Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 14:51
Static task
static1
Behavioral task
behavioral1
Sample
b4f7257547b4d8516eb0d9cffbafe738.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b4f7257547b4d8516eb0d9cffbafe738.html
Resource
win10v2004-20240226-en
General
-
Target
b4f7257547b4d8516eb0d9cffbafe738.html
-
Size
9KB
-
MD5
b4f7257547b4d8516eb0d9cffbafe738
-
SHA1
a17c8442448ae0803d8bf6724dd69e33e09c7d79
-
SHA256
290e176f3ef73e294d4823b86221293daa0592e56502fc396092645b69f8e704
-
SHA512
a8c15da2d95d72cf0853b6e3fc44305d6e1edd0323ae52636b69f51a4e94615ad8810c37770ef194f9173b17734de8937c46675422852a73c467f4085496992e
-
SSDEEP
192:ln8uqnGDSSW0nq7kz1HzHSgundALiBJ33MP2Ad9L3zAXGDgzm4wgIfZdpD1WKsCT:ln8uqnGDnW0q7kz1HzedALiBJHMPjd9r
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000f0c4fcb03e76aaf8a2deb1f48efe23773ae578aeaa61cd7cf1886537fabf91f8000000000e8000000002000020000000ea0527303ccd12485783a76a19a50635e614cc851c694a44edee17f40b28a5c690000000f790de5dd0914b4632985b2e07f3689a289f23c1a745d90c88590413be6964afc623b6b70b65b8367e2fc698f108f8cb030011a64c3f81f4707edb2b1065e1d233e8ca03f84164d8ef65041694c7a5ab039370ffaa3101198378a0e5c93ef1d7b0a39a16049cdb11160529aa90459504128344074e0cd1f5f161e4f403e808c925a564245b611fd7cef82357e37ad1a240000000b199187e173dcd53239737a48913be0cadc52faed55adf0bd4fed015930cb639e8542f6507ddf7c69ba9571a28d3750d2f26232e4828e39420a3262a7f698c68 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b000000000200000000001066000000010000200000004f2e3e3c4547f9f540f017c53605020039110ff420d6ba324fdb9696dab55829000000000e80000000020000200000007596a9a9e224186a36bf6bb2a76da08833d9752daa199c2f2c7f2432924c828e200000008a17bf67e69e35722c8a80c0b55b262145e624383a22146084eb03c79f145891400000003be1dc92960f259b9b9f20d64f5dff0c44f942871f8b16aba8fa9b5d9dd03f66bd5cd7355193813a9d13af2f29fa5f4315cb53833d4a6c85949968ba21028bc4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20848ca90c6fda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "415812143" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CF1FEE21-DAFF-11EE-A6D5-5A791E92BC44} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1556 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1556 iexplore.exe 1556 iexplore.exe 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE 2300 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1556 wrote to memory of 2300 1556 iexplore.exe 28 PID 1556 wrote to memory of 2300 1556 iexplore.exe 28 PID 1556 wrote to memory of 2300 1556 iexplore.exe 28 PID 1556 wrote to memory of 2300 1556 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b4f7257547b4d8516eb0d9cffbafe738.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1556 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7f0f98783d10a5e3240c8cd3846bca6
SHA1d158c87af2f0d8079fdfc045a60288ebe418f42c
SHA256bc842ab8681daa82f41b80e9f9a31e4a4c6abfcb8046fb295a83fc3316e3422d
SHA512c18879c669908eecbf3de310ddee435f93b317a726cc20ce27595b6fbecd5c6f69188af0c581914e108286c8bc237192b4ad4a3b1c067391fa3fc274ddfea7f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8deabd9c9296566d451c388ec401b8b
SHA130b9be88c240a677a0ae9d604fcc543f979b0a98
SHA2562e798e11396244d94399bf3cfe93ddf192e7d74941570e4f76219dbdfe91198e
SHA5121785e7422c2fd21933ff410462ce723bf8f1ab61cdf4db2e36a1ea563421deed98594bcc834d6bb24ae8383325a6071ea9297b4465d6a27e85880f1231fd3aee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d945a9d3d6986b043eff9a7b094dd8f6
SHA1342a35a613c0c34c1054d2b01ff689188950e7fc
SHA2565aec8b9612fe6c9b87a390d756393bbc78d6a1210f5a063cee6a391fb41d4310
SHA512f473c660d042611a32439546f91f774eb4717af294fead241f6b8c438a0edf0731e84716c99b36d2b5741bf670ba0c7edf1d5a98053937d6eea0669bc969e32b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558a470c59d718829d343e8c593696bd8
SHA1174d47e49068f584dab9f4ae48ccaad2c42fe04d
SHA256d6d29b1c39bdf6ff886750c097d205a19ef90011bdbd77a84b606882caf2af0b
SHA512d9c94fee5494ed00421bc83e02671648ced5798c9701df8b47b70babf49adc87f73277266cb476004582841c6d7e52948e3efc2953243f74bd67991921e03e6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d47807284613176ad2191f1b6008cf7c
SHA138ab11cc1bbc61b2f26333d813c7e1984543cf85
SHA256b8b8e450319a59d4d9954c4f114806c7680efef760c16fe65a0281ae8b9f0d60
SHA512aadad3b0e6123a7a9f95c5b99f1c2940f552b355ee3d5c8cc26657da0822a175d5f7e551b57f29adcc9709e674d96593ee024aa8c719da1b5f2abc62159768b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51cd2e536a0e6f94bbd042c4b04193e1d
