Analysis
-
max time kernel
23s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2024, 02:02
Static task
static1
Behavioral task
behavioral1
Sample
050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe
Resource
win10v2004-20241007-en
General
-
Target
050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe
-
Size
1.5MB
-
MD5
06a72ba35aaff1b3ab0ea4d3e2e65451
-
SHA1
656564a2afc61d10e70d4833a0a57ef046709963
-
SHA256
050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9
-
SHA512
cffae7007d5b2a972f0f2e3fc044b6fb96a91b1d4609f575c113b8920dabb986e9709a3a599cd32d30b8681838cff797b198e3a9fbb543b5622e36143ab9a79b
-
SSDEEP
24576:RWGddPN4jN35Ohf8aT7JYR/MNPjWXY1Q7/VJJzsaz:RLLW15OOsYR/wjWXY1QZNz
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral2/memory/1532-3-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-7-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-9-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-14-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-25-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-44-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-46-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-67-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-39-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-38-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-65-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-37-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-63-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-62-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-60-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-57-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-58-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-55-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-54-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-52-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-30-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-50-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-48-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-45-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-43-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-23-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-42-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-41-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-40-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-66-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-64-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-36-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-61-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-59-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-34-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-56-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-33-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-32-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-53-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-29-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-16-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-28-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-27-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-49-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-47-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-24-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-22-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-21-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-20-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-19-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-35-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-18-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-17-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-31-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-15-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-26-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-13-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-12-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-11-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-10-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 behavioral2/memory/1532-8-0x0000000002E10000-0x0000000003E10000-memory.dmp modiloader_stage2 -
Executes dropped EXE 2 IoCs
pid Process 4828 alpha.pif 1656 alpha.pif -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2252 esentutl.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 20 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe PID 1532 wrote to memory of 0 1532 050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe"C:\Users\Admin\AppData\Local\Temp\050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\dlftfmtN.cmd" "2⤵
- System Location Discovery: System Language Discovery
PID:4276 -
C:\Windows\SysWOW64\esentutl.exeC:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o3⤵PID:892
-
-
C:\Windows\SysWOW64\esentutl.exeC:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2252
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows "3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4828
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1656
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 103⤵PID:4564
-
C:\Users\Public\xpha.pifC:\\Users\\Public\\xpha.pif 127.0.0.1 -n 104⤵PID:1860
-
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c del "C:\Users\Public\xpha.pif"3⤵PID:3604
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \SysWOW643⤵PID:4700
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \"3⤵PID:1056
-
-
-
C:\Windows\SysWOW64\esentutl.exeC:\\Windows\\System32\\esentutl.exe /y C:\Users\Admin\AppData\Local\Temp\050736376a0870aea56e2faf90ea34aa7af231c7b2d3d209bcac91628eec77c9.exe /d C:\\Users\\Public\\Libraries\\Ntmftfld.PIF /o2⤵PID:1360
-
-
C:\Windows\SysWOW64\SndVol.exeC:\Windows\System32\SndVol.exe2⤵PID:4716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222B
MD54bf2f8278ddfff1e951830455b1b62e3
SHA175af432bdf840620477333fa7ffb7d8312fa558c
SHA256401cd5ffd930b4a9dbbe50d318aa458ddc51f08805c3388907222d121337ce75
SHA512e0a1a4d3f098023f414ddaf18e2adea7c86f7ea6ce405401f0201673f25b1764a74479e9eb9de28e27423758da4622061ac221009bf7a27bfc1361fa4f4b21a6
-
Filesize
60KB
MD5b87f096cbc25570329e2bb59fee57580
SHA1d281d1bf37b4fb46f90973afc65eece3908532b2
SHA256d08ccc9b1e3acc205fe754bad8416964e9711815e9ceed5e6af73d8e9035ec9e
SHA51272901adde38f50cf6d74743c0a546c0fea8b1cd4a18449048a0758a7593a176fc33aad1ebfd955775eefc2b30532bcc18e4f2964b3731b668dd87d94405951f7
-
Filesize
231KB
MD5d0fce3afa6aa1d58ce9fa336cc2b675b
SHA14048488de6ba4bfef9edf103755519f1f762668f
SHA2564d89fc34d5f0f9babd022271c585a9477bf41e834e46b991deaa0530fdb25e22
SHA51280e127ef81752cd50f9ea2d662dc4d3bf8db8d29680e75fa5fc406ca22cafa5c4d89ef2eac65b486413d3cdd57a2c12a1cb75f65d1e312a717d262265736d1c2
-
Filesize
18KB
MD5b3624dd758ccecf93a1226cef252ca12
SHA1fcf4dad8c4ad101504b1bf47cbbddbac36b558a7
SHA2564aaa74f294c15aeb37ada8185d0dead58bd87276a01a814abc0c4b40545bf2ef
SHA512c613d18511b00fa25fc7b1bdde10d96debb42a99b5aaab9e9826538d0e229085bb371f0197f6b1086c4f9c605f01e71287ffc5442f701a95d67c232a5f031838