Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
113s -
max time network
112s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
04/02/2024, 11:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://download2393.mediafire.com/g89qse524x6gM4_8xohA_TWuZxdEkRNIoHxILjT4kFSgJtbRshtdH6OBvhDBy2_ODRFowOvROQBaZE3FKwQwb_oAB-lKMwuNIkpC_4HehcNR399pQye3gE0jBfiEePxp6G7hZBaZTO6VaMSPitbmlvtcxDIRaAycmodWoO6-2BGb/fkz5gfddt826621/Xfer+Records+Serum+v1.368+WIN-TCD.rar
Resource
win10-20231215-en
General
-
Target
https://download2393.mediafire.com/g89qse524x6gM4_8xohA_TWuZxdEkRNIoHxILjT4kFSgJtbRshtdH6OBvhDBy2_ODRFowOvROQBaZE3FKwQwb_oAB-lKMwuNIkpC_4HehcNR399pQye3gE0jBfiEePxp6G7hZBaZTO6VaMSPitbmlvtcxDIRaAycmodWoO6-2BGb/fkz5gfddt826621/Xfer+Records+Serum+v1.368+WIN-TCD.rar
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133515214545641316" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 168 chrome.exe 168 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe Token: SeShutdownPrivilege 168 chrome.exe Token: SeCreatePagefilePrivilege 168 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe 168 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 168 wrote to memory of 1068 168 chrome.exe 14 PID 168 wrote to memory of 1068 168 chrome.exe 14 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 4476 168 chrome.exe 39 PID 168 wrote to memory of 1516 168 chrome.exe 36 PID 168 wrote to memory of 1516 168 chrome.exe 36 PID 168 wrote to memory of 1980 168 chrome.exe 35 PID 168 wrote to memory of 1980 168 chrome.exe 35 PID 168 wrote to memory of 1980 168 chrome.exe 35 PID 168 wrote to memory of 1980 168 chrome.exe 35 PID 168 wrote to memory of 1980 168 chrome.exe 35 PID 168 wrote to memory of 1980 168 chrome.exe 35 PID 168 wrote to memory of 1980 168 chrome.exe 35 PID 168 wrote to memory of 1980 168 chrome.exe 35 PID 168 wrote to memory of 1980 168 chrome.exe 35 PID 168 wrote to memory of 1980 168 chrome.exe 35 PID 168 wrote to memory of 1980 168 chrome.exe 35 PID 168 wrote to memory of 1980 168 chrome.exe 35 PID 168 wrote to memory of 1980 168 chrome.exe 35 PID 168 wrote to memory of 1980 168 chrome.exe 35 PID 168 wrote to memory of 1980 168 chrome.exe 35 PID 168 wrote to memory of 1980 168 chrome.exe 35 PID 168 wrote to memory of 1980 168 chrome.exe 35 PID 168 wrote to memory of 1980 168 chrome.exe 35 PID 168 wrote to memory of 1980 168 chrome.exe 35 PID 168 wrote to memory of 1980 168 chrome.exe 35 PID 168 wrote to memory of 1980 168 chrome.exe 35 PID 168 wrote to memory of 1980 168 chrome.exe 35
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fff1c2d9758,0x7fff1c2d9768,0x7fff1c2d97781⤵PID:1068
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://download2393.mediafire.com/g89qse524x6gM4_8xohA_TWuZxdEkRNIoHxILjT4kFSgJtbRshtdH6OBvhDBy2_ODRFowOvROQBaZE3FKwQwb_oAB-lKMwuNIkpC_4HehcNR399pQye3gE0jBfiEePxp6G7hZBaZTO6VaMSPitbmlvtcxDIRaAycmodWoO6-2BGb/fkz5gfddt826621/Xfer+Records+Serum+v1.368+WIN-TCD.rar1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:168 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2092 --field-trial-handle=1840,i,14889632250505374256,13997504613752072863,131072 /prefetch:82⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1780 --field-trial-handle=1840,i,14889632250505374256,13997504613752072863,131072 /prefetch:82⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2856 --field-trial-handle=1840,i,14889632250505374256,13997504613752072863,131072 /prefetch:12⤵PID:4392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2864 --field-trial-handle=1840,i,14889632250505374256,13997504613752072863,131072 /prefetch:12⤵PID:1096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1840,i,14889632250505374256,13997504613752072863,131072 /prefetch:22⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=5020 --field-trial-handle=1840,i,14889632250505374256,13997504613752072863,131072 /prefetch:12⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3376 --field-trial-handle=1840,i,14889632250505374256,13997504613752072863,131072 /prefetch:12⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5144 --field-trial-handle=1840,i,14889632250505374256,13997504613752072863,131072 /prefetch:82⤵PID:3388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5288 --field-trial-handle=1840,i,14889632250505374256,13997504613752072863,131072 /prefetch:82⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 --field-trial-handle=1840,i,14889632250505374256,13997504613752072863,131072 /prefetch:82⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2904 --field-trial-handle=1840,i,14889632250505374256,13997504613752072863,131072 /prefetch:82⤵PID:2628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5368 --field-trial-handle=1840,i,14889632250505374256,13997504613752072863,131072 /prefetch:12⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5416 --field-trial-handle=1840,i,14889632250505374256,13997504613752072863,131072 /prefetch:12⤵PID:3824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5832 --field-trial-handle=1840,i,14889632250505374256,13997504613752072863,131072 /prefetch:12⤵PID:3388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=6132 --field-trial-handle=1840,i,14889632250505374256,13997504613752072863,131072 /prefetch:12⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=6000 --field-trial-handle=1840,i,14889632250505374256,13997504613752072863,131072 /prefetch:12⤵PID:1280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=2892 --field-trial-handle=1840,i,14889632250505374256,13997504613752072863,131072 /prefetch:12⤵PID:4628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=1828 --field-trial-handle=1840,i,14889632250505374256,13997504613752072863,131072 /prefetch:82⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 --field-trial-handle=1840,i,14889632250505374256,13997504613752072863,131072 /prefetch:82⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6212 --field-trial-handle=1840,i,14889632250505374256,13997504613752072863,131072 /prefetch:82⤵PID:1184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=4564 --field-trial-handle=1840,i,14889632250505374256,13997504613752072863,131072 /prefetch:12⤵PID:3536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=3652 --field-trial-handle=1840,i,14889632250505374256,13997504613752072863,131072 /prefetch:12⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=5824 --field-trial-handle=1840,i,14889632250505374256,13997504613752072863,131072 /prefetch:12⤵PID:2424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=5888 --field-trial-handle=1840,i,14889632250505374256,13997504613752072863,131072 /prefetch:12⤵PID:1652
