Analysis
-
max time kernel
152s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01-01-2024 18:32
Behavioral task
behavioral1
Sample
3d9194f42ff0ae3ac82d83a999543ad0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3d9194f42ff0ae3ac82d83a999543ad0.exe
Resource
win10v2004-20231215-en
General
-
Target
3d9194f42ff0ae3ac82d83a999543ad0.exe
-
Size
84KB
-
MD5
3d9194f42ff0ae3ac82d83a999543ad0
-
SHA1
e7ef6189bcfc6c7c3d915670512e923e192c3681
-
SHA256
3a3bd3bdc2032ebca45c3d98d5dbb3519fbc9f5e23ef5e562c2b236ff0e25c96
-
SHA512
71c2c5c483f58b4accccb0b93823604849f3b2c8fa57a22dbe784028305b69a38e41d9a2b056b35cc266aec0a2e0b8f866c23c1c452f758614c6c5a350daf1f2
-
SSDEEP
1536:EU6liacYNCQ80sCzKnf5Z4wBQEfY3361ti7+mEDBYQynqnouy8608:r6lia2Q80hef5Z4wBQEfGKOy3myoutI
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2692 regsvr32.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe -
resource yara_rule behavioral1/memory/2656-0-0x0000000000400000-0x00000000005A3000-memory.dmp upx behavioral1/memory/2656-8-0x0000000000400000-0x00000000005A3000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Live Messenger = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3d9194f42ff0ae3ac82d83a999543ad0.exe" 3d9194f42ff0ae3ac82d83a999543ad0.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\VolumeControl.ocx 3d9194f42ff0ae3ac82d83a999543ad0.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B219DFCB-09E0-45BB-9EFD-33E265CD9DA4}\ = "VolControl.VolumeControl" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B219DFCB-09E0-45BB-9EFD-33E265CD9DA4}\MiscStatus\1\ = "148881" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8058BCEA-D0D8-4CBB-89DB-B92B662BC68E}\ = "VolumeControl" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{30A9BB10-A7D0-4342-9001-DC71E9B0080E}\TypeLib\ = "{2CAE4279-9C6F-44DD-B89E-A7138A6E4B46}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8058BCEA-D0D8-4CBB-89DB-B92B662BC68E}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B219DFCB-09E0-45BB-9EFD-33E265CD9DA4}\MiscStatus regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30A9BB10-A7D0-4342-9001-DC71E9B0080E}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B219DFCB-09E0-45BB-9EFD-33E265CD9DA4}\InprocServer32\ = "C:\\Windows\\SysWow64\\VolumeControl.ocx" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VolControl.VolumeControl\Clsid\ = "{B219DFCB-09E0-45BB-9EFD-33E265CD9DA4}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8058BCEA-D0D8-4CBB-89DB-B92B662BC68E}\ProxyStubClsid\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{2CAE4279-9C6F-44DD-B89E-A7138A6E4B46}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8058BCEA-D0D8-4CBB-89DB-B92B662BC68E} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8058BCEA-D0D8-4CBB-89DB-B92B662BC68E}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B219DFCB-09E0-45BB-9EFD-33E265CD9DA4}\ToolboxBitmap32\ = "C:\\Windows\\SysWow64\\VolumeControl.ocx, 30000" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{30A9BB10-A7D0-4342-9001-DC71E9B0080E}\ = "VolumeControl" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{2CAE4279-9C6F-44DD-B89E-A7138A6E4B46}\1.0\ = "VolControl" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8058BCEA-D0D8-4CBB-89DB-B92B662BC68E} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B219DFCB-09E0-45BB-9EFD-33E265CD9DA4}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B219DFCB-09E0-45BB-9EFD-33E265CD9DA4}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{2CAE4279-9C6F-44DD-B89E-A7138A6E4B46}\1.0\FLAGS\ = "2" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{30A9BB10-A7D0-4342-9001-DC71E9B0080E}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B219DFCB-09E0-45BB-9EFD-33E265CD9DA4}\ToolboxBitmap32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B219DFCB-09E0-45BB-9EFD-33E265CD9DA4}\Implemented Categories\{0DE86A52-2BAA-11CF-A229-00AA003D7352} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30A9BB10-A7D0-4342-9001-DC71E9B0080E} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B219DFCB-09E0-45BB-9EFD-33E265CD9DA4}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8058BCEA-D0D8-4CBB-89DB-B92B662BC68E}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8058BCEA-D0D8-4CBB-89DB-B92B662BC68E}\ = "__VolumeControl" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B219DFCB-09E0-45BB-9EFD-33E265CD9DA4}\TypeLib\ = "{2CAE4279-9C6F-44DD-B89E-A7138A6E4B46}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30A9BB10-A7D0-4342-9001-DC71E9B0080E}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30A9BB10-A7D0-4342-9001-DC71E9B0080E}\TypeLib\ = "{2CAE4279-9C6F-44DD-B89E-A7138A6E4B46}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{30A9BB10-A7D0-4342-9001-DC71E9B0080E} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30A9BB10-A7D0-4342-9001-DC71E9B0080E}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{30A9BB10-A7D0-4342-9001-DC71E9B0080E}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B219DFCB-09E0-45BB-9EFD-33E265CD9DA4}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B219DFCB-09E0-45BB-9EFD-33E265CD9DA4}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B219DFCB-09E0-45BB-9EFD-33E265CD9DA4}\MiscStatus\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{2CAE4279-9C6F-44DD-B89E-A7138A6E4B46}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{2CAE4279-9C6F-44DD-B89E-A7138A6E4B46}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8058BCEA-D0D8-4CBB-89DB-B92B662BC68E}\ProxyStubClsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B219DFCB-09E0-45BB-9EFD-33E265CD9DA4}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{2CAE4279-9C6F-44DD-B89E-A7138A6E4B46}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\VolumeControl.ocx" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{30A9BB10-A7D0-4342-9001-DC71E9B0080E}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{30A9BB10-A7D0-4342-9001-DC71E9B0080E}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{30A9BB10-A7D0-4342-9001-DC71E9B0080E}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8058BCEA-D0D8-4CBB-89DB-B92B662BC68E}\ = "__VolumeControl" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8058BCEA-D0D8-4CBB-89DB-B92B662BC68E}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B219DFCB-09E0-45BB-9EFD-33E265CD9DA4}\ProgID\ = "VolControl.VolumeControl" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B219DFCB-09E0-45BB-9EFD-33E265CD9DA4}\Control\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{2CAE4279-9C6F-44DD-B89E-A7138A6E4B46}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{30A9BB10-A7D0-4342-9001-DC71E9B0080E}\ = "_VolumeControl" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B219DFCB-09E0-45BB-9EFD-33E265CD9DA4}\VERSION\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VolControl.VolumeControl regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B219DFCB-09E0-45BB-9EFD-33E265CD9DA4}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{2CAE4279-9C6F-44DD-B89E-A7138A6E4B46} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B219DFCB-09E0-45BB-9EFD-33E265CD9DA4}\MiscStatus\1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8058BCEA-D0D8-4CBB-89DB-B92B662BC68E}\TypeLib\ = "{2CAE4279-9C6F-44DD-B89E-A7138A6E4B46}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B219DFCB-09E0-45BB-9EFD-33E265CD9DA4}\Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{30A9BB10-A7D0-4342-9001-DC71E9B0080E}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8058BCEA-D0D8-4CBB-89DB-B92B662BC68E}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VolControl.VolumeControl\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{30A9BB10-A7D0-4342-9001-DC71E9B0080E}\ProxyStubClsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8058BCEA-D0D8-4CBB-89DB-B92B662BC68E}\TypeLib\ = "{2CAE4279-9C6F-44DD-B89E-A7138A6E4B46}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B219DFCB-09E0-45BB-9EFD-33E265CD9DA4}\VERSION regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8058BCEA-D0D8-4CBB-89DB-B92B662BC68E}\ProxyStubClsid32 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2692 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 28 PID 2656 wrote to memory of 2692 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 28 PID 2656 wrote to memory of 2692 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 28 PID 2656 wrote to memory of 2692 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 28 PID 2656 wrote to memory of 2692 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 28 PID 2656 wrote to memory of 2692 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 28 PID 2656 wrote to memory of 2692 2656 3d9194f42ff0ae3ac82d83a999543ad0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d9194f42ff0ae3ac82d83a999543ad0.exe"C:\Users\Admin\AppData\Local\Temp\3d9194f42ff0ae3ac82d83a999543ad0.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 -s C:\Windows\system32\VolumeControl.ocx2⤵
- Loads dropped DLL
- Modifies registry class
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD51bfd55b086a9d9552cd35a080223f659
SHA191b6838701cd8d816619ebb588eae7574287f7f0
SHA25618bb788d1435735eebf2f5e5bccd07dff49639d60836c0f033c75c1649179bec
SHA512c2ecbf85bf5744ba77ed310ec45b41071b217e96061a4e65e23b8d44af332722653dc31358eb267f80a19072c0a6cd1e9ef312627e8bd8766912832567b18ed9