Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 11:56
Static task
static1
Behavioral task
behavioral1
Sample
4b5e5aa2900daf8563278a499faa3e51.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4b5e5aa2900daf8563278a499faa3e51.html
Resource
win10v2004-20231222-en
General
-
Target
4b5e5aa2900daf8563278a499faa3e51.html
-
Size
180KB
-
MD5
4b5e5aa2900daf8563278a499faa3e51
-
SHA1
87e39c7660b623c8e745ad684faa9bb742ec9d1b
-
SHA256
76415895ae08607b2039cdbb02117d7ad2174152907fc006a7236c8144aa51e8
-
SHA512
a57b65de4b14fc8ba3de193467f5aed744b24d8439557b5b33c0060101f88ff2946c25148706d5ebd643b92316078fb1234b0da252805dfdeab9e280f8424d55
-
SSDEEP
3072:ibWiF4OpBH0xsPsPl9aj7cUWwmJYhiKuvoQFcSKC82/xlL8M3/:ibWA4OpBUPnajOB+hiKuQQcz+/XN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{000646C1-AE1D-11EE-B55C-66F723737CE2} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "410876882" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1748 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1748 iexplore.exe 1748 iexplore.exe 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE 2272 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1748 wrote to memory of 2272 1748 iexplore.exe 28 PID 1748 wrote to memory of 2272 1748 iexplore.exe 28 PID 1748 wrote to memory of 2272 1748 iexplore.exe 28 PID 1748 wrote to memory of 2272 1748 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4b5e5aa2900daf8563278a499faa3e51.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1748 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_9E9C5BD522DEAFF0AF9BF0B0877DDF33
Filesize472B
MD56fdbb14021dc508f713ea3c26e19b894
SHA142b6d80a04d525374a8a3923be11aa9973cde163
SHA256362117ad193e5e1fac1ad4207cfbedac48c6d7d9ff96211d4069cee5f5083d61
SHA512bf9e3a87595c0d602793b497fe906af1056413edbdbaec01afa35374620b8178bc9866c572f391320a6ed44bd2aeae4af29aa47b622c23b133e6599203461181
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD553b3b686d6890cd994fb1c02992dd361
SHA156cb0c885849ee0659c6f64cd0efb30f7e941043
SHA2561313a27e8cd4adab5a12f9a272bbcd3b79506a701aeaa712b3c6f71c08f76e5c
SHA5129f6a365a12f5e6a9cb8e9b45a1b48103e69784e808a0ae2d6a71d46313b6c900f52a5d4237a6e9ab91176bcc8c5a4226a4531a2c931641ffff3d0028fb88ae9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5c2d7d40a8b842ecdc355800f0caf38a2
SHA193f276e6384de20da6b3e27d18095a8cae204e1b
SHA256404e98e1d5e209d2adcf8cd944aa4e96f0503ba99fc71561e322d8096514405b
SHA512ccad2bf4e42131296933621d9f90e82a2e5c01699ed0661ede6f7fb3f01dacf696ddb4dc806951d1e5665b16929cf91098e809b7d99764e69dc3c5024abf3217
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5216d2fc1bf490f9c4e2a385b650fe582
SHA17af83fe7ca147216f774fa0cf2a837d8d28676e9
SHA256086d66f8515e5cd5d79e8e52263a9a6cef33a9c7ecada1ecffcfad978f2b9fcc
SHA512c182ae7f0b5c20da324c857d50ea103f8f501ec3172a80b6a9c6f11b6ff1e9914d4776d28405cce5e7d8c948a3b374707fdc0857dce75248d1f5c5dbd2a8e8b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546ee241df700bfa74e7fab7426d336db
SHA1907c23897d4065be32429a9131adacfb2c027f91
SHA256102338fc15dbab0bd60a2805274e4f1f126c8062b61c295e0f72e125298f5293
