Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
16-06-2022 08:55
Static task
static1
Behavioral task
behavioral1
Sample
264f0a6d47f8c4578be602be1ea01dd634eace574afd7d44d854431721ffcabf.dll
Resource
win7-20220414-en
General
-
Target
264f0a6d47f8c4578be602be1ea01dd634eace574afd7d44d854431721ffcabf.dll
-
Size
381KB
-
MD5
b17b80898eedfe9d51ac5f8da1b55a08
-
SHA1
1227c764f46482f5e30e5a53433f45cb1a7eabdb
-
SHA256
264f0a6d47f8c4578be602be1ea01dd634eace574afd7d44d854431721ffcabf
-
SHA512
e5afaf0e885efaf44d391bc63c46d97611af1119f5979f0f06ae109afe042af91944cdbd49ed6c84069f262ee8a5882d2450b1fcd929c6b61714665472192750
Malware Config
Signatures
-
Detects PlugX Payload 9 IoCs
resource yara_rule behavioral1/memory/2044-64-0x0000000000190000-0x00000000001BE000-memory.dmp family_plugx behavioral1/memory/1828-81-0x00000000001B0000-0x00000000001DE000-memory.dmp family_plugx behavioral1/memory/1784-80-0x0000000000230000-0x000000000025E000-memory.dmp family_plugx behavioral1/memory/1684-82-0x00000000001C0000-0x00000000001EE000-memory.dmp family_plugx behavioral1/memory/1828-87-0x00000000001B0000-0x00000000001DE000-memory.dmp family_plugx behavioral1/memory/432-88-0x00000000001E0000-0x000000000020E000-memory.dmp family_plugx behavioral1/memory/1784-89-0x0000000000230000-0x000000000025E000-memory.dmp family_plugx behavioral1/memory/1684-90-0x00000000001C0000-0x00000000001EE000-memory.dmp family_plugx behavioral1/memory/432-91-0x00000000001E0000-0x000000000020E000-memory.dmp family_plugx -
suricata: ET MALWARE PlugX CnC Beacon
suricata: ET MALWARE PlugX CnC Beacon
-
suricata: ET MALWARE PlugX/Destory HTTP traffic
suricata: ET MALWARE PlugX/Destory HTTP traffic
-
suricata: ET MALWARE Possible PlugX Common Header Struct
suricata: ET MALWARE Possible PlugX Common Header Struct
-
suricata: ET MALWARE UPDATE Protocol Trojan Communication detected on http ports 2
suricata: ET MALWARE UPDATE Protocol Trojan Communication detected on http ports 2
-
Blocklisted process makes network request 3 IoCs
flow pid Process 16 432 msiexec.exe 18 432 msiexec.exe 19 432 msiexec.exe -
Executes dropped EXE 3 IoCs
pid Process 2044 ktmhelp.exe 1784 ktmhelp.exe 1828 ktmhelp.exe -
Loads dropped DLL 4 IoCs
pid Process 2020 rundll32.exe 2044 ktmhelp.exe 1784 ktmhelp.exe 1828 ktmhelp.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat ktmhelp.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Google\roboform.dll ktmhelp.exe File opened for modification C:\Program Files (x86)\Common Files\Google ktmhelp.exe File opened for modification C:\Program Files (x86)\Common Files\Google\update.log ktmhelp.exe File created C:\Program Files (x86)\Common Files\Google\update.log ktmhelp.exe File opened for modification C:\Program Files (x86)\Common Files\Google\ktmhelp.exe ktmhelp.exe File created C:\Program Files (x86)\Common Files\Google\ktmhelp.exe ktmhelp.exe File opened for modification C:\Program Files (x86)\Common Files\Google\roboform.dll ktmhelp.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 dllhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CENTRALPROCESSOR\0\~MHZ dllhost.exe -