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3296
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3941⤵PID:4472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5923a543cc619ea568f91b723d9fb1ef0
SHA16f4ade25559645c741d7327c6e16521e43d7e1f9
SHA256bf7344209edb1be5a2886c425cf6334a102d76cbea1471fd50171e2ee92877cd
SHA512a4153751761cd67465374828b0514d7773b8c4ed37779d1ecfd4f19be4faa171585c8ee0b4db59b556399d5d2b9809ba87e04d4715e9d090e1f488d02219d555
-
Filesize
315KB
MD5d013db2840a239cc4616531b85ef1a77
SHA19c563b6b2d69b72d338c8ca6576f8ac8fb39f21f
SHA2560aa30d7546bc342e7a45fa907915c993e22ea11834bfff9a66094a4aee3f440a
SHA5121a7a0b499e82782acc0dce2d83d5f5aaa67d2b8d73ffd7f77108873208ba1025c7db6df1f83b353142f261f3ee3d912edd263ee6c19d5771fc56c9ef89dd0104
-
Filesize
126KB
MD5b01bbe74a37a660aab7069a5b0addcac
SHA1c6df83851703dcbc56c2eefcdacad118399b70e0
SHA256aff0bc82fa4f2b9663288a96a31f6c77441c2653a706d571fe2a240509df31f5
SHA51292d7b9bfd69fde6c87e4de842f243e2deef50ea77e3d24a447607eecae15eae62014d6f4007992066cabee4aedd7c195465999165fcc8a644c34c1038a1c514f
-
Filesize
35KB
MD5e0029b4bca105ee6c488ff5859200811
SHA1b803af3e54813c9f80b0f3f43fc3349c3b2b6bcc
SHA256e3181747e13d9c4b5e66ede000ea505ec3a9caac73fb58740c657bdb9b0cf9c2
SHA512b141da2c00a7bd2d174abf2a4ebf50f30aa19348cb3968d3e127eccfde3ff8ce4e90d54420f4129ea467519190c667fd8c1aebd88568ccdc48eb14939e7d5842
-
Filesize
40KB
MD51128652e9d55dcfc30d11ce65dbfc490
SHA1c3dc05f00453708162853a9e6083a1362cc0fc26
SHA256b189ff1f576a3672b67406791468936b4b5070778957ba3060a7141200231e4e
SHA51275e611ba64a983b85b314b145a6d776ed8c786f62126539f6da3c1638bf7e566c11daf18d1811b07656de47ff8b50637520cf719a2cacc77a9d27393fc08453b
-
Filesize
1KB
MD599b55732dfc0672d8d1e4a75330bc5c0
SHA14a97137a8f0fd88f9724caf69260bd11f7816d07
SHA256744e866a5f63d3cc959b5b49b3b6bb72bd8eebd6a72618a6729e182fa69460cd
SHA512a15156d41fcc03076e43bcfd2d352fa5adaee9a71b06d1c6151a0ae506d33c53d836ac3b03ca2803ec45a9c683a3265231dbcdd846ac8f4992e9f52008c83653
-
Filesize
5KB
MD5617ab26a8d34e7777944d0882ec562fe
SHA127969c585fda1291e484725ba084f59c39ca4d3c
SHA256f64ebbe8be325c1c594697ef77974231b8be158d49dff59f76a10dd63c0f45c4
SHA5123ba98b166ecd2f662871eb4c85cc3fd18228df27e8fea23d0225c6dc094a099f8d61c1744c5e77da06c9bf5ca986aaa72f8bb94d9973174d4b738df7b8be34d5
-
Filesize
1KB
MD5c4bb472768bafec6cdf61b2edc4aa9d7
SHA1880a8dae3257ddca277beaf3dc4ed563df88f6e0
SHA256e8bc644c80c40d3bf83ba9384f6f262e072edac3f5b17d4fb6f2dc258d01591d
SHA512d80e1300b662ad4b4e899b2d80351b9a0ac35ef069037805f4e9f335e681cda8305a9bc80a8e9c847e07ab86f4beac3b2eb630ef3ec2b308d661a2e15e6c1961
-
Filesize
2KB
MD5376bbe9830d3a1f3362561fad6c969f4
SHA17b29d647f46a8cf1d68ea9df2f13dcc7b1f8a8dd
SHA25696dde04825cff3b81ba77e66a1f4e86e3b5c5f0f96a731a35804a88e8b4ef14b
SHA512bcf55285452e8d3297eb0006139221520f337cb86d3da1dfdfc0faffac8a2f74d8c1405cac52fb5a35781c508bc1805f0c5fbe69e554a94f98e01acac35331dd
-
Filesize
2KB
MD5f6f5bcaf76c46d87dd14832bafce8b78
SHA1553bb421d31991bfcb18f7a879716a74c55079d3
SHA25691d0b39f4359be596bc7890080906153cbd26dc131ee0da6162da87a545f69a3
SHA512fb36832d8829833b3bdb4719f7463798fa3f5c2d19f51fb3693b5aa08ae605f6b4210d7ba3ad038a2f7a3573539406eec8cf3dbb209a2f47d1870dfd70435c4f
-
Filesize
3KB
MD5434a86a6a8d10eb13710c1b74821fc21