SHA5125525e86bd7cec14068783d651ef87964611f509a49c935b640d9b226c5dc24056ff4cdd0074bdb5900975b0821db97a93d87bedc91b451d5b49a902b0da034e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aaf1c2c436624eeb83a9672608de825a
SHA153f542a8fc105125a3410f070d70edf0a40941e9
SHA256013ef9f17d94cffc09b9e25445c0cc29766f62e2e2ddb0633b8239edd14177de
SHA5129c2d760e35bcc4ff6ddb3a1ce2622c988d55b232755b1521ce1ed38ac14c2de5a0d9d255946a95a20f29bc32d1da1bb5357e884ff0b8ae7e3d439f2326f23f23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55d90cd8f662a9177c29839992dace599
SHA189ee05c8e82f7dd3a2344935d46b9e15d2fe606f
SHA25627ea87e215f7d9175d354d899bc5233ec9010a1343cd3751edbabb33d5e5005c
SHA512078c9a407cdbed0e7200740a191d8b371482c72d42afb575d4465ac14945491687b1cc4cd609e5fc63a59841fad1c1a5cdecd5e7193d3ef86391b6e2b260f65b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d751585e91e4a4b73a648fd608e43ab
SHA1db2fb05b75410e9dd7748d171d23f72f14a7f830
SHA256bb1c441a310139c82f2e9140488fc09386f2ae031f7ae8fff4806c5e03fdb648
SHA512dd272b7a03328d47fbf487458493a570fa52eeea8ac14817a8cb182fa194ffea533f58e9e440cc1346eb192149af2421bae66a9f5f140c406b8f5172648121e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54d3949aad77c02454ed4037268314fcc
SHA147870b646b1b8c78925fa0669d0abe59f413498a
SHA25691744df9149518da577fafa87cef2cdd465dadb9e43f84ea139ef3d6b9f380b7
SHA51273f0bb137ee905402cbabe4f570faceb16f62ec063be89fe0e592a2af40acb544ff49d1eb6c948062e69767e2deddd429e9913295d9739cc8760c948dbabf8b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5728a0c235f5871b0233ff1dfea530383
SHA124d3a31f0c3ae1bcca84eca4aa89d87372088b89
SHA256dcb12f2ca19e1cd7712087505b8905d55954e66c14657f3d11f78403a02baa85
SHA51206cf1286e839861eabc621ea69d0ca680532c88519625d6df20321a9ac2243345e91aa7328205d8b1a602d65390d290603e86adc1ef1bf837b3c1bd7b13948be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d7bb413088410fd0f55817075872500
SHA15b6c8169d4d5eeb292480b093426c235d4a91b23
SHA25667ec0992e32cb9fc480798c17badd15047f530cc5365590b8698e515ef294d09
SHA512ba3160f8932ce736e2becf3e5d9740fff0b3fd85b77bbe46ab3a4ec016f6c721792770dd08e03f952092af4a3ca0c28eaa215ca8345f4912932e6acdc34b7d9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5e28eecda555d39bd1a037de8347966
SHA16157aea6f787014199e21a338e45a7a494772fb2
SHA256a9217563f68fc7d3e481d2946aa7701916cda2675403e72b70b757c4ea3817bd
SHA51285fdc7ed1ddbfe382a70ec2a4081df9e0a6e5989e7c0d902a2f66971eccf57935e8d8a5ab0da28e639b6bf090add5079dc49f07c9665d76363b0371bf1d3d4b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e4ddc90c9b4b5368ac1cb1b6e1f1125
SHA1b841267c664f830d8b53f71e5ff9202e81875c5a
SHA25672cd5f3811a27feaae882aaf2321c8f64401a758fc459e4cff4feaa7667668e9
SHA5126b73e2509ffa98ce30eafbab1dc5f32d4b1deff8d9fd2634f5e007fa5c96ad08c4e576d6754c0d6531562700022c951ab8a5336a772e337eaedd3b8cefa4bf14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58754bbc124bc87a75ac890eccf780f9e
SHA15cdc6b1df807a601808147abe9dc2c4934abe48e
SHA256eb2b37306c84470bf42c37428984759bb4de72d22afc8f71ede088924d2e19c5
SHA51224e916623dd081adf3a76967aec6624ba6645c3c84b865d7b7e81c00ac51a0013911434e176d59ccb41155eedc9de0e03f653f2e413eb6f14edfca606adab4b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9d43a1d0d720017158f0ec3d0f00f05
SHA179ff5f3c6631128add8135563a61b010b62cabce
