Analysis
-
max time kernel
251s -
max time network
252s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-02-2024 18:44
Static task
static1
Behavioral task
behavioral1
Sample
crashed_by_vohr.mp3
Resource
win10v2004-20240221-en
General
-
Target
crashed_by_vohr.mp3
-
Size
9.3MB
-
MD5
0d813790b342f04e991a7f07487d39c7
-
SHA1
b3b73c636113390813ed338e83530120b5d0b9cd
-
SHA256
ad15869dd2adda745da583f9c1038ffdb127d7a2bab682b82c9858fd64c32301
-
SHA512
49b666e7dbed2903a544e04a2a1499537293fb09410d6391fd0f4b9d421880211930988e6aaaa5a99f2ccfd13cd8f7c6237270b34a7dd4fffe33bc13c252cc6c
-
SSDEEP
196608:OHK+1paMFx7zrfwVsZ1ZfjqkKIdPhvy/dxP:5+14MFx7HfhXfxdTKHP
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: unregmp2.exe File opened (read-only) \??\M: unregmp2.exe File opened (read-only) \??\O: unregmp2.exe File opened (read-only) \??\X: unregmp2.exe File opened (read-only) \??\Y: unregmp2.exe File opened (read-only) \??\E: unregmp2.exe File opened (read-only) \??\J: unregmp2.exe File opened (read-only) \??\P: unregmp2.exe File opened (read-only) \??\V: unregmp2.exe File opened (read-only) \??\T: unregmp2.exe File opened (read-only) \??\W: unregmp2.exe File opened (read-only) \??\A: unregmp2.exe File opened (read-only) \??\L: unregmp2.exe File opened (read-only) \??\N: unregmp2.exe File opened (read-only) \??\R: unregmp2.exe File opened (read-only) \??\Q: unregmp2.exe File opened (read-only) \??\S: unregmp2.exe File opened (read-only) \??\U: unregmp2.exe File opened (read-only) \??\Z: unregmp2.exe File opened (read-only) \??\B: unregmp2.exe File opened (read-only) \??\H: unregmp2.exe File opened (read-only) \??\I: unregmp2.exe File opened (read-only) \??\K: unregmp2.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 48 discord.com 49 discord.com 50 discord.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133533603872317467" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3316742141-2240921845-2885234760-1000\{18406DA3-7088-432C-85F4-E047C3655877} chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3980 chrome.exe 3980 chrome.exe 1436 chrome.exe 1436 chrome.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 660 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1160 unregmp2.exe Token: SeCreatePagefilePrivilege 1160 unregmp2.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe Token: SeShutdownPrivilege 3980 chrome.exe Token: SeCreatePagefilePrivilege 3980 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe 3980 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2908 wrote to memory of 3880 2908 wmplayer.exe 88 PID 2908 wrote to memory of 3880 2908 wmplayer.exe 88 PID 2908 wrote to memory of 3880 2908 wmplayer.exe 88 PID 2908 wrote to memory of 1636 2908 wmplayer.exe 89 PID 2908 wrote to memory of 1636 2908 wmplayer.exe 89 PID 2908 wrote to memory of 1636 2908 wmplayer.exe 89 PID 1636 wrote to memory of 1160 1636 unregmp2.exe 90 PID 1636 wrote to memory of 1160 