Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/09/2024, 09:41
Static task
static1
Behavioral task
behavioral1
Sample
ff327814-4b20-47ab-745a-08dcbbfcf387.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff327814-4b20-47ab-745a-08dcbbfcf387.html
Resource
win10v2004-20240802-en
General
-
Target
ff327814-4b20-47ab-745a-08dcbbfcf387.html
-
Size
173KB
-
MD5
780bb64e8e179de9920d1fbe22e9197e
-
SHA1
2040e7ea0d641cc4bcb284fe23bee6a2ee12c8ba
-
SHA256
cc0b88ecbaa22e5ef78320217ff12490aaa6a687fba1792e8df69d6f8fc7ac66
-
SHA512
38e85d2f0e7feb38fcdb4592df9b64d3162e410e4aa17541a82480ebf05f095d13cedaadd4807750cd8e59c3c91ab5dc138fce909ddf19aa65d5f1539a90965a
-
SSDEEP
3072:ouy/uMffCX0W5zbk8rUD/b0C349tuy/uMffCX0W5zbk8rUD/b0C349i:RKfqEWlbk2qD0CI9AKfqEWlbk2qD0CIY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f00000000020000000000106600000001000020000000fffceb8aa4df668f95ae17eaba96b7f2fc62e396ec5accb422d58e3bc39bfdb2000000000e800000000200002000000058c5066c69213c28a2cb277d4edce0c0943a9f1711ece098780259713c28368b2000000031e6b42e274bdb23ff7de5fe5a9fa9a84463c80a83b9cdfabfb0765a45d7670540000000b69a933d07209816b60e769a7dc6824005e283b73b730f46c48a8334de2073c04e1d5abba41d8c75325f8c2644fed1dacc2d85fb84c3d6d1b9e9ae64263227b9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B9C78D91-69D8-11EF-9CC3-FA59FB4FA467} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8d48fc8adfa6b4a805f1a4a681aaa6f000000000200000000001066000000010000200000001fd7fa4e7da7b7c7e01514d621d482fedc550923dc0490a48a2fd37a788934b7000000000e8000000002000020000000370a3c2f625739935b2041d4f6e6756ee68c680e373751969c974522abe046189000000011218074a9c085a16f1c62e7127dde2b9f4cfe61e12b72a585e68203d5a4280a4dc0af5269f8addd6fb848c2443abd7e096d6ce14c4b3b954f031b427d34a476c5deee43466aae806ceadedbd2ff92fc96631b9e52d44fe0e453450e179cd190f463f4cc5e5fb0ec8e0399a8a3f6c083906311f8ad31dc58efe3447304a7883da3ef414f68a26c9d546c7532a3de5b2040000000e12767a69f563414d92a5fa110c14789ade04cf8ddf09d0c971814c04eacd5a8f18d9804ee5da8f59aca3fbdeb7e4bc91647ee5bc43f130f458580d7e1bf181f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431518369" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d002398ee5fdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1328 iexplore.exe 1328 iexplore.exe 1480 IEXPLORE.EXE 1480 IEXPLORE.EXE 1480 IEXPLORE.EXE 1480 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1328 wrote to memory of 1480 1328 iexplore.exe 30 PID 1328 wrote to memory of 1480 1328 iexplore.exe 30 PID 1328 wrote to memory of 1480 1328 iexplore.exe 30 PID 1328 wrote to memory of 1480 1328 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ff327814-4b20-47ab-745a-08dcbbfcf387.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1328 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6d6445dbe16678d4c7d32e519da22d0
SHA1e6cd5069c7dd5b6d700725fe7a7e7a9be943e166
SHA2569865f7f0b6e0138b28a0ae04baca3b4d4075d20e13be54727c092c5fc6df1c4c
SHA512a3d412fb11ce851b57e304a37ba482e117597063b65b974be4915b4f92133cbab268fc4ce453c6afac3d1e9ebfa3a4ff26e993585c4532d8bd71a47f74e74ca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3de5d53d0f6f8042e9abaf76d5045dd
