Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/12/2024, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe
-
Size
2.0MB
-
MD5
db709ffca16b90369f0feadd92730fec
-
SHA1
167dcea6800303f9ba2fd28d82fdecd3feb2d160
-
SHA256
77c0e470dfc8b4234cb665773a97b9b98864e993acbac3de284ee474160f556f
-
SHA512
cfb446da9657ac4615f632133310f1e5fe21fe6e6ea61987be581f122fe4181aa6985626333291f119adedfb76dfbacca1e063879686f3caf3be8e70b4f81bb2
-
SSDEEP
49152:xdc6IDfhIOnpoDrwQs+bLc4SexDWDwRZuc2qdL3ejAq1n2:xdcLDfhI2sHs871xDWDAZOWajP12
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 4 IoCs
resource yara_rule behavioral2/memory/3444-40-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/3444-53-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/2256-85-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral2/memory/2256-88-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation AdobeART.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe 728980.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe 728980.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AdobeART.exe 728980.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AdobeART.exe 728980.exe -
Executes dropped EXE 3 IoCs
pid Process 828 728980.exe 536 AdobeART.exe 1796 728980.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeART = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeART.exe" vbc.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5088 set thread context of 3444 5088 db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe 90 PID 536 set thread context of 2256 536 AdobeART.exe 100 -
resource yara_rule behavioral2/memory/3444-40-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/3444-53-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/2256-85-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral2/memory/2256-88-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe File opened for modification C:\Windows\assembly\Desktop.ini db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe File opened for modification C:\Windows\assembly db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 728980.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 728980.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeART.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5088 db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe Token: SeDebugPrivilege 536 AdobeART.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 5088 wrote to memory of 1340 5088 db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe 83 PID 5088 wrote to memory of 1340 5088 db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe 83 PID 5088 wrote to memory of 1340 5088 db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe 83 PID 1340 wrote to memory of 1300 1340 vbc.exe 85 PID 1340 wrote to memory of 1300 1340 vbc.exe 85 PID 1340 wrote to memory of 1300 1340 vbc.exe 85 PID 5088 wrote to memory of 1748 5088 db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe 86 PID 5088 wrote to memory of 1748 5088 db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe 86 PID 5088 wrote to memory of 1748 5088 db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe 86 PID 1748 wrote to memory of 1592 1748 vbc.exe 88 PID 1748 wrote to memory of 1592 1748 vbc.exe 88 PID 1748 wrote to memory of 1592 1748 vbc.exe 88 PID 5088 wrote to memory of 828 5088 db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe 89 PID 5088 wrote to memory of 828 5088 db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe 89 PID 5088 wrote to memory of 828 5088 db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe 89 PID 5088 wrote to memory of 3444 5088 db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe 90 PID 5088 wrote to memory of 3444 5088 db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe 90 PID 5088 wrote to memory of 3444 5088 db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe 90 PID 5088 wrote to memory of 3444 5088 db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe 90 PID 