1636 unregmp2.exe 90 PID 3980 wrote to memory of 2596 3980 chrome.exe 98 PID 3980 wrote to memory of 2596 3980 chrome.exe 98 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 2520 3980 chrome.exe 100 PID 3980 wrote to memory of 1864 3980 chrome.exe 101 PID 3980 wrote to memory of 1864 3980 chrome.exe 101 PID 3980 wrote to memory of 2672 3980 chrome.exe 102 PID 3980 wrote to memory of 2672 3980 chrome.exe 102 PID 3980 wrote to memory of 2672 3980 chrome.exe 102 PID 3980 wrote to memory of 2672 3980 chrome.exe 102 PID 3980 wrote to memory of 2672 3980 chrome.exe 102 PID 3980 wrote to memory of 2672 3980 chrome.exe 102 PID 3980 wrote to memory of 2672 3980 chrome.exe 102 PID 3980 wrote to memory of 2672 3980 chrome.exe 102 PID 3980 wrote to memory of 2672 3980 chrome.exe 102 PID 3980 wrote to memory of 2672 3980 chrome.exe 102 PID 3980 wrote to memory of 2672 3980 chrome.exe 102 PID 3980 wrote to memory of 2672 3980 chrome.exe 102 PID 3980 wrote to memory of 2672 3980 chrome.exe 102 PID 3980 wrote to memory of 2672 3980 chrome.exe 102
Processes
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\crashed_by_vohr.mp3"1⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Windows Media Player\setup_wm.exe"C:\Program Files (x86)\Windows Media Player\setup_wm.exe" /RunOnce:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /prefetch:6 /Open "C:\Users\Admin\AppData\Local\Temp\crashed_by_vohr.mp3"2⤵PID:3880
-
-
C:\Windows\SysWOW64\unregmp2.exe"C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon2⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\system32\unregmp2.exe"C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT3⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1160
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc1f19758,0x7ffcc1f19768,0x7ffcc1f197782⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1960,i,14486257140829760421,14212879797816349013,131072 /prefetch:22⤵PID:2520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1916 --field-trial-handle=1960,i,14486257140829760421,14212879797816349013,131072 /prefetch:82⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2096 --field-trial-handle=1960,i,14486257140829760421,14212879797816349013,131072 /prefetch:82⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3036 --field-trial-handle=1960,i,14486257140829760421,14212879797816349013,131072 /prefetch:12⤵PID:4404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1960,i,14486257140829760421,14212879797816349013,131072 /prefetch:12⤵PID:1220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4640 --field-trial-handle=1960,i,14486257140829760421,14212879797816349013,131072 /prefetch:12⤵PID:1712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 --field-trial-handle=1960,i,14486257140829760421,14212879797816349013,131072 /prefetch:82⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5260 --field-trial-handle=1960,i,14486257140829760421,14212879797816349013,131072 /prefetch:82⤵PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 --field-trial-handle=1960,i,14486257140829760421,14212879797816349013,131072 /prefetch:82⤵PID:4476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5456 --field-trial-handle=1960,i,14486257140829760421,14212879797816349013,131072 /prefetch:12⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 --field-trial-handle=1960,i,14486257140829760421,14212879797816349013,131072 /prefetch:82⤵
- Modifies registry class
PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3048 --field-trial-handle=1960,i,14486257140829760421,14212879797816349013,131072 /prefetch:82⤵PID:3244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5448 --field-trial-handle=1960,i,14486257140829760421,14212879797816349013,131072 /prefetch:12⤵PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=3296 --field-trial-handle=1960,i,14486257140829760421,14212879797816349013,131072 /prefetch:12⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5684 --field-trial-handle=1960,i,14486257140829760421,14212879797816349013,131072 /prefetch:12⤵PID:820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3912 --field-trial-handle=1960,i,14486257140829760421,14212879797816349013,131072 /prefetch:12⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=212 --field-trial-handle=1960,i,14486257140829760421,14212879797816349013,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=5692 --field-trial-handle=1960,i,14486257140829760421,14212879797816349013,131072 /prefetch:12⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4568 --field-trial-handle=1960,i,14486257140829760421,14212879797816349013,131072 /prefetch:82⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=4892 --field-trial-handle=1960,i,14486257140829760421,14212879797816349013,131072 /prefetch:12⤵PID:1912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=5052 --field-trial-handle=1960,i,14486257140829760421,14212879797816349013,131072 /prefetch:12⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=5652 --field-trial-handle=1960,i,14486257140829760421,14212879797816349013,131072 /prefetch:12⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=5968 --field-trial-handle=1960,i,14486257140829760421,14212879797816349013,131072 /prefetch:12⤵PID:1432
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195KB
MD5873734b55d4c7d35a177c8318b0caec7
SHA1469b913b09ea5b55e60098c95120cc9b935ddb28
SHA2564ee3aa3dc43cb3ef3f6bfb91ed8214659e9c2600a45bee9728ebbcb6f33b088d
SHA51224f05ed981e994475879ca2221b6948418c4412063b9c07f46b8de581047ddd5d73401562fa9ee54d4ce5f97a6288c54eac5de0ca29b1bb5797bdac5a1b30308
-
Filesize
24KB
MD5b82ca47ee5d42100e589bdd94e57936e
SHA10dad0cd7d0472248b9b409b02122d13bab513b4c
SHA256d3c59060e591b3839ec59cad150c0a38a2a2a6ba4cc4dc5530f68be54f14ef1d
SHA51258840a773a3a6cb0913e6a542934daecaef9c0eeab626446a29a70cd6d063fdb012229ff2ccfa283e3c05bc2a91a7cac331293965264715bdb9020f162dc7383
