Analysis
-
max time kernel
67s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 10:10
Static task
static1
Behavioral task
behavioral1
Sample
Play_VM-NowCLQD-1.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Play_VM-NowCLQD-1.html
Resource
win10v2004-20240802-en
General
-
Target
Play_VM-NowCLQD-1.html
-
Size
38KB
-
MD5
bb08a303b50f6b1f5074b16ac6f79706
-
SHA1
491cd8adee8949bf58438d5fc02dab2d526a6948
-
SHA256
e7e25c280d351b26b98925fd20faeaad5972b6438b101181243822774adf650e
-
SHA512
f88081f6f90bdb09ca86a494fc71e45a37866e6b38d51f2d157a80edcbaef4ae3c9349e071f7c22e51b7b39f1ae6b84c015e97093c5e8005925d9bde0510e1a9
-
SSDEEP
768:VNoNzxx13jkpdqVT9dGpHJ1SPtCwk5SnnU+oX8w6/GOF/5EEYzx:n4hTAdqVT9dgHJ1SPtCwkYnUPX8wUGOw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000007aaeaaef29d9a2425d577f485f26e4b70695befb768cf77f91af98f11a32d966000000000e8000000002000020000000c0f7d049fefe9412fd131a82285213ab0d5c068e1e7e0ba63f4032a1ca04194020000000e063ce4157f8b9213991cd4bf8849a45b93c09cf1e4fd22d79ae50fd3f990a37400000001343701caa6cd1f8330b141fd9a8e25a33cc43ca26e3723271c3931f9895f24b1feb18e688088febb71a3a4f1ae7d69e6f60d036c5d0eff67947c3cd73eb9340 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90e62d9fa002db01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb000000000002000000000010660000000100002000000029d2040765d2203d60ddf8171749fd362a8b87b9ffcb79df8238886fa1e7c25e000000000e800000000200002000000033ee0cc33c91e1fb76a74816e159302ea6b3d1c371e9b99e8a012a929667e7a690000000ae560ff04a9d7e3c945eea03167f756dc048a184fd41a4b159bda2955cea03cc8ed8b7a3458bbacf3b3374177eef8b90a3c78ca537a1e121b4b41de6b20889928d21e595294dfcaa13efd429446b647d994d7adf6f0c92ea06cc23bec45a9594f5bf78b559e5d37e754f5814810325bbffe2231c46f5397f8a435079fe412136c39d6f8e4d487defb7ff50e47827b266400000006a85d043fe2ac973f4342192f50050c607c7ec51402ae08d890f0d98f1946e5cdf1c7a1f3e7c4c34fade33ad3e11eab4536997977cbe2f599d7f062908227f1c iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CABD53E1-6E93-11EF-9AE5-CA26F3F7E98A} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "432038519" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 808 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 808 iexplore.exe 808 iexplore.exe 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE 2132 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 808 wrote to memory of 2132 808 iexplore.exe 30 PID 808 wrote to memory of 2132 808 iexplore.exe 30 PID 808 wrote to memory of 2132 808 iexplore.exe 30 PID 808 wrote to memory of 2132 808 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Play_VM-NowCLQD-1.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:808 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bdcad9abf9801553d880a0906f296add
SHA11bb99d4c94a1dffa3200ec968d79423039cfaf2e
SHA256503cb1350f0a73a8628d6b17d1d2e454ab75bf9d6e4596831df44ae3f5de09b4
SHA51288db88b78fba223c8e50faa8c0bfd138de73042cd711cede76cd1c8011cfebe5e6868a209fc5037a94036d597ff0146d483cc4103a0b066065a6ba3f064a0362
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c619bf9bfe7f9956fe692199ebb2bc9
