Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 20:45
Static task
static1
Behavioral task
behavioral1
Sample
38381aa1b897a8c4533a83fd5bfc60fdc9a839b568a26033649005dfc164ad75.exe
Resource
win7-20220414-en
General
-
Target
38381aa1b897a8c4533a83fd5bfc60fdc9a839b568a26033649005dfc164ad75.exe
-
Size
314KB
-
MD5
b83ea939e613dd56cb93f4917e7d9d50
-
SHA1
121f18843dc6fe8779247ab0a931bd6840c67436
-
SHA256
38381aa1b897a8c4533a83fd5bfc60fdc9a839b568a26033649005dfc164ad75
-
SHA512
3ab8a22f6c6ca34dbd59b4ff37e4ee46cc607a5d1321cfbf263fbc17c6c670188feface18aa1729808911c6dee7013d36c90f4522f71f7a534d16ed2fb96e229
Malware Config
Signatures
-
Detects PlugX Payload 9 IoCs
resource yara_rule behavioral1/memory/908-66-0x0000000000350000-0x0000000000380000-memory.dmp family_plugx behavioral1/memory/1008-74-0x0000000000680000-0x00000000006B0000-memory.dmp family_plugx behavioral1/memory/908-75-0x0000000000350000-0x0000000000380000-memory.dmp family_plugx behavioral1/memory/1680-84-0x00000000007F0000-0x0000000000820000-memory.dmp family_plugx behavioral1/memory/1600-85-0x0000000000210000-0x0000000000240000-memory.dmp family_plugx behavioral1/memory/1008-86-0x0000000000680000-0x00000000006B0000-memory.dmp family_plugx behavioral1/memory/692-91-0x0000000000280000-0x00000000002B0000-memory.dmp family_plugx behavioral1/memory/1600-92-0x0000000000210000-0x0000000000240000-memory.dmp family_plugx behavioral1/memory/692-93-0x0000000000280000-0x00000000002B0000-memory.dmp family_plugx -
Executes dropped EXE 3 IoCs
pid Process 908 QQBrowserUpdateService.exe 1008 QQBrowserUpdateService.exe 1680 QQBrowserUpdateService.exe -
Deletes itself 1 IoCs
pid Process 908 QQBrowserUpdateService.exe -
Loads dropped DLL 7 IoCs
pid Process 1380 38381aa1b897a8c4533a83fd5bfc60fdc9a839b568a26033649005dfc164ad75.exe 1380 38381aa1b897a8c4533a83fd5bfc60fdc9a839b568a26033649005dfc164ad75.exe 1380 38381aa1b897a8c4533a83fd5bfc60fdc9a839b568a26033649005dfc164ad75.exe 1380 38381aa1b897a8c4533a83fd5bfc60fdc9a839b568a26033649005dfc164ad75.exe 908 QQBrowserUpdateService.exe 1008 QQBrowserUpdateService.exe 1680 QQBrowserUpdateService.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 33 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\62-be-27-1e-f8-7a\WpadDecision = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6F03467A-F5C4-4683-B8E7-6E3DCE6855C5}\WpadDecisionTime = f0baf9d2ed88d801 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6F03467A-F5C4-4683-B8E7-6E3DCE6855C5}\WpadDecision = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6F03467A-F5C4-4683-B8E7-6E3DCE6855C5}\WpadDecisionReason = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6F03467A-F5C4-4683-B8E7-6E3DCE6855C5}\WpadNetworkName = "Network 3" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\62-be-27-1e-f8-7a\WpadDecisionReason = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f009a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6F03467A-F5C4-4683-B8E7-6E3DCE6855C5}\62-be-27-1e-f8-7a svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\62-be-27-1e-f8-7a svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\62-be-27-1e-f8-7a\WpadDecisionTime = f0baf9d2ed88d801 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6F03467A-F5C4-4683-B8E7-6E3DCE6855C5} svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\FAST svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FAST\CLSID = 38003600300046003400350032003800330039003100350033004600420030000000 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 908 QQBrowserUpdateService.exe 1600 svchost.exe 1600 svchost.exe 1600 svchost.exe 1600 svchost.exe 692 msiexec.exe 692 msiexec.exe 1600 svchost.exe 1600 svchost.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 1600 svchost.exe 1600 svchost.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 1600 svchost.exe 1600 svchost.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 1600 svchost.exe 1600 svchost.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 1600 svchost.exe 1600 svchost.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 1600 svchost.exe 1600 svchost.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe 1600 svchost.exe 1600 svchost.exe 692 msiexec.exe 692 msiexec.exe 692 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 908 QQBrowserUpdateService.exe Token: SeTcbPrivilege 908 QQBrowserUpdateService.exe Token: SeDebugPrivilege 1008 QQBrowserUpdateService.exe Token: SeTcbPrivilege 1008 QQBrowserUpdateService.exe Token: SeDebugPrivilege 1680 QQBrowserUpdateService.exe Token: SeTcbPrivilege 1680 QQBrowserUpdateService.exe Token: SeDebugPrivilege 1600 svchost.exe Token: SeTcbPrivilege 1600 svchost.exe Token: SeDebugPrivilege 692 msiexec.exe Token: SeTcbPrivilege 692 msiexec.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1380 wrote to memory of 908 1380 38381aa1b897a8c4533a83fd5bfc60fdc9a839b568a26033649005dfc164ad75.exe 28 PID 1380 wrote to memory of 908 1380 38381aa1b897a8c4533a83fd5bfc60fdc9a839b568a26033649005dfc164ad75.exe 28 PID 1380 wrote to memory of 908 1380 38381aa1b897a8c4533a83fd5bfc60fdc9a839b568a26033649005dfc164ad75.exe 28 PID 1380 wrote to memory of 908 1380 38381aa1b897a8c4533a83fd5bfc60fdc9a839b568a26033649005dfc164ad75.exe 28 PID 1380 wrote to memory of 908 1380 38381aa1b897a8c4533a83fd5bfc60fdc9a839b568a26033649005dfc164ad75.exe 28 PID 1380 wrote to memory of 908 1380 38381aa1b897a8c4533a83fd5bfc60fdc9a839b568a26033649005dfc164ad75.exe 28 PID 1380 wrote to memory of 908 1380 38381aa1b897a8c4533a83fd5bfc60fdc9a839b568a26033649005dfc164ad75.exe 28 PID 1680 wrote to memory of 1600 1680 QQBrowserUpdateService.exe 32 PID 1680 wrote to memory of 1600 1680 QQBrowserUpdateService.exe 32 PID 1680 wrote to memory of 1600 1680 QQBrowserUpdateService.exe 32 PID 1680 wrote to memory of 1600 1680 QQBrowserUpdateService.exe 32 PID 1680 wrote to memory of 1600 1680 QQBrowserUpdateService.exe 32 PID 1680 wrote to memory of 1600 1680 QQBrowserUpdateService.exe 32 PID 1680 wrote to memory of 1600 1680 QQBrowserUpdateService.exe 32 PID 1680 wrote to memory of 1600 1680 QQBrowserUpdateService.exe 32 PID 1680 wrote to memory of 1600 1680 QQBrowserUpdateService.exe 32 