Analysis
-
max time kernel
35s -
max time network
60s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03/09/2024, 21:19
Behavioral task
behavioral1
Sample
04d7b5c1faf8782712e5f8d7dc373485a6a00d747ae4134ff43e734a1895c3d6.docm
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
04d7b5c1faf8782712e5f8d7dc373485a6a00d747ae4134ff43e734a1895c3d6.docm
Resource
win10v2004-20240802-en
General
-
Target
04d7b5c1faf8782712e5f8d7dc373485a6a00d747ae4134ff43e734a1895c3d6.docm
-
Size
206KB
-
MD5
0680f1f2d8663080d3156400a8d59748
-
SHA1
3a9cdc306df8296201ddaca96b7b815a529e48f0
-
SHA256
04d7b5c1faf8782712e5f8d7dc373485a6a00d747ae4134ff43e734a1895c3d6
-
SHA512
a3b5f6f1d8102ab1c5f04d21b7f41b315d6bde1cdbf2ded1fb35fa9eb7d515d9a3694a35e120a0c98ea8c78798bf07e5cc8032e604479420e6b7d358325969e3
-
SSDEEP
6144:dExHVH3zJky3eEGVdajJ66tAhUJOO3NVfxseg0:WZdkyuEGfMuhU7n5N
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Office loads VBA resources, possible macro or embedded object present
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000d6385ed220413b8cf4962dafa0c6a7f508049f73d5d808f4a9faba2d29cd5d04000000000e80000000020000200000006ae36498057caa2ecd40835e1bd139563b46ec9c10e509022677511814da4fa690000000bd8b146a21818a02e79595f3209e78a46f9e830ede93a70fcb61b7af29399f24126e31bc09175350b6797946034d596336fd6070758c88c66eafc663011de5c4693c4d1d50ed440c34fece602d2804cb9f6e0de9aeb2462a3cb4541bdfd881bb4e9bc8aa49bc439e186766f8d7ca581e7b9715fa5b28fbab227939a27d9e6d0eaf9011177a15d43e517492c5e3413d754000000075c2c4584828f2789572df84808cabd320beafde15a8389c3b919f4e9fe1d5cde66751af85a30115739a854c1a3829e2e17871579d37bd230ab52a73993a2fbf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{30249D01-6A3A-11EF-8E54-C2CBA339777F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b05d280747feda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c00000000000000010000000083ffff0083ffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000c21d2af3a01a1419b9fe136470737e06bbbd42741844427707efe13402358d8d000000000e8000000002000020000000a75a255faf1acc0ed6240e19e3894ca5a358f56d19d1a4e31eda4b51368ebdca200000006edf6c88fd470be3d66867eb81a709b3e904189f2dd9421cbe7340f86b0727c040000000a25451a28232128052c28955631144b7f44577f5e2ea96b159f4e096f514378c5df51d170c27bce51cadafb85be508f9c5665ea1bbd1415b8abe75fc7d30b6ad iexplore.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{04598FC8-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{8BD21D12-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{47FF8FE6-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents7" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{47FF8FE9-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents10" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01}\ = "OptionFrameEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{8BD21D53-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcOptionButton" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{5CEF5613-713D-11CE-80C9-00AA00611080}\ = "IPage" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{82B02370-B5BC-11CF-810F-00A0C9030074} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074}\ = "IReturnSingle" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{8BD21D23-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcList" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{4C599243-6926-101B-9992-00000B65C6F9}\ = "IImage" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{47FF8FE1-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents2" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{47FF8FE2-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents3" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B}\ = "FormEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{47FF8FE1-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{EC72F590-F375-11CE-B9E8-00AA006B1A69} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{04598FC4-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{8BD21D22-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{47FF8FE4-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{7B020EC1-AF6C-11CE-9F46-00AA00574A4F} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{04598FC6-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B}\ = "FormEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01}\ = "OptionFrameEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{944ACF93-A1E6-11CE-8104-00AA00611080} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{4C599243-6926-101B-9992-00000B65C6F9}\ = "IImage" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{47FF8FE3-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{92E11A03-7358-11CE-80CB-00AA00611080}\ = "Pages" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{8A683C91-BA84-11CF-8110-00A0C9030074}\ = "IReturnEffect" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{7B020EC1-AF6C-11CE-9F46-00AA00574A4F}\ = "CommandButtonEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{47FF8FE4-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{5512D113-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLImage" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{5512D119-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{8BD21D62-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F}\ = "TabStripEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{47FF8FE2-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents3" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{47FF8FE9-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents10" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{04598FC9-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{8BD21D62-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{04598FC8-866C-11CF-AB7C-00AA00C08FCF}\ = "_UserForm" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{9A4BBF53-4E46-101B-8BBD-00AA003E3B29} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{8BD21D13-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{04598FC3-866C-11CF-AB7C-00AA00C08FCF}\ = "IScrollbar" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{4C5992A5-6926-101B-9992-00000B65C6F9}\ = "ImageEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcCheckBox" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{8BD21D12-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{BEF6E003-A874-101A-8BBA-00AA00300CAB}\ = "Font" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074}\ = "IReturnString" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{5512D113-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLImage" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{5512D117-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{47FF8FE9-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{5BE9DB4F-967C-48A6-B837-4A7E88C6285B}\2.0 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{8BD21D22-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{47FF8FE9-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{04598FC1-866C-11CF-AB7C-00AA00C08FCF}\ = "ILabelControl" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Interface\{8BD21D63-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{944ACF93-A1E6-11CE-8104-00AA00611080}\ = "Tabs" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{8BD21D52-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Wow6432Node\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776}\ = "SpinbuttonEvents" WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2660 WINWORD.