SHA16be2fd9cb1872c4963cdb0257d6fec04e4a5fd2b
SHA25667749850dbaa0f3df07992f91255196e22a3861e3e22f74844c7ede78974b721
SHA51224ca2977794c2a76f1d4a873a1e08304e0593738b37fb16b575dbc78a08d6a9450230ea0c47acd9692fea0427c12b22e18f35075e07d88e7a8be81af438cdcf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56843232c6ac17835b4c2ad5f842f601d
SHA1add6a557f990139852141be12dcc46d9efc283cf
SHA256b065d0d3e735dfabb5811a9fd5696f7f8f2ac710ad950204320bfad817e4209a
SHA5124f31565480d96ed87ec56a279521b30066893395af1aebd67e00384818aa792efb523f7a09e569540f69878dcb7a3cf9a10eacd19ed9f75b785bc7b188aa351e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5faa87ac90053d634596569e06f0f6ada
SHA11891630fdf62cec8a1dd926c6fca9e07d88b8e21
SHA256515f5556fc78072eec4650ca44231971fad09bfe1384b610e5fa5690c651016e
SHA512971367a2e38ebd933dc965c8f54060143a27ad06a165461558757f62431c61960c402bf2aec0cdbd335e64f40224570289a29b44c3df1483db7853ab0179f968
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584946660a29b1321eddcb6101184e6bf
SHA19ab810ca2c0e29fe8153496bc15792e11daea447
SHA2560415018b5a0fd577661ee45047d09776556d0280432aa3dc7180407cf0bab9e7
SHA512197e9bb7a8490d8e574ba9a210f7144f44d60bf2067d23a18e9d60657fbd9e50b0083385b7ada281b1b45ae131b74c1d087a47b4871e3522ac96702a6bb45a2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5157502868fd605260164527e5ac28edf
SHA15ddc364d0cf7c7e99d50be05f3579313f1275e04
SHA256c7b22293fb7dd68e4b505d426ec1da485f8b08728e34d4cf5f04ee40369f5109
SHA5121ae1aade345e0438e3c63c918c5233e16299e6c5f822355ca12045997d35a62f7d762b9a8763cde910557c23a029f4278ee7968b259fbd6fe8e72060e41e5fc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d84263f1d8a6ca306ba37d7a835dba72
SHA1528085756b82d409bd2cfd0c79c21fa8f5b33a89
SHA2565a55f6a134c64e6c2ce27bba65ded0bc7da1cbd2edd2a05064d3501e1519e81e
SHA5123842ec46fb3bc69337ab7a953fc045fc0c74b9701cab1caca2c66afdc647cde8f4560ebed3aac16bec80959b41e351d931f3be8c1e3ab0ab6a1a4f34f73cc070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584021a2b603e84f0e9978d6dd77df744
SHA197f4f339c26b65deca1ef33870488f730fc34940
SHA256b1b5856ca5448546fa8c4178fdbf5169aad5c85ce70d6f477bedbae7ca5233a5
SHA51240da8752e9588120e4c029160794160f3a7bc38c15a14a93f5445e441ad4eaedeed2acf4813df6a72bd521c38a2704cfd7f895624ff45752f5a89bf60366b525
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53548260f576157e10903ace1e8cce712
SHA1f688849b71a8546122a304191307c65d8dad4e97
SHA2562e49a3035fb46ef924c9fef339223d3a43a9d16052fce4e39dde656793cc3576
SHA512e0371c7856d0bd4eac44754170b8026bf02487f83298cb39dc241af01622fad50a615d4ff42ed376cd8919ac04adc65dfd59031c0a850ba17ecb7a7487d9d21c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fb4aa5e64615b82a2e8767354fac504
SHA12f8cba03a6d2d71239d3ba8cf6cec95a7d63d207
SHA2566d0ed1dcafdfa7d6f7e8bc6617ccbbc6d51d2ec99a0e6cf649944f33e956e265
SHA5124fc3423a3f451f3258d65595cd0da60a35faed175df980b854c54065d0cf608ee6c94beca0d04667f5e1019a50dc210958a783239ea8b99c97473cba10c9cc65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b55cfbbd92043681260359a529ac614