SHA16c710153becc9b815db0cac3a82f8ce151337aaa
SHA2565a9ea0a9ef7a19350124353a88865023a6941bec0e19f1a35290aee8776209af
SHA512e2265327068ab6103a3b89f1923856fe6151d4bd4007619e33c5059415c00547e9ddbfd0b96eabe4d122e6f3b60d6ae3f114f7030a04784eaabf4fa073e791be
-
Filesize
3KB
MD53733141d689de34ff952c4b93af89c1d
SHA12cb7456628221ddfb46cf8c06bb1a89e26765028
SHA256aec5abf59f04161f3b06708a6416549b5e0e9177b0304712807d1dab9616c548
SHA51245d451ac592ec1862f9addd6ee4359b4c67693c4c2cddbd4ec39a95af0923f606c6dea96db0e03e0d747b8bb68073eebb8ee83c3826a3dfbd260efc021da9f3d
-
Filesize
2KB
MD5f2c1356257a121d01bcae4e98f468a7a
SHA18ec2494b7839624f9c39c00b774a09c74bf8da16
SHA2560bf8398700cf017af46b2c3caedbfd7242e5c7db9e1b1cb1a52ea4016355eb03
SHA5123de70fb2c9bbe190de6ed3fe7c5480874661afdf2cab6f50ca1ee4c5aee7df6672cef3053f72a2ce6a4d641e79aca81af22f7bf80003b373408fbc7255ee9373
-
Filesize
8KB
MD5997b494b8eea5f757a07bf3cd69dd623
SHA191e661e5731a2e40748a2a3f376112289dd220aa
SHA2566a2263b58598e632964a5d3583c73de45db41f351b179b9b592b915d8e61f59a
SHA512d7b95aac2af1ae862d4d567422e475543b8e7718d40cdd330cfb7bed1aa1b1e713ddbbfa7f6e279898625c21b2ef011ec6a8ca37bb9419a3494328700ef1a602
-
Filesize
6KB
MD566293db4d91082e1a042442244c8e0bf
SHA177c032d53f427a58edfbc6147e9745c8d8cdbb53
SHA256a85585bc39c23495d4c59527ec517346592a0a6c7d1dd74299d64839a8bc436a
SHA5128630821f61fa5e551eb1b76eab9f29dc2b2ed9cd92cb0e38643eb191dd63317dc507bde4cab8a53ac565493305964562d7c9ca318ba62c489ea6d8582a6fae3b
-
Filesize
7KB
MD5e123bea3183012a1fde70e938117be1e
SHA1019f9dec3b6d39490af33b7586376d0d2ebdea9c
SHA256b5300ebb156d17fe36e5ce5e3e7c755e76a07911fa21b92e1cdd79ac637549f1
SHA512002204be6d462a928296e5cf63c0de36eac1630948b99053a0dc0e50fbecf215c94c6ce17cdfc17ed89237d17e0a394a30f957a64c8f81ef2a902a7619fd0223
-
Filesize
8KB
MD533ac2511d0bd6d8ecee6b67c363d0d7a
SHA1de773c30f456b7c8aa988c4d7cae5f6755726c20
SHA256f527d428e1f439beecbdefb4c63682e54d2ad06d20e335bd5c69bf1e458e42d8
SHA512713c52e97a9f08aba42b23d8a5be9c90608404790afb1ced5934550113229dc2a5ca12b7fffb9de3b4e2cd2f66f1254858c686dcdc98463ef48b50c2e9fc9de5
-
Filesize
6KB
MD5b06f5f9f1cec1c363b328ee0f3a349b7
SHA1bbb002ce8c1df9f942c8fe0e0c06464deff8c756
SHA256ae15e057d203cee57512c18ed243c077255599c384a8d4a5125e540ebf5dc082
SHA51227dc2e0f8206573a6f9dd003bc77d30aac4162b42d31f9bd1c1f3b58c7695e440597194640a65e6e4ecf72fc439a9d1c4c58dcae22ba63fe2ba9785b31fba72f
-
Filesize
8KB
MD57893e9e8aaeb0c0ec1dce7c5d7961b72
SHA15e87143415475c7480e59c3fcf50868e45e4e27e
SHA2569bdf62ce766196c6f0e78ab8276124673ec024fb127d1dfc6be2663dbf6e7c3b
SHA5124e37e91a97b7a13a9f94220a8b605a3b0cc01a1876553362cb761de21cc6e3ca2da68aca23c306a450597852439f05da9a7c18c6238e3c2ba291678bf5d42b79
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\eaeee80b-48c0-493a-ad64-89b1d160d1f9\index-dir\the-real-index
Filesize2KB
MD5dc5022342e19a17ed77a38bc808cc5e0
SHA121289724a4f608201a3ba5bed3f6dabec258ff77
SHA25677992402d8f4d45d664dac18fb6865511711becb577f009be93d97c51eacd975
SHA51232889181fc4035694b3c7606e73be190e78b43dfcfe842c3b62665e59ab18a9920824b7642d54bfd668bdd8d4caf3b83bd7eaa5ca0683a13fad0626f2ee29bcd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\eaeee80b-48c0-493a-ad64-89b1d160d1f9\index-dir\the-real-index~RFe587f1e.TMP
Filesize48B
MD58dc17ed4fefb33b794e2a39f80af35ce
SHA18fb520a1efd8ad1ff93b0b2f4bcb417c87bddabc
