Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
89s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
19/11/2023, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
Entrevista Ramos.pdf
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Entrevista Ramos.pdf
Resource
win10v2004-20231023-en
General
-
Target
Entrevista Ramos.pdf
-
Size
220KB
-
MD5
4fa52f61c85901949228c48723aa3d85
-
SHA1
fcd7154476cf05edb53fc580bb9e243c681aaab4
-
SHA256
c2736d528d0d8b890ec617f7e15ce1ea192e85c6609ad4195987185c37d51506
-
SHA512
f10238599059f705fab6368896a0324b03a5658a541b0e636c7f9e4f6d3249a4e9fbb59c27021740ee0909c044b8b0feff2ccf2450ab2bba9455dee6094a4e1b
-
SSDEEP
6144:bmgZVXAGyr0ZphafVTSjdovhp6kf6OzymnLNdIhVTTs:KgZVXAGJZjEt6O+mnL7IhVk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2436 chrome.exe 2436 chrome.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe Token: SeShutdownPrivilege 2436 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe 2436 chrome.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2960 AcroRd32.exe 2960 AcroRd32.exe 2960 AcroRd32.exe 2960 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2476 2436 chrome.exe 31 PID 2436 wrote to memory of 2476 2436 chrome.exe 31 PID 2436 wrote to memory of 2476 2436 chrome.exe 31 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 944 2436 chrome.exe 33 PID 2436 wrote to memory of 2716 2436 chrome.exe 34 PID 2436 wrote to memory of 2716 2436 chrome.exe 34 PID 2436 wrote to memory of 2716 2436 chrome.exe 34 PID 2436 wrote to memory of 2604 2436 chrome.exe 35 PID 2436 wrote to memory of 2604 2436 chrome.exe 35 PID 2436 wrote to memory of 2604 2436 chrome.exe 35 PID 2436 wrote to memory of 2604 2436 chrome.exe 35 PID 2436 wrote to memory of 2604 2436 chrome.exe 35 PID 2436 wrote to memory of 2604 2436 chrome.exe 35 PID 2436 wrote to memory of 2604 2436 chrome.exe 35 PID 2436 wrote to memory of 2604 2436 chrome.exe 35 PID 2436 wrote to memory of 2604 2436 chrome.exe 35 PID 2436 wrote to memory of 2604 2436 chrome.exe 35 PID 2436 wrote to memory of 2604 2436 chrome.exe 35 PID 2436 wrote to memory of 2604 2436 chrome.exe 35 PID 2436 wrote to memory of 2604 2436 chrome.exe 35 PID 2436 wrote to memory of 2604 2436 chrome.exe 35 PID 2436 wrote to memory of 2604 2436 chrome.exe 35 PID 2436 wrote to memory of 2604 2436 chrome.exe 35 PID 2436 wrote to memory of 2604 2436 chrome.exe 35 PID 2436 wrote to memory of 2604 2436 chrome.exe 35 PID 2436 wrote to memory of 2604 2436 chrome.exe 35
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Entrevista Ramos.pdf"1⤵
- Suspicious use of SetWindowsHookEx
PID:2960
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7169758,0x7fef7169768,0x7fef71697782⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1136 --field-trial-handle=1168,i,10690052415398467945,14085238743455075181,131072 /prefetch:22⤵PID:944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1524 --field-trial-handle=1168,i,10690052415398467945,14085238743455075181,131072 /prefetch:82⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1620 --field-trial-handle=1168,i,10690052415398467945,14085238743455075181,131072 /prefetch:82⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2260 --field-trial-handle=1168,i,10690052415398467945,14085238743455075181,131072 /prefetch:12⤵PID:1768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2268 --field-trial-handle=1168,i,10690052415398467945,14085238743455075181,131072 /prefetch:12⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1216 --field-trial-handle=1168,i,10690052415398467945,14085238743455075181,131072 /prefetch:22⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1344 --field-trial-handle=1168,i,10690052415398467945,14085238743455075181,131072 /prefetch:12⤵PID:1004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3364 --field-trial-handle=1168,i,10690052415398467945,14085238743455075181,131072 /prefetch:82⤵PID:2840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3576 --field-trial-handle=1168,i,10690052415398467945,14085238743455075181,131072 /prefetch:82⤵PID:1288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3548 --field-trial-handle=1168,i,10690052415398467945,14085238743455075181,131072 /prefetch:82⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2684 --field-trial-handle=1168,i,10690052415398467945,14085238743455075181,131072 /prefetch:12⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1856 --field-trial-handle=1168,i,10690052415398467945,14085238743455075181,131072 /prefetch:82⤵PID:2428
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562a4e6899720938f570eaed253df8d79
SHA104cdc2edc66b94686515059bd5da02158c469e45
SHA256c2521c637c56b9fd85a1098a8ab4c45de25f8b235aea68c9eb0ea82479a0a321
SHA512aa35e7218bbaf7bd69c19732dc10a294fc538ccf4f567ff6db4be10aab8ead06f88bacf0299cf00ee88bc6910253605703d2edfa6034de4de9a2a3b5cd38a17e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b518879c9abb3fb8e0c8ac5356588a6b
SHA1fe4775be232ab580010552161b07b070351f41a6
SHA25682bdab36140ba648108248bbeec05b7b67e7fb1d99afd17422f3e93ecdd159d6
SHA512e273a69ad223c7b91f072fb28fca5b3a13dd92fa9d6e919963913aed5649280991bc75b0f5a85e8b01aa5881cde5cb720b86d007f8c1649997879dec5ff2991f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD533999a2d1c0813470938454dfb8fc3c1
SHA191d762cdf1c0abba2215401689c7208172902927
SHA25676b811dec908f27fee2c7a07d4fa1b514179bf59aa9600644d86aad0759378a9
SHA512f43ebf6f1f9997d57798be85b65279007c26a31892dbeefe446ba9fc099924a45b82cf331de15e6cc88a5e38d25ffcb9bbf583f1b9db6bc2fc0965f07a15eb22
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
363B
MD57a7ef1de00b706df3320f4af785a01d6
SHA182b959f056fd795e5323a4a8dafdacfb1b4bcbcc
SHA2567f9449f927611a1522733dcda35538f72d36bf752058eabd353d8dd162b6c6a0
SHA512d0ac06696a6e33f701e4bd570475e19f4f4bf837d03e03d32cd5dc1c8349b50ecb8aa16e49084e706a1d6f3768c127a48946bb25b79701a09e1ce562621f96b0
-
Filesize
4KB
MD5ea2b098b122fc7f37e867ef9954188e8
SHA168fcca824d88c472b4242f9064c363b621f291b8
SHA256740e5cefb27a7634f6edaffe9ed9e58536195b849c318fd1d6cfc92bdcbc8aa4
SHA512f025805a79d34c759be43036821442dff34431e12055b1995eb5823059b8683e70dc350daa8a0193e03945dd669ab8b691af376d74cd882d784730fbe36d1d95
-
Filesize
4KB
MD543d83da956d023fa7232603c72167e6a
SHA165fa9b7d9a04f699a81e06d9ed658026142d527d
SHA25627409b4df4938bd9bd3b6e8a07dd37912233c11c2fffc3b528e4d740e38c3782
SHA512dde5245aa9f650b19cfbd2680d37fb7919f9b989f3c67a2d4690ab26ee8f742f1daccb3cd080f3d584a6c0ac459955954e2dd2c5fba3c26e99732553c3e65caf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
3KB
MD5b0b9af30d5b0cae135151ba4533528a8
SHA115a87c3d2548a0090942c9f02bf943cb9f23665d
SHA2564f404ded5692f1154fc3cfcda7650d34c97bc7bf0e916f96e082d2e015864b76
SHA5122bfe72003051425ae159808d421cc85e3e2f5136c953aae41afea34e9d0756a3401a733bbe7ea3e82cafcb3cc8f5a9c81e4c4d4c4b02fc78867936e9c16c566b