Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
273s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
19/06/2024, 21:50
Static task
static1
Behavioral task
behavioral1
Sample
SG_Windows_0.0.1/Snake Game.console.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
SG_Windows_0.0.1/Snake Game.console.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
SG_Windows_0.0.1/Snake Game.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
SG_Windows_0.0.1/Snake Game.exe
Resource
win10v2004-20240611-en
General
-
Target
SG_Windows_0.0.1/Snake Game.console.exe
-
Size
87KB
-
MD5
1ee03a1a8f60c33ddc9c6b0a8b58a589
-
SHA1
9c6f72c2f9c4000408d36dc0e00cb46e8a977487
-
SHA256
5d5cd0ad1a86f73b378e996e4c2f8959de66660b9e2f1b39f962e8508dfeeac3
-
SHA512
18d29a4c8fe12eb30d3e40001e69d9add1209b8b678ee6ad2d444cca965c3734d8cbba186546645d168e62d829176d5477b1f34121a6122fdef619ccfc5532c5
-
SSDEEP
1536:uvkeFQfCPO8mBGsyAWhoDW2j7Nid8a9X2NDXnAS64ud+MhaWOOQMT:uceF0tGRhoDW2VM9X21QS69co
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 111 drive.google.com 177 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1612 chrome.exe 1612 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1984 Snake Game.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 1984 2316 Snake Game.console.exe 29 PID 2316 wrote to memory of 1984 2316 Snake Game.console.exe 29 PID 2316 wrote to memory of 1984 2316 Snake Game.console.exe 29 PID 1984 wrote to memory of 2372 1984 Snake Game.exe 30 PID 1984 wrote to memory of 2372 1984 Snake Game.exe 30 PID 1984 wrote to memory of 2372 1984 Snake Game.exe 30 PID 1612 wrote to memory of 1616 1612 chrome.exe 36 PID 1612 wrote to memory of 1616 1612 chrome.exe 36 PID 1612 wrote to memory of 1616 1612 chrome.exe 36 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 1112 1612 chrome.exe 38 PID 1612 wrote to memory of 2104 1612 chrome.exe 39 PID 1612 wrote to memory of 2104 1612 chrome.exe 39 PID 1612 wrote to memory of 2104 1612 chrome.exe 39 PID 1612 wrote to memory of 2288 1612 chrome.exe 40 PID 1612 wrote to memory of 2288 1612 chrome.exe 40 PID 1612 wrote to memory of 2288 1612 chrome.exe 40 PID 1612 wrote to memory of 2288 1612 chrome.exe 40 PID 1612 wrote to memory of 2288 1612 chrome.exe 40 PID 1612 wrote to memory of 2288 1612 chrome.exe 40 PID 1612 wrote to memory of 2288 1612 chrome.exe 40 PID 1612 wrote to memory of 2288 1612 chrome.exe 40 PID 1612 wrote to memory of 2288 1612 chrome.exe 40 PID 1612 wrote to memory of 2288 1612 chrome.exe 40 PID 1612 wrote to memory of 2288 1612 chrome.exe 40 PID 1612 wrote to memory of 2288 1612 chrome.exe 40 PID 1612 wrote to memory of 2288 1612 chrome.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\SG_Windows_0.0.1\Snake Game.console.exe"C:\Users\Admin\AppData\Local\Temp\SG_Windows_0.0.1\Snake Game.console.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\SG_Windows_0.0.1\Snake Game.exe"C:\Users\Admin\AppData\Local\Temp\SG_Windows_0.0.1\Snake Game.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1984 -s 1923⤵PID:2372
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1908
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5ab9758,0x7fef5ab9768,0x7fef5ab97782⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1180 --field-trial-handle=1392,i,16175780917408595862,4639893251891268007,131072 /prefetch:22⤵PID:1112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1528 --field-trial-handle=1392,i,16175780917408595862,4639893251891268007,131072 /prefetch:82⤵PID:2104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1592 --field-trial-handle=1392,i,16175780917408595862,4639893251891268007,131072 /prefetch:82⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2252 --field-trial-handle=1392,i,16175780917408595862,4639893251891268007,131072 /prefetch:12⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2276 --field-trial-handle=1392,i,16175780917408595862,4639893251891268007,131072 /prefetch:12⤵PID:748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1428 --field-trial-handle=1392,i,16175780917408595862,4639893251891268007,131072 /prefetch:22⤵PID:568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1348 --field-trial-handle=1392,i,16175780917408595862,4639893251891268007,131072 /prefetch:12⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3460 --field-trial-handle=1392,i,16175780917408595862,4639893251891268007,131072 /prefetch:82⤵PID:1576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3576 --field-trial-handle=1392,i,16175780917408595862,4639893251891268007,131072 /prefetch:82⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:2544
