Analysis
-
max time kernel
74s -
max time network
73s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 16:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://sienteslacorrienteviejo.com/registro
Resource
win10v2004-20240802-en
General
-
Target
https://sienteslacorrienteviejo.com/registro
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133688168732998923" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 648 chrome.exe 648 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe Token: SeShutdownPrivilege 648 chrome.exe Token: SeCreatePagefilePrivilege 648 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe 648 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 648 wrote to memory of 1120 648 chrome.exe 85 PID 648 wrote to memory of 1120 648 chrome.exe 85 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 5020 648 chrome.exe 86 PID 648 wrote to memory of 4956 648 chrome.exe 87 PID 648 wrote to memory of 4956 648 chrome.exe 87 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88 PID 648 wrote to memory of 4960 648 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://sienteslacorrienteviejo.com/registro1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9fec9cc40,0x7ff9fec9cc4c,0x7ff9fec9cc582⤵PID:1120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1944,i,14589361790495530992,716566271371829650,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1940 /prefetch:22⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1884,i,14589361790495530992,716566271371829650,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2120 /prefetch:32⤵PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,14589361790495530992,716566271371829650,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2240 /prefetch:82⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,14589361790495530992,716566271371829650,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3152 /prefetch:12⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3128,i,14589361790495530992,716566271371829650,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4352,i,14589361790495530992,716566271371829650,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3660 /prefetch:12⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3684,i,14589361790495530992,716566271371829650,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4972 /prefetch:82⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=3464,i,14589361790495530992,716566271371829650,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:3472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5220,i,14589361790495530992,716566271371829650,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3652
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD569bf75cf703aa2cb081f413d35209755
SHA1f02efb95fce421db640e5a84ed52e9f0bbf32b34
SHA256a5557061f6cb116090bffeff5a8e5cf0c16537bfc07c5e324ebfcb190394e0c3
SHA5126736fa510edea9aef5a93d01682924b5350d4f7e786cc86902318b9a926366a279c6208f9a7ff74eb9587034802a7013f33ce9f2427b8417ee29002ae0590341
-
Filesize
18KB
MD5b86e3f25c2757b8e896216bc39af4362
SHA1cb7bb7a686b0c8ba43e60aac09c457207fcc75d1
SHA256893b559dddc00536e74f380510c731a559c8594b5bbf8a2adacdff128f5093cf
SHA5124fd1bcf983cecb69ac6592463c285e8b5d6a8c169fd4b883cae5fe3ff8f032c4830f0009ddb9977eca8db773fdd63c67ff4d471207c81d221cf84db1bbc5c580
-
Filesize
63KB
MD5c80ada4f962f21969ff48f1d4b76b31d
SHA1cc889157ad8d122bb609b15b6321243048c3d065
SHA2568d93515fab06ddc3ccaf0496a15dbab7c5bcb619e8afb78017980f2652695dc2
