Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 18:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://82jce.boragher.com/BV3FVBi2/#CbGF1cmVuLmJ1cnRvbkBzb2RleG8uY29t
Resource
win10v2004-20240802-en
General
-
Target
https://82jce.boragher.com/BV3FVBi2/#CbGF1cmVuLmJ1cnRvbkBzb2RleG8uY29t
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 504 msedge.exe 504 msedge.exe 1324 msedge.exe 1324 msedge.exe 3284 identity_helper.exe 3284 identity_helper.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1324 wrote to memory of 2796 1324 msedge.exe 81 PID 1324 wrote to memory of 2796 1324 msedge.exe 81 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 3748 1324 msedge.exe 83 PID 1324 wrote to memory of 504 1324 msedge.exe 84 PID 1324 wrote to memory of 504 1324 msedge.exe 84 PID 1324 wrote to memory of 4212 1324 msedge.exe 85 PID 1324 wrote to memory of 4212 1324 msedge.exe 85 PID 1324 wrote to memory of 4212 1324 msedge.exe 85 PID 1324 wrote to memory of 4212 1324 msedge.exe 85 PID 1324 wrote to memory of 4212 1324 msedge.exe 85 PID 1324 wrote to memory of 4212 1324 msedge.exe 85 PID 1324 wrote to memory of 4212 1324 msedge.exe 85 PID 1324 wrote to memory of 4212 1324 msedge.exe 85 PID 1324 wrote to memory of 4212 1324 msedge.exe 85 PID 1324 wrote to memory of 4212 1324 msedge.exe 85 PID 1324 wrote to memory of 4212 1324 msedge.exe 85 PID 1324 wrote to memory of 4212 1324 msedge.exe 85 PID 1324 wrote to memory of 4212 1324 msedge.exe 85 PID 1324 wrote to memory of 4212 1324 msedge.exe 85 PID 1324 wrote to memory of 4212 1324 msedge.exe 85 PID 1324 wrote to memory of 4212 1324 msedge.exe 85 PID 1324 wrote to memory of 4212 1324 msedge.exe 85 PID 1324 wrote to memory of 4212 1324 msedge.exe 85 PID 1324 wrote to memory of 4212 1324 msedge.exe 85 PID 1324 wrote to memory of 4212 1324 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://82jce.boragher.com/BV3FVBi2/#CbGF1cmVuLmJ1cnRvbkBzb2RleG8uY29t1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe74a346f8,0x7ffe74a34708,0x7ffe74a347182⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,17347396716260727010,3388631667125888929,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,17347396716260727010,3388631667125888929,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,17347396716260727010,3388631667125888929,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17347396716260727010,3388631667125888929,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17347396716260727010,3388631667125888929,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17347396716260727010,3388631667125888929,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17347396716260727010,3388631667125888929,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,17347396716260727010,3388631667125888929,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1296 /prefetch:82⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,17347396716260727010,3388631667125888929,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1296 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17347396716260727010,3388631667125888929,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17347396716260727010,3388631667125888929,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17347396716260727010,3388631667125888929,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2824 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17347396716260727010,3388631667125888929,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2152,17347396716260727010,3388631667125888929,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5628 /prefetch:82⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,17347396716260727010,3388631667125888929,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1288
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1436
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
264B
MD5109661c88d711741aad05fd3ec680531
SHA188810634572bc344d697914a609515964a391701
SHA256a96013b63e6d7a7455e3f7be4a7acb10125f245ca53ac84a0e978b87841d4f05
SHA51239c5d9a37ef7d641bb7fbe90e11303f698d17a7196f7ab811673e77f6e0a59dfd02fc55fc3d611d2bb952138c1336ae9bdc67c1d77cb48c6ea636d16bc63c385
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5b71169ad506cd53c415598f66c025d16
SHA1d44cbb4f2e0e1fea0d4d5d76833a2df7358ed369
SHA256a97a0200c73c2f26fdfd3e3c3280fbc9811fe964ce3ed7068b9cdfb5becc4b8b
SHA512050aad0c068048404a1d026f9210737d92b6f913a67da78f218c3caacabada83640e13188786dba1de3de0fb3c66fd4ecc535d5a67c56843344eb7ea8b4a7107
-
Filesize
1KB
MD56427fdb00b0983b1e9816b187287cffc
SHA11b1b44b91400ecc745543dc7a202d244e1a9464d
SHA256ab6bf42f0c37fd2d788e061385816d1eaacb354525b328a849225fca4014fc25
SHA512b0cfab11cf539e82886cd1c3585c42e7bf0ee3233bc295f81b297743265024d44bd403818ee450fa6516c31bfaa43fe2422fe1293531b32931b5668f75ef9d8e
-
Filesize
6KB
MD5d67bd6d6bde0606d98ea92feda1daba8
SHA12c6f9e46e3efe52cfecbd5033e64ef762fd67c7e
SHA25611c0e75e9c763377d0e285bd53f9e3c08a27d70dc0a392a25120e0fdd5e22a6e
SHA512f006883a6cd38fc735b41285f5234da8654ab4488b884d92e3f612da56378a61921d8e906c22475485d1cc9599837b177e9bb405234ba8d975bb4d2cef82a2ba
-
Filesize
6KB
MD56f0da96fc54d5931d1e5e27322d3a18f
SHA1798a462bba6da27175a875a33d42a65e362fe579
SHA2560b50291bc5dc13f146ba913cbd13268dff69a975bce6a6e2ccf2ad0f17081469
SHA512f23c61f665fb6e29a9c31d55d1dc62fc14ce9cff09d925044b6cfed19e83cb38645094df32b9363c6128933fe572d0e61947086eed36fe2764c335503a132cfb
-
Filesize
6KB
MD57392683c04b99ddd3d9a1f7929c67627
SHA15e3088a6050292f00c1cdea1c46c4f9d9f8cf0f8
SHA256c0a9636ccc542143190feb05b196e6ddcde5e7778d7401879d3ed5fca0767b79
SHA51252795b89bdded3d9ddebe27f00fb84a05b40763e4180fe7457f20075645a2c5f843de4a10a9d3c3b4b1a137eb6c6f8d4f9ae7f8cd4d50066914bd64deca998a8
-
Filesize
706B
MD531a48b08dfda154f168324d44372321b
SHA1f190e7333065c602dfe45032b7ec2afdfdbe9cbe
SHA256d0a97681653b7a64a97f5544ade9fe92728c91be106ba0b352976df8b01daf18
SHA51258051b6f7a1e8bb75cca26c52d50e0d95c9689c398324d3457b13c15c60e78cc42ef59b22775e1ef768237d85ac4fb90bd3aea12dd94faf84461028e792cccd4
-
Filesize
204B
MD5b8bd8db972a24c8d17905fee5ea699c6
SHA1d6c8f560ef45feda5b2cb015dc0d270e5ff5bbda
SHA256468874705f7dbe89c709c214d74b66ad07a7c9f5247dd3e5efd217fff716b5f1
SHA512181bfea1838aac45002964d35efafe6f8bd00211ff5f4a1184d9abf1973046cc177a9b52df61d643869b8037b54f326f86ea099e6a112c550460d18905935527
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59de150c92bab719cec92bf8adfbb396c
SHA14b23d33c4e49edf17e2eb5721d2a926aa952017c
SHA25632f153d96232cb37009e143cc56cf5ed18af56eac8949b9db201222e7319f6da
SHA51221672ccdf1afb57cfc93df61cd945ce8a950879d8e599539d7625d683e927d39deb34e78866370f01ef90ca36fd4d59a58661c1bdf995c3fad85687b41082af9
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84