SHA2568333572f37faf6912e93b21eed65b78ca97edf9cb8f2447be2e2c2e682da7399
SHA512bd38959799ba46ac86dcb986010355753ce6c239bad104699982e005e4ae1918eafa220c274eade4f47dba842a0327acbf312c16edf9be3bd544892edca2a25f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize176B
MD5f8962b44c478304b115ceabea2f7cc1a
SHA14a622a6f30206cf0fa03fd6d4aa027b01fb8fb29
SHA256873d92d35c8682bc050c152e42f4cd046cc91293d505ebd9186e7c11b6243632
SHA512fecd6ca7dc6978eec2ee55eb16af30ffa9df2a4c617d928f740f35b6434b2981c186aae8892d279c80c965f87b2960f68569bf6d9686419ae39c75dcef596345
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize114B
MD5457f3a67be0641121e4cef2e31eb17c2
SHA16c1e3c9154dee3047a73772f220ae53b7322791f
SHA2561632070f1ec2b3fc0e6040a9b40bdcdb5734c3e491770960e30918086c1962d1
SHA51203ef397f5a16d5cbdb7f9324ba2bc4e898ff6d951bfbae4e537b3206d9102fff3b7c122affe33eba3dac89bd2fff55a8b9ab4f79cff4fc42d1b9fd0f7cac2d19
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize112B
MD5f740e9a978e5ee1f3499f67572d07698
SHA17d9c610c948d35f44b084d3dba09890a202a9fc3
SHA256bb16ff108dfce2001f9ad89311cd2d644ba232d79908cf40aed03cc3f967390e
SHA512c4595c5b0ab7d673e21ba60fc1d65f686b416db8ffe7b9d43f7d504d4a48bddc3725cc801eedf33b12af46118078fe69395226cb1cc2daded064673109943a66
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe58676f.TMP
Filesize119B
MD546b7ffbbf62e870766ba04e2945a76c2
SHA1ebb2f81586f47d51577f1ed6d99ffcf24706d61c
SHA256c4b379a2c49e53c65bda2139b82aa4e50ea0667a9ed4b6b0f09dc94dc1f43bb0
SHA512d0ccaeab44f95b7220c244b91671799688a09434a44db79c8c94bd64412cf7980a20d190ae32f646ce5b699654b1aef1f20c7602c9715a7459096abed4374809
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\5f8830bc-3a1f-42c6-a939-c28e7241b476\index-dir\the-real-index
Filesize72B
MD5e93a1cbcb063d0c65714871e0bf05736
SHA1259f5d978952b06ff19366bc823e104bf03935d8
SHA256ef48818b45aa3260c091a10d2dfdd414d66306e1dbfd358226bbc081e536916f
SHA512e76fc072c47dca1454f5f4e5b85aa365c7bae4fed437a48111404a0205cd2b8a89c6ca7fb6bac209249016f831b29ab015aac8ef81ee85019e71a93257770c34
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\5f8830bc-3a1f-42c6-a939-c28e7241b476\index-dir\the-real-index~RFe591459.TMP
Filesize48B
MD5bea9ff8b8ed483dbf20c137648f02f37
SHA1ab10e5921ed1f2bfba33b787f27b229426a2b8ce
SHA256c06c440b3bb7fab476bb84e9a8b0c1b718254e5f010c42767898a76126203df2
SHA512ac084966de2d119598630ef98954fb8e8281e032190ae5dc1be5124a62a5e2e0d3fc94ec7be1261d5c00d7edff05d50f8451826c78148d68da7793cd44ec98ef
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\ccf78971-f2bd-4871-8a74-c450a33f0386\index
Filesize24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\ccf78971-f2bd-4871-8a74-c450a33f0386\index-dir\the-real-index
Filesize1KB
MD5e02d42b22cb5c4515ceb4ec8d76ba4a5
SHA1998bc45eaa4ce3bd1533efb51749891879c14b75
SHA256d30cb4f3267d785c1ace93e8d5754f35b3cd37825d391a644f11d447b8b123c8
SHA512facc44852cef481289efdbad7acc414bc2521ca36cc8f40016f1ba1501d40e0a2de463b66edaba96b5e9d3d88a54311329ed42a1774446d1fe35c1f824be070e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\ccf78971-f2bd-4871-8a74-c450a33f0386\index-dir\the-real-index~RFe592050.TMP
Filesize48B
MD513c4423996169e76b756b1ce76fa7635
SHA11f4b369ca8f4975d55496eb248350fbc7f858e9b
SHA256f255ffd102b2732a667e348c6a36e5f5bc76fea87bfb8ca422555c3540873228