Modifies data under HKEY_USERS 33 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent ktmhelp.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE ktmhelp.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform ktmhelp.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft ktmhelp.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings ktmhelp.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B10DAB59-8895-4277-AF97-B4B0CF2764BD}\WpadDecision = "0" ktmhelp.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" ktmhelp.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B10DAB59-8895-4277-AF97-B4B0CF2764BD}\WpadDecisionReason = "1" ktmhelp.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix ktmhelp.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4e-7e-bd-7c-2f-46\WpadDecisionTime = d0d91abd7281d801 ktmhelp.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows ktmhelp.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 ktmhelp.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B10DAB59-8895-4277-AF97-B4B0CF2764BD} ktmhelp.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B10DAB59-8895-4277-AF97-B4B0CF2764BD}\WpadDecisionTime = d0d91abd7281d801 ktmhelp.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4e-7e-bd-7c-2f-46\WpadDecision = "0" ktmhelp.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" ktmhelp.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 ktmhelp.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" ktmhelp.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0094000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 ktmhelp.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4e-7e-bd-7c-2f-46 ktmhelp.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform ktmhelp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings ktmhelp.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" ktmhelp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad ktmhelp.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" ktmhelp.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B10DAB59-8895-4277-AF97-B4B0CF2764BD}\4e-7e-bd-7c-2f-46 ktmhelp.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4e-7e-bd-7c-2f-46\WpadDecisionReason = "1" ktmhelp.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion ktmhelp.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0 ktmhelp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ktmhelp.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{B10DAB59-8895-4277-AF97-B4B0CF2764BD}\WpadNetworkName = "Network 3" ktmhelp.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent ktmhelp.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections ktmhelp.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\FAST ktmhelp.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FAST\CLSID = 41003000450043003700360033004200360045004300350042003300320037000000 ktmhelp.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1684 dllhost.exe 432 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2044 ktmhelp.exe 2044 ktmhelp.exe 1684 dllhost.exe 1684 dllhost.exe 1684 dllhost.exe 1684 dllhost.exe 432 msiexec.exe 432 msiexec.exe 1784 ktmhelp.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 1684 dllhost.exe 1684 dllhost.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 1684 dllhost.exe 1684 dllhost.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 1684 dllhost.exe 1684 dllhost.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 1684 dllhost.exe 1684 dllhost.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 1684 dllhost.exe 1684 dllhost.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 1684 dllhost.exe 1684 dllhost.