Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/05/2024, 11:02
Static task
static1
Behavioral task
behavioral1
Sample
简约BT种子搜索神器v2.0.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
简约BT种子搜索神器v2.0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
西西软件园.url
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
西西软件园.url
Resource
win10v2004-20240508-en
General
-
Target
简约BT种子搜索神器v2.0.exe
-
Size
968KB
-
MD5
fa870eb3e9b334c134b415138ae2af95
-
SHA1
b7d2a3e1842aea916e713ab995cb41fa9533c437
-
SHA256
dc1c1c8d3c6c36e927c2b29718f06fc2c76373cca54375a038fbed65f3422a43
-
SHA512
7c793589d76a3d26eda716109291c04fe372ef67d6a0beccc2142a58011804b687de8fea5ce8a6d59b24abd754dfa771fb577118d7de67638224bcefee6a0812
-
SSDEEP
24576:iJF+Vvsix+peQZLg7SOCB3QrxEdMTeWmFlSA:in+9mZLZfB3Qr6dMTeWYS
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4624 msedge.exe 4624 msedge.exe 4480 msedge.exe 4480 msedge.exe 116 identity_helper.exe 116 identity_helper.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe 3420 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2680 简约BT种子搜索神器v2.0.exe 2680 简约BT种子搜索神器v2.0.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2680 wrote to memory of 4480 2680 简约BT种子搜索神器v2.0.exe 95 PID 2680 wrote to memory of 4480 2680 简约BT种子搜索神器v2.0.exe 95 PID 4480 wrote to memory of 2808 4480 msedge.exe 96 PID 4480 wrote to memory of 2808 4480 msedge.exe 96 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 972 4480 msedge.exe 97 PID 4480 wrote to memory of 4624 4480 msedge.exe 98 PID 4480 wrote to memory of 4624 4480 msedge.exe 98 PID 4480 wrote to memory of 1128 4480 msedge.exe 99 PID 4480 wrote to memory of 1128 4480 msedge.exe 99 PID 4480 wrote to memory of 1128 4480 msedge.exe 99 PID 4480 wrote to memory of 1128 4480 msedge.exe 99 PID 4480 wrote to memory of 1128 4480 msedge.exe 99 PID 4480 wrote to memory of 1128 4480 msedge.exe 99 PID 4480 wrote to memory of 1128 4480 msedge.exe 99 PID 4480 wrote to memory of 1128 4480 msedge.exe 99 PID 4480 wrote to memory of 1128 4480 msedge.exe 99 PID 4480 wrote to memory of 1128 4480 msedge.exe 99 PID 4480 wrote to memory of 1128 4480 msedge.exe 99 PID 4480 wrote to memory of 1128 4480 msedge.exe 99 PID 4480 wrote to memory of 1128 4480 msedge.exe 99 PID 4480 wrote to memory of 1128 4480 msedge.exe 99 PID 4480 wrote to memory of 1128 4480 msedge.exe 99 PID 4480 wrote to memory of 1128 4480 msedge.exe 99 PID 4480 wrote to memory of 1128 4480 msedge.exe 99 PID 4480 wrote to memory of 1128 4480 msedge.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\简约BT种子搜索神器v2.0.exe"C:\Users\Admin\AppData\Local\Temp\简约BT种子搜索神器v2.0.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://down.juycn.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff926d746f8,0x7ff926d74708,0x7ff926d747183⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,11842966920348168197,1620136994541347073,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:23⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,11842966920348168197,1620136994541347073,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,11842966920348168197,1620136994541347073,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:83⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11842966920348168197,1620136994541347073,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:13⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11842966920348168197,1620136994541347073,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:13⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11842966920348168197,1620136994541347073,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4028 /prefetch:13⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11842966920348168197,1620136994541347073,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3688 /prefetch:13⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11842966920348168197,1620136994541347073,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:13⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,11842966920348168197,1620136994541347073,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:83⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,11842966920348168197,1620136994541347073,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11842966920348168197,1620136994541347073,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3696 /prefetch:13⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11842966920348168197,1620136994541347073,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3704 /prefetch:13⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11842966920348168197,1620136994541347073,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4596 /prefetch:13⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11842966920348168197,1620136994541347073,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3924 /prefetch:13⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,11842966920348168197,1620136994541347073,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4512 /prefetch:13⤵PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,11842966920348168197,1620136994541347073,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2272 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3420
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1492
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5c925a309aa50f43555c926b5072db1e5
SHA150e4d5d397870648bb6b89cc4a18029f4aeba5c8
SHA256a0f0153e90dfb8cdc1ff3e97f4251ef5c3eb6b2c88edff5e0a0f657f56a8a746
SHA5127773eef6361d7bf72e063871dd5cff7e5238ecbbbfabebe38fd53e90a9e59f0490280f049d83536678c911c7b1caa464a76a5a1773c67ac2cdd8d7f35935876f
-
Filesize
6KB
MD5426282b24ca24f754eb7600a0a0fab40
SHA1497a8dabd88c66987d5105d45b34c6dda789ea87
SHA256c3ec221e7d517c7c89e8149affe9c1035173d05a36c06b98ad8770cc79e4595d
SHA5126fb21085f28def0f72b4dd67d6928b1fba4db5ab1b49e6e215b12b78faf03b73b2f4c290ef7f2d101fb0b286d0b028a818d96d938c49a4772086b28351fc07c6
-
Filesize
6KB
MD5e7dd0ffe3c81d5104a173183479ecd8a
SHA11140e5dc9260d3288910c621b93196637b868607
SHA256edd6fa0c739fd4d9cb36e94f00dc160729e2e3b9e662d0e17e9663d7a8f992c5
SHA512917b7eb7d5acb8196cedf16687ab07ade91e595f9699c0634aa99b071045ec71806e45d94c8266a167d150f3e966b9412e4c9376f2c22acbea93692639c62b60
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD53930aac4854569d9f0c83fa482350f8d
SHA1b4246fd666a3b4513f611647b5d33e0872115313
SHA256bbf5b637403852776b57d34a0fdd104f566d45e0dc701f780bfcf81218fb0dbe
SHA5122b66597c5a3903b73c4c1143ade22ea9ced6d33446d1f60ac6ebe06d61e38d40fb320bf5b5917c6660b8ceb82054fb62133e1939f361837735e79ac33fb87dcc