5088 wrote to memory of 3444 5088 db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe 90 PID 5088 wrote to memory of 3444 5088 db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe 90 PID 5088 wrote to memory of 3444 5088 db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe 90 PID 5088 wrote to memory of 3444 5088 db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe 90 PID 3444 wrote to memory of 536 3444 vbc.exe 91 PID 3444 wrote to memory of 536 3444 vbc.exe 91 PID 3444 wrote to memory of 536 3444 vbc.exe 91 PID 536 wrote to memory of 2952 536 AdobeART.exe 92 PID 536 wrote to memory of 2952 536 AdobeART.exe 92 PID 536 wrote to memory of 2952 536 AdobeART.exe 92 PID 2952 wrote to memory of 3504 2952 vbc.exe 94 PID 2952 wrote to memory of 3504 2952 vbc.exe 94 PID 2952 wrote to memory of 3504 2952 vbc.exe 94 PID 536 wrote to memory of 1216 536 AdobeART.exe 95 PID 536 wrote to memory of 1216 536 AdobeART.exe 95 PID 536 wrote to memory of 1216 536 AdobeART.exe 95 PID 1216 wrote to memory of 2856 1216 vbc.exe 97 PID 1216 wrote to memory of 2856 1216 vbc.exe 97 PID 1216 wrote to memory of 2856 1216 vbc.exe 97 PID 536 wrote to memory of 1796 536 AdobeART.exe 99 PID 536 wrote to memory of 1796 536 AdobeART.exe 99 PID 536 wrote to memory of 1796 536 AdobeART.exe 99 PID 536 wrote to memory of 2256 536 AdobeART.exe 100 PID 536 wrote to memory of 2256 536 AdobeART.exe 100 PID 536 wrote to memory of 2256 536 AdobeART.exe 100 PID 536 wrote to memory of 2256 536 AdobeART.exe 100 PID 536 wrote to memory of 2256 536 AdobeART.exe 100 PID 536 wrote to memory of 2256 536 AdobeART.exe 100 PID 536 wrote to memory of 2256 536 AdobeART.exe 100 PID 536 wrote to memory of 2256 536 AdobeART.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\db709ffca16b90369f0feadd92730fec_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\xtqmzs-s.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB15E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc8351797D300442B1AB67E1935747EAC8.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:1300
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\xtqmzs-s.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB20A.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcEAF83AC0CB5C4F26AF5669BD285D7F6.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:1592
-
-
-
C:\Users\Admin\AppData\Roaming\728980.exe"C:\Users\Admin\AppData\Roaming\728980.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:828
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Roaming\AdobeART.exe"C:\Users\Admin\AppData\Roaming\AdobeART.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\lgrgribq.cmdline"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB7C7.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc692DA7218406426F9F8656C5ED3EA41.TMP"5⤵
- System Location Discovery: System Language Discovery
PID:3504
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\lgrgribq.cmdline"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB844.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA1E8BC38C3E42609389A695E6934BF8.TMP"5⤵
- System Location Discovery: System Language Discovery
PID:2856
-
-
-
C:\Users\Admin\AppData\Roaming\728980.exe"C:\Users\Admin\AppData\Roaming\728980.exe"4⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1796
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\\vbc.exe"4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2256
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116B
MD5fbcc48ddf361df41da6b0400718841f8
SHA1b6d3641dc3c8186662f3906a350e355f47e373e3
SHA256ecb300191d0e3420d114338ed6850afa649b270f75c181ffe86b435420100870
SHA5121d9d8e3335423152e7b19bc3b0ac8f04d318c342cfeb1567b9b82f0dde0e3d3f57c3fb7c312fbca7d9f46ba2383f32a2abc90df9a924f27da43f854bd490e578
-
Filesize
1KB
MD52fd753a309cc712d54c49783b784c371
SHA1cc05d8a06cd55120036dd981e7454738185f61e6
SHA256494a0835afd74e82a893d05d610c9ac7c5ee1447c55dd498715235c3a7c7d2b4