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe 432 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2044 ktmhelp.exe Token: SeTcbPrivilege 2044 ktmhelp.exe Token: SeDebugPrivilege 1784 ktmhelp.exe Token: SeTcbPrivilege 1784 ktmhelp.exe Token: SeDebugPrivilege 1828 ktmhelp.exe Token: SeTcbPrivilege 1828 ktmhelp.exe Token: SeDebugPrivilege 1684 dllhost.exe Token: SeTcbPrivilege 1684 dllhost.exe Token: SeDebugPrivilege 432 msiexec.exe Token: SeTcbPrivilege 432 msiexec.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2020 2008 rundll32.exe 27 PID 2008 wrote to memory of 2020 2008 rundll32.exe 27 PID 2008 wrote to memory of 2020 2008 rundll32.exe 27 PID 2008 wrote to memory of 2020 2008 rundll32.exe 27 PID 2008 wrote to memory of 2020 2008 rundll32.exe 27 PID 2008 wrote to memory of 2020 2008 rundll32.exe 27 PID 2008 wrote to memory of 2020 2008 rundll32.exe 27 PID 2020 wrote to memory of 2044 2020 rundll32.exe 28 PID 2020 wrote to memory of 2044 2020 rundll32.exe 28 PID 2020 wrote to memory of 2044 2020 rundll32.exe 28 PID 2020 wrote to memory of 2044 2020 rundll32.exe 28 PID 1828 wrote to memory of 1684 1828 ktmhelp.exe 32 PID 1828 wrote to memory of 1684 1828 ktmhelp.exe 32 PID 1828 wrote to memory of 1684 1828 ktmhelp.exe 32 PID 1828 wrote to memory of 1684 1828 ktmhelp.exe 32 PID 1828 wrote to memory of 1684 1828 ktmhelp.exe 32 PID 1828 wrote to memory of 1684 1828 ktmhelp.exe 32 PID 1828 wrote to memory of 1684 1828 ktmhelp.exe 32 PID 1828 wrote to memory of 1684 1828 ktmhelp.exe 32 PID 1828 wrote to memory of 1684 1828 ktmhelp.exe 32 PID 1684 wrote to memory of 432 1684 dllhost.exe 33 PID 1684 wrote to memory of 432 1684 dllhost.exe 33 PID 1684 wrote to memory of 432 1684 dllhost.exe 33 PID 1684 wrote to memory of 432 1684 dllhost.exe 33 PID 1684 wrote to memory of 432 1684 dllhost.exe 33 PID 1684 wrote to memory of 432 1684 dllhost.exe 33 PID 1684 wrote to memory of 432 1684 dllhost.exe 33 PID 1684 wrote to memory of 432 1684 dllhost.exe 33 PID 1684 wrote to memory of 432 1684 dllhost.exe 33 PID 1684 wrote to memory of 432 1684 dllhost.exe 33 PID 1684 wrote to memory of 432 1684 dllhost.exe 33 PID 1684 wrote to memory of 432 1684 dllhost.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\264f0a6d47f8c4578be602be1ea01dd634eace574afd7d44d854431721ffcabf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\264f0a6d47f8c4578be602be1ea01dd634eace574afd7d44d854431721ffcabf.dll,#12⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\OUT\ktmhelp.exeC:\Users\Admin\AppData\Local\Temp\OUT\ktmhelp.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
-
C:\Program Files (x86)\Common Files\Google\ktmhelp.exe"C:\Program Files (x86)\Common Files\Google\ktmhelp.exe" 100 20441⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
C:\Program Files (x86)\Common Files\Google\ktmhelp.exe"C:\Program Files (x86)\Common Files\Google\ktmhelp.exe" 200 01⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\dllhost.exeC:\Windows\system32\dllhost.exe 201 02⤵
- Checks processor information in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\system32\msiexec.exe 209 16843⤵
- Blocklisted process makes network request
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD5ee1887696c8445caaaad13bdb39d5dba
SHA1bc09e8530d2497befaeacbf4d50022181ffc59cc
SHA2562e1c2572e5e584ecfb00afcaa677c97b6c477c376da4f0169a72f8be7f9b426b