SHA13b9315d54deca1ed84ae44201dcc92325cd39fe6
SHA256b727414c1aee9448f5e90831fcc6790b36b3822a7511bb18d4672095ea2198bd
SHA512aefdd2033a766f19da4b41739bba01fb8add5976998e7767849a621e75fc8374324fe7a82bad9e049a39e0084169337eb04d7711bc3ee8cd66141ae79d0cfd80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2c9a132dd312fb20fcbafedcd52ac16
SHA1dc4152ba19dbd63a1b20f4915dbe7e591311a9d4
SHA25687ea436fff49e7d26a6a99df2c9b3a54e73df234add07a9d0d7e2b2b99475414
SHA5124e25a27363e9f056f8b87735f31f249faa76e7555498a41a06d2803704006bcfbeb449ca459d5b6d95a30cd5f52724692e16bf50963a056ba5ac4c7043cc0c38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5990104888535f60acf11a7938df8556c
SHA1cf47b74b7d0e6a8f03edfc6d938156567726c94a
SHA25612998da265b04317aaebadb0b833b9246152e3ac3de3f9233abc53529af896e0
SHA512a7275b88689251a5cfaca9c71916f4bec7e80ab3cc90b2ccbf58fbf2b5747db9cc0fa1c96552d6effc83d16df48df119844003d534e507088f54cb42f04b6b98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b9be12e6834674bacb17a9db347f938
SHA148b0a299915ea1a8dfd8aef39256f29147f65b82
SHA256728af18319e155d183c70948654e21e7d6b6fc002218f1689954ef717f3e467b
SHA51223f174a534ddf8232510ab7dd560ed74c551d9c021468503ae2626363d7ca0a35c9dec1cf8783a2e2bb73ae05770a762bc2d12a1694bff44f5660c1c4609bb3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c13757712e423685db8aa447ce6f4d1
SHA18653f7a9f705995edfd77e64e2f2adf062eb6df7
SHA2562e7860be5b80372d09be6c1933d4b3bbc7757fddb05bd50f761efaded7de05cd
SHA512ee77d6a351d454d36fc52dcd84bcf2af2aa947ff463ca0277ca7ecaafdc3d53123d49fa9aca5b7cfb7fb43feb0838f44c71b3cd4968d35387a2fa8b38dc4c6b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5996a26364387d6db57d682204a8fbd57
SHA1331af57466d2320a81f25b63e166d015fa4347a5
SHA256601ba2db88464558882e959d06d0e3f055c3e3b4fe54a3860c537cb749a4f166
SHA512adb0b5758b113e0b54b63601e47a8036d7e71ddd99fd87c69dc66144b670e50c6cfee06f6b4e0b79e8d679ea60b7e70e1515e49e670e9fb09e6b60cf46414b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d127f186b0dd44865ece9fa4ffebee1
SHA10cf40bcd140dcc098d4539217cb25e70a02ca0f5
SHA2560e1861563a5cfa987ca038c5f53cdb6f6880150b71ffa5b5eadf7ce74d172ea0
SHA512733c7661ea97058792fdff6901136bdb5152bff362da2e59b4970d1a179bd978b67d700cac82c2711c32217d56e9d64da5b9fb774c64c5879698d60e83a9bf27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d054bc5e835524b4fbd964696847e8ad
SHA1014e2cf4a0bbf0392c1927e634a7e4c80c168593
SHA2560a813e3644a69903818926fc198119b0fe901eea8d879836db87791a121c09b9
SHA512cfe507743d3f8f260556038e122b7e5d15f35c19b50b506b4090efe2b0102d3df1fd6a79fe916869281e711ea640e175d10f3951514dd673c06a971c16c6841e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585bf2e62ea28f1632a5361c68b07c64b
SHA1850fc533d40212feb2425cd1238316bd172a8d32
SHA2564d8cd63ad1eadd06ff57c6a8b8ec114556a9f8a36227dbf43bd67cf4e01cd040
SHA512b6e5724fd5845e5ed6f4d605c0502b48f89f48e6d31f13e3f2e5711655e4dde1605d41dbfecc2f448c70a462613e35b4f681a45de0a925cd241917f182751912
