Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 15:36
Static task
static1
Behavioral task
behavioral1
Sample
25878a5562066a3064ded373478147d0_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
25878a5562066a3064ded373478147d0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
25878a5562066a3064ded373478147d0_JaffaCakes118.html
-
Size
90KB
-
MD5
25878a5562066a3064ded373478147d0
-
SHA1
e80bc49643a6b32c66aa8fb20d4459063530bf2b
-
SHA256
f33de7610cb7af399924aa7c965c28a75bac85ea19fc17d30050687ccad6ce99
-
SHA512
f98fccc2ede0fc3543d6dbe256d2662bb05f7c53429c5ce0595defa3855b22cb7d7bd88dd4c9c70902117dede6329fdbe8a9435c20ab3a5a805d43aa2e4e0a9b
-
SSDEEP
1536:Ap1f5aBtIlT3V7OMLIjScL1pKbA8vLSUaN3NBeB2:5B29IMLuL1pKbA8vLSUaNw2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4380 msedge.exe 4380 msedge.exe 1984 msedge.exe 1984 msedge.exe 1104 identity_helper.exe 1104 identity_helper.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe 4364 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe 1984 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1984 wrote to memory of 4216 1984 msedge.exe 79 PID 1984 wrote to memory of 4216 1984 msedge.exe 79 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4028 1984 msedge.exe 80 PID 1984 wrote to memory of 4380 1984 msedge.exe 81 PID 1984 wrote to memory of 4380 1984 msedge.exe 81 PID 1984 wrote to memory of 1392 1984 msedge.exe 82 PID 1984 wrote to memory of 1392 1984 msedge.exe 82 PID 1984 wrote to memory of 1392 1984 msedge.exe 82 PID 1984 wrote to memory of 1392 1984 msedge.exe 82 PID 1984 wrote to memory of 1392 1984 msedge.exe 82 PID 1984 wrote to memory of 1392 1984 msedge.exe 82 PID 1984 wrote to memory of 1392 1984 msedge.exe 82 PID 1984 wrote to memory of 1392 1984 msedge.exe 82 PID 1984 wrote to memory of 1392 1984 msedge.exe 82 PID 1984 wrote to memory of 1392 1984 msedge.exe 82 PID 1984 wrote to memory of 1392 1984 msedge.exe 82 PID 1984 wrote to memory of 1392 1984 msedge.exe 82 PID 1984 wrote to memory of 1392 1984 msedge.exe 82 PID 1984 wrote to memory of 1392 1984 msedge.exe 82 PID 1984 wrote to memory of 1392 1984 msedge.exe 82 PID 1984 wrote to memory of 1392 1984 msedge.exe 82 PID 1984 wrote to memory of 1392 1984 msedge.exe 82 PID 1984 wrote to memory of 1392 1984 msedge.exe 82 PID 1984 wrote to memory of 1392 1984 msedge.exe 82 PID 1984 wrote to memory of 1392 1984 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\25878a5562066a3064ded373478147d0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9924846f8,0x7ff992484708,0x7ff9924847182⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,6239529441901743749,6247307819791097516,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,6239529441901743749,6247307819791097516,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,6239529441901743749,6247307819791097516,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6239529441901743749,6247307819791097516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6239529441901743749,6247307819791097516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6239529441901743749,6247307819791097516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6239529441901743749,6247307819791097516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2532 /prefetch:12⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6239529441901743749,6247307819791097516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2480 /prefetch:12⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6239529441901743749,6247307819791097516,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,6239529441901743749,6247307819791097516,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6416 /prefetch:82⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,6239529441901743749,6247307819791097516,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6416 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6239529441901743749,6247307819791097516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,6239529441901743749,6247307819791097516,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6388 /prefetch:12⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,6239529441901743749,6247307819791097516,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4364
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
22KB
MD55e74c6d871232d6fe5d88711ece1408b
SHA11a5d3ac31e833df4c091f14c94a2ecd1c6294875
SHA256bcadf445d413314a44375c63418a0f255fbac7afae40be0a80c9231751176105
SHA5129d001eabce7ffdbf8e338725ef07f0033d0780ea474b7d33c2ad63886ff3578d818eb5c9b130d726353cd813160b49f572736dd288cece84e9bd8b784ce530d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD54e9cb3a65284fd941513f19d566bfe1f
SHA158830af8e68ea02c0b33b9d6b0ba0d68e0cd1586
SHA25604a82575aab9c1a359f94e41de3dfb75ce10e14509b72d865c77c8d20105eceb
SHA51218b31816e5f2f6eafce3d853b135c9931f532ea332797746a50c89e1cd10e293ca713cbbf429f05bc018d4f0a3645693fb6387094188197f22fa283ab50286a0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD587ed3d22e0bff08582e311f5069f26c9
SHA1826f6c56b66df67547b81e989e2ebcf52ec4db1f
SHA2564dfdb6226c19ea3eb11cd6fb6df4954d8d6e7e1ac56e3e9b3ea0af248eb657e5
SHA512914c890a0d36c0374563e501c51ac811a442209266ab0117891ed060e73a691a650f0730ccb7f6fb620254111928e40d85053473691d85bc384da604c5bd1d21
-
Filesize
1KB
MD5a3d2bd1a1c14be0e9369ea3e89286a46
SHA1d33dffe261299362679b32effe39e3beef347304
SHA256cd856a4923ff7e279edd5fa58fad0701c629af19be88af709709ec80677f6928
SHA51287072f2b28783afbb37dc70fa37a89fd6d465c80833122234d1af2c5307d86134106b723a1699b4e23fe40130f613c8d0a787801b55f36aba21ef21eb029a671
-
Filesize
6KB
MD578b180f7b18f15b5f20cd980d3bdae7c
SHA12188b753160a63956b8fd55b85dd6069d733d9af
SHA2561c3a8e7b73f9c5334e44a42dca26432a598d24f766e23aeae9df5657a28d3bd7
SHA5120c6cdc614a696dedd084e9418be85d3f41a22e555145130ee54cd66702655be392d4066996c40855b94c0a781e4e49d2a7a88ddb38ab11cb264b86c7e4e5b48a
-
Filesize
6KB
MD58ba701e93f3415c9016df8447675d7ee
SHA1f0e43307f1ba46c90e282682e29f34833608c176
SHA256199d916b1e3d1e5a4cb38bc86c50be7ad475fee77493e182b54f53f905153258
SHA5123ec2849d056d4d0555fd29cbfcab342f58d611f186d74cd7f54a534ef91988043dfcf5ab3ccda95bd867556889067a8e36eb63668678f7043b60c5ba30ee0cc2
-
Filesize
7KB
MD56502d988eb2029dc10275a6ac062e608
SHA1a2572885ca3dfc519829f7fbf6637bf98a5450f5
SHA2569e8beb929dfed9a7fba7688d209822de88336ed88de529ab496cb995b7e2973e
SHA5123e5b874234c1b13c0d7076f800ce0abc15abd868d2871c0acdc48d0eb4383487103f0467deb0b9118ba434b696b026a29cfecd16855f9e86c56a75e13902981c
-
Filesize
7KB
MD5cc48a7bb46b39a184afe635253ac2288
SHA1d2fe220933ed8393f33e8b9983a1eda637992f9a
SHA25606d11fe8ad5ed611b99a6766e7d6f9bb5d60494c86e14de26f5816648954d4f8
SHA512b1406124a1c9cc3160bffa093c4a6544d37e5864235967337ce7c5571cf3168323b02a26d0d800dfe17cf26b2b97adc198896ba50c823ee9bada8426312379de
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b044acd8453c0dc70e3f1e5ceea069b4
SHA1eb33627becef5579dff2f18026af72646ccea7ca
SHA256f6ca03683c7c16d958c76d2cd5ea3f18fe2b50dbd731c0e6fd37377c6eb09fa1
SHA5124d20c237c0436be54bf8e8fc6ca4b46bdab0b663afde521edde30cc356680babeff921fdb0e7c6029e3be0919353c19789715f2e3f3fc0d073c5a2de9abaa9b5