Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 15:54
Behavioral task
behavioral1
Sample
fda2de190376f0365d12784abf181542_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fda2de190376f0365d12784abf181542_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
fda2de190376f0365d12784abf181542_JaffaCakes118.exe
-
Size
321KB
-
MD5
fda2de190376f0365d12784abf181542
-
SHA1
08dada2a536ca580d4eb94eeee35a953551b064b
-
SHA256
8079b09eec527a746367e9e26a0fe944321b7f37b4e461432565c4a572242500
-
SHA512
4cc0db517d8226fbfacce91258538db75fa05cd781f66061d2aa9d641eb5bd4b6cbf1425d7f72b8bb0c32e9ca6ac33ced759d8095bccc69117c07bc034b4fa79
-
SSDEEP
6144:rgg/nv8YotwxoMsQNtMZTk+KUd/9SYq73ckuNBQ9T:rzvbotweLQv4pKUjSh3ckuN6R
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/4408-17-0x0000000000400000-0x0000000000457000-memory.dmp modiloader_stage2 -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{01K81C5T-YL0T-5A81-Q276-867WQ80UG33I} fda2de190376f0365d12784abf181542_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{01K81C5T-YL0T-5A81-Q276-867WQ80UG33I}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\cigicigivip32.exe" fda2de190376f0365d12784abf181542_JaffaCakes118.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation fda2de190376f0365d12784abf181542_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CigiCigi2OO9 = "C:\\Users\\Admin\\AppData\\Roaming\\cigicigivip32.exe" fda2de190376f0365d12784abf181542_JaffaCakes118.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fda2de190376f0365d12784abf181542_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3368 msedge.exe 3368 msedge.exe 1936 msedge.exe 1936 msedge.exe 2792 identity_helper.exe 2792 identity_helper.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe 2912 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4408 fda2de190376f0365d12784abf181542_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4408 wrote to memory of 1936 4408 fda2de190376f0365d12784abf181542_JaffaCakes118.exe 83 PID 4408 wrote to memory of 1936 4408 fda2de190376f0365d12784abf181542_JaffaCakes118.exe 83 PID 1936 wrote to memory of 804 1936 msedge.exe 84 PID 1936 wrote to memory of 804 1936 msedge.exe 84 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 4636 1936 msedge.exe 85 PID 1936 wrote to memory of 3368 1936 msedge.exe 86 PID 1936 wrote to memory of 3368 1936 msedge.exe 86 PID 1936 wrote to memory of 4968 1936 msedge.exe 87 PID 1936 wrote to memory of 4968 1936 msedge.exe 87 PID 1936 wrote to memory of 4968 1936 msedge.exe 87 PID 1936 wrote to memory of 4968 1936 msedge.exe 87 PID 1936 wrote to memory of 4968 1936 msedge.exe 87 PID 1936 wrote to memory of 4968 1936 msedge.exe 87 PID 1936 wrote to memory of 4968 1936 msedge.exe 87 PID 1936 wrote to memory of 4968 1936 msedge.exe 87 PID 1936 wrote to memory of 4968 1936 msedge.exe 87 PID 1936 wrote to memory of 4968 1936 msedge.exe 87 PID 1936 wrote to memory of 4968 1936 msedge.exe 87 PID 1936 wrote to memory of 4968 1936 msedge.exe 87 PID 1936 wrote to memory of 4968 1936 msedge.exe 87 PID 1936 wrote to memory of 4968 1936 msedge.exe 87 PID 1936 wrote to memory of 4968 1936 msedge.exe 87 PID 1936 wrote to memory of 4968 1936 msedge.exe 87 PID 1936 wrote to memory of 4968 1936 msedge.exe 87 PID 1936 wrote to memory of 4968 1936 msedge.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\fda2de190376f0365d12784abf181542_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fda2de190376f0365d12784abf181542_JaffaCakes118.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff38e146f8,0x7fff38e14708,0x7fff38e147183⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,2063035468886651293,8960237285010882501,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:23⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,2063035468886651293,8960237285010882501,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,2063035468886651293,8960237285010882501,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:83⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2063035468886651293,8960237285010882501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:13⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2063035468886651293,8960237285010882501,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:13⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2063035468886651293,8960237285010882501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:13⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2063035468886651293,8960237285010882501,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:13⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,2063035468886651293,8960237285010882501,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3292 /prefetch:83⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,2063035468886651293,8960237285010882501,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3292 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2063035468886651293,8960237285010882501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:13⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2063035468886651293,8960237285010882501,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:13⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,2063035468886651293,8960237285010882501,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:13⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,2063035468886651293,8960237285010882501,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1384 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2912
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\fda2de190376f0365d12784abf181542_JaffaCakes118.exe >> NUL2⤵
- System Location Discovery: System Language Discovery
PID:2128
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1748
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4352
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
5KB
MD5dfd1190184d6e9d16f77913357b9c8b5
SHA1df394e8b0627d9e45174fd3cbd0fcfad68969206
SHA256e29a5782aab374d0589cc8a0914388f5e8d8aacd57074e8ac0a33f4ede41ee74
SHA5120bc375cf6962dde3a7890cbfce5bbc2c9dbe4d5333805057235ea077cd8890d0162cfed8489ced7758603c9470de56d48eba36de7a98530a38367c17b20a1b31
-
Filesize
6KB
MD516dcfdbbac365872b092ae27c20f47e8
SHA1f213281bebb9e2043a1c01bc0787cd68aef6444b
SHA256c4f5a5310a3c482c96c4b95b96798f7e69387154715eb7530af129da2610e9d6
SHA5125bed0fa6013a23b539e9fb6200010402936c5fdcf6a328e03f5c08e5f6429d36d66505798a6c4accf90840a4dbdc15922567881282210fb6a436c82af7d301e4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56ccf5373fc082b22bcece9addca9572f
SHA1b3cb2ad0484f962d18b64e8734c0f70d6e6d5ab8
SHA2568ad53c6f27bca2e35749e7f5cb407b51986d34ff5fce8bd79bc54f386d5e6fb3
SHA512178368a1f5c2ab349770ca24bb1bfb0e8e712562ae80c9db8387969998dbb61393b7105edff40e6799f4c8ce45dd3f7e66b36bc69f73e589ffaf98d05a812e76