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2056 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2660 WINWORD.EXE 2660 WINWORD.EXE 2056 iexplore.exe 2056 iexplore.exe 916 IEXPLORE.EXE 916 IEXPLORE.EXE 916 IEXPLORE.EXE 916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2056 2660 WINWORD.EXE 30 PID 2660 wrote to memory of 2056 2660 WINWORD.EXE 30 PID 2660 wrote to memory of 2056 2660 WINWORD.EXE 30 PID 2660 wrote to memory of 2056 2660 WINWORD.EXE 30 PID 2056 wrote to memory of 916 2056 iexplore.exe 32 PID 2056 wrote to memory of 916 2056 iexplore.exe 32 PID 2056 wrote to memory of 916 2056 iexplore.exe 32 PID 2056 wrote to memory of 916 2056 iexplore.exe 32 PID 2660 wrote to memory of 1948 2660 WINWORD.EXE 34 PID 2660 wrote to memory of 1948 2660 WINWORD.EXE 34 PID 2660 wrote to memory of 1948 2660 WINWORD.EXE 34 PID 2660 wrote to memory of 1948 2660 WINWORD.EXE 34
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\04d7b5c1faf8782712e5f8d7dc373485a6a00d747ae4134ff43e734a1895c3d6.docm"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://eu.onamoc.comano.us/XQkEvbjdHV3M3aWJ1dDUwQStxMGFvdHpWRjlPZWUvT3d0TUJZMUZRUmNjOXRFTzBYbThLMDFMS1k1WnB4Z25NZUI3cVpacXNqY0RLVE1Fa3Y5S2pWbFAvcTZMakx1ZWExbHlsNVRDUUNQVk5rWW5CbHFVMWQ0ckdqb21yejZGSUQ2OW9EcG93K3pFM2N3TGNyNGZmK0JwTFN3bWN1ZG5GeFd0TG1YK2Y5dUN1SktCRFVZeWNMNi9pMU1yYjZDbVQwemRPZkVRPT0tLTl1NmFDdHV3NExKT2tiT3ctLU56OG5ZQmRPUXZBNnFJMUs1QWR5T3c9PQ==?cid=2736294752⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2056 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:916
-
-
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_645BC4A49DCDC40FE5917FA45C6D4517
Filesize1KB
MD5ff29a60ccfb08f30dd431fd8782c5c83
SHA1a55fb32b51b64509a2570130fc05c20702ade46b
SHA256742316ed89dde4e98d394e05f08b1261bbe7817bc20f6d37074f76a0dd7c8db2
SHA512d04210a1c2d18dc3d5e4de6632071735e4572a9ddd9fd180d7fd04dd950bca9f8c23de2f036c484d7358a4e10aecce21958cdf285c254b96ffa46a274d9f9fe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\83D863F495E7D991917B3ABB3E1EB382_4AB4D5CC97CCEF05D12D9E4436C36478
Filesize471B
MD5ce683c1783b174f355ae85844be04c6f
SHA1ea681f072e96996b13fef6cb78b1bae7945e2dce
SHA256d610672e60c7bce2ef18bb2e7fb0d39a31cd210aa322b86a6e167c8e057ea8f8
SHA512ec99c43ed09c0066c5698ae5711dbf7acbfe673276eeb06b11762548943548204a25c59433b40d1a07b3288c3c4417b9445ee64f381febc875202f57110ce812
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
Filesize2KB
MD5837ee89c28f208c5f39ef8b2417762e8
SHA1b5b86a602cf308c4ebc11c580a2983397dc98387
SHA25661d0fb9ba441a7f9b2a9dbaacf60116980546cd88f536b2ee1be3183f6056d87
SHA512fafc1ea2ce4cc84ba53449150f3e3a5770706b7e7dfb28602f4f748b373aef07ce168181acc2da70c423d6444214cf30a875f5d38bd3a2142b5c01ada21cb728
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894
Filesize1KB
MD58bd37f60b635378f3c5997940f81ecb3
SHA198e2debe82a3350dd28df3d471781431f0456cab
SHA256d16ea0432e4efb43997a17c3eb3353654098a62ea0670717a1982390421edd07
SHA512a8e773e3cc0900287b55a6365568e1f4922fcdb55698722ba746fde3eed1d61565accfe53c6007c825765f8d1ce581bb5a726f8a6dedc212e88fe6063ffc673b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD52730a61bab280d3d20e873ebdd3f59b7
SHA111781fb6d14530817c175154c98ed8a6928dcb7c
SHA2567a3c1948257d1c1774687f6d1a90889eb4447af0790e3c3766b235a97605945a
SHA512f3c951a1520166980da2c7a6fbc457815abf37fe42439f7c9b0207ebbbfca1c69394bb8974e3566ff557fe57d315b40d3c6919af113076c64236c741323759ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_645BC4A49DCDC40FE5917FA45C6D4517
Filesize434B
MD57ef78b48dd5ec53fdd6a57686a62687b
SHA1476f1c4a0c426a4e84faf6e47413501ba1a59e40
SHA256869bd4e3bd94af6216ffd7dd92f23b743fe2550eff21701d9d41dee5c10d016b
SHA5120d6f79c8152ef6c3e3dc7a23f63633b7380c9b2c844c1244a39a62955dd29893cd3ca8ac2a5bbdcbe9cad35c209c69fa0f841b7576507b4cdc3437168819a9a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\83D863F495E7D991917B3ABB3E1EB382_4AB4D5CC97CCEF05D12D9E4436C36478
Filesize422B
MD5a9b07d4cb51c6f7c4f3f6c39be35a8cc
SHA195fea924454169a3cf9b91a4f809324919240dbe