-
Filesize
289B
MD58212397cfc49b6fefd7639fbe5f582b6
SHA1864dfbd251a1a16a93b5beca3e4973e3aa31e378
SHA2566e2b5e8e058bb0f6bf034a242242708b2d9674c1818e1a11161addc151ef4aa8
SHA51269fef6e283f8ecb47b5aba149b28e6137c8b74e94033a300c81bf7b4dd2123dbf063f5258dae798722494b01bdf13f5b7c7f8105e57612a4a78ec1e29e359938
-
Filesize
320KB
MD55d7311804ff020b5255985bcc586d216
SHA1c938e6edc92e52ae9ee8f527fc8897ba04e02249
SHA2561f773a3aed47f46769be063c9d4a5cf90664b8d011bc13c2289d8587b32b26ca
SHA512d2bc480fdd6149e1e9eb22f55269914f9bca4c89e1ab8b4d296ea271f45e7bc1bb4c776fa9f01eb6bcc5fea7cdd2f9e2b4fd7ca6d865e7bd896fdecc847ee21e
-
Filesize
3KB
MD54281b87375190ce88bac842881f64e13
SHA10f8331212b2c73c44bf006ff6e35605e96e9b659
SHA2561880313aaa06c7f86f547030b19341025a7474c5f48ad25b83b78230edd62743
SHA512115730809329b91d8f538e6dd48ddb3419908d64b18464b06c8d215bd31dcd07dfc70a07e8a741ee09fc098c39f899a412c074fe80e700f3381d3163c74f3322
-
Filesize
3KB
MD529cc3a82306c509f4602c0098e930202
SHA12c9ae5ceaa5416f040b65e07be3489db64fcd147
SHA256422e75c4c33bbd1096afcbcce91ca3c80f4c908f09a56e718295624c3eb23355
SHA51219ea67e01792885b60529397f69ac7cbdddb8124eb77518d0bace4f63dfd2adfea10221c21b3b87a521310bc6d5487a045d1c43660e9b7112fd269ee27b5058c
-
Filesize
3KB
MD5394fc4285ecbfc21b2320d9e8c5392d8
SHA1349c7dbcf939fc1e6ff1025c9d5f223ad1589675
SHA256c12f4ad8691d01447b987340cdc0908e2f19106308cd4cdd513b9dc485de834d
SHA512e4e40bf11dd23bf9d88a48a6a7efc60b749f64850ae93cf056b665cbc2ee83a5dc6a0e4a6aa291b134cf6e55aac6affe4189691c640e8f9836542d250646b30f
-
Filesize
4KB
MD525e71c5d02c2c76bcec4fe7714be1575
SHA1d9ab154269449c1d4c6da0221891e20c8d1e7b25
SHA2566785c6d25c3ae5a30214dc05ff002c5029136060dfb2a921a93d4f1189ca6f53
SHA51257cc6b5c536119d70ba9c58a4a8f518c3b0962aa498d7ca138f18bf72161c97ef75f30febb58f87471026bdd4166de9ca10325cad23de98650f6096642100b1a
-
Filesize
3KB
MD5eac619968dcbead9f881bb97e6f27d4f
SHA1004b3fc315d0882d985a8005eff84dadcc196a24
SHA25661bc79b70bc8f8207a4ca090395e299d84adf2742f8e31b77e49b4119462082d
SHA512b6b066c43d89aca9a5b3e78cea120fcc2260c7dcd5841471ce2cac7e5233b8f0b026cb2889c0a574a86cd580a5ffef42078aa337cc4f0e3763ff202ed0c2298f
-
Filesize
4KB
MD58736fab6053561c1c1210e739b875b03
SHA19fbbb39044d13dfaa8b6008f1bf2a146404fa81f
SHA2562d5554f010a6d8430d7db3ac8a72db8c43c0db4858f247257791a951acbce0bf
SHA512f7052a75cf1dbdc4348bfac9710b7d0d917a40be97b21ec202494bfbcb08ee27be35b03b9965f974d8bae184c0a05421620b6c447d9fd6ac584b310cf1e5434d
-
Filesize
2KB
MD5904848bd2241812ef149614815b7ea23
SHA108c1b94dcf9f38c65fa6adfc9365bc0ce2d15ca7
SHA256b1c1f3a912f8a15111148f7a428fa6930ef0b8b340aca35a7ef0430a6e8099f8
SHA512ad6368127b35305bf06a16a50f6e7a531a870586c3b8c7391023afe4e309c976ff996f76615296dc2ff35a59ccad68b5633de54162d39127b47dab63196740eb
-
Filesize
1KB
MD544d72289d0fc6e2459616926dae9e139
SHA16a4d5e7803db0d4fe0db4de9c6054440dc4b24e2
SHA256f4edb63cade90b80d2526c201cbbb0e1350b7fd4ca726a32d1e48a18278dacf0
SHA51266aa7cf0843e52d53467b2a22eb92fd366c620ca22f5a19ea9c7813eb6c8971538f8944aec49279ad0765f78784c5d4a340d45219070db6006d40af025ddf1bd
-
Filesize
1KB
MD5eac3fd3a5bace0f1ad1b4c52ed1525c1
SHA1735c83cbd7e93f1f02556ed1c3951fb3efe5315a
SHA256426f747774aebfb6acba21dc29de259b60a6118ce450a97988bbe41721c1ef1c
SHA5123bc35d623aae6adde1088a49347c771cd9eecf6b911e19951b1548cfdec7f3589b4a3a636d96e85824ddbdcde96589e2afef7e3a2414bdaa0da062067b38ee1e
-
Filesize
2KB
MD5cbb76d94fc77e25ffdf73f77761c969a
SHA13330263ac173a536e9b93b29ad2076c33b07a0a8
SHA256ae3e8910dc33fe896fe5178cfdbcf61f7ca1f78410c961e2ad282938a306df73
SHA5129dca9bf1d927b86c2168d89f51e8d21b31f04d083ee5609f40ce6541ac8458c0941377a08512fe72b0cb0e7ed8c5d51c219aa6f2b27d50ea8fa48c06e3ebfc34
-
Filesize
1KB
MD5aab05b7d5b038a2e32b7a8bfb9bb7040
SHA1db9c2d87a1fa15b3f0ab97c7b7bb6828413b0f47
SHA256759749bb883a22584f115a0db08a94693f766695a97bbe9178c9df559c3dcfcb
SHA512143a00469594dc67ef9aca8b078ba06afa80ed9261b4ed032cb17fd06c0754562566e96ecd4878f2285a112da0f660270eee8646dc6637639d58a3150f4f668f
-
Filesize
2KB
MD5973c83619eec4f16061064eaa447a939
SHA124aaa1ea0cc8ae8694b9d8292d5247df557f2f1c
SHA2565091b070279c987b3c3b829b2ca5585eb548c523db253ba36a5bb51d696c64dc
SHA512340c8d2a4b1d0f05c3b4cb1b5028ddc3fdc6cc26697e4bba3482f7dec763089bfd9f2145dd0e91e82b71af61e5327f7efe58942e986f090fcfff7ebf7d81585e
-
Filesize
2KB
MD507f7b20734771c1fa4910fb86de25bc7
SHA1797d82aedca91c4a2b98bcea8b7c52019c0103b5
SHA2568eb14c260d3a7024877f31129359ba21454f94ffbd639150068f2a0416864fc7
SHA51210e493a2f820afcdd8d0562f64f8888bc91b61074a1e9fe62a3fcce6abe8366b928c53d76e8eada80eb47abcae19c87b793747ee408782983cf920dbb9666ee0
-
Filesize
2KB
MD5f8d30e8b1775c4d40272799616947e73
SHA16ab831accba9a8fcf46a97565bf0c00af810b243
SHA256cfb8d2cefe05750b369748b26c4f9c559feee5462535f540730cd46f7ec4fb40
SHA51288cc137f9186ecc2392e03e7af12147517747af496b02dc34f4b0396659e5d19fbf4af0f9de8b26cebf2158fad902b73e38cdf2665fe5103c3e29bc69e6a378c
-
Filesize
2KB
MD552f35c076c86f932b99eb2a7200d75c8
SHA1769be771946f39ece2088b852db886b9576b8274
SHA256533fc4b4c1793996317f1c392cf98a5f116a8dbac36be92f17d5682642a38ca8
SHA5129b23f216e13eb193d3006669c5ad19df38b755f38362c180265b2990f58a2ddc760353286000b77f6dd81bb2e7ec1f1d75922a9e882a79b3b5f168a81580e3f6
-
Filesize
2KB
MD5b1b0cdfe7f9c204d904f9d74a96af01c
SHA1d08cee1f2cf781948c6e727a7b998725b3559b7a
SHA25629af1235dea9943da71e3c1804aeb9f0385fa4c94168603c55baf7963e00a453
SHA512c4f17b18967eb2a5b7b152c51ab2a763dac38411a159b819df987ec0e82347701b53b5db2be00eda7abfd65efae746a6c0c30f9dc9709c0951582d93145d4f00
-
Filesize
7KB
MD5aed4222d644ec25dce79cd6818afe6a8
SHA14e2aaf325276a1a9200a9c24da4a3e6a558099b6
SHA256acdfa2c143e0ba45da995a5b0081a11fd6e3a77e84b261580da418bbf2a94f8f
SHA512c39a1317097a361fc00cda148b132ecf6a1675a5b6764489b3abb6226511cf2ad96f521bff1d53f0e2c9ff087279dfd79c0e2726f1c0e0651a29bc83685bdb3d
-
Filesize
6KB
MD5c8989c46cdb687d86139736800303b82
SHA1ab25f989bf7956f8c00ae534d64c7e8429f2759a
SHA2563e35ff5bd0aa0de79e2320f47ac99ae0ff454e4b10479de8b5a7d9d056682c95
SHA51227495e1b9dd3d44b2765221838b404fc813ce19a5edafae82f73c3af3fc0eb538c4d45fa21f952cc006cdfea4885e7409cd078102a8e3d4f7652660dc6d41227
-
Filesize
6KB
MD577f1fadab5af34f64630e79fdd8329cf
SHA1135adb09dd397a21a47abd2b67b7b02745d98ff2
SHA2567ad93b1f4f4ccac3fb9dda692094f6cf5e92e1bac255ee8a63d55c43097227ba
SHA5120b984e4360a5d6cc8f975d7c2e863d7ec82622b0f4554cdeba66ed34b73a4e9bb71f8bcf6c9b67d51e3e5f19c71ac68f15262bfb69d01405bb529b0cab757fa3
-
Filesize
6KB
MD540607bf3237dc8f127a39191f91d8ba0
SHA1755b512c36d51c4e9326e32ef814569a03d05883
SHA2562eb58800a924d08148d95bb317b5839924e3db33cb04d1033242b690b75bf0be
SHA512623f2147cfac982f9716525ab4de6e09c5bc27e4b3f6166fd72981b6b8d62eeed7b5e67e323c048124d969c2429a266156269dc8febe808c87f397a71db99bda
-
Filesize
6KB
MD56494be58823118db212a0080b6061c4d
SHA10df6eb06fad1d944168ace6a1599f4791fbe5aea
SHA256a4720c08cc7728edfc832c19dcba256877004c9f9b19cdff1c89c17cfbfe2c6a
SHA512f984e185b337b981a4c40f235fd9dcb645dc1607dcacc0099ebb85d65be70e66827b3a27b30b20a2eca5a9b4fa04c0a906c13c942ac1ab0e460369421c383832
-
Filesize
7KB
MD5d5849db151779f4ca9c508a00dc90d2b
SHA1a7cad442fd88f198204b1fffd31c0bfac0723a5d
SHA25625f5a4a437d249fb02f0b98b58b7f72c2170ae8b47edbb8b7fd8f2e908e3d17c
SHA512947aa3b5492898dd2339bef2eee4d2e7ad53a3bdaae21b0847fb1f3150e3a6b882d83c0a00d1214e0c3677de26e32689dbcdafd882cad502988e9e68223b6ba7
-
Filesize
7KB
MD567007c3193702f244b34ea2f229d41ba
SHA1cae0438a8591693a298db5ab1dd1288d810467cc
SHA256caa9dde473bbd5b2530dd4aa465673c0f1f9bc7d255defb51f7f2a6c85a65ed4
SHA512c6acc331f8720a7949bd53ca1c8bf70294e641b9466ac67412850f27c7bb459a302fc9b4f374d886a70c39d9d7e6fe12bbe5a6d728aa51cd0e892b38f582a9a3
-
Filesize
15KB
MD5579e19abac8f202d1faf050969aae53a
SHA1583cdc9c246a734e4ace58f11ed0422d89b3cafd
SHA256c3e00929a57e6540fa07fb26950c2daf924eb7f3cb3466efc7a73fe8f0cd3e3a
SHA51274d2c3a1d89f2e665e58de66da2ecc4aa5804323bf2a381b7b431736f1c1ff26faa5fa2213e63746d37d61cf8f47c40a7a8ef94e4eeca190e56495c1cb3610e7
-
Filesize
257KB
MD5696be3eaab5536d515aab8b15dcf97a3
SHA153e453fae33152fe3479dd387416ef9ddb3a4b78
SHA25680f3b6c154c878c7ce4643f58ac9785b9e3fe6c20b231a7e81c0f5a5b3805342
SHA51268fa934f06e765c1da6f396354c976ff92e0342738167380cef5757a4b1ee6ba18a404c36a5c97834043d53cd150f4de03d9fae745fb2d0c7ff8f3b86a5e36f7
-
Filesize
257KB
MD5e5b92d06b1895206c5754686007d3642
SHA1e21e041ef9888fd2864510c25c6473c1814b6947
SHA25606274420a9559fe71af5c33398043e1a0079611e759b881cd89415ab1d0022ee
SHA51222946e64c2654e94d594c38911941499d5bba133f0abca0c68140551198e4467e1a5479bb2461675851dd748f5978a3b98ca33a8e3cffe209ae395659968825b
-
Filesize
257KB
MD52acea28e5aec37c32de12a3a1b70cdf5
SHA18f5181251c7892af4b6271fe31d664ace350af73
SHA2565b3e4e20180dd6e65b30f98d45bee642fd0efacd2a544c0ca037aac91faaa90c
SHA51290d53eac3b1cd4139bf86834f23f5cf8c6ceb64543b35434a44c7ea9f9616d90e0f3bdb3ad63d2f94fa0779a933cc6f1f86dacbd33654f2642a458897fb27445