SHA5126f88b3b40653eeb7e965743d9988522d763425560b5b7608051431f38e32a374adb97769337af5f42d6ba6387af45968e6a3a7be2b057d33817676005a2f785d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt
Filesize237B
MD52f02e04dbe3a89cb4e2267c4ea81c0a7
SHA10883b280aa7fa6d932ae9779e89507a43142af37
SHA2563766698c5fe9f18478366be6019d52180ca4833933e8f8af3d8d37324e65b4c1
SHA5128b7eebd0f016fadecc37d1c76929274cebea1b597c8f210acb87081dc27f5d76e1e051de596f2d47265bb0a0b435c95b2f5ff7866c0ce4876b861560eb60125b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt
Filesize234B
MD56d4a6433ec71fdc5f9a0604353e93612
SHA137f56fb196076556ae651b4dbd6d7550959fc1aa
SHA256defcb68b9d8f0f09bb4dfabd9ea97557c0f782d7ee8ac795cb4b7ce2670ead67
SHA512c4235121f8fc56586a3bda28407bc989bc48f6a1b1ac717a06026bae7767992adfb0b5f7bf407423f3f5e62dbbb1fc08b73290f7d0455c744e527c0c8570aeda
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\a0a74304db73132d4bc12ef9404aa74f9fdeda56\index.txt~RFe58c639.TMP
Filesize142B
MD547be2f8d2800c8ccbf8bee25fbf45779
SHA1571394fd6bdc0ca8eeeebd1b5f4c319b59298464
SHA2567214ecbdfd51c820dd9b744a39daf636257f189eb4dc0307f3685d665ad1536f
SHA5120655a67df322d3d47d49989f321eb479e4e56eee7d62cac9e0386cab6de859f47256bed03ba4aa84f595f5a87788bf4d53194fd6ab36eb050c2213e7786e186b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD51cccdf14a5e93869252fe4b863d99c9b
SHA19525bbc290a53005d92c68cf19a7d0ffc0a7893d
SHA256bb5a53512b1a816c37cac25b4b10a325a6300c99bd3eace7e31bfaf434ebc64a
SHA5124da68cabd4a033588a3cc5e45905d0b201295b05cb59b72bb74eda237da0dd3488406c451da27c742bd816b496b33ae5d5b63b02a6536361b27fa40a77e1bd4c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe59141b.TMP
Filesize48B
MD5d68430e087f95e3388db259dd339c215
SHA17afbcb37d0dd44da28b3f1c63967ddf782ec2a09
SHA256b274119f42f7069357eb9530aa0c24e5ef5f67b7762395f62bfb5fb88125548b
SHA51207086d4ff1a4e0fcda6c24b4da8a7bc8786d50d1d825e6a9704c1f9d90c38345c74af738e12d85cdc851801ba96efd8858875ac3d3c070c1d655bf2c2df7c22e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp\scoped_dir168_1465717710\Icons Monochrome\16.png
Filesize216B
MD5a4fd4f5953721f7f3a5b4bfd58922efe
SHA1f3abed41d764efbd26bacf84c42bd8098a14c5cb
SHA256c659d57841bb33d63f7b1334200548f207340d95e8e2ae25aac7a798a08071a3
SHA5127fcc1ca4d6d97335e76faa65b7cfb381fb722210041bdcd3b31b0f94e15dc226eec4639547af86ae71f311f52a956dc83294c2d23f345e63b5e45e25956b2691
-
Filesize
114KB
MD5aa87846d2306246dcefd516168ecf50c
SHA15fc1c04af2ac27da3474265a393224516e1cb69d
SHA2562199d8a74e0c4bbc604ef3dda5f7951750c57e8ed71c00bf763cb9322bcfaac0
SHA512941d58473ee131d36d86e657d41ea2555176151cca8e8f364ffb019d71a32022cf6f8d6aaed0c0d6db397ac1c04f7f09a7277466e6becb31f4357300cc0e38a7
-
Filesize
101KB
MD527f7740ca558f5b23fb9ff9d45486fd1
SHA1950564060c2fd1e4a725a2377d33a55be0fe7427
SHA25609bd4932d5a09cb1648090d762a37eee39acbb0d8991fbc174362e95339b0aed
SHA512c35c68cbec6d12c2a45f7f0a08ed380cd17e5b38d576ede3bcf59a1f6bd32d872f8569252e4b4b5b4a29775002667b896c5c13a1906ebe217780c422c4fc9787
-
Filesize
100KB
MD5298ba66ef70c430e7f596353ce7bfce1
SHA12c22b77342063856c82cdc528960dafb964d5db0
SHA2560fce8b436490e50724386321f1fb6085dfdabef235c655637001f0503cb9ed90
SHA512876b8df09497f3845b35f68b524dfed114a22dfd7e52abcbde56b16396767f54d4ccd50f041ddc165fb1cec1336feb7cfe8425d445c5ef105402e16797ce4027
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd