Analysis
-
max time kernel
1s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 13:47
Static task
static1
Behavioral task
behavioral1
Sample
22ed4e3f3bf70565d7b06ac317f93aec.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
22ed4e3f3bf70565d7b06ac317f93aec.exe
Resource
win10v2004-20231215-en
General
-
Target
22ed4e3f3bf70565d7b06ac317f93aec.exe
-
Size
512KB
-
MD5
22ed4e3f3bf70565d7b06ac317f93aec
-
SHA1
f6efda263c340f6d560aac158b82dffafe110794
-
SHA256
f629280bd3147000718ec60d7e6fbdd26f36580c15c6d903b8c6f1e27ae857da
-
SHA512
b49c958bd6b3d3d06e74ac52c2c4fe4ed7659373f09fb74767224e85e2191e6ca8738ee38a463f97b63de15111c7a255066b1cecf95a1dc93aaca4c0f0ae0c38
-
SSDEEP
6144:1VY0W0sVVZ/dkq5BCoFaJ2i5Lf24C07N5OvSLTUF6pQxI6Upe2cBnTu19bcodj6Q:1gDhdkq5BCoC5LfWSLTUQpr2Zu19Qm5v
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2720 xhwiikgtle.exe 2792 pkhlsujeeuihieo.exe 2800 tzaogzps.exe 2796 ljqnznszryndj.exe -
Loads dropped DLL 4 IoCs
pid Process 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\bmvpsysi = "xhwiikgtle.exe" pkhlsujeeuihieo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ldtuoclj = "pkhlsujeeuihieo.exe" pkhlsujeeuihieo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "ljqnznszryndj.exe" pkhlsujeeuihieo.exe -
AutoIT Executable 22 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1948-0-0x0000000000400000-0x0000000000496000-memory.dmp autoit_exe behavioral1/files/0x000a00000001223a-17.dat autoit_exe behavioral1/files/0x0009000000012266-5.dat autoit_exe behavioral1/files/0x00320000000155f7-29.dat autoit_exe behavioral1/files/0x00320000000155f7-32.dat autoit_exe behavioral1/files/0x0007000000015c40-41.dat autoit_exe behavioral1/files/0x00320000000155f7-40.dat autoit_exe behavioral1/files/0x0007000000015c40-38.dat autoit_exe behavioral1/files/0x0007000000015c40-33.dat autoit_exe behavioral1/files/0x00320000000155f7-42.dat autoit_exe behavioral1/files/0x00320000000155f7-43.dat autoit_exe behavioral1/files/0x0009000000012266-28.dat autoit_exe behavioral1/files/0x000a00000001223a-27.dat autoit_exe behavioral1/files/0x0009000000012266-21.dat autoit_exe behavioral1/files/0x000a00000001223a-20.dat autoit_exe behavioral1/files/0x00050000000186a3-66.dat autoit_exe behavioral1/files/0x0006000000018ae8-72.dat autoit_exe behavioral1/files/0x0006000000018b39-84.dat autoit_exe behavioral1/files/0x0006000000018b11-81.dat autoit_exe behavioral1/files/0x0006000000018b11-78.dat autoit_exe behavioral1/files/0x0006000000018aee-76.dat autoit_exe behavioral1/files/0x0006000000018aee-74.dat autoit_exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\xhwiikgtle.exe 22ed4e3f3bf70565d7b06ac317f93aec.exe File created C:\Windows\SysWOW64\pkhlsujeeuihieo.exe 22ed4e3f3bf70565d7b06ac317f93aec.exe File opened for modification C:\Windows\SysWOW64\pkhlsujeeuihieo.exe 22ed4e3f3bf70565d7b06ac317f93aec.exe File created C:\Windows\SysWOW64\tzaogzps.exe 22ed4e3f3bf70565d7b06ac317f93aec.exe File opened for modification C:\Windows\SysWOW64\tzaogzps.exe 22ed4e3f3bf70565d7b06ac317f93aec.exe File created C:\Windows\SysWOW64\ljqnznszryndj.exe 22ed4e3f3bf70565d7b06ac317f93aec.exe File opened for modification C:\Windows\SysWOW64\ljqnznszryndj.exe 22ed4e3f3bf70565d7b06ac317f93aec.exe File created C:\Windows\SysWOW64\xhwiikgtle.exe 22ed4e3f3bf70565d7b06ac317f93aec.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\mydoc.rtf 22ed4e3f3bf70565d7b06ac317f93aec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\CLV.Classes 22ed4e3f3bf70565d7b06ac317f93aec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com1 = "32322C0B9D5583566A3576A270212DDA7D8264DC" 22ed4e3f3bf70565d7b06ac317f93aec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com2 = "6BB5FABFF965F19584083A4486EA3994B08A03F143610348E1BE429E08A5" 22ed4e3f3bf70565d7b06ac317f93aec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com3 = "2EB0B02047EF39ED53C9B9A733EED4C5" 22ed4e3f3bf70565d7b06ac317f93aec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\Com4 = "7EFDFF8D4F58851F9032D7297E96BCE7E630583767326343D79E" 22ed4e3f3bf70565d7b06ac317f93aec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom1 = "E7F36BB8FF1D22D8D173D1A78B7A9163" 22ed4e3f3bf70565d7b06ac317f93aec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLV.Classes\StartCom2 = "184CC67514E6DBBEB8CB7CE7ED9234BC" 22ed4e3f3bf70565d7b06ac317f93aec.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 2792 pkhlsujeeuihieo.exe 2792 pkhlsujeeuihieo.exe 2792 pkhlsujeeuihieo.exe 2792 pkhlsujeeuihieo.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 2720 xhwiikgtle.exe 2720 xhwiikgtle.exe 2720 xhwiikgtle.exe 2792 pkhlsujeeuihieo.exe 2792 pkhlsujeeuihieo.exe 2792 pkhlsujeeuihieo.exe 2800 tzaogzps.exe 2800 tzaogzps.exe 2800 tzaogzps.exe 2796 ljqnznszryndj.exe 2796 ljqnznszryndj.exe 2796 ljqnznszryndj.exe -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 2720 xhwiikgtle.exe 2720 xhwiikgtle.exe 2720 xhwiikgtle.exe 2792 pkhlsujeeuihieo.exe 2792 pkhlsujeeuihieo.exe 2792 pkhlsujeeuihieo.exe 2800 tzaogzps.exe 2800 tzaogzps.exe 2800 tzaogzps.exe 2796 ljqnznszryndj.exe 2796 ljqnznszryndj.exe 2796 ljqnznszryndj.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2720 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 17 PID 1948 wrote to memory of 2720 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 17 PID 1948 wrote to memory of 2720 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 17 PID 1948 wrote to memory of 2720 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 17 PID 1948 wrote to memory of 2792 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 18 PID 1948 wrote to memory of 2792 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 18 PID 1948 wrote to memory of 2792 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 18 PID 1948 wrote to memory of 2792 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 18 PID 1948 wrote to memory of 2800 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 22 PID 1948 wrote to memory of 2800 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 22 PID 1948 wrote to memory of 2800 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 22 PID 1948 wrote to memory of 2800 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 22 PID 1948 wrote to memory of 2796 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 19 PID 1948 wrote to memory of 2796 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 19 PID 1948 wrote to memory of 2796 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 19 PID 1948 wrote to memory of 2796 1948 22ed4e3f3bf70565d7b06ac317f93aec.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\22ed4e3f3bf70565d7b06ac317f93aec.exe"C:\Users\Admin\AppData\Local\Temp\22ed4e3f3bf70565d7b06ac317f93aec.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\xhwiikgtle.exexhwiikgtle.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2720 -
C:\Windows\SysWOW64\tzaogzps.exeC:\Windows\system32\tzaogzps.exe3⤵PID:2572
-
-
-
C:\Windows\SysWOW64\pkhlsujeeuihieo.exepkhlsujeeuihieo.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2792
-
-
C:\Windows\SysWOW64\ljqnznszryndj.exeljqnznszryndj.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2796
-
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"2⤵PID:2636
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:2612
-
-
-
C:\Windows\SysWOW64\tzaogzps.exetzaogzps.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2800
-
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD5954ecdbc9ad9da3a0d9439140d22abf9
SHA11f76e61124a82d5615b4c2a23bc205936eceb827
SHA256bf9b1e08ca0802c3b72d2e2f4fdd077364cf283114e3050c7efa204cd865b345
SHA512726a30f156aa6eaad80d5a9e1e2198f3c21dcb6e9ceccb3247e2588dd601cf223da2e3118fcd4f3f602d3de256b806f0c10f76a4be64982b4b29911e3422f4be
-
Filesize
12KB
MD59b26346e6d2fe8bf4b9500bb1f33ff1d
SHA13ed798643cdfcf9cd57b721cab5ecc2949e0cfd5
SHA25680e6a162b32d0e9e22efb20de624dbc37cfd90da55d3ca3d93e9030c228d44e8
SHA512c6b8c9f2584fac3928f779f86711a23bd545317b38ca1be855083dd16409dc71a4fbd0cf8fc8ec3c442b4e09dc62cdc255e53aa22aae0c6c77c6e4a4a72f2937
-
Filesize
20KB
MD52e3885ed2bbdbd2dec7457a70749a72f
SHA110b7c7cc759069978074e328c052c353f54cfe25
SHA256a2ea7efcb54abc52342c857d5842c4c66d4151f4ec2d47b375c9cdf2398ade3a
SHA512c2b4ba2b130216d072057c87947bdc4b1027a0e9f558c07c35b85cfac7f1629483f276583edd44bc62406f7197207c65effe669303ae9412106be8adc3ca107a
-
Filesize
45KB
MD57b7b6230297c48362e990dad801bb597
SHA10e501cbe9c39fab73b2f41b572b527347415528c
SHA256328bf284b64c7d81c6600d8292872ec15844689c38c7cfaf7d9377ecd57ea4a3
SHA512260daf45fde4d445a65c8682c5eab83e34e577d619435f711a89aa6d44384aecdea4918a108085d233193cb57d4f3e6dddd277037fb6f56597359d8cc576bf68
-
Filesize
1KB
MD51c9fe21bfb90ac9ebed670d4adfef68b
SHA12cb6f4f18ce162601f4ad2f97e680d859d81008e
SHA2569c5127f2e662905231fce155b8810fd0489aaf5fb586591f79b307476a8690b0
SHA5126dba9a9d5131d56e7b5886298f76224b0935c67d8ffef184d228cb2ef363d0c0dd61df52030907b9234fa2bc93161b2627e60ee4f098017eceb171cb35fa8408
-
Filesize
5KB
MD503b57330f8c5a226e804d947afe09ad1
SHA156672a982ec93b8d2d37c8abdb15b28e9ec29314
SHA2568ac88feddd3452d21cf6efcf1a8aefc48d912cf346953e307b985cd47ca14d44
SHA512d594e4d6459e40a72f791b2ea682eb04160110d5c7510bca787915f7a6504f374b9cb1e158ed1c91ff6675c382dd4a504516d876a8f882bd2c4d5a4b7cf4e60b
-
Filesize
76KB
MD5090fbf3e519db5291ffd48b21c855c7b
SHA19bf6380e3e13e8ff5fa1a26450d957f4c3bc19ad
SHA256023c560ef6e4390c3ddde901057c3e506b86f874e373faaf16ed10c763c8a7bf
SHA5121feeee4013b4372a79190b2831d46657fc377b7176725060a6e353e0827439f967bcb8cba252652df8dde6d32082268b166a0607f1ea16181c8b8349aa6c4ebf
-
Filesize
15KB
MD5602abc4dc58a158294b8285b295eba99
SHA111bcbfd073c391da391d540525282978c7beb66e
SHA2566309f3bf697801d2c28701198bfd0fbd3def1e0795e68b0fb79d23830bd422fa
SHA512dfd4bb2e3e64a0ac04a96807b762de41395f598aec36fb53ea90df01cff0150ff8a7bb9e404beb2ee70488c0826fbc45858414f9134996936827ab6ce8880958
-
Filesize
37KB
MD5a2548e15fba3e23c2f3f4b8f82e15d9c
SHA1c762750fa9574933b05ca705ec3b213e9aaef942
SHA25665c15a9d23f66e2ccde4e280a49d147300418d816b7192e36e125eb3f7a90c47
SHA512e21c064c28e12d549bd9316c9fd36e3ffdbe1a7ae69651c509377b0b09fc06e0498837d0bf08eef9bd27b4a6b36e5dc10cb21df444f8b98cb618569a6012270d
-
Filesize
45KB
MD5e8d0a210a7de9cb675e1378280b0b6de
SHA1c2ab939a2766a03bf6c24459cd935c2d580f220d
SHA256c7c4be5ef5432feb35d5b82dadc75a8e6292be3f6630a23c22c1b66957344d0b
SHA512e3aed655216ba65313dfc649215cb55b215aa5a3bccb14598d335ada70f6b0d02cc0133b02e755ae53f6e3983c19366dda6364ca91976fb07def3f5eaeb54fb5
-
Filesize
49KB
MD50c27f58d42fc8d29c2b8c36da8d3590c
SHA1dfeaae68f04015ca97577435f9b64bae74665e0f
SHA2561386a2a5ac2e53073a48a1f1d2198c8d4e77d009127d4ae7e6b3c193d34d9565
SHA5124a0d1633128093138b74563d7e0bc8e965eb686d2d83b8ebdb590be79325ccbc6ac11b046dd14b089c225b9df540b242b687f068951936c9e93ef30bf9376ecd
-
Filesize
44KB
MD5335c13db365750588f3f95e9bebfdbc3
SHA15fe6e881a1703191aa27fe405a673d8d1715fa30
SHA2564a5f58f1b7739af9b003eb0277ecd4f38cdf7b676a0a921d3a155119515e0c54
SHA51251c9a91bd9ff508d8b0eb512d273ac63b109f48ef82473681b92483da51b42e6a15cb1d1149c2914fb9635d73db19e307c9abaff82af131e13e6850e1f4378a3
-
Filesize
37KB
MD5d8daab88f0562d30afd7643e7ffeb1bb
SHA1401ddb23ae8e254dd0ccbf447c5f6e844495e45e
SHA2569342162c492e720dc74691959803a2679eea4b14cd670685fc2d8fcb9fb59cf1
