Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 12:12
Behavioral task
behavioral1
Sample
QQ牧夫 V3.00/ii23购物街促销秒杀.url
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
QQ牧夫 V3.00/ii23购物街促销秒杀.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
QQ牧夫 V3.00/qqmf.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
QQ牧夫 V3.00/qqmf.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
QQ牧夫 V3.00/新云软件.url
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
QQ牧夫 V3.00/新云软件.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
QQ牧夫 V3.00/淘宝购物小帮手.url
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
QQ牧夫 V3.00/淘宝购物小帮手.url
Resource
win10v2004-20240802-en
General
-
Target
QQ牧夫 V3.00/qqmf.exe
-
Size
776KB
-
MD5
4843388b2b990ca48708b0b51c4c8822
-
SHA1
d1fe2361ce8dfcfacbecec9f58cc13fbfd1505dd
-
SHA256
4dd3134ab6ffc205ccba28c7c5509c9a5e3c4c7b3c003ec1c898592ab53cd90e
-
SHA512
5c6a074dd206dfcd1755cfff5d595b76d1bafea4e4273c0c8dd300bea3833df6eeb07df741effecb5cdfadc769bfc62b2a0e2f07361dcb436c0f2ba4b36d2320
-
SSDEEP
12288:ryxncpExr3e2DVJjYZK3XIav/jrnQQKo/1CFKkyJgJD/TlY/FkFyFnAdhu118xNG:UnLhBTsZK3XLnnfKodSKHqJDG0dhu3H
Malware Config
Signatures
-
resource yara_rule behavioral4/memory/4656-0-0x0000000000400000-0x000000000071E000-memory.dmp upx behavioral4/memory/4656-2-0x0000000000400000-0x000000000071E000-memory.dmp upx behavioral4/memory/4656-3-0x0000000000400000-0x000000000071E000-memory.dmp upx behavioral4/memory/4656-5-0x0000000000400000-0x000000000071E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qqmf.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Software\Microsoft\Internet Explorer\Main qqmf.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 1844 msedge.exe 1844 msedge.exe 1648 identity_helper.exe 1648 identity_helper.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 4656 qqmf.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4656 qqmf.exe 4656 qqmf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4656 wrote to memory of 2320 4656 qqmf.exe 98 PID 4656 wrote to memory of 2320 4656 qqmf.exe 98 PID 2320 wrote to memory of 2732 2320 msedge.exe 99 PID 2320 wrote to memory of 2732 2320 msedge.exe 99 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 4556 2320 msedge.exe 100 PID 2320 wrote to memory of 1844 2320 msedge.exe 101 PID 2320 wrote to memory of 1844 2320 msedge.exe 101 PID 2320 wrote to memory of 4444 2320 msedge.exe 102 PID 2320 wrote to memory of 4444 2320 msedge.exe 102 PID 2320 wrote to memory of 4444 2320 msedge.exe 102 PID 2320 wrote to memory of 4444 2320 msedge.exe 102 PID 2320 wrote to memory of 4444 2320 msedge.exe 102 PID 2320 wrote to memory of 4444 2320 msedge.exe 102 PID 2320 wrote to memory of 4444 2320 msedge.exe 102 PID 2320 wrote to memory of 4444 2320 msedge.exe 102 PID 2320 wrote to memory of 4444 2320 msedge.exe 102 PID 2320 wrote to memory of 4444 2320 msedge.exe 102 PID 2320 wrote to memory of 4444 2320 msedge.exe 102 PID 2320 wrote to memory of 4444 2320 msedge.exe 102 PID 2320 wrote to memory of 4444 2320 msedge.exe 102 PID 2320 wrote to memory of 4444 2320 msedge.exe 102 PID 2320 wrote to memory of 4444 2320 msedge.exe 102 PID 2320 wrote to memory of 4444 2320 msedge.exe 102 PID 2320 wrote to memory of 4444 2320 msedge.exe 102 PID 2320 wrote to memory of 4444 2320 msedge.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\QQ牧夫 V3.00\qqmf.exe"C:\Users\Admin\AppData\Local\Temp\QQ牧夫 V3.00\qqmf.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.ii23.cn/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcefd846f8,0x7ffcefd84708,0x7ffcefd847183⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,1193094581225348191,7278792679608617136,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:23⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,1193094581225348191,7278792679608617136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2560 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,1193094581225348191,7278792679608617136,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2572 /prefetch:83⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1193094581225348191,7278792679608617136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2784 /prefetch:13⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1193094581225348191,7278792679608617136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2792 /prefetch:13⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,1193094581225348191,7278792679608617136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5028 /prefetch:83⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,1193094581225348191,7278792679608617136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5028 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1193094581225348191,7278792679608617136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:13⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1193094581225348191,7278792679608617136,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:13⤵PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1193094581225348191,7278792679608617136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:13⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1193094581225348191,7278792679608617136,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4380 /prefetch:13⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1193094581225348191,7278792679608617136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:13⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1193094581225348191,7278792679608617136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3140 /prefetch:13⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1193094581225348191,7278792679608617136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3940 /prefetch:13⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1193094581225348191,7278792679608617136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2380 /prefetch:13⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,1193094581225348191,7278792679608617136,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3712
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:948
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
6KB
MD546bc54042db9fab46282f8ede38724b6
SHA1f139ee5da7719c8774f1259d8356dbe5b93f3d76
SHA2564dcfed88b544bea7f604eb4ae1ab0e88a05d33d18bd0aaba13cb2147e82ec441
SHA512bcd9f490a1e43b020c83d154675295df7184b672b10e9fc81679fc93a3ac5c5f37e1eef0a3cd44fa549c8f9654bc5241835f9ce97d9c624700279f9dbdb70fa6
-
Filesize
6KB
MD5e6bdc2242ff69bb3acb2fca039dceab7
SHA15f7f4cb8467f44d1c79c4a2f572a9b74fb1f7fc7
SHA2560d603d7107322a6129a6a4ce3df83ce1d3be67f485c500b98553807f05f9c1e5
SHA51213e4c6bdf90b1db8c2100b13e24aaf0b6d9906380736079f1f5c335fc292fb821a4ff5b6e810cbef346f0de01c6d448221d1e3033b688bdba474de2b57d3f22e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c1721a858faeae0edac029b9a8decd3f
SHA15b901340e6cac524cb6d967af354522653b20aff
SHA2561a79025dfdc2327ba8fa83b99ae0e22f828aa68f216df4b25012e99454d6daa7
SHA5122c1ce0da894f0cf430649778e6412843ca144a6d2a466283816f73998710a665640636ba8c491dc34683d4ad399c376c14becd5b956b8de7410bc763be9bd090