SHA256ea39e39b9ed68447423e5dfa7f7bf7814a65545bf0ecb648b13a1ed58cb10cb0
SHA512ea0ba50a80f5f8ac5079e0cf58bf13083a102058b52016303aa33b4ca9c65d0c10143a3e6d0a427cdba7f5d66d2375101b06f90eafb96f00b4e6797524a32b55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579833527928c2857ff7e4f953fff0480
SHA1fe64ef687c3002245778a7016f994edfd721f6b6
SHA2562cbbf752666f479eac8d6fef99db13ba222a346010a5c958861a787db8567a97
SHA51215513319fea6589e3317a46e9c9d78f55bfb7a8fd08f50f769b3ee6410c27b282e9ee5bbab12f18f1c42935b1af1ac6e1ea9c174ce67e73bca6e03ddf9e67398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e555584a5ceb2ec77a1be04f255d7b50
SHA1c548dad807ac33839080e1268279b16aa45b35da
SHA256d2dd1a2a284ad00ec86c2cd78ed93afd815a0afb52cc4acfebde4648c331fcc5
SHA512079a1b2010bb9ba3e42e5f2101eca15a10d716a6804a6e62ffb376ea7d47168c261a3fde373e0e0bb617b5246bf1711002512c1ba0e61310314a6b1d86834101
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d47fc3cc63f41fd09ba2542671699bff
SHA12d16d6c91a92f1e4a0c0347e44669217d0b81102
SHA2568039f2c144c30ca74dc467af2d878629eadfd09aaf46425dd21092326c99824a
SHA5121d63fbeae5969a6319a873387120d13fb5de6d35355efb595ee2a63d74f99b1bc584627de1e2c9c42a6f1322dfff08d95eaca84dce3db42030737f32b674a2f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2476705364f1bbb7fff8f444d7476ca
SHA1d7f17550a0e725d4c776a4c14ee03fe2aef60db9
SHA256a6b393385cf2a914f60173db87fbc7677ce9fad2aa788f115b1d4196eacaba85
SHA5129c8d8a8109a5368f8815ac3101e0039b7e09adb26060757c48d10c3838e3e745b7a4a93122528fe5342b2333fd0ec04f6754cd4664a1c1496e05bec6bbc76bfd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2575b9078dca7352dcb615613b901d8
SHA1b2bac13f8a531dd7f1b6642964a276c7a18682b4
SHA256b12088c134d82749102f0a14c2f20194c6004850fe4a33121f28c0f9352906cd
SHA5128e497737d5102e856e47486b7bd83965f87d7d25c3586a0f3b7dea73b1acee9d00531a493d37985ef2b0f75a8403e6766d254f6683e4a83c37f203e37d7bcecb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529761a48401d336dc3d3450e852d720a
SHA1f988bb0c4ec24c6dd8a53455997daee056fe7f85
SHA2561cc4f0ad71836379b82c3c11dcec14bf8caa969e9676ab3acc8caef30de0d7b2
SHA512bf08c6ede45182b9b7060c78d366261984e24ede6bca9808d34601f7f5bfa7315087f770c9db5940a26c327d28fdf6d6e29fc3100a3a84fc7d6a06c6cb02e02d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e93a797d514109980874306fc84c8bd
SHA194658fe510f206794bb30318b8439188517a1a87
SHA256c22cf0e321aa52e08017371bdf0c7672e1e8f438835ed3589f201d3407f9f8f7
SHA5126c4474a4e043b78652f7b3e7b379249f05681ad56ec0eadd2b03f7a2b0822f41c07f025d0eee34668009dd50a404870f16b247fc86c890a1e286836c06200746
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cc57beb0c795551ddce0213c52b3f24
SHA1a824382cb1df0f384a2878f41065ac192ee90adb
SHA2565a621091119d61e52c2eeff084eb7b4eab78594a87acde799e042709acae4ea1
SHA512dd785a87a4b5d68727b85ca7916c8cfb33b464761e50553c509ab6c9cd38daaa840eba834f44036848d9a40b33ea14ac66af4c13ef590055b03a8f06c0651b47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5250d01d52dbaea71a26e800be7dcb5b2
SHA1ec7c1b558b602fb2072e3c4804d0ae4f422aa4f6
SHA2565f4b4e8278c53eb9a451afab1599a07e872db09719b05896e6493cf9fb4bb146
SHA51215783b1d1bd830f0f45889ac43fd4b7d9319010ceada24216b9e92b1e0c3d456e43746826a80cbaeb626a568e3ebd67cc2524a3719ef6450031680875f1aa1f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cab509e4fb5b53907c7ffd1220c95a17
SHA1949aae160f6866e8c2817715613e93ac1b8901c6
SHA25615fde6bd856653224998481c51a0e263006c1d5dc0b30a0df0c0bc6d823729cb
SHA512259b354ed631d4d1bbbfda79fa3d8557f42b683b5d784df3e3c1871782dc53815e65487e04b25fb8ae5cffe00d0f554594636e4ea7a355f0b4ff95dd46667bb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51eaedbab27c396481e7d454d8936cc18
SHA102b57443e85f2ebdc2cbd6e752ec8ba54f93294a
SHA2569bf94e97c8c701f2da6ed134b06b20337a8d7f0601cdecf121c7d501f756d9cb