SHA51294ce672d12e1de85deebd1362b7195a2365785689f00f63ba5240a3f81ba62409c973691713751468716fe8a502ca6dc8d7114da38d8b522d16f4ad027e013db
-
Filesize
96KB
MD50ba73a0db3913ba14be521f82c1b2c6c
SHA115920f9b5c190b70f927d18fa9d03793cb1f6332
SHA256212a8859adb7a74beb51a9faac6df60edafb645f936d4b1af95d15265325d62f
SHA51251472b924efea3d86607b17431829b3719ed7e1d153e09eb227b70f811d1db45880d0f195324afe3a418b62029a44c234011f3ad5e656c48e2920481a8fcc37a
-
Filesize
96KB
MD50ba73a0db3913ba14be521f82c1b2c6c
SHA115920f9b5c190b70f927d18fa9d03793cb1f6332
SHA256212a8859adb7a74beb51a9faac6df60edafb645f936d4b1af95d15265325d62f
SHA51251472b924efea3d86607b17431829b3719ed7e1d153e09eb227b70f811d1db45880d0f195324afe3a418b62029a44c234011f3ad5e656c48e2920481a8fcc37a
-
Filesize
115KB
MD5fc34d2fd567e8d1815d8d67cbbb4b32e
SHA10e83054a19f683ccea20b6ee48726030ef550b36
SHA25659ac056c4174c3065b8ca01ebcbb8b4c0c93b0a4f2f16de75de89865915bd6d8
SHA512f968bebfd09bbba63480ae1c84fe77dce8890d447d211fbfa54ab61933ff75ed79a18088d3835888061dbe7c154d435ecb1ef5d881cc3d9c097b71475bf37257
-
Filesize
74KB
MD5ee1887696c8445caaaad13bdb39d5dba
SHA1bc09e8530d2497befaeacbf4d50022181ffc59cc
SHA2562e1c2572e5e584ecfb00afcaa677c97b6c477c376da4f0169a72f8be7f9b426b
SHA51294ce672d12e1de85deebd1362b7195a2365785689f00f63ba5240a3f81ba62409c973691713751468716fe8a502ca6dc8d7114da38d8b522d16f4ad027e013db
-
Filesize
96KB
MD50ba73a0db3913ba14be521f82c1b2c6c
SHA115920f9b5c190b70f927d18fa9d03793cb1f6332
SHA256212a8859adb7a74beb51a9faac6df60edafb645f936d4b1af95d15265325d62f
SHA51251472b924efea3d86607b17431829b3719ed7e1d153e09eb227b70f811d1db45880d0f195324afe3a418b62029a44c234011f3ad5e656c48e2920481a8fcc37a
-
Filesize
96KB
MD50ba73a0db3913ba14be521f82c1b2c6c
SHA115920f9b5c190b70f927d18fa9d03793cb1f6332
SHA256212a8859adb7a74beb51a9faac6df60edafb645f936d4b1af95d15265325d62f
SHA51251472b924efea3d86607b17431829b3719ed7e1d153e09eb227b70f811d1db45880d0f195324afe3a418b62029a44c234011f3ad5e656c48e2920481a8fcc37a
-
Filesize
115KB
MD5fc34d2fd567e8d1815d8d67cbbb4b32e
SHA10e83054a19f683ccea20b6ee48726030ef550b36
SHA25659ac056c4174c3065b8ca01ebcbb8b4c0c93b0a4f2f16de75de89865915bd6d8
SHA512f968bebfd09bbba63480ae1c84fe77dce8890d447d211fbfa54ab61933ff75ed79a18088d3835888061dbe7c154d435ecb1ef5d881cc3d9c097b71475bf37257
-
Filesize
74KB
MD5ee1887696c8445caaaad13bdb39d5dba
SHA1bc09e8530d2497befaeacbf4d50022181ffc59cc
SHA2562e1c2572e5e584ecfb00afcaa677c97b6c477c376da4f0169a72f8be7f9b426b
SHA51294ce672d12e1de85deebd1362b7195a2365785689f00f63ba5240a3f81ba62409c973691713751468716fe8a502ca6dc8d7114da38d8b522d16f4ad027e013db
-
Filesize
74KB
MD5ee1887696c8445caaaad13bdb39d5dba
SHA1bc09e8530d2497befaeacbf4d50022181ffc59cc
SHA2562e1c2572e5e584ecfb00afcaa677c97b6c477c376da4f0169a72f8be7f9b426b
SHA51294ce672d12e1de85deebd1362b7195a2365785689f00f63ba5240a3f81ba62409c973691713751468716fe8a502ca6dc8d7114da38d8b522d16f4ad027e013db
-
Filesize
96KB
MD50ba73a0db3913ba14be521f82c1b2c6c
SHA115920f9b5c190b70f927d18fa9d03793cb1f6332
SHA256212a8859adb7a74beb51a9faac6df60edafb645f936d4b1af95d15265325d62f
SHA51251472b924efea3d86607b17431829b3719ed7e1d153e09eb227b70f811d1db45880d0f195324afe3a418b62029a44c234011f3ad5e656c48e2920481a8fcc37a
-
Filesize
74KB
MD5ee1887696c8445caaaad13bdb39d5dba
SHA1bc09e8530d2497befaeacbf4d50022181ffc59cc
SHA2562e1c2572e5e584ecfb00afcaa677c97b6c477c376da4f0169a72f8be7f9b426b
SHA51294ce672d12e1de85deebd1362b7195a2365785689f00f63ba5240a3f81ba62409c973691713751468716fe8a502ca6dc8d7114da38d8b522d16f4ad027e013db