SHA17febc5ceb445ba1b0520cb6657da42490865f0ed
SHA256360f5f537e87438c2b913badf39f3126d0ae8838b5a3306ef7a9d719fc17c0f3
SHA51225b368b9c0ddda230def6799e06243fa6bd2214bc72a77f4955479d346568d0c0320f8ee4e0f5a6ff2010e7d8325012e987f21b61646d9a718194f4d599a4b97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55035dd96c7dfa083286509b8c623f829
SHA1a2702cb9d36dd28678a48e2d3418d557f6086377
SHA25610ebc89eae00ab2825ab6bb3556b8a1be4f328e77ae756cee0f02edc89ab1993
SHA512e3ddb7f2f48bb5229afadcdf6f6246d4807933fe9434080d3f204419edb12af15aa7e40101ef9c52fa3f5ab5687491bde240cbd2f4441f0f41e7d810440c6e7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57237c6030488cb3dc456d8ee46bd550e
SHA1a8a545b0da53f38490938ad38fec1def0a96a604
SHA2568022926750b3ced90463d6ed9a151eed390c8cb78ea200345680b2c7b73a7a15
SHA512826ce07a3e7515b27949cb53d81c753d5d3f41fc2e36e6d621b9485f44a5b03ec77373da543ab62076e39a42ff95ee6eeaa5712d10f1534f036913a448f36257
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f26b76000fc76d23d89a7cb735d95cd9
SHA1888fefd35d3ba7e683bf2623f534d868b44198cb
SHA2569d7b38bc835efcd820548c7fd1d72c29df3e090b178d64c760a2c6824ab308d6
SHA512f55bcf7035f66501fc18f899c4e71e293b3f569ba85ca6cee04e0dc4af0f8b016a58434ab01958ac270b8d6a5f790cec6de9aa3bd8984b1d4243d7a43596425c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8c5201e863f2cf40219aa32d864f487
SHA1aaba2e2e9adcb3f7d83819b1b1e63ebc68b7520c
SHA2561171bfb8f6d893d86b94cd8904df7e18295326fe8822a33b320670140055efd6
SHA512be78051026c36a0bf3934fba902afe00b215a619b857d8308e8724041c84a3ce1513ace774cf3259d9a04015ee3e29483d18b829ec52492ab9e46a7f4f43c547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d4f8da73723cf9892b8c4f3aafecee6
SHA1a6ef878d834bc3854c250b022aac5e61e671b799
SHA256e40a082fc63c0693dfa347364194f57d9b24b7a450c51682e3758862b05918a8
SHA5127c3aaddf270a2b4b832f27a7c1dec0f1f81e0da6c4ef7568083a915a8d8169b796fdc61980c678687c4751d6d19169dea1588653926536dc748684677383e74e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e3f192ffc890193668f58d5dabd7e5b
SHA1d0d783d97943ad829ce24cb563bebaaaa0092d0b
SHA2566ae421b75e339ff006b21ee52eb9b2a83317036047e4d101d04353a554ef36cb
SHA5128f8f1ad673f763222c011b08b6722872b2ac26bd43abb08679552019ff07250405a3351f5a28834ad90fa2dd7f39afc5c7265fcecdcc8f288958530e55cf722d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efdf9e6451a63e543c7c592e89cbcd2b
SHA1bc53249f636e82529a64829c4a386c699a03b70e
SHA256ce70531941c1d80bd7a2437d6a973dfe7d4b46d9f07824db4c84a8ce35a9d271
SHA5122484ec2e51575a74927f924031ffc744b5b1a157e59f94de224b7a0fbeada8d17bcb5294da550d2634843d17ed3a8ed15e052d5e52c0ae31242a71de491629b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec38bc41504cf9b2d6ae3d21d481f2e7
SHA1bd76937f1cf4578397a82d464736d514ab23997b
SHA25623ee371f9814445c5803a75d84acd0b1c627e7603ed545638c9069fd8eb01c11
SHA5127034a041263213f37d50b3a578833ad14d2d32f5b83b34eabf0ad9cbd4fb6b80c73a077af24f5a06cabf19c4da47f68bbce4d3675a2ad4474131c8326f942882
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD546b0fc64b4b83d3b5080964e56a4d167
SHA1a91dd736986d50ebb41124c54be7c9e069ba4190
SHA2564a7ce351495ccde25acd1234914b60a589c80736524e51291a9b180caca43352
SHA512f7e724827a3641aa50d95581536cf05b3e2af2d44b709f4285fc51b9b9c827886119004cc69acb3c6d213538aaaa85f023364416919d41405765d7e1bce56bda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d846bfae29247d64cf072aa988bdccc
SHA140984ff5edeb4a2312188d007810e5df9293ef5d
SHA2568b628fe73a7e8ef1a3bd1c47b3e955c7566d7abd6f78a3c26cb587ed39c936b6
SHA512f9eb3faa5c232cb21b16e02ad9e8cb2f2a28d791ab704a05da32405906d35d57921a2bb640ddd6f04d39d791ac7e84ab34f53b2ed8d28dd1915563fd1d961093
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed339af0301d09e6c490c6cb1c905b02
SHA19eb39991669577a136419516d795c65e110c08e9
SHA2564b9061bafb04f0a25907666c9332131ebd13013e32f1df36b5588e604caa748d
SHA5129b3ac1fa078b2a575abee96db94f55d39e430a731d01d1b58b0b3de67adb3d416ae7fabbbb30442ce81cee364d5297287e33b4159385e35f461039e03a6ad390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54416d835fe7de398f50d06067aabff97
SHA1841baff81b70e007fd6c2f1c6299c3697420c8fc
SHA2560d1ddcf6cb95cfe3d8af2cde0dac64784690720e0184f127cece4329fb149709
SHA5120af6814dca4d28915263ffead05ed222a3b177e1e9f6b5826944d2e536cdeafda35c2adbfa1f99ef3379b2c6cf547db868449086d494fab6dfb248123380ced7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63