SHA5128630b61c95835124b89308a7bf3b587790293e1cbf0495171375020320c88d864668db6eb6cdbe0e86572cd5e70e747815214ec103afa970f8db68f94c74bc08
-
Filesize
1KB
MD538bdddcb09fc6e554c64f7affbcced25
SHA13387f913bda16cb46d1993922d52eb4a0714aa23
SHA256def5b14059f5ef4ce1675096214c0f37edd9e34523bac06e4959bf53c3d93ff9
SHA5120b9d26b95198ca874bd6dcfda74b4ab631e5f10044a659550a5ecd9bab45eac3d7e510950c4d1bca0fd4b91151ebb943c81a5f353404ed91646a2d9f5eaaa819
-
Filesize
1KB
MD532331a064d49d21fa9021999211f38d9
SHA1b22789a19728ed0a5f3d30ebe6761e69c8211e1c
SHA25660ce016dfd7325f3fcdf2ecefea0addec6d5a1cb81dfd9d07a8075a98e624765
SHA512040c10508a17be3cb85e4737a35c94a1f28c4fee5ca8ce600f49c69c5b16f0a008b81fe50a9b9006290c01bade5c341a39316ce8a824aa549145ab42637fbaf1
-
Filesize
1KB
MD54a3f3225457275e4bc68481c02437c05
SHA199ffaded321a699b743a4d3bd2954dbb56c3b152
SHA2565245965bcbba85d48785dc0f838dd750914105345bf68b78ad4d2d0f73091a61
SHA5126be47c2392853ae76fbac579556b7ec81cd8a1a9384a80bbff1f468c75dc04ef8811346b3ab6d1be33b5a12b6b1cb837c1ffe1d8cdc3fe24d86fbc50534d33e5
-
Filesize
1KB
MD5c2d9742959254e08a98749a3150f4aaf
SHA17c8053feff1809b54af266576975fae7f6a8344e
SHA256671999e918b8b3a339c86366e359400a2596abc3bed6a4bb484bc759cb7b2449
SHA512dca6f970b953f6ce29bb45792822e5c60ecad6299cc975118c489cf6e40643357ab808b1d719e20231190db4e2517baf3cf319cb3db5f6eead6733999ed5f7c2
-
Filesize
211B
MD5793e2c3b6578167071e859021e1cc096
SHA1f400f8cc4c67ddf685bf24c008604ed932db063e
SHA2565f68d25f37c3ae3a5d2d4375c3249e814349fb349596c63230b63fd1d2bf9d10
SHA512836401e2a7b1ab12751dbc10d3cc073d431a51f9aaffa10f91f654defcccf4ff94801c4754ac14561434e73f40d36fab663cf13b67ba4167a3b53413e24afb6f
-
Filesize
940B
MD575189b4aad9a73d622481d4c815913fa
SHA10c7732c0981764b438958a2a025f0befbe2a8562
SHA256dc7255857f258a57764b8d68318929d5f6540fb62ddd2b4e86937cff96385440
SHA51284115e34f26f4b8fc1476d4ca7c8ddca1db4e864d04fc11fc123f4948a75c4c69697b9b43e8646011261f4460e1c5b1e714781e17cca3d68c1979932a63b074a
-
Filesize
1KB
MD5900f62120d2114145c303882969f0658
SHA18f3a5756f0404772ea6b16d3f49d88425aa912bc
SHA256bfd99e5dbb5a7b4b438ade81e9bd4a7bc1a8e4338736b75b1417787533a2aa82
SHA5122651d9bd94939c6eaedd368550216135ddcdc4b1769626f147ea1efd84c3b31d1829baaaca21f65f0b9f85890e10bac65e2563847ab622773d095b68c43bc129
-
Filesize
211B
MD5da2c4b4fc9f2c6f03dba3f36e89c2542
SHA1e1524ff98185034c85897b08037fbb7039950ffe
SHA2563bb812be009249abcf8f37806f004ef8900d5a2920ce35755afd47f9d574e9ef
SHA5125dc7c275b917cc5f36b7b62cc78e5e9e6df0bff148530fecaf53ecd02cde4f8f123a17757fdb9475aa18e505647f8acdeb8e50c0317856dceb126f240aea9e1f
-
Filesize
7KB
MD5be834812199f2c6e224ebdbeea61cf1e
SHA13ce8dab9c5c95b68ce34cd66055ee5eb51bd7e0e
SHA256e02eea9e8227c9e744825de55f83174543090e96a9b1826de0487e79382aff22
SHA5128c0f1ba34f2674462540d3f2c7467fc08273301bf7ea14871643621a6bf3b7ea29b6f9dc6a9d25c2ef27fa9fb652817703b4e32ee175c5d91e6868862ffc7361
-
Filesize
7KB
MD5ca0699150d45422b51a95a218ddc410d
SHA17f4bbe3c82d81fb21ae438ec90c317bb70636009
SHA25676edf1b93ed3d37358903aad9828e7f63e9e1150572d06031851acff35213b94
SHA5126e3328118769e8afd975cdace8077f6ce6c66833264ea33ab3b73be063744e4527ebc6049dc37a94b16664b2ebc92f3076902c2e15537bc2f70ba0fdf16844f8
-
Filesize
7KB
MD5a2fec8f72b040089b1337a84be04b533
SHA1863f33477f6bd3b33eda6c5ca9d8d644fd5dbafa
SHA256cc540fa01a500a590bd6aabc1f539dbc7d481dd2467c4be404765354b804b55e
SHA5124eab976b3983a4a45338b56e205d193f387407b1c0821069133e983dd814bc0cb042fb5bfec87e201cee2da9ed6bfed0c7d6b81806ed2aab18dd28fc8ed4b77c
-
Filesize
7KB
MD59e482b27e39722b51434067a0f56530e
SHA1a7366f51550a265176cf8ddf261ab9676870e285
SHA2566a00cdefd2f0501e7067d8c53946af1b7083a106cb2e0c0db8808895483eac7e
SHA5125d3af92dba33d4001a275f10ade23f2f070790e0292c0800fd1197cc803902c8801a0771e0dfe4dd8c78b9d41643d5051b93ee289c85925dc0348f1e844b1200
-
Filesize
2.0MB
MD5db709ffca16b90369f0feadd92730fec
SHA1167dcea6800303f9ba2fd28d82fdecd3feb2d160
SHA25677c0e470dfc8b4234cb665773a97b9b98864e993acbac3de284ee474160f556f
SHA512cfb446da9657ac4615f632133310f1e5fe21fe6e6ea61987be581f122fe4181aa6985626333291f119adedfb76dfbacca1e063879686f3caf3be8e70b4f81bb2