Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3Rc7 - Copy...ox.dll
windows7-x64
1Rc7 - Copy...ox.dll
windows10-2004-x64
1Rc7 - Copy...er.exe
windows7-x64
7Rc7 - Copy...er.exe
windows10-2004-x64
7Rc7 - Copy...C7.dll
windows7-x64
3Rc7 - Copy...C7.dll
windows10-2004-x64
3Rc7 - Copy...ol.dll
windows7-x64
1Rc7 - Copy...ol.dll
windows10-2004-x64
1Analysis
-
max time kernel
40s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
19/09/2023, 21:22
Static task
static1
Behavioral task
behavioral1
Sample
Rc7 - Copy/Rc7/FastColoredTextBox.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Rc7 - Copy/Rc7/FastColoredTextBox.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
Rc7 - Copy/Rc7/Inposs Rc7 Launcher.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
Rc7 - Copy/Rc7/Inposs Rc7 Launcher.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
Rc7 - Copy/Rc7/RC7.dll
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
Rc7 - Copy/Rc7/RC7.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
Rc7 - Copy/Rc7/VisualStudioTabControl.dll
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
Rc7 - Copy/Rc7/VisualStudioTabControl.dll
Resource
win10v2004-20230915-en
General
-
Target
Rc7 - Copy/Rc7/Inposs Rc7 Launcher.exe
-
Size
6.1MB
-
MD5
9a7ac8e985a73d3a31c5eef540fd8973
-
SHA1
b1a09baacd78021a3234b3402c9d65eb589aa773
-
SHA256
1c175b2bd70d3bbc32ea31455b868ac9add6a2b5f4ad77a5831814a9704a6120
-
SHA512
33ad423bbbd98f4b980e92f24427f44e2cc86f3ce2fa460cb7cda0c3e25b543af36de75745d288e8994807a2cf3ab912f36c8644addc5645c13ab7bcd2f5059f
-
SSDEEP
98304:A6WEtdFBmamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzDgsRuGK4RQrVQBK03NiINHT+:A6VFFeN/FJMIDJf/gsAGK4R0QgsJHT+
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2664 Inposs Rc7 Launcher.exe -
resource yara_rule behavioral3/files/0x0006000000015c6a-21.dat upx behavioral3/files/0x0006000000015c6a-22.dat upx -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2636 chrome.exe 2636 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe Token: SeShutdownPrivilege 2636 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe 2636 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2664 2236 Inposs Rc7 Launcher.exe 29 PID 2236 wrote to memory of 2664 2236 Inposs Rc7 Launcher.exe 29 PID 2236 wrote to memory of 2664 2236 Inposs Rc7 Launcher.exe 29 PID 2636 wrote to memory of 2316 2636 chrome.exe 31 PID 2636 wrote to memory of 2316 2636 chrome.exe 31 PID 2636 wrote to memory of 2316 2636 chrome.exe 31 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 3056 2636 chrome.exe 32 PID 2636 wrote to memory of 1892 2636 chrome.exe 33 PID 2636 wrote to memory of 1892 2636 chrome.exe 33 PID 2636 wrote to memory of 1892 2636 chrome.exe 33 PID 2636 wrote to memory of 2864 2636 chrome.exe 34 PID 2636 wrote to memory of 2864 2636 chrome.exe 34 PID 2636 wrote to memory of 2864 2636 chrome.exe 34 PID 2636 wrote to memory of 2864 2636 chrome.exe 34 PID 2636 wrote to memory of 2864 2636 chrome.exe 34 PID 2636 wrote to memory of 2864 2636 chrome.exe 34 PID 2636 wrote to memory of 2864 2636 chrome.exe 34 PID 2636 wrote to memory of 2864 2636 chrome.exe 34 PID 2636 wrote to memory of 2864 2636 chrome.exe 34 PID 2636 wrote to memory of 2864 2636 chrome.exe 34 PID 2636 wrote to memory of 2864 2636 chrome.exe 34 PID 2636 wrote to memory of 2864 2636 chrome.exe 34 PID 2636 wrote to memory of 2864 2636 chrome.exe 34 PID 2636 wrote to memory of 2864 2636 chrome.exe 34 PID 2636 wrote to memory of 2864 2636 chrome.exe 34 PID 2636 wrote to memory of 2864 2636 chrome.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Rc7 - Copy\Rc7\Inposs Rc7 Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Rc7 - Copy\Rc7\Inposs Rc7 Launcher.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\Rc7 - Copy\Rc7\Inposs Rc7 Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Rc7 - Copy\Rc7\Inposs Rc7 Launcher.exe"2⤵