PID 1600 wrote to memory of 692 1600 svchost.exe 33 PID 1600 wrote to memory of 692 1600 svchost.exe 33 PID 1600 wrote to memory of 692 1600 svchost.exe 33 PID 1600 wrote to memory of 692 1600 svchost.exe 33 PID 1600 wrote to memory of 692 1600 svchost.exe 33 PID 1600 wrote to memory of 692 1600 svchost.exe 33 PID 1600 wrote to memory of 692 1600 svchost.exe 33 PID 1600 wrote to memory of 692 1600 svchost.exe 33 PID 1600 wrote to memory of 692 1600 svchost.exe 33 PID 1600 wrote to memory of 692 1600 svchost.exe 33 PID 1600 wrote to memory of 692 1600 svchost.exe 33 PID 1600 wrote to memory of 692 1600 svchost.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\38381aa1b897a8c4533a83fd5bfc60fdc9a839b568a26033649005dfc164ad75.exe"C:\Users\Admin\AppData\Local\Temp\38381aa1b897a8c4533a83fd5bfc60fdc9a839b568a26033649005dfc164ad75.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\QQBrowserUpdateService.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\QQBrowserUpdateService.exe"2⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:908
-
-
C:\ProgramData\QQUpdater\QQBrowserUpdateService.exe"C:\ProgramData\QQUpdater\QQBrowserUpdateService.exe" 100 9081⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1008
-
C:\ProgramData\QQUpdater\QQBrowserUpdateService.exe"C:\ProgramData\QQUpdater\QQBrowserUpdateService.exe" 200 01⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe 201 02⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\system32\msiexec.exe 209 16003⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:692
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120KB
MD5768fb7e913b66701a20cdea2abc7f884
SHA110e8ddf7333109b430ccaeb87ae644051d120f5e
SHA25692812f4d34aca0bd7c7e2f67abd2c1813546f2826ec3380fc45a5ea0822ea76b
SHA51219c261f9b6508288f0e88d1b9f6385d3393bcb92d6a31c521ea6a22955f17d02b9e1dc690812bdaa9a3ad84ba9929a5732529b78b0f6df560bca573170a23290
-
Filesize
204KB
MD5bf8c7b6e88a049fda4ebd7407488aca6
SHA18b889494f25aafcef5e92b6cc7b2e0e0e217e60a
SHA25628e0bafc9b20c4a5104d558a36600098429e8ac779a46e52a28edd432e6457e2
SHA51235a72a887e4389bf7faa5ebe712d569301d03678816b2631712138628f03dd26430682a2ec656ae7167c19314f8c6dc162993789bdb0b3eca298f95c3f27da08
-
Filesize
204KB
MD5bf8c7b6e88a049fda4ebd7407488aca6
SHA18b889494f25aafcef5e92b6cc7b2e0e0e217e60a
SHA25628e0bafc9b20c4a5104d558a36600098429e8ac779a46e52a28edd432e6457e2
SHA51235a72a887e4389bf7faa5ebe712d569301d03678816b2631712138628f03dd26430682a2ec656ae7167c19314f8c6dc162993789bdb0b3eca298f95c3f27da08
-
Filesize
8KB
MD52ab8934a0133f1cf3122b1bbab6de846
SHA14e0db9d32f99d724fdaa56d18e9fad687333f18a
SHA256462713911bac73ee904afab28d19f366b6b125ca7656144142654892319259fc
SHA512164075833213b164b722854252f5349fdae8cb9ba80028fde7670f5bb90b9dae34befd4e32ffc1cd11ae6cbad3fc3176e77a3a85cdf1583c73153387d6d831c5
-
Filesize
120KB
MD5768fb7e913b66701a20cdea2abc7f884
SHA110e8ddf7333109b430ccaeb87ae644051d120f5e
SHA25692812f4d34aca0bd7c7e2f67abd2c1813546f2826ec3380fc45a5ea0822ea76b
SHA51219c261f9b6508288f0e88d1b9f6385d3393bcb92d6a31c521ea6a22955f17d02b9e1dc690812bdaa9a3ad84ba9929a5732529b78b0f6df560bca573170a23290
