Analysis
-
max time kernel
70s -
max time network
68s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/02/2024, 22:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://skidrowrepack.com/3426-the-amazing-spider-man-2-1.html
Resource
win10v2004-20240226-en
General
-
Target
https://skidrowrepack.com/3426-the-amazing-spider-man-2-1.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133535492492960339" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-275798769-4264537674-1142822080-1000\{C76876F2-74C6-4CB0-8E18-E5B949CFA8A1} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3320 chrome.exe 3320 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe Token: SeShutdownPrivilege 3320 chrome.exe Token: SeCreatePagefilePrivilege 3320 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe 3320 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3320 wrote to memory of 1056 3320 chrome.exe 64 PID 3320 wrote to memory of 1056 3320 chrome.exe 64 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 2936 3320 chrome.exe 90 PID 3320 wrote to memory of 3472 3320 chrome.exe 92 PID 3320 wrote to memory of 3472 3320 chrome.exe 92 PID 3320 wrote to memory of 4488 3320 chrome.exe 91 PID 3320 wrote to memory of 4488 3320 chrome.exe 91 PID 3320 wrote to memory of 4488 3320 chrome.exe 91 PID 3320 wrote to memory of 4488 3320 chrome.exe 91 PID 3320 wrote to memory of 4488 3320 chrome.exe 91 PID 3320 wrote to memory of 4488 3320 chrome.exe 91 PID 3320 wrote to memory of 4488 3320 chrome.exe 91 PID 3320 wrote to memory of 4488 3320 chrome.exe 91 PID 3320 wrote to memory of 4488 3320 chrome.exe 91 PID 3320 wrote to memory of 4488 3320 chrome.exe 91 PID 3320 wrote to memory of 4488 3320 chrome.exe 91 PID 3320 wrote to memory of 4488 3320 chrome.exe 91 PID 3320 wrote to memory of 4488 3320 chrome.exe 91 PID 3320 wrote to memory of 4488 3320 chrome.exe 91 PID 3320 wrote to memory of 4488 3320 chrome.exe 91 PID 3320 wrote to memory of 4488 3320 chrome.exe 91 PID 3320 wrote to memory of 4488 3320 chrome.exe 91 PID 3320 wrote to memory of 4488 3320 chrome.exe 91 PID 3320 wrote to memory of 4488 3320 chrome.exe 91 PID 3320 wrote to memory of 4488 3320 chrome.exe 91 PID 3320 wrote to memory of 4488 3320 chrome.exe 91 PID 3320 wrote to memory of 4488 3320 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://skidrowrepack.com/3426-the-amazing-spider-man-2-1.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb261d9758,0x7ffb261d9768,0x7ffb261d97782⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1876,i,16713087629811733209,848655454785016299,131072 /prefetch:22⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1876,i,16713087629811733209,848655454785016299,131072 /prefetch:82⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1876,i,16713087629811733209,848655454785016299,131072 /prefetch:82⤵PID:3472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1876,i,16713087629811733209,848655454785016299,131072 /prefetch:12⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1876,i,16713087629811733209,848655454785016299,131072 /prefetch:12⤵PID:3340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4672 --field-trial-handle=1876,i,16713087629811733209,848655454785016299,131072 /prefetch:12⤵PID:4752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4896 --field-trial-handle=1876,i,16713087629811733209,848655454785016299,131072 /prefetch:12⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5064 --field-trial-handle=1876,i,16713087629811733209,848655454785016299,131072 /prefetch:12⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 --field-trial-handle=1876,i,16713087629811733209,848655454785016299,131072 /prefetch:82⤵PID:3880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5336 --field-trial-handle=1876,i,16713087629811733209,848655454785016299,131072 /prefetch:82⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4780 --field-trial-handle=1876,i,16713087629811733209,848655454785016299,131072 /prefetch:12⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3112 --field-trial-handle=1876,i,16713087629811733209,848655454785016299,131072 /prefetch:12⤵PID:720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 --field-trial-handle=1876,i,16713087629811733209,848655454785016299,131072 /prefetch:82⤵
- Modifies registry class
PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5408 --field-trial-handle=1876,i,16713087629811733209,848655454785016299,131072 /prefetch:82⤵PID:3000
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
120B
MD5831669818ef06bbfc05b5c3108c25e9d
SHA17f0c38abe9fcf2c4b827dc46069e4b95aefef114
SHA256a2fc0b5854a08d429cd5f5fc75738b0f943edc2269f5d8bab82fb0cbf5964e07
SHA51229d56434051e830075819396799669c57146758b24786e6ec4d0704d2313f77b119153011eb68997e49b7c285eb74b1c3021518ae6c62b133c5d46dde5e09c84
-
Filesize
538B
MD5c1e35d8ac88986d27248f1e05f12b623
SHA19806b6b5f7ca887ad86e9e99f8820bd185bac96b
SHA2560e9f3a30e547e357958029484e81eb8455cfd7fbbe257e98e9654dadfb859fd7
SHA512f9897eb448e8ecc215d55398df0a5dcb79ac5f729c16b4ff74a1a8b2daf74451c6734a0ef3422e4381204adbb1ebcef29536852e3c63cda4f6ab6ff02e745cbf
-
Filesize
6KB
MD54e03fb0f345aa38a1e32bcf643e2f3fe
SHA17d4212d25074aea8dbe8086a04fec3e368331238
SHA25646fc56144c7b40ead3833b487ac38fcee8d7877341d6c5a731fdeae216f7873b
SHA512ed5796ad7453f362bb7f997eab62f9820e41f2e729c870d2f6114bf8a2711aa51dcb349a8ddba46f334a6d4270a63a7d16416d0481cee7c29cc078933e8bcdcf
-
Filesize
6KB
MD5e8145e53c73fd38a51adc79e7e2ddd96
SHA1f580c239ae029c393c20e25719ba84ce8993acb5
SHA256ea31f20dc336592fee26a0c3f9c09e113e28602be1217d044d33b4f5e49d77fc
SHA51281eaca8ffa76895ebc5cc0b62f4fddfd1dc4058c2ea171b4c50e7b2fd138f8dfeeef022e7ad8166268d6fb22df49b2512909ea0f09027bfcb61625521cf2c51f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe582f87.TMP
Filesize120B
MD54e599e503963c3b3b785325b7ccc2a63
SHA13f1223867b4dad99466eb8b2fda2170790a9bf64
SHA25622afaa61a4fed6e8a62307849c1e40825364111229ad8e9a3be65832e89483ee
SHA51230f948e8c0bd3da58be03e134d6eae6681265417ebbaea100ac512e099e4e34166a090fc82f5a35dba519b78922f92c23a3b4e17017ae30a85fc431709cf77ef
-
Filesize
128KB
MD59164bc593b28f13b76cc8105b2aa6579
SHA10325bcfb66e538ba7db26fa9d16cc8e569796301
SHA256e16f71efacf4e0b5b59ec69c4dc3fdfe7cab1c955a0088b104451b5f9b1143f9
SHA512d795101accfa624b585348f71fa536a95c1c1d5a9c4ae497ae2ef375a04262ab0b3fe0562e14ceb340c627d5e2a46b2b710d09da5755c5b5a7b2e17b0056a0d3
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd