Analysis
-
max time kernel
112s -
max time network
245s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 20:31
Static task
static1
Behavioral task
behavioral1
Sample
34-CITACION DEMANDA EN SU CONTRA -JUZGADO LABORAL 04 CIRCUITO ESPECIALIZADO EXTINXION-044.svg
Resource
win7-20240704-en
General
-
Target
34-CITACION DEMANDA EN SU CONTRA -JUZGADO LABORAL 04 CIRCUITO ESPECIALIZADO EXTINXION-044.svg
-
Size
365KB
-
MD5
80193d67d0da94a9d928fe4bc5b3a7cc
-
SHA1
ec3b1f52e184dd87dfe9ceb2eb5cdca6f96f5dc4
-
SHA256
6e6577761b13f6a42f212419a8fcca10f35ab9315f24e9be39c8fc5cdfcfea10
-
SHA512
b376e9152c6ec0b45d8e9fa7d4f298a8ddf2d873c3b42b3f7d60704dbef3c7a4967a6e32fef5cd8fa0019bd6176401c2b8fcc0698437c2ae8082bfacb9088957
-
SSDEEP
3072:RCkLBpCoMXyV1d/Cl+XlwdgrJGwS4BHKlgeJtonukwUwPsWw5wzwQw6qmPwOhuqZ:RfBpCoK21dE+XlpJGwSsKldhLsuCY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2276 chrome.exe 2276 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe -
Suspicious use of FindShellTrayWindow 42 IoCs
pid Process 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2700 2276 chrome.exe 30 PID 2276 wrote to memory of 2700 2276 chrome.exe 30 PID 2276 wrote to memory of 2700 2276 chrome.exe 30 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 1368 2276 chrome.exe 32 PID 2276 wrote to memory of 2752 2276 chrome.exe 33 PID 2276 wrote to memory of 2752 2276 chrome.exe 33 PID 2276 wrote to memory of 2752 2276 chrome.exe 33 PID 2276 wrote to memory of 2608 2276 chrome.exe 34 PID 2276 wrote to memory of 2608 2276 chrome.exe 34 PID 2276 wrote to memory of 2608 2276 chrome.exe 34 PID 2276 wrote to memory of 2608 2276 chrome.exe 34 PID 2276 wrote to memory of 2608 2276 chrome.exe 34 PID 2276 wrote to memory of 2608 2276 chrome.exe 34 PID 2276 wrote to memory of 2608 2276 chrome.exe 34 PID 2276 wrote to memory of 2608 2276 chrome.exe 34 PID 2276 wrote to memory of 2608 2276 chrome.exe 34 PID 2276 wrote to memory of 2608 2276 chrome.exe 34 PID 2276 wrote to memory of 2608 2276 chrome.exe 34 PID 2276 wrote to memory of 2608 2276 chrome.exe 34 PID 2276 wrote to memory of 2608 2276 chrome.exe 34 PID 2276 wrote to memory of 2608 2276 chrome.exe 34 PID 2276 wrote to memory of 2608 2276 chrome.exe 34 PID 2276 wrote to memory of 2608 2276 chrome.exe 34 PID 2276 wrote to memory of 2608 2276 chrome.exe 34 PID 2276 wrote to memory of 2608 2276 chrome.exe 34 PID 2276 wrote to memory of 2608 2276 chrome.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\34-CITACION DEMANDA EN SU CONTRA -JUZGADO LABORAL 04 CIRCUITO ESPECIALIZADO EXTINXION-044.svg1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7249758,0x7fef7249768,0x7fef72497782⤵PID:2700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1152 --field-trial-handle=1260,i,4750962056923302227,7807514254929626580,131072 /prefetch:22⤵PID:1368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1524 --field-trial-handle=1260,i,4750962056923302227,7807514254929626580,131072 /prefetch:82⤵PID:2752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1616 --field-trial-handle=1260,i,4750962056923302227,7807514254929626580,131072 /prefetch:82⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2332 --field-trial-handle=1260,i,4750962056923302227,7807514254929626580,131072 /prefetch:12⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2340 --field-trial-handle=1260,i,4750962056923302227,7807514254929626580,131072 /prefetch:12⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1472 --field-trial-handle=1260,i,4750962056923302227,7807514254929626580,131072 /prefetch:22⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2948 --field-trial-handle=1260,i,4750962056923302227,7807514254929626580,131072 /prefetch:82⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3180 --field-trial-handle=1260,i,4750962056923302227,7807514254929626580,131072 /prefetch:12⤵PID:2952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3616 --field-trial-handle=1260,i,4750962056923302227,7807514254929626580,131072 /prefetch:82⤵PID:1720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3688 --field-trial-handle=1260,i,4750962056923302227,7807514254929626580,131072 /prefetch:12⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3964 --field-trial-handle=1260,i,4750962056923302227,7807514254929626580,131072 /prefetch:82⤵PID:2008
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5f3c5a66996fc31a6e58f6b1fb10204f0
SHA11ea42a6c2d5ba8db15c170e2330691040c49dd65
SHA2567d72c4c1efcb85d8d79d429a5b6a9b932dc9667ff9dcd5aa7600ae61829ae5a1
SHA512c6db35ae5971effec629965e50ff60f47a76efee2262788ae31efa3241cf1910d75c89c475b984a02718636e9879aa1e03fde1efb90b9cee60fb30a14c0396ac
-
Filesize
5KB
MD54a5e8fdd1f9fe91b5d450cc8e8c30e52
SHA1ade0136bff5a2024c73efbb6217566f258ac57bc
SHA2567d9730c3542bb22a7cd85d1f09a3d18e25dd49a3cd7c05eb3de806c63f8e5042
SHA5127f59f643373bbfba8b7158ad613205b4f638d85cbf4b596f327bc4d26dc4fb1f7716c552fc2af70091f1347939e2bae8f22273b26c87c9bca8a48b1685cda78d
-
Filesize
5KB
MD5cdc0c27c32b32636dbe5553ff813a33a
SHA133a25888b6d5b9599666ff599381cdab0aa783c9
SHA256f78f2dbc6067a2097edbda0c38de219a72cccf32ee7f1e82b0e04cee9e8db03f
SHA51269dd1e6f1a0ea6f6e53dbf3ad2a721da33ca6e8069a154430ec8816e1ff3f126543a23a0cf429aa74c70c0ab06a4717cb71626dcd3ad46977340b27a1f3772a4
-
Filesize
5KB
MD597f04ce935dd48d8944147a2829699e7
SHA185e1c3d62b0676956f9187ba3a140c983e7e6936
SHA256614b019ad20a41e8ea55890e450209c757ccaf4e04ae20f613d58f284bb86d30
SHA512a83d8e651f1ddd01fe154485cbad44618da6ebafa9abc0c7069551625e227347623c2906c4c20d34963cac4654db8ac087c2466248129909151403b2fe5be345
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
155KB
MD5bbb83ee2f61060fb8269547acbd7208a
SHA164529ddce1cada56913497cb1262fb6e65e46150
SHA256b5f26c6cac8fa2a327d77c4f88a19270c122fc54fc664623f304e61701e9b28e
SHA5129b17f1f44e5c3f42bbcad93835b52062b304916b78bb7617faec82056962e03c941c137ef14880918d4a24a6d8d18f94ed1922d62718a8f83c2342882b9afb43
-
C:\Users\Admin\Downloads\01-CITACION DEMANDA EN SU CONTRA -JUZGADO PENAL 01 CIRCUITO ESPECIALIZADO EXTINXION-01.zip.crdownload
Filesize6.7MB
MD5da0f823b67bc093b75d381f2a105ecb6
SHA111e82222f4070fbadc8c4c2f194ba65d9fa60ac5
SHA256ed88b5c4a8be75f5da0400817a9514bdcb38e602aa3fe463d39cec523dcd3268
SHA5123d2986bf2b9d6fc9c7251934f68eab8995dc33b1cf3886c2360afebdc2f9f35a088a2e0d92002a3c225a07095a5213677df78a4bf95ed77842d98a998b1e1016