu.UI....er.dll
windows10-2004-x64
1Bunifu.UI....wn.dll
windows10-2004-x64
1Bunifu.UI....ck.dll
windows10-2004-x64
1Bunifu.UI....ge.dll
windows10-2004-x64
1Bunifu.UI....el.dll
windows10-2004-x64
1Bunifu.UI....ox.dll
windows10-2004-x64
1Bunifu.UI....on.dll
windows10-2004-x64
1Bunifu.UI....el.dll
windows10-2004-x64
1Bunifu.UI....es.dll
windows10-2004-x64
1Bunifu.UI....el.dll
windows10-2004-x64
1Bunifu.UI....ox.dll
windows10-2004-x64
1Bunifu.UI....ar.dll
windows10-2004-x64
1Bunifu.UI....on.dll
windows10-2004-x64
1Bunifu.UI....ng.dll
windows10-2004-x64
1Bunifu.UI....ar.dll
windows10-2004-x64
1Bunifu.UI....or.dll
windows10-2004-x64
1Bunifu.UI....el.dll
windows10-2004-x64
1Bunifu.UI....es.dll
windows10-2004-x64
1Bunifu.UI....er.dll
windows10-2004-x64
1Bunifu.UI....ar.dll
windows10-2004-x64
1Bunifu.UI....ox.dll
windows10-2004-x64
1Bunifu.UI....ch.dll
windows10-2004-x64
1Bunifu.UI....ip.dll
windows10-2004-x64
1Bunifu.UI....on.dll
windows10-2004-x64
1Bunifu.UI....ol.dll
windows10-2004-x64
1Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2024 16:45
Behavioral task
behavioral1
Sample
Bunifu.Licensing.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
Bunifu.UI.WinForms.1.5.3.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
Bunifu.UI.WinForms.BunifuButton.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral4
Sample
Bunifu.UI.WinForms.BunifuCheckBox.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Bunifu.UI.WinForms.BunifuCircleProgress.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral6
Sample
Bunifu.UI.WinForms.BunifuColorTransition.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Bunifu.UI.WinForms.BunifuDataGridView.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral8
Sample
Bunifu.UI.WinForms.BunifuDatePicker.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
Bunifu.UI.WinForms.BunifuDropdown.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral10
Sample
Bunifu.UI.WinForms.BunifuFormDock.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
Bunifu.UI.WinForms.BunifuGauge.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral12
Sample
Bunifu.UI.WinForms.BunifuGradientPanel.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
Bunifu.UI.WinForms.BunifuGroupBox.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral14
Sample
Bunifu.UI.WinForms.BunifuImageButton.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
Bunifu.UI.WinForms.BunifuLabel.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral16
Sample
Bunifu.UI.WinForms.BunifuPages.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
Bunifu.UI.WinForms.BunifuPanel.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral18
Sample
Bunifu.UI.WinForms.BunifuPictureBox.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
Bunifu.UI.WinForms.BunifuProgressBar.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral20
Sample
Bunifu.UI.WinForms.BunifuRadioButton.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
Bunifu.UI.WinForms.BunifuRating.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral22
Sample
Bunifu.UI.WinForms.BunifuScrollBar.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral23
Sample
Bunifu.UI.WinForms.BunifuSeparator.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral24
Sample
Bunifu.UI.WinForms.BunifuShadowPanel.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
Bunifu.UI.WinForms.BunifuShapes.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral26
Sample
Bunifu.UI.WinForms.BunifuSlider.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
Bunifu.UI.WinForms.BunifuSnackbar.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral28
Sample
Bunifu.UI.WinForms.BunifuTextBox.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
Bunifu.UI.WinForms.BunifuToggleSwitch.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral30
Sample
Bunifu.UI.WinForms.BunifuToolTip.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
Bunifu.UI.WinForms.BunifuTransition.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral32
Sample
Bunifu.UI.WinForms.BunifuUserControl.dll
Resource
win10v2004-20231215-en
General
-
Target
Bunifu.Licensing.dll
-
Size
1.3MB
-
MD5
2b2740e0c34a46de31cf9da8a75d77cf
-
SHA1
242324f1112e6387cda41686291b6e9a415eeb8c
-
SHA256
a9be91cae167702885a5ca74273db779e3e391e2e604cc03779ed403c53ebe43
-
SHA512
605eb300b159e6ed2ee872b6ee378eed7dde6541000221fcd94d52057be91cb3c7dd65c7203f05e0718303b157b6fb941498b5e653501f97f0417d459da6bc40
-
SSDEEP
24576:ebkurkdR5uuMeiPUf2lHmdpjrcbYdwcqMw5LTvBrq/WGs1xGUfGUCco:a1roD9MeiUDDjrW4bqD5LDBrqWG0GUfX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 932 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3920 chrome.exe 3920 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 932 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe Token: SeShutdownPrivilege 3920 chrome.exe Token: SeCreatePagefilePrivilege 3920 chrome.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