SHA256f4ce05ce6f932a1af4b084085d62bb65f60e524af0752d59e8a9c425bd7a66c1
SHA512691597ef30a0dfaee95870de692a686839a0f7f8efa9d35934b3c1abd1bdd6b3c17faaac18500c2d277ebd5bd349a730357ff0ae586b4b11d6a5ada1f70058b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500e0ef3b3cb703d78b64971183a199ee
SHA19b46d6e2ba84906508896faab4e4d04797534af2
SHA2569df0831ec2a232f4e74935e96469176103879367b83e0454b0d9cf8a651d4e79
SHA5129972176d86f360fed704411a8e2ae9314c7251ee79acd35ec74a9ab6383c5729fa9bd04d660603a9c992feebd3448ba07f9a39bd6224b79511f1235aa6b17612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD522d3cf6faff4e38558173b969b229d24
SHA10c95419557e4c69c484ce50b8ac89743c416f798
SHA2565a33851b4dca412c88c718a4790bdbfb4ef3209509b1eda050df8d040e287365
SHA5124f18ad0d8000df2c42aaaaf5393f9e752179e2695eae47a8ea23a0aa754c29628ea00a5fd58119fba19c0872d805e4d3c2a030f37252f88776268ae9e8fa86f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD554934293b18301085c801a85ccdb2813
SHA1bf145010b0b9c5f90eabc7ce931d88d159580669
SHA256df8891bd2f1339009c8214c2767f3d0c480125663a13091ac277f6bec6130479
SHA5121f51d1b834f3030ae3a85325352e60045f1181a4d860ae50c6d3328eddbe7aef04339f04c69f190aa66ccf994910e5047bad2a12ac27cc535ea7c13e7cb1b154
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2RM502ME\platform_gapi.iframes.style.common[1].js
Filesize56KB
MD5f6140cf2e81a9d5b9bc96970fe1946f6
SHA1e18cb20a08d0c13d44b72e36e9560aec2187abce
SHA25668cc8a99c8ed5cc0eb3aa2146fd34bee0051bfd98faa3c03b83c78b4a12a8bd5
SHA5121f61bf7228ae9fc1b36249223f4ca0675da05beaa6c00b28b7fff500e0527ee237d139eaf6793ece67f8730dfff0207bf945a848795aab7c57301433449a8acb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3S6PZELC\577263412-widgets[1].js
Filesize160KB
MD5cbddfaeef9d9c74d8ba50d85e3942302
SHA1b36654e72072ba1e04f9b129a6bd8517cb0077eb
SHA2569fba97eb8920d6a89bf0576db418a9369a56a94b5d55e8add37d92ad5c9f6c3e
SHA5124b8b74455e79f1030b02f9d90271adde8248cab9ce81981eb105b882f50b2f282fed0e85b2f40443d23c5d179641fc5a71cd107b4dfacc5a058278f787fcff17
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DI72RXDH\cb=gapi[3].js
Filesize133KB
MD5288c5ba5b7001fe841c32f690f62cc93
SHA129aba9d8e4f7cbe25fa5e64b9ecbe256e51fc789
SHA256c2f33dc18eae27d4e878bf837dd97f1bde5151e44b0271408535bb93265b8c52
SHA512e375d41344a086d35accfb02bb1f91e2dd383db032af387fc3d6b1230057cc5e432e9b2cdd976e51425b4f587391d42f4d9d857c2e6f11e822a65edcb85f1c9f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DI72RXDH\e[1].htm
Filesize99B
MD5aca457390e414cb12c22328109bd2d82
SHA19bd1265fab7dcc80f0eed843212b930b788d759e
SHA256d188d336f8b4d05c1c1964fa5fc7dc6214af906395d35c684fc2843ac1d0761c
SHA512f58b93b69458082b9a1ec9367ca1138e724529211393c096fa4ac0b2da9e75406d864695d50ee609b8540d875d02690bac94d0ad3f6efcc1ae6ada928a9142b4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UJAMLHDT\cookienotice[1].js
Filesize6KB
MD5a705132a2174f88e196ec3610d68faa8
SHA13bad57a48d973a678fec600d45933010f6edc659
SHA256068ffe90977f2b5b2dc2ef18572166e85281bd0ecb31c4902464b23db54d2568
SHA512e947d33e0e9c5e6516f05e0ea696406e4e09b458f85021bc3a217071ae14879b2251e65aec5d1935ca9af2433d023356298321564e1a41119d41be7c2b2d36d5
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06