Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 07:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://tracker.club-os.com////campaign/click?55670ms55670gId444d738c6bd137e6a03157c6c728cbc659e734fc398&test=false&target=aquajackirrigation%25E3%2580%2582ru%25E3%2580%2582com/vac/55670%2F%2Fc193YXR0QHdhcmdhbWluZy5uZXQ=&
Resource
win10v2004-20231215-en
General
-
Target
https://tracker.club-os.com////campaign/click?55670ms55670gId444d738c6bd137e6a03157c6c728cbc659e734fc398&test=false&target=aquajackirrigation%25E3%2580%2582ru%25E3%2580%2582com/vac/55670%2F%2Fc193YXR0QHdhcmdhbWluZy5uZXQ=&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4048 msedge.exe 4048 msedge.exe 3048 msedge.exe 3048 msedge.exe 4860 identity_helper.exe 4860 identity_helper.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3048 wrote to memory of 4536 3048 msedge.exe 85 PID 3048 wrote to memory of 4536 3048 msedge.exe 85 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4796 3048 msedge.exe 86 PID 3048 wrote to memory of 4048 3048 msedge.exe 87 PID 3048 wrote to memory of 4048 3048 msedge.exe 87 PID 3048 wrote to memory of 4748 3048 msedge.exe 88 PID 3048 wrote to memory of 4748 3048 msedge.exe 88 PID 3048 wrote to memory of 4748 3048 msedge.exe 88 PID 3048 wrote to memory of 4748 3048 msedge.exe 88 PID 3048 wrote to memory of 4748 3048 msedge.exe 88 PID 3048 wrote to memory of 4748 3048 msedge.exe 88 PID 3048 wrote to memory of 4748 3048 msedge.exe 88 PID 3048 wrote to memory of 4748 3048 msedge.exe 88 PID 3048 wrote to memory of 4748 3048 msedge.exe 88 PID 3048 wrote to memory of 4748 3048 msedge.exe 88 PID 3048 wrote to memory of 4748 3048 msedge.exe 88 PID 3048 wrote to memory of 4748 3048 msedge.exe 88 PID 3048 wrote to memory of 4748 3048 msedge.exe 88 PID 3048 wrote to memory of 4748 3048 msedge.exe 88 PID 3048 wrote to memory of 4748 3048 msedge.exe 88 PID 3048 wrote to memory of 4748 3048 msedge.exe 88 PID 3048 wrote to memory of 4748 3048 msedge.exe 88 PID 3048 wrote to memory of 4748 3048 msedge.exe 88 PID 3048 wrote to memory of 4748 3048 msedge.exe 88 PID 3048 wrote to memory of 4748 3048 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://tracker.club-os.com////campaign/click?55670ms55670gId444d738c6bd137e6a03157c6c728cbc659e734fc398&test=false&target=aquajackirrigation%25E3%2580%2582ru%25E3%2580%2582com/vac/55670%2F%2Fc193YXR0QHdhcmdhbWluZy5uZXQ=&1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed3dc46f8,0x7ffed3dc4708,0x7ffed3dc47182⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,14101417160894943165,8515541778716143934,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,14101417160894943165,8515541778716143934,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,14101417160894943165,8515541778716143934,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14101417160894943165,8515541778716143934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14101417160894943165,8515541778716143934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3540 /prefetch:12⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14101417160894943165,8515541778716143934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14101417160894943165,8515541778716143934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,14101417160894943165,8515541778716143934,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,14101417160894943165,8515541778716143934,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14101417160894943165,8515541778716143934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14101417160894943165,8515541778716143934,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14101417160894943165,8515541778716143934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14101417160894943165,8515541778716143934,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3648 /prefetch:12⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,14101417160894943165,8515541778716143934,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3984 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2108,14101417160894943165,8515541778716143934,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4148 /prefetch:82⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,14101417160894943165,8515541778716143934,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3888
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1244
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54d6e17218d9a99976d1a14c6f6944c96
SHA19e54a19d6c61d99ac8759c5f07b2f0d5faab447f
SHA25632e343d2794af8bc6f2f7c905b5df11d53db4ad8922b92ad5e7cc9c856509d93
SHA5123fa166b3e2d1236298d8dda7071a6fcf2bde283f181b8b0a07c0bb8ba756d6f55fa8a847ca5286d4dbabc6dace67e842a118866320ac01bd5f93cccd3a032e47
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD5c1422980e648ed14be30796de5df6037
SHA11a6e2b66eba8ee2a220f52f25c0e4225702776b6
SHA256b21db2f31f923da5280201cc99637c820a3b8e762631c7a32ce9b68b5b3f25e1
SHA512810e9c70426b5c0dd7f3b465c49edbe23858fa759d38ded0da2444016c504e95e35f019fd1fb677b52403786196cfcde36ab4252985d5b85fda17faae0963383
-
Filesize
440B
MD581070c7fbc27ab394bca4a440be1a17a
SHA1a25207e01eecdff0482f1775eac9b917adb9080c
SHA256b4e68bc05645684849119b24abaeb054ceaadba408335fae400589a681237b40
SHA5128b7df694af388e3bec5b1d31e5dbf91549622512bbf120ebfa3e33ff7a7e5765c63f2030b3262704c70c80ef4ae56d7e3a819efd1f5957d8f3d682961def8895
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD56dd7cb013962963195ab781041514236
SHA17abcbde8acf1c66774f4d7de872d2a95c0cb94e5
SHA256402d5a89355974e72a0470a5e8145d72e77c8445415c688f0f1e4d85b58f00a5
SHA512750375acdb38f259387e1bff0e14f9d5418f33edf3beb9c74f72ab3985809b36ed3d9ccfaa495e88c2c2b80c80781cbad36973005b8f5ba91457e35c60c05e11
-
Filesize
6KB
MD5fbb4c8c24a76ecd1e3af7a98a2a4c42e
SHA1290d287e8f8b1678f75f075d21a4381a7ac01cd7
SHA25644a2b4abbd3acb5c8cba207976d5eb959996f72f7c5ba14286cf7b0cdeed0899
SHA5128b07a7ac278b3b30e2f86689993ec7f7554fdeae1d4d9d8da1e11f0e65971031ec22944fd473553b8af87d21f8080ccab245e531ec7820674eaf1c342f0345de
-
Filesize
6KB
MD5b200a2952bbac6ab30c1648b3aa2ed14
SHA117e3e67a37eac3413bd3ffbe93a3aaacff7cb8f1
SHA2567ecb19f63fffe9b83dd178bb585a50304283ec041525c46f8a74acf64d147fd7
SHA512b73de9921e7aa303dc4ca4b12e84c44d526a38d32c4f3ce2806c754468d13bd9f2a462fdd6f16edac6002f673633cecd7ea66a5d9a01208eb0e61e1b09b0b346
-
Filesize
24KB
MD5c2ef1d773c3f6f230cedf469f7e34059
SHA1e410764405adcfead3338c8d0b29371fd1a3f292
SHA256185450d538a894e4dcf55b428f506f3d7baa86664fbbc67afd6c255b65178521
SHA5122ef93803da4d630916bed75d678382fd1c72bff1700a1a72e2612431c6d5e11410ced4eaf522b388028aeadb08e8a77513e16594e6ab081f6d6203e4caa7d549
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57fb36dbd50ede6c667da332787633844
SHA1086251c2e8fd103cb78a9219cf3ed8b7c21b42e2
SHA2563f964c8e62b94f7fc4a0d9839f00acc9cf281fa0cef38c20217e4403d488ffa4
SHA512d5074f01accd01a7a7777d94c8ebe3a741e3d9de19ce010c5017d72aff2e1026a456556fa1705df3f11ea4ef7eb4bc0733b416f09bc892d9c927b1342e6e1895