Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
26/02/2025, 21:58
Static task
static1
Behavioral task
behavioral1
Sample
WinWord.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
WinWord.exe
Resource
win10v2004-20250217-en
General
-
Target
WinWord.exe
-
Size
6.9MB
-
MD5
389390bf696737deedaaf10a90d407d1
-
SHA1
87758da2fe832f302032e904eb13994c70023825
-
SHA256
d3f31c512033046c4209c5af1352f3ce36d1af39f84946c22ca3e25da6539734
-
SHA512
4b1ff3b939a22250222afc6ded49e636b76cc602ea67a587a70dac2deafabf5446f1eb27feb688b3d7759b9b4bcd46f016c8f98b42cba29920045031da6551b0
-
SSDEEP
196608:I/9sLB5t3JJQGR2nroh1L9cDIw4v6N+ED6JwtPnoDAMzvaqx/D:u6tdJ2rIcIw4vjbJCfoF+KD
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ WinWord.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WinWord.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WinWord.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine WinWord.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WinWord.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 WinWord.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5056 WinWord.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinWord.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 5056 WinWord.exe 5056 WinWord.exe 3944 msedge.exe 3944 msedge.exe 1968 msedge.exe 1968 msedge.exe 3372 identity_helper.exe 3372 identity_helper.exe 5212 msedge.exe 5212 msedge.exe 5212 msedge.exe 5212 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe 1968 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5056 wrote to memory of 1968 5056 WinWord.exe 93 PID 5056 wrote to memory of 1968 5056 WinWord.exe 93 PID 1968 wrote to memory of 2356 1968 msedge.exe 94 PID 1968 wrote to memory of 2356 1968 msedge.exe 94 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 4716 1968 msedge.exe 95 PID 1968 wrote to memory of 3944 1968 msedge.exe 96 PID 1968 wrote to memory of 3944 1968 msedge.exe 96 PID 1968 wrote to memory of 2368 1968 msedge.exe 97 PID 1968 wrote to memory of 2368 1968 msedge.exe 97 PID 1968 wrote to memory of 2368 1968 msedge.exe 97 PID 1968 wrote to memory of 2368 1968 msedge.exe 97 PID 1968 wrote to memory of 2368 1968 msedge.exe 97 PID 1968 wrote to memory of 2368 1968 msedge.exe 97 PID 1968 wrote to memory of 2368 1968 msedge.exe 97 PID 1968 wrote to memory of 2368 1968 msedge.exe 97 PID 1968 wrote to memory of 2368 1968 msedge.exe 97 PID 1968 wrote to memory of 2368 1968 msedge.exe 97 PID 1968 wrote to memory of 2368 1968 msedge.exe 97 PID 1968 wrote to memory of 2368 1968 msedge.exe 97 PID 1968 wrote to memory of 2368 1968 msedge.exe 97 PID 1968 wrote to memory of 2368 1968 msedge.exe 97 PID 1968 wrote to memory of 2368 1968 msedge.exe 97 PID 1968 wrote to memory of 2368 1968 msedge.exe 97 PID 1968 wrote to memory of 2368 1968 msedge.exe 97 PID 1968 wrote to memory of 2368 1968 msedge.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\WinWord.exe"C:\Users\Admin\AppData\Local\Temp\WinWord.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=applaunch2&plcid=0x409&o1=shim_noversion_found&version=(null)&processname=winword.exe&platform=0009&osver=6&isserver=0&shimver=4.0.30319.02⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc81f146f8,0x7ffc81f14708,0x7ffc81f147183⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,17018948228868808228,5760751451385427564,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:23⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,17018948228868808228,5760751451385427564,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2496 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,17018948228868808228,5760751451385427564,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2600 /prefetch:83⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17018948228868808228,5760751451385427564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:13⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17018948228868808228,5760751451385427564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:13⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17018948228868808228,5760751451385427564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:13⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,17018948228868808228,5760751451385427564,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:83⤵PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,17018948228868808228,5760751451385427564,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17018948228868808228,5760751451385427564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:13⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17018948228868808228,5760751451385427564,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:13⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17018948228868808228,5760751451385427564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:13⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,17018948228868808228,5760751451385427564,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:13⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,17018948228868808228,5760751451385427564,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1300 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5212
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56cdd2d2aae57f38e1f6033a490d08b79
SHA1a54cb1af38c825e74602b18fb1280371c8865871
SHA25656e7dc53fb8968feac9775fc4e2f5474bab2d10d5f1a5db8037435694062fbff
SHA5126cf1ccd4bc6ef53d91c64f152e90f2756f34999a9b9036dc3c4423ec33e0dcee840e754d5efac6715411751facbe78acc6229a2c849877589755f7f578ef949a
-
Filesize
152B
MD5f2b08db3d95297f259f5aabbc4c36579
SHA1f5160d14e7046d541aee0c51c310b671e199f634
SHA256a43c97e4f52c27219be115d0d63f8ff38f98fc60f8aab81136e068ba82929869
SHA5123256d03196afe4fbe81ae359526e686684f5ef8ef03ce500c64a3a8a79c72b779deff71cf64c0ece7d21737ffc67062ec8114c3de5cafd7e8313bb0d08684c75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD50f4ab77b6eae130d98df76be734571a0
SHA1fb71f0aa8a5555906bc6f2a5f5288d93d6ce8380
SHA256b6aab187c5caf4d414d9f5ea48030ecbe17a790b7893eeb042e479ec7ec32562
SHA512f418eb1cf8ea3590798f909ba5b68f0f0d5c433aec95b7932c8968e0a9553e3501e90cd50434e3d914dfe28d5a2b521d2833dc8858a509797eee06d693bc0a42
-
Filesize
437B
MD50a8ea5dae27f141be6436c1a828dc840
SHA1d69f06ab302b56ead0af142ad60f5ca8acb4f42b
SHA25624c8b87b69cc0aeee6ce898bce60dbdca51dfa690e7e0720b58a87b9a16e52e2
SHA512289759ab1f9636c6147526f3419bff7941f77bdc327ba621c5ddbf334afab9723983ff9ce59fb85c3636d63fa402a50becaa9c232c04afc825509652ce2074e0
-
Filesize
6KB
MD5e83f23b02e599bf40b7b9503e96c0953
SHA14e2e0017abc2fefad81703e410313229d6eec801
SHA256f41889f5fd9917cfb7204cd960f10b3c69c48f0986ba2b414e0bbb778e14487e
SHA512f3d8dda1b4e9fd0d97667cceef5b40c50e417077acce21aa5c8d256a64c6ff151f5b1807ba83616c46105d41740c5a054f14a4fb0979df2ba056ca380e594b19
-
Filesize
6KB
MD5ea0061094c2c89da346d8f251f810371
SHA173ec3e5a964e1f88aaa68cbaf751782d9cffd666
SHA256b59cb06936d7071ab9761b3c4e995fa0a47b54ae2a06480341a71f8b3475fba9
SHA5127637cd73241fd0fe4d8c59f854def112dceab98912e70f9bed6ec8a1a2ae28af9cb12a1251ddfaefd065b0a6e34d71af9af3db5a4afc5ec5638b1c1f7d6f6b88
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD548ae652545ea2dabd43e7b33ec23c52f
SHA18e330d9b829c58a18014e9e703f90f18c921ecee
SHA256ff73debde5c8e6378408423b8538a864d4f727bc98449bc4af1401060396f041
SHA5121c8774f74a75cc69a23e06fcae52fddaa39c2390f8419915e872ed73f359bcb8a545a47119fc3f5112d60b4414c3597d2a6db95162b77ddb7bbc30546ea01278