Analysis
-
max time kernel
25s -
max time network
15s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 12:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1275831833887641681/1284459565454462976/WaspLoader.rar?ex=66e80730&is=66e6b5b0&hm=bb48a332c8c74253367dddf7cf5041defca851083d1e455aa9129d6862bb9dba&
Resource
win10v2004-20240802-en
General
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 3 IoCs
resource yara_rule behavioral1/files/0x0007000000023508-158.dat family_agenttesla behavioral1/memory/2520-159-0x000000001B870000-0x000000001BA82000-memory.dmp family_agenttesla behavioral1/memory/2520-160-0x000000001CEE0000-0x000000001D1EC000-memory.dmp family_agenttesla -
Executes dropped EXE 2 IoCs
pid Process 2520 WaspLoader.exe 3940 inject-c.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3940 inject-c.exe 3940 inject-c.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion WaspLoader.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS WaspLoader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer WaspLoader.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4136 msedge.exe 4136 msedge.exe 868 msedge.exe 868 msedge.exe 3560 identity_helper.exe 3560 identity_helper.exe 4432 msedge.exe 4432 msedge.exe 3940 inject-c.exe 3940 inject-c.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 4860 7zFM.exe Token: 35 4860 7zFM.exe Token: SeSecurityPrivilege 4860 7zFM.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
pid Process 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 4860 7zFM.exe 4860 7zFM.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 868 wrote to memory of 3624 868 msedge.exe 83 PID 868 wrote to memory of 3624 868 msedge.exe 83 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 1128 868 msedge.exe 84 PID 868 wrote to memory of 4136 868 msedge.exe 85 PID 868 wrote to memory of 4136 868 msedge.exe 85 PID 868 wrote to memory of 220 868 msedge.exe 86 PID 868 wrote to memory of 220 868 msedge.exe 86 PID 868 wrote to memory of 220 868 msedge.exe 86 PID 868 wrote to memory of 220 868 msedge.exe 86 PID 868 wrote to memory of 220 868 msedge.exe 86 PID 868 wrote to memory of 220 868 msedge.exe 86 PID 868 wrote to memory of 220 868 msedge.exe 86 PID 868 wrote to memory of 220 868 msedge.exe 86 PID 868 wrote to memory of 220 868 msedge.exe 86 PID 868 wrote to memory of 220 868 msedge.exe 86 PID 868 wrote to memory of 220 868 msedge.exe 86 PID 868 wrote to memory of 220 868 msedge.exe 86 PID 868 wrote to memory of 220 868 msedge.exe 86 PID 868 wrote to memory of 220 868 msedge.exe 86 PID 868 wrote to memory of 220 868 msedge.exe 86 PID 868 wrote to memory of 220 868 msedge.exe 86 PID 868 wrote to memory of 220 868 msedge.exe 86 PID 868 wrote to memory of 220 868 msedge.exe 86 PID 868 wrote to memory of 220 868 msedge.exe 86 PID 868 wrote to memory of 220 868 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1275831833887641681/1284459565454462976/WaspLoader.rar?ex=66e80730&is=66e6b5b0&hm=bb48a332c8c74253367dddf7cf5041defca851083d1e455aa9129d6862bb9dba&1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe80f946f8,0x7ffe80f94708,0x7ffe80f947182⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,17568291659892287267,171881508389386147,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,17568291659892287267,171881508389386147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,17568291659892287267,171881508389386147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17568291659892287267,171881508389386147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17568291659892287267,171881508389386147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17568291659892287267,171881508389386147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17568291659892287267,171881508389386147,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,17568291659892287267,171881508389386147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3356 /prefetch:82⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,17568291659892287267,171881508389386147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3356 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2060,17568291659892287267,171881508389386147,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5700 /prefetch:82⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17568291659892287267,171881508389386147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17568291659892287267,171881508389386147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17568291659892287267,171881508389386147,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2060,17568291659892287267,171881508389386147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6060 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4432
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2196
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1608
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\WaspLoader.rar"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4860
-
C:\Users\Admin\Desktop\WaspLoader\WaspLoader.exe"C:\Users\Admin\Desktop\WaspLoader\WaspLoader.exe"1⤵
- Executes dropped EXE
- Enumerates system info in registry
PID:2520
-
C:\Users\Admin\Desktop\WaspLoader\inject-c.exe"C:\Users\Admin\Desktop\WaspLoader\inject-c.exe"1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
5KB
MD56d4e7206cae20c321f090edbe9ac5d36
SHA10b04c93cba9a41dde62d3ff75713c4b8e2cbbc09
SHA256b7ea2c789ee69e5d1f4a713f914eab3b3cfb7471a5d746d2b87c29ef7139a9da
SHA5120e89eb81b4512046c3d3720de2c9abc46691e538a9c0d631ebc9aa43dd76dd9a929b4e461d9dd39e035f1f8a43ff7742a63d968ea3337b496e4d785e0b53d2e0
-
Filesize
6KB
MD53166c8e2dd429178718987d1bbcd4ace
SHA1272659204ac216c5f68ab244257575c0b011312f
SHA25604da6dd137bf45ea97d825d60a77703c3cf9f4a384f69ea2218f1c6eeeb0611e
SHA512ce916083c02ae2e3a75564c854f0196798486f3a0bb83bd810a0dfc1f81aacfc47adf909df6865db235114f790c3efc0eed5a9c993e3765d5e762461c8c486f6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD516d019349f9ec4d81749a493c6f06a7a
SHA1b7126c32f22773ced37bd868072bbd1ed577eeb3
SHA2569ccf531fa370b55338e273da5a044d4afde660f56082d166e97ef1389e7bfb21
SHA512a53aee324a3ef5a743c6aac818901ebdfda7602f162aa57d63f846a14e66eec2c4fa0877c588922823032e329ca4c9e39e8df1aa7103d76749236c64b3d10d69
-
Filesize
2.1MB
MD570bbce41447ba33a3c7e8dc99d3e6175
SHA1295ca6d304dbe2532b4ff27e283834ded38d78ef
SHA2564a641ea243f6e8943cbad387e5730d9eb92ce4bcfd5d9d096a547927503e755e
SHA5126ef6f383a2623ba16dba08fb31afd4e980981886653737274df84e5ffde322f560d1ffe71edd0829ea24461c5ea488bb92be751019b44c921bd919207e5fcdd2
-
Filesize
1.7MB
MD5ded7171654d9f359e3f920bd97eea82a
SHA1211ae6a3d881adc8a88e2ae625ae783342b2d572
SHA256fbe79d5be3c54c322b4417a1633fa98fae73da97e30da6e22647aaa8ea47ec3f
SHA5128bf30b9316f02fc9deaa808c7d47eaede9238242aa38f78954297ed3348d7e2272cd2c26160a6d0a841eeef1d532ad63734e77888926ba0b25b6e253dacfade2
-
Filesize
12.2MB
MD5e6333b1e880f784228ebba74fcb76a88
SHA10ded82ee467b4012b45eef9878402f50b7be17c4
SHA256c40fe901f365043c08b3053830e4bef1b496dbec93e6ca33c891f58f14006aff
SHA5121c5bbd9b6cbd0418133186f5e977c7a66915ddd128e3a478acbc92042bcf8a3ee2b2f93ea23849caab1730a329adf96dfacb5d1d9453ccdd86266ddf8442fef6
-
Filesize
12.9MB
MD51f57b31be0f4e54672397d5c4f46de9b
SHA1e781ba218978944cb3fad89ec9507a1e985598ab
SHA256f2d5a1669bdecee17615cb12cce91538fc0509fb729ad75484b53aa924d588da
SHA51269d68b48ab2e6c33e618a74312ec2e419d82fd253827fa127514d6a36e005ad1050f8c9a72c42106095a81ec8a6c7fb1b230b985f15bf05165a2c79caad76ac7