-
Filesize
204KB
MD5bf8c7b6e88a049fda4ebd7407488aca6
SHA18b889494f25aafcef5e92b6cc7b2e0e0e217e60a
SHA25628e0bafc9b20c4a5104d558a36600098429e8ac779a46e52a28edd432e6457e2
SHA51235a72a887e4389bf7faa5ebe712d569301d03678816b2631712138628f03dd26430682a2ec656ae7167c19314f8c6dc162993789bdb0b3eca298f95c3f27da08
-
Filesize
204KB
MD5bf8c7b6e88a049fda4ebd7407488aca6
SHA18b889494f25aafcef5e92b6cc7b2e0e0e217e60a
SHA25628e0bafc9b20c4a5104d558a36600098429e8ac779a46e52a28edd432e6457e2
SHA51235a72a887e4389bf7faa5ebe712d569301d03678816b2631712138628f03dd26430682a2ec656ae7167c19314f8c6dc162993789bdb0b3eca298f95c3f27da08
-
Filesize
8KB
MD52ab8934a0133f1cf3122b1bbab6de846
SHA14e0db9d32f99d724fdaa56d18e9fad687333f18a
SHA256462713911bac73ee904afab28d19f366b6b125ca7656144142654892319259fc
SHA512164075833213b164b722854252f5349fdae8cb9ba80028fde7670f5bb90b9dae34befd4e32ffc1cd11ae6cbad3fc3176e77a3a85cdf1583c73153387d6d831c5
-
Filesize
8KB
MD52ab8934a0133f1cf3122b1bbab6de846
SHA14e0db9d32f99d724fdaa56d18e9fad687333f18a
SHA256462713911bac73ee904afab28d19f366b6b125ca7656144142654892319259fc
SHA512164075833213b164b722854252f5349fdae8cb9ba80028fde7670f5bb90b9dae34befd4e32ffc1cd11ae6cbad3fc3176e77a3a85cdf1583c73153387d6d831c5
-
Filesize
8KB
MD52ab8934a0133f1cf3122b1bbab6de846
SHA14e0db9d32f99d724fdaa56d18e9fad687333f18a
SHA256462713911bac73ee904afab28d19f366b6b125ca7656144142654892319259fc
SHA512164075833213b164b722854252f5349fdae8cb9ba80028fde7670f5bb90b9dae34befd4e32ffc1cd11ae6cbad3fc3176e77a3a85cdf1583c73153387d6d831c5
-
Filesize
8KB
MD52ab8934a0133f1cf3122b1bbab6de846
SHA14e0db9d32f99d724fdaa56d18e9fad687333f18a
SHA256462713911bac73ee904afab28d19f366b6b125ca7656144142654892319259fc
SHA512164075833213b164b722854252f5349fdae8cb9ba80028fde7670f5bb90b9dae34befd4e32ffc1cd11ae6cbad3fc3176e77a3a85cdf1583c73153387d6d831c5
-
Filesize
204KB
MD5bf8c7b6e88a049fda4ebd7407488aca6
SHA18b889494f25aafcef5e92b6cc7b2e0e0e217e60a
SHA25628e0bafc9b20c4a5104d558a36600098429e8ac779a46e52a28edd432e6457e2
SHA51235a72a887e4389bf7faa5ebe712d569301d03678816b2631712138628f03dd26430682a2ec656ae7167c19314f8c6dc162993789bdb0b3eca298f95c3f27da08
-
Filesize
204KB
MD5bf8c7b6e88a049fda4ebd7407488aca6
SHA18b889494f25aafcef5e92b6cc7b2e0e0e217e60a
SHA25628e0bafc9b20c4a5104d558a36600098429e8ac779a46e52a28edd432e6457e2
SHA51235a72a887e4389bf7faa5ebe712d569301d03678816b2631712138628f03dd26430682a2ec656ae7167c19314f8c6dc162993789bdb0b3eca298f95c3f27da08
-
Filesize
204KB
MD5bf8c7b6e88a049fda4ebd7407488aca6
SHA18b889494f25aafcef5e92b6cc7b2e0e0e217e60a
SHA25628e0bafc9b20c4a5104d558a36600098429e8ac779a46e52a28edd432e6457e2
SHA51235a72a887e4389bf7faa5ebe712d569301d03678816b2631712138628f03dd26430682a2ec656ae7167c19314f8c6dc162993789bdb0b3eca298f95c3f27da08
-
Filesize
204KB
MD5bf8c7b6e88a049fda4ebd7407488aca6
SHA18b889494f25aafcef5e92b6cc7b2e0e0e217e60a
SHA25628e0bafc9b20c4a5104d558a36600098429e8ac779a46e52a28edd432e6457e2
SHA51235a72a887e4389bf7faa5ebe712d569301d03678816b2631712138628f03dd26430682a2ec656ae7167c19314f8c6dc162993789bdb0b3eca298f95c3f27da08