pid Process 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe -
Suspicious use of SendNotifyMessage 45 IoCs
pid Process 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 3920 chrome.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe 932 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 932 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3920 wrote to memory of 4528 3920 chrome.exe 99 PID 3920 wrote to memory of 4528 3920 chrome.exe 99 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 628 3920 chrome.exe 102 PID 3920 wrote to memory of 4832 3920 chrome.exe 101 PID 3920 wrote to memory of 4832 3920 chrome.exe 101 PID 3920 wrote to memory of 4564 3920 chrome.exe 100 PID 3920 wrote to memory of 4564 3920 chrome.exe 100 PID 3920 wrote to memory of 4564 3920 chrome.exe 100 PID 3920 wrote to memory of 4564 3920 chrome.exe 100 PID 3920 wrote to memory of 4564 3920 chrome.exe 100 PID 3920 wrote to memory of 4564 3920 chrome.exe 100 PID 3920 wrote to memory of 4564 3920 chrome.exe 100 PID 3920 wrote to memory of 4564 3920 chrome.exe 100 PID 3920 wrote to memory of 4564 3920 chrome.exe 100 PID 3920 wrote to memory of 4564 3920 chrome.exe 100 PID 3920 wrote to memory of 4564 3920 chrome.exe 100 PID 3920 wrote to memory of 4564 3920 chrome.exe 100 PID 3920 wrote to memory of 4564 3920 chrome.exe 100 PID 3920 wrote to memory of 4564 3920 chrome.exe 100 PID 3920 wrote to memory of 4564 3920 chrome.exe 100 PID 3920 wrote to memory of 4564 3920 chrome.exe 100 PID 3920 wrote to memory of 4564 3920 chrome.exe 100 PID 3920 wrote to memory of 4564 3920 chrome.exe 100 PID 3920 wrote to memory of 4564 3920 chrome.exe 100 PID 3920 wrote to memory of 4564 3920 chrome.exe 100 PID 3920 wrote to memory of 4564 3920 chrome.exe 100 PID 3920 wrote to memory of 4564 3920 chrome.exe 100
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Bunifu.Licensing.dll,#11⤵PID:2768
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0x104,0x128,0x7ffa64459758,0x7ffa64459768,0x7ffa644597782⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2264 --field-trial-handle=1796,i,14022289193706448675,14878345693611847293,131072 /prefetch:82⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 --field-trial-handle=1796,i,14022289193706448675,14878345693611847293,131072 /prefetch:82⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1796,i,14022289193706448675,14878345693611847293,131072 /prefetch:22⤵PID:628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3116 --field-trial-handle=1796,i,14022289193706448675,14878345693611847293,131072 /prefetch:12⤵PID:372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1796,i,14022289193706448675,14878345693611847293,131072 /prefetch:12⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4664 --field-trial-handle=1796,i,14022289193706448675,14878345693611847293,131072 /prefetch:12⤵PID:1260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4844 --field-trial-handle=1796,i,14022289193706448675,14878345693611847293,131072 /prefetch:82⤵PID:1556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4988 --field-trial-handle=1796,i,14022289193706448675,14878345693611847293,131072 /prefetch:82⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3768
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\UninstallUndo.TTS"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5ed8ed2fae0ca393622bbbdb014ce2a5c
SHA1b203b0c9611c5964f67fd679dffaa3365de04945
SHA256d31ae3bc06fe97299e87c3f8b838e17c4eb127362c6e80abd558242dda4b3a8a
SHA512a091309003ac278fdb0181c5b7c531222cd263fe9a3d7da55b243787bc2df6dbb79766947fc7a9906c90cb658c58d758de5830b38570343283c78b709a564382
-
Filesize
371B
MD5b44311ecdc0a7cd285c045cf9afcb36a
SHA1d2aefbc657422ce99b17b46a630b71b380f276af
SHA2564d638540dee58a55a0091c19cc6c3e2309f18511dff69254a52d994ecbaa51c1
SHA51233da73cf3cfd15b55c53bd3113ea3325e060920e7e31f7c6fc3daab6903b394e48e6f798753c8ea461361e80fec9d2705d2c7c37cff372fef17b4443c7a28756
-
Filesize
6KB
MD56f8ba3090e9c5ab3dafa8882b4776479
SHA18ff9d027ab6dff4890a00ba19a31caaa836fc68c
SHA25606bb039aa961f74b41592fd8b60678069ed22dcebbb917193596d7f905b84616
SHA512324b0d471120d6ac82a8fea0ef8dc87d9025c8df64492f96097607aaac4c57d3e9c8125bf7b9396156a6685ffe47ee6a09a937a8263778d9b6aedfbc497091cd
-
Filesize
232KB
MD5ae6814819e0b0fd625bac8486a8501da
SHA15008f8e2dbd23793a09d8c5ac1c4c97a04622415
SHA256596a54c8f647757691b9c396280b2202907b97a04a2e640f96ea53f910e0df3a
SHA512329ac7c93dda11e3b5dc33ec0db22f85f5d0690a048889c2454961bd320c82e7c380315ebac71f1791fa0f763557280ac92b9513a21f95138ce14a9ab675bd3d
-
Filesize
78B
MD583f18b8068f4e30a1eb35747bb33181d
SHA1a3fe10ac984caa11627bb1d3524b7a1e5b42de5f
SHA2560d39fb9f09bef1afa293bad4834d4da4000d2087265e9f719d0acd910310aa2e
SHA5127637586539514bd4904f2bd3ab4d45d4317dd350cf3c01695825882d36329f3128cbaa2cdd323a66214dc6a3d79fb5d7f91445535a08097c66b0500d802c3a0c