- Loads dropped DLL
PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef72a9758,0x7fef72a9768,0x7fef72a97782⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1116 --field-trial-handle=1360,i,5379107475835778507,18249467659319927862,131072 /prefetch:22⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1360,i,5379107475835778507,18249467659319927862,131072 /prefetch:82⤵PID:1892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1608 --field-trial-handle=1360,i,5379107475835778507,18249467659319927862,131072 /prefetch:82⤵PID:2864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2200 --field-trial-handle=1360,i,5379107475835778507,18249467659319927862,131072 /prefetch:12⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2208 --field-trial-handle=1360,i,5379107475835778507,18249467659319927862,131072 /prefetch:12⤵PID:1964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1388 --field-trial-handle=1360,i,5379107475835778507,18249467659319927862,131072 /prefetch:22⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2144 --field-trial-handle=1360,i,5379107475835778507,18249467659319927862,131072 /prefetch:12⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1464 --field-trial-handle=1360,i,5379107475835778507,18249467659319927862,131072 /prefetch:82⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3612 --field-trial-handle=1360,i,5379107475835778507,18249467659319927862,131072 /prefetch:82⤵PID:440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3620 --field-trial-handle=1360,i,5379107475835778507,18249467659319927862,131072 /prefetch:82⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD51737c03ba59a8e28cb6915fbd7ced86a
SHA174d6e17d31e88dfb0ddd433c1379b9bce28ccc4f
SHA2561ba18b5c67e4350314a207d75dad7a4f578ab322066082818402e5e115b73d04
SHA512c4297ec7d6e55517fff4944b515b7c2faee700778aeddf00932cf42c5e15dcfc56c31db67d8b2d47a0c60c0c6053b9cb092e41b323f4dc6450b077de92f8b531
-
Filesize
4KB
MD52b92b19ae60fe324188e4f9cc1544c48
SHA1e5f33a3c6ce352377dfbbe151e1b8fedac89c2ec
SHA2569112045805c02b0cc29471d305732f004aabe29520eca68a67622f97164d8653
SHA5120cf5f38870fde1547c55f1112b82d1f832607776138f5cf071c9e94c3fdd5dbdd57c224e89aa05a4e01823d833d095126639c6aa3d73c9dadccab28e0189703b
-
Filesize
4KB
MD5046914b601b4e4662ffd4ca9f4e7960a
SHA13c635a7f87977f827541672c2b3e64479666c897
SHA2568c59dee5e31be07d586cc90c7b726cc297397d540e741648468afcb2db6e8d38
SHA5121902edc43d8344b59f97e2f670b2a8c5267c4c2d10eb63596bf3fd5b118ceb653be53bedaf0d28595e81b520d257d3a955a473c5788149ed2c163b6df803aa3d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
1.4MB
MD5178a0f45fde7db40c238f1340a0c0ec0
SHA1dcd2d3d14e06da3e8d7dc91a69b5fd785768b5fe
SHA2569fcb5ad15bd33dd72122a171a5d950e8e47ceda09372f25df828010cde24b8ed
SHA5124b790046787e57b9414a796838a026b1530f497a75c8e62d62b56f8c16a0cbedbefad3d4be957bc18379f64374d8d3bf62d3c64b53476c7c5005a7355acd2cee
-
Filesize
1.4MB
MD5178a0f45fde7db40c238f1340a0c0ec0
SHA1dcd2d3d14e06da3e8d7dc91a69b5fd785768b5fe
SHA2569fcb5ad15bd33dd72122a171a5d950e8e47ceda09372f25df828010cde24b8ed
SHA5124b790046787e57b9414a796838a026b1530f497a75c8e62d62b56f8c16a0cbedbefad3d4be957bc18379f64374d8d3bf62d3c64b53476c7c5005a7355acd2cee