-
Filesize
257KB
MD54917777087ab7c5de3513619febe4d59
SHA1ca2eb820ac33217dc8bcbdf697dfbedb37becec8
SHA25654e8344ee59e6f94a805ce5f0981f55afda47f8f58ae63935f5f09e423841476
SHA512a6df6433ccbe6e39761f1631bb3521193954a560cc2f138dd0de34bfa0ae3331a6d7a28ba0034d32fb465e8f42709d73e33105aff5dc46b96a76e2971bfa58d1
-
Filesize
257KB
MD56fed1818fad50e74a83f70d8dafc98f4
SHA12b0716e7f6d0969bcaaa81e2ad7abc5bf410dde8
SHA2568949b0fc3d6c51b6dda869c583cb3a620a754b98f18d4ce39b5122593e0917e6
SHA5128c9841a9302e02700b0857ef5b8f71e25788abb1a321a2e02e21718e1c8bfa6162d213f4fdc607338556ae452e194f40ee4ad2673f19e2002582267803e3e218
-
Filesize
257KB
MD52aca66af798612125d0546e83a464fef
SHA1769486c5dd7c9ef09089e13fcd398a880708b106
SHA256f5a852622dab576b3201ce22d4fdef3ce0cf46533e0f63b67f640a225e5b35dd
SHA512ca518f330300d7e66c67c26dba382af9017b91cf3d5b07ef5596058fe8bde4c57975e59181978f7100384d940276095701c2630ab7dde8d375e0067580cfc913
-
Filesize
109KB
MD585eb54121e26a7e8a277bd8c568d418f
SHA1e7bac7f8e13f2a79f52f088b766e5427cc6d19d7
SHA256552ae8f9af1ed83bbb6128a39967b806b040c93f75c243d99db09ed53dd5fccf
SHA5128279e973836f0e88eb01eab77de89ba9bf995007fa3efb520e8711b398a84fc733a4099b5257cdefc00402ec56a0aaf0dbe4b5e3075c3b92028a097a45ca5dad
-
Filesize
103KB
MD5aac3b1abe534d34fba2d11a914cef4d7
SHA1ed8a83bf40e404a757bf87f1a17b2f46773827f8
SHA256df80754e7290937d4533f345c00c627511667354f356d6465b06f3fba69c64cd
SHA5120f6d86450923de4ac10ec8e28fe808381487ce8c848fe0afc8886c6db89618d279a29ff6cff8501cbd84eee739228e8ebd823f0c0826d34c0128ab3bcb688724
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
64KB
MD5987a07b978cfe12e4ce45e513ef86619
SHA122eec9a9b2e83ad33bedc59e3205f86590b7d40c
SHA256f1a4a978ce1c4731df1594043135cf58d084fdf129dd1c8e4507c9e06eac5ea8
SHA51239b86540e4d35c84609ef66537b5aa02058e3d4293f902127c7d4eac8ffc65920cb5c69a77552fc085687eed66e38367f83c177046d0ecb8e6d135463cc142aa
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
1KB
MD5852a19b155b1dc8ed35a6e7109ecfcb5
SHA18e1506d6ed3c27ab2cd5448564dd3b12530d9db0
SHA256e025ace6c4cc76a39f25be33eea06faf2ce715a96940a280ce46aac22fd18e22
SHA512e5849a2891b1c47d317337b9b248df42c85562dc0826540e61b07ed6bf296387e9b07a58ebf030c6a140862d0aa620f9df714b4e561b70593c0245b1fce6d60f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize9KB
MD5d6c81413ca19a88fd1e595276266ec78
SHA150671c0ebb238e4eabd12405c5c822942d9ba418
SHA256a4579ea2fda66b25d8bd2a7f607c75f1794bcfcdf604387e1b97d6d29416daea
SHA5122bd276497f937324869164cf0360764ab86d301cbc74e4ca9b1f25353a872523021ea347c95a5cbe9dbfd4ac34164f693174f1e75759488960103de81dc63f8a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize12KB
MD5952e72e1b87af4a627f473de268958b2
SHA18a0d9356f4996c381099abe84a8a83ed8e03f5d0
SHA256ee23be1b05f02ae500d4149e15259dd40c0b98d522d1fb9a982d9808f77a53f1
SHA51290ede7b4f32543f4403f35f6099a17f40610e65afac73988e74edd5b7289931a6d4e368dbeade6971a3cb5e2ee802a5f5a73d1c922c21df401ed52fdcaf9ba4b