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5251b09908a12a037c0597de1049bc644
SHA1a8e5364610abab2131bc8655c8524a48164c4360
SHA25605e15e9a720c4e16ff48a98a9194c28da6fc60cecb1a83621ff2101ef941b29b
SHA51203299b1b64840781d2f115e423425e41830d1bbc711a310118ed01a7baf7f5acedad78b2dcd159aa03f2787aee5452f8a6c5be9f454eca820148fcf44c5613b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506f4bfb8c0687368d2a639ead76694e0
SHA1b4eb244c69745e8b134f9428af0c118a661c5100
SHA256be2c5849a526443641195228978a93d22d112e9b38cd04778af770e2cb262ad4
SHA512cf6651e82cebe846ed254eaf70d92f52ff719f1aed79917b502d89fc084b19c090d5276ef7140959c6bec19bc3e16d91956247a8f796799ec6d09d7154bc613e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5610c9909ebf5fc9ab2b73ae3553ac557
SHA13cd499f95517f32b064c486eb4f0f048927763bb
SHA256e88f803e5ed61898649062d7d7c07ff4e26bbbe96b16c8f9f61d6a0ffa3bf2e4
SHA51277b27913c51c8ea56c5f9c56ff6afd02df250dca3d3823592d4276a5480b2cc54b322e78581420e6975c8bb0bbd4d8c1925028424def51df4ae786a8989949ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf35a99d0a5dc9aa6e2f039af3cae9a9
SHA164589aaa5c69f6996372342b8774e0c857498627
SHA256674b3600951993deb3ec7977ff9e1abe87fa29c1c28b37bd121fe6a5c3be437e
SHA512b1bd89341682332a1377e28dc596a9a42e2812285fd9e0e3ec042185d2d12d62f95f83478a9d09e4cceeab686be4907f76dc20118928d63107a9214b93850e34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dec665dbd034468b9b5d365c848026d2
SHA1ee4e1004deff2e23a340bbd17b97d4c541116ada
SHA25618d1b59db7d19d8c17233dde7d342114ce88499b00b013e98043e773d05f8011
SHA512667c3ca5c6e1a4b09a3f85289c3a6fe798602624353ced7a39ac881038309b1e2cd702a812a06cd22154ed80f19dbcc800ee9326b7d737f03f3fb1e24df30a99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5766e741c5f7bdcd628a344c96db60669
SHA18fc03fc9bb7fee49ef8125d15d71a01093e83c90
SHA256f054950fd53bdced0a41cc3e57aa8515df1dd8df11e01bd075fd1781764db3b3
SHA512bc967624b053953d08b765b2764b473258f9bd0dfcec5bcdf3c1545f2c15339ae3f915020f6153538b4ab37877888c377293627e751469a79118f508fd884882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5356b27e0492852f8954b3cdb077c2a55
SHA1e126f627f760d6c694c80224537b582a8b1d2e8d
SHA2563ba8906316d5bfab4bc2a65b37e7a3da9aeb5ddaec36bca0061486d71848aa2e
SHA5123862c6d39bd093cf9246954fe19d3f3f84b1b5684bbc9fd2b0c52f5262de8bdbcaa8b98c1732f70d729ffb4e20d9242576657fdb97b8e0c7124d1bfcc6ee3e04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5576a4524423c6fd444a6b71168348dd8
SHA1deabae4841c116b0abd37d4f68b265a98efda18c
SHA2561663d34c37166c731663b3ae6fd3493f4b9c635472a2adf608f5700857a95758
SHA512d07c98fc8902db4e010f5496301b67234d6b882164951954905a0353a8bf31a1b2248093691849ff7361c3acda8bd6740e8b65efb408e8e46665be2feee91d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb87a06f4a0cd13af3503166d66e6757
SHA1c10518fa7f63ee83999d7ece58ff896636209aeb
SHA256e5110df82ea6f25a10d4883ee4eeef405a180c421c7c4b4a915d1e3b876fe879
SHA512ef838c5535d200429d274e69dc7e187172aa93300b9af77e89792bc678cacb493d2272283e1cd2bbfe44d08fb98a7f0154fadfd635bc4107d281b3a4ac3517e1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b