SHA51268c7d0bfa3c835ab676b652d1991e8237959dcb7e890093f1a14e856f44af2235029be2ed4d4318dae929f27cc2b94b1e7ecaa5bdf85ebe134d61934db31a186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c3ef0f2f95612ff85a4e899a36ee8d5
SHA1ac6f3f423cb44b33fc2c968b391a9166eb31a8ae
SHA256c5c760c173e43750ecfde68fb983c1cbdcf687e394e608a43ffd0225edfc2be0
SHA512fc003428d6ec0e035c3125b0a2e5e568ada69207f875b68b4a5f6a7b6bcbe939d3e1e88e738db30dcbe088e9a8b83299da94a2e062aeb490c8f286dd3645e979
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6225e6adcee640549fa116e7c849b26
SHA1eb9168a1d08b6d75c2bc6e5da361817ecf6492e8
SHA256ceed764f8ef129a6205346bc0c3a7e117b554e3116f93cf71d8bc7ab169ddb44
SHA512d7f53766356037b561b62b5daaa1530b71d9cc40c2756cca67893a75356c3e6f9ae3a99aad832a1e3e58af1bd373a631c10ad1e64ccbf0b2a1916e37c65dd321
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cf68f5b6a4c3cb41596498c06111de59
SHA1177e681760ee6f37ac6574000b91cee1aedba5a2
SHA2563bb83e001f863e654bc5251363912d915610b816fff9736b3003ed1da99c3f9c
SHA512a33ce78e2c27ba52f778861f315f687baa0cdf3603503cf74ecc277c9f84340156ac79feb876ea16bd6c257f4ac3e38345d1c598065b20bb09244e0fac5e6d42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d54c9c402783e0e11cd9e1ab11237ee
SHA18f177b0502e90e9a68a427c0ade4afe12b61e918
SHA256abe8b702cc95a9a64c15ba7f220bcf973ba4173a42c88bdd5ac8d7e812b81430
SHA512e293e59f00ff5bace962bc10853d0a54589791fa670b4ebdd674489dc53f10beca2db4407a5c46548031730db2a83363219747147c5f4c1ba87fc0748526f1d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5b680663067b477ee324cb38ab71431
SHA14d1af2344726e6b764ee8e9b10411a5d8a6b596c
SHA256e1d5a060604efe73f460f1e493c94750bb2bfefd983d9d3fce09b846305a2e97
SHA51298e5468892819abbed739ec491e29c13425192f11ab1fb56db786cab3f4ad5f72e037d7ff7125c1f82db8c2d06c81261ccd47941a2ae0613b43746cb7eeda4d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544b05aedc20af774ce0af35261fe1df3
SHA19dcd6f581cf0c6aad18912b45de8cea7d1a250f2
SHA256d6edc6e54cc833f326aa460d50e0995b5f404f0f47535c7bbf1563a27b051743
SHA51292f505215e964a254964cb7ccdd404f6d2e9a7902e29411cf4ba2898fd76ef3efeb9061c797b6f79792c6b4d3407b0045f8157b7ca978f4cedaf0d0c9f29c14d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bef75fe175ebda98395809356a3c5f15
SHA1b12f3635e8592c27e31e4eb556fcafb8de6f71ff
SHA2564b6e5451eba876834324aaaa42cfec87e3664466a1239daf7e2e26c6f1769428
SHA51230a200f0243a11befddfbd8875633415d5ba0ebf312dbf9ab919eae9075ccfffba55969d8b89dcf4bdaed94229dc40c11c7f14ed2258e58c9d0fa3b528fc2e7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8820efdc77480b0e23598974f357131
SHA10b9d191dcf5712d07ec7cc182d8ad82a038f6c16
SHA2565dc3c71be84c03932489bd89e0d2c44c4727935a6f4bce96bcce83d4f9202881
SHA512e7771b8db848f1f6882ed4ccf3eac4cc0edf569ba40f0a4734bbd4d93d6744fc8c6cf2610fcc088a3688600701f055d555f8823b0f9cee6760f0cdc8d6f746c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556390dbea531fb187e06ef52f7679061
SHA1dcfa24b4f8659c7a38b1b2a88ab6981969e32771
SHA256e696c22e8100703cbd504b0141434c9c340975d37072493338e25bf84f1dedc2
SHA512358ad37eeae6c35efe8c201e58c42aedddf0c08a8a4153f4a0cc6c43a78240887f286b34d39977c07833736e1968fbc6b15b0c664fe6285bd63269adbd52d48d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62
Filesize458B
MD58ee6f634a41f062febc8d649e21c3f05
SHA1d5dbca660d78c50df60a210eb77b36d3654a33d5
SHA2563cc418b21ce460fcbf49076b108f430576754b5f5a51c294d416d20ab264af25
SHA512cd3e5012d05842aa83f6eadf20ac1ad3ab952b83e6fe82a042745e7fb25c2271a34cba94328e7d20966b76e388dee7942b13abc26cf2ed48c46f71d9ec587005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894
Filesize432B
MD55b13933f4800c52f5fc36eebcda0eb3d
SHA161cd96fc3d12740f213bbf4481635fbe8ac3e176
SHA25625b61c9f63083b22348be9dae7536d152e606f7181770a330ff5b53cb9438af0
SHA5125a09a0f72c5eff618e3e56ed32dbf892b7732ddc58c23ee9fabd3d18e49e40c24a1687f631afaad51ee3344401028491ca4dd7bd4537a5a5a5a5e9847a3235a4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b