SHA162a9b64f849a7c31ebe482f70e7dbd938fdd937f
SHA2568a3a2f2d0c42553a1669b700d687c9c3a8f03490bfdcc122048edbcf3f207954
SHA512b70720b015d9df30c7c51e3e51a52cd53a6c8ab0198c1f791cbaa5d72257a57d95e5332cb503ef02662a1b88b0e77df5cb3a7a4921d0daead286b45413ffe0bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558f9ae8658614b5200524de088236969
SHA13f6b9b566b1b811aae9759a830d23eea21c26c1d
SHA256a30d8a0aef5e8397591ebe518e37fffaabffff4ecdd4f333e873a9d782dad6b6
SHA512933afacb69dd7cad1f03151f29cb33f41b417b0bad7c2f7dd91cf8f0b95ad9cf8790b8a0f88cacd5ba567ee951603ebcca2c9c7d14e81ee79bf509fdd1b5917b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeb957e2d2e1e4ca7d83f081a1eeb6c0
SHA15f445e39c0ca7cb6b69e764237e8d6e746c84466
SHA256c562cf66f67c8e111b42deecb5b6586dbc588346906e04d81daa84f841b46ea2
SHA512deb0a5c5a846b68f00eb9383e333a0d62ee70c4497729dc42715d39670c056ae9f86b4b169fc67a1693259621da0ac5ef8c6d2447cf6b47445b0e9d2f4935621
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5449f71fedbb3159116651f3c90210f03
SHA19c54f0cef79b2889485153639f38c37982d0481a
SHA256b974cbca54ffeee64847298ff5b3167dc7b4e89a09ec8d6fb4090ad3dd4e60a0
SHA512bbcc4053b1f9ffef48e9d68ea6dcb1fe7688bdb34ab150cba00c0d7138bcf6908e30c1272ab573de3c470c41b5dd2fe52010d138cc920ae0be7afd4fac617d03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ab031a5d285caffdb4c1f22fb77c2c77
SHA1fd5b54ff94c6d9ecf90db735085f5ec4f20e2e14
SHA256023a9373f07f16167ded3bc7f5fa8c8191a270b7688e299926a5d980ffd28227
SHA512f5db00a080bbe50addefc8f185d783fbc5d4f8e1a4e4112273dd7ae080264b006fe340eb4e5aab64c1b3975b57921927753cbb682fcf9de89e1d4fb6c3b37624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b3805a99807a9dbe43c2e71b7db5b689
SHA11b290f5478760812522525068f21f8fc3343a9b3
SHA2564ec98b5dd7d66bfd6e86a0e602f7f04f436ef10570b8d7b9e5f9e9f3d4464537
SHA512e4d4b134e747ce9cbaf168f23af02e02487555a94870bb45a1bad08cf9413ac07ba599db13e0bb923b3048278f51ed552fd6048aba5582cc9dcb6e53067e23ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53878f1960d742060738b5da95b571486
SHA13331561427fe30ccf8fc79967e0abea7752b04cc
SHA256125f02f48d7246a9f138aad43133c9705546824f107b15a8e1984f341bd684bf
SHA51260f4865fa1798f5e779ec3fc04a801a9b9793c22005c23b123303c741b389927d8fb9817d9afe3d95fbe7144aab4ac905162a19ed63e90b23d3988a4175bac28
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57a10ae0b7d72aac7e32d8dab9cffcbc1
SHA170815b8b9585a3711ad1c208c706e035ca10f8e4
SHA256908e5607f396c541fb4f7358c3a86146f9cdd1e42dc77d50586fe2a42e62d514
SHA5120be49bcf6a9d2507018c979537b6bbf8a2e14fbdab0b4e96e319d99e137112a59e6aabb31478bf8cb256c15e69263991dfdebc948a246d0095d5c396bdd41b60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5961b957837f9c3637771d0bdfee69cd8
SHA1d28193a450b7c172915635745953ab854f1ec4ed
SHA2560a088d474737a81770ae9528caa49a7d0de5eaf6b7961d5d1cd1b8aaac6b3e69
SHA5129c15994f4abda7050463dcf6cbb30e001ce5384fbad2ce00c5e1d19b645f58e290c8a523a65e05edca0daa4d469bc7760a603b76eb3d0fdf9585a710db35bead
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b