SHA51280ba4e061e82791209c80ff5566e7e62005f2875230da9ad2fd862c46dd144382a88443ea6be6a6c3dab16eb04254711364df167d1c53afa2aa8a6728b63875f
-
Filesize
1KB
MD5db5adad7f704828216c1cf81a81dee8f
SHA1b90f967628104753a1053dfbee6671586b0b19b5
SHA256ec40b642dc9145e1a9abbc8af8686a8a7996d27b038f07668c47a79ec84933fc
SHA512f0aafb6e3108a768c87727cd3f89edb474f99aa551a809d5a123a059e93d382f28faa98cd0da2df3f3c7fe3d3a181df22c54b2a12b3a6e9066b3c6d46c77f12b
-
Filesize
11KB
MD55ec3cecb13be7ec697ab2f0c702e59d6
SHA141f7cc772653c36fcde9602ff24875bcc17649b8
SHA256d9d8b3179fb01c11030be774141c842933703146586a3404e10d42f7925a8c06
SHA5124bdec9cfd8d6358ced15af9a1962bfde80573a5c7a41cac5979bd4d8e242ea14d0009f13066235577b2402487fc5d597b3654ac14f277635e2bacc4978447a41
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5608c7d03451d0c7807d05ad2ad697ce5
SHA132003950dab26703b9d6ffe574453f4204fc884c
SHA256dfd79ae539167c84d907948845f2b82452112d1de7577de70e0c9010a9b8fd8e
SHA51254acfc57e7d3b414c5ab06db3044b25c5f073dbb670fe1b6abe24d1add05fa55a429c60377a1ba95c5dd6b99f997c5679eab883c4ce08ea29f87f1a44b2b8cef
-
Filesize
1KB
MD5e8e0ac0900af2ddb23e16c77024b9e36
SHA15a3fa0610b1448c8432578422d443e97161290c0
SHA256b00b83af921cbf0b3d27abdce09c8b84f51ee21ab258acf5109853dac9663a03
SHA512828869d5863ec571722515d493ac2e3fc2bab6477d2bd25995982f39d1f45ccc73dcffec22a549faa5d75d0cbd8d9b6eb2742b284bb7f4d66a71bdfdb4d8efaf
-
Filesize
10KB
MD58570f005e0306a2b9d2b06b5365ca3b8
SHA158e566f22eaec01a45e18d5e6746090fcac923cd
SHA25646c92904656151b22c1c61d804a37944dfb00f163b131bad89ba1dabcec867ed
SHA512d49eb3ceb7241e955ffa160ccac6e2551199fe28a1d93b624bf899caa5f732d51d47f53741d8d17f3ba265aa45525a216a8f29ad3879e288272ba2e909e19b6d
-
Filesize
9KB
MD534fdbf665c4806beda047fade51a9e07
SHA1da47d85a6144d3077f67dbc1b41cab8f02848f8f
SHA2565262d059fc946db4cab8abeca6e5603bd1a2eae39066ed171da78a26c4f35dcb
SHA512a6ad52e185c20beee43a245e0a3329ac8248c09e3aad75d8ce33ee6670ec8772b481d704d8d9827d5e6fac8937b1f5cb515e460efc48fe5349cbc70faacb3980
-
Filesize
9KB
MD51ad819b7fb8cf30ec58392fcdb72c8b7
SHA1729a8dc7954a61ed4dd13e5f117c076e7844328f
SHA2567caebde1ad7d359a6765354d5b9e344e1509b373938357d400b893d0c57ff4e6
SHA512cdc29b739f11ee539beaf2c11bc0ee32a11adef47a50f0affc32b153b8bc660a0f6485da3e2ed2f9ccff519e8e5cf743233b0c4a24601b9284a5d82ac967ac11
-
Filesize
9KB
MD562e92c21d84df6286cfe9dba2541b3e7
SHA1a8d1ed66c9a4c09800fdad417363a9b487752b38
SHA25637c5032a0460586b9bab896bec108925a32b5be9dfca35707fb42c4b9176c0a3
SHA512def756e7852e1d9c3ba17deca5f8a118945a5ff17acd2abaeb122ebee60d895bb87fe1fe19b9731ec22de63135ced362986781579456a3a75c3398ddaf0ccd11
-
Filesize
9KB
MD5d36cddde6da3ccb696a849076fc34855
SHA108748135f1608df45aa0886e8efa3f7d379af08b
SHA25676b48a506981c9bd308876646c104d6115b7b5a1148fc246ca199c4cbe42ee5a
SHA512807c3c3d3715dcab144d19716acf5cb1d26704a2ee9a0284d40a231d58714dbea8c434b01afadfd342dd1f55f772a85b80cdc65451bf047b906a1db0cd09883c
-
Filesize
99KB
MD53f957fca3b810289ac27e0f37f0edc7a
SHA10aa5b946ffddd01e995fa9a4cab61952c876e9b1
SHA256b69c8a6323847c53c4f6221bdafeb505ff8d543afd7f1388b382588d996b8872
SHA512089c24a302ee05f290f71cec7cbd51da8b6114cb982e2e20351fd4c7cd529b4abe6698d09b107ccf1af17a787a39292147680bcea1d0d05f8e37ec117989a2ae
-
Filesize
99KB
MD51425411e49049d062e83a50bd7a54abd
SHA1b0fbf9682bcdc7c3c7d7ab8c4a20398fd43c3d9c
SHA25629ac0510b196c8857cda0f805ed47456821db30a28a9255cd1cada7f18f3b295
SHA512443c7e64794d1427ab6339a42ba3331e61e702b2ba4f27a27a3bdae6a8186f8fbb89f0460032c04299503b0d123d85197f7aa093d6a36a9641e5db50c5735ce3