SHA512079cb218770957c928b163b1fd8af0db55ef41763ca8907767b6ca1a8b3076fac359e40a46ea0680145da0963af2ea34adf2d8a23512079b0066f852bb50c22e
-
Filesize
8KB
MD56a1b43ab419a9c7f87999b34fe952888
SHA1adff7ad633e850c41515af0e1852c08a45c37b87
SHA256ac90c5a83a5497a08d4ee1b3339ef9cc385acfc18cc6df3e2da6c4dd228de5e8
SHA5128dfe24fc89ecda852c0c16dc3ae666c49666ef69e5dac95e173a541211c1f5e6326632ba5cb16be4201c81228b64ae6a4b90bd402dcd6eca0d4223e72837894b
-
Filesize
17KB
MD54c014fdfc6b1a8f8a1df8fef2dd106e8
SHA19225fa90c578c73fe78dba529f2f0b8a01f2d3e0
SHA25674badc611d4a4063d4f34e94a0221fd2e8ba914977c8d5492968f4c80264a077
SHA512b21ebb86099c856884429c5afdb2aea624bfa7300a40814c16e6783ce393d2a8102de75db9261e96544ec2084a12497f91c846fcea57f225ebe1fbbfcb690838
-
Filesize
6KB
MD55d9b551d4113f32c8d857570eb3ee68c
SHA1777c28ec9d116facb2b79a90d94f7e82ba4bad9d
SHA2567cade22c6d4dc46f9410c5bc4e73cb07e682ee5684fc9bfac661920371ce99f8
SHA51207845438aa7fb490b1462cb3408f258ac787230734451404383f27569bfcb550d7b8a80531e894015b1862e0cb781b4caee556d650c2e634f506cce824a63a47
-
Filesize
223B
MD506604e5941c126e2e7be02c5cd9f62ec
SHA14eb9fdf8ff4e1e539236002bd363b82c8f8930e1
SHA25685f2405d1f67021a3206faa26f6887932fea71aea070df3efb2902902e2d03e2
SHA512803f5f2fddbf29fef34de184eb35c2311b7a694740983ca10b54ef252dd26cda4987458d2569f441c6dedc3478bea12b45bfd3566f1b256504a0869ad3829df7
-
Filesize
3KB
MD5de7f6ac59fe55c5fce538775798a238d
SHA1978a55fff6c52c3264e9fa186d16c232a441113e
SHA256a49c52fc78ee9f75366500de1f663b4686f99d4f466fccef154170dc6024b0fd
SHA512374ee185b9db7bafefea7831e3a5b3b36e2013a02c666614e2a77fc43df959647720ba7bfe356f3640bb91b592da69f8a17ff64c7ae18dc9fc8c632b422bcd58
-
Filesize
15KB
MD5d77c15412933cd9aa17ad64680ee810f
SHA1418ffd121352abed1a213c88dc9214711b13ab66
SHA256c5fd91a9e9cd6ea679f41e5912523bc1990e52c24206ef91d2a211b58b734860
SHA512885405870b97de1451bb7e623cace5921246a723e27145f459aee03d9118b54c939edc569571158a2f435d987c2bf67f7377076884e8158b95c0e3c8d7b3ec5f
-
Filesize
23KB
MD59e52f3a2fb6bf55b2603c47d22b4064a
SHA1af0b6aa2aea4920d251b6512ec85d4d833c19393
SHA2562acdd3f3e31ec195589480a78a5d2c5b7e4d9b9e85177e4af4019d256036d6b0
SHA5128b11020fa2448bc088ad0493a54aadcb9995d90f632acdb57c31d51dfe93edb0e97ab08d61296a17ab19b5e869c5be49f22aec8d68ff01a2c3aa5bf499f360ac
-
Filesize
44KB
MD531ae958162c9d9bb8aadb41bdb523b03
SHA118da9d89b22e76a91f0f6e24f2e82ae2c42561ad
SHA256a82736cb824abe66bc8040d5e612a05564f344e5d59f8dd6a14ac03586967145
SHA51240eea818bb6b02ddc8467683c668ae917c9c28a0ce9b6f0b5d407d822717de0a9a850b1eb0cb14ef7656ace6b7996b32391b871c239934fa37d9593ef744760f
-
Filesize
48KB
MD514ba9ec0f4e4b1c443fc354ac6f518fd
SHA1e3e70fa35d1fb18d048b98212ea68c508305e388
SHA25669ed0274e16b83d19568b2d9610d83b07bcf6683af7d282ba75faf3187e4bc32
SHA51291cd5514b2aa2bc5c19368743416caf51da1c5e76f0db9ca0fcf76a3260cb995a48b29da2d14a2bdb0f99e7f97ebbc6f3602e147eadded3a9135186546b05add