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13f5e7688,0x13f5e7698,0x13f5e76a83⤵PID:2572
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3568 --field-trial-handle=1392,i,16175780917408595862,4639893251891268007,131072 /prefetch:82⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3780 --field-trial-handle=1392,i,16175780917408595862,4639893251891268007,131072 /prefetch:12⤵PID:1084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3568 --field-trial-handle=1392,i,16175780917408595862,4639893251891268007,131072 /prefetch:12⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2588 --field-trial-handle=1392,i,16175780917408595862,4639893251891268007,131072 /prefetch:82⤵PID:2036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3728 --field-trial-handle=1392,i,16175780917408595862,4639893251891268007,131072 /prefetch:82⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3964 --field-trial-handle=1392,i,16175780917408595862,4639893251891268007,131072 /prefetch:12⤵PID:604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3900 --field-trial-handle=1392,i,16175780917408595862,4639893251891268007,131072 /prefetch:12⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4248 --field-trial-handle=1392,i,16175780917408595862,4639893251891268007,131072 /prefetch:82⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=4380 --field-trial-handle=1392,i,16175780917408595862,4639893251891268007,131072 /prefetch:12⤵PID:2712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=3892 --field-trial-handle=1392,i,16175780917408595862,4639893251891268007,131072 /prefetch:12⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=4072 --field-trial-handle=1392,i,16175780917408595862,4639893251891268007,131072 /prefetch:12⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=4052 --field-trial-handle=1392,i,16175780917408595862,4639893251891268007,131072 /prefetch:12⤵PID:1888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=4448 --field-trial-handle=1392,i,16175780917408595862,4639893251891268007,131072 /prefetch:12⤵PID:2036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=4520 --field-trial-handle=1392,i,16175780917408595862,4639893251891268007,131072 /prefetch:12⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=2784 --field-trial-handle=1392,i,16175780917408595862,4639893251891268007,131072 /prefetch:12⤵PID:1884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4704 --field-trial-handle=1392,i,16175780917408595862,4639893251891268007,131072 /prefetch:82⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4160 --field-trial-handle=1392,i,16175780917408595862,4639893251891268007,131072 /prefetch:82⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 --field-trial-handle=1392,i,16175780917408595862,4639893251891268007,131072 /prefetch:82⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2328
-
C:\Users\Admin\Downloads\Snake Game-20240619T215418Z-001\Snake Game\SG_Windows_0.0.1\SG_Windows_0.0.1\Snake Game.exe"C:\Users\Admin\Downloads\Snake Game-20240619T215418Z-001\Snake Game\SG_Windows_0.0.1\SG_Windows_0.0.1\Snake Game.exe"1⤵PID:2704
-
C:\Users\Admin\Downloads\Snake Game-20240619T215418Z-001\Snake Game\SG_Windows_0.0.1\SG_Windows_0.0.1\Snake Game.console.exe"C:\Users\Admin\Downloads\Snake Game-20240619T215418Z-001\Snake Game\SG_Windows_0.0.1\SG_Windows_0.0.1\Snake Game.console.exe"1⤵PID:1576
-
C:\Users\Admin\Downloads\Snake Game-20240619T215418Z-001\Snake Game\SG_Windows_0.0.1\SG_Windows_0.0.1\Snake Game.exe"C:\Users\Admin\Downloads\Snake Game-20240619T215418Z-001\Snake Game\SG_Windows_0.0.1\SG_Windows_0.0.1\Snake Game.exe"2⤵PID:1156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53c1382f88d4e0e933ae14388bb13837c
SHA15825d0b4feca9721001e498243dc0cb8530e5886
SHA25692bf28953fc710ad05c40cb283c45697551ed77a9f39070fbaff878fb0cf0f51
SHA512c061dcaf733064125765a70015b567f384d6960caa8b6d5bdce865c528dfa3f17ef485c06d5791f9d01a7d631a63fc91a63ad70530d52593789f02e197fd7b72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de551a3ba4c978434008ac8eb2488a4a
SHA15c4ef3f37d05485849a00938a4906465cd901532
SHA25655eb9ab369e2d04d46b75533a7d0cff89d82c7d2d1d5d66556110c4df8b1a30c
SHA5125b3ff6a6143d9f3b535908da18a45f7fbd8edfa26bc00ab486eeaeef8b3b9f6b0717d395b74b015f4742c7a8560ac02b5b48b1a69e622abce09d0f59930440b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c11f71685fbd7b34f42cf12a57f03f1
SHA1e820f3988c8e408a813b901ed3aac591540dd1b3
SHA2569bfab7f39892ba3ff13ff48852f347fafd5add977e84d14d3b6975af5b859e37
SHA512289ac384f08a4888bd5ecd7daf41d0eef99e597677c4d207c34d47e1e46f312db0e581a45a3ebcc23d1447ee645b4537158e65b1ce4e83f2bd67ab7c25328c42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5560b656bfe885b3f4541add6b3cd4fc2
SHA1944d15ae7f14d89d9e4b121accc730c48a6ab3d4
SHA256362d8e4d2e2ec8c186ea795df68731e052dfaf461c5e3045d8343d5508e5abbb
SHA512caff9bb75cf19079c7e6fd6b2c5872e420ab8adf9a183b8244eaa6286fce08894d02b4a8e89845cc71bd8890efccd9f61e82baf43f751c1fa263c896e888f094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5afd5b5a882753e999c3ba9712b749635
SHA14d8b3836d376c3817ccbd7d42fe3f8fe9efca755
SHA256f409db0626f01d41a3745906ac8d3bd515606454517a4c43c52e64b0fa11234b
SHA512facaca59abbc0a50d845517e8b1d891ab4d71fe50d955916673ea5ef97e91d069dc2fdec3e531c8d947e74b2877f10eaac10d50b2b32d2c8316ddcd0db92159c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5b584fa8a86ffdf195ed631e2fe1ec6
SHA1141c3596735d5af2314154a509cbf774787c04a0
SHA256562eb1aad92f9755b15e4282fe4afddfab46202b5af37a30039fd4d63506686d
SHA512c8d08096f5b6ad9793bcb0cca230b58ae46638591540c3f29105954b2488334c006f3b2898319ed1996f9dc5035e2f9c39e00a7e300657ce2da11706a9e7344b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ac55afaa2e58d35d5679911dcf72af2
SHA16f5083092932f1f6aeffd504ecbfd8fcaefe7a53
SHA25632883ee8eb5893f4cf5401738390603471d42b66491b8c7635de32ee52767f84
SHA51270d3f14802582f376aed19131a2208140fc8a3b0dbee3817b74fa4d40003647f57b301933e1b64aaa1ff7dc72bcca95b2e37bbd0eedad5ae1370d1dbcc391e14
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d4ca6cd857710025e957def3430e9b9
SHA15be0e921679231382ceb34a71ba5a18053b7c57f
SHA256977336c7bb04b1d18ecca78c7144ea509123ff588e0dbf3f0673daa352c237fe
SHA51244753d17ef1978e825251a45547d9f61ed63c6220fa78f45283678400452f122b015f9989fa97757c5122c828ae946c7b3b8de4481743806d5ada83c178a2f45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514f8ee5f96445f5f15553710a09d8c08
SHA1b776cdd006edc8bf8aa18b99293a48f2f2dfa766
SHA256ed3a3a2bef5a82bb27b0ef0e54b417638212da47934c776f1cab042602b72f65
SHA512083a12d5746fe7bc508ee9bc437f1b62cf1cca350d17fc1a07c5f7c67ef6b378176dfeb96b6fcb4abefc9f41f447b21b6fed3936060e5c81169e8383fc0bfc22
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\0067047a-f2de-490a-99b2-217fd54da7cd.tmp
Filesize6KB
MD5a5fab6f272bc6d7b4421a3429c9299de
SHA1b44dc3313b3aec58957f7f153e23689686a2de61
SHA25669183a11f6ea1f7855825deb01fd83a932a36805262c9c05efab8f4ca8ec1a5c
SHA5122a044c8d359a4caa01f8a5d4690291be93a0eb5bcde8126072426962560b7b511e045356341d3a4fea3c8f0db092efe6febbf6cd708910bcab6eb108291c0a1e
-
Filesize
19KB
MD5ce1093c800c0933d7c9674eda75790d8
SHA1371c2dcde092f51b18852e2617bc6c0c176f5873
SHA25657781a723db9a2483067bcbc89d1f30f7e2f22ae2d18aab1e45ad894d8cdab89
SHA512fdbb31c607cc9a4bd75c42cbc552fb40d82e53804d156244ed2daa124c75e1680b908589f7a3ad8888b9b03ebfd1f4b3e83e19f84e3a746cf210d0b8a1678533
-
Filesize
27KB
MD597f07e182259f3e5f7cf67865bb1d8f0
SHA178c49303cb2a9121087a45770389ca1da03cbcdf
SHA256c3a70f23a2cf331852a818d3f2a0cf7f048753c9b47aa4e7f0fee234c46b226c
SHA51210056ad3a71ee806a8d8aff04d513a079568bf11799016f76f27c4255be2141a4c2d99c1f46bbfde9c99ba0f8b44e780a92b59f514d3cc1c248ead915c31b5dd
-
Filesize
2KB
MD5db6ab36e253d6a39b4c9e8b8883f26b9
SHA1328e1d7844f7620451db341816fe1f3a3734b3f3
SHA25623681cd4b59991f0234e2543998344807f1af9da09ecb1cab261160d19c85120
SHA5125daffee8d9625145b04eef7bb59d60f59fe4c678b1b580eb97875bf501ebd0e42fc91133022de35b423e364a30662b026aa4606e4982fcf33e39138db10160de
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index~RFf794cc9.TMP
Filesize2KB
MD544a875aaa820459e90bd4c055ec2553c
SHA1d36a8f52e81a9e2c044dffe61356d06ef140719a
SHA256b62b3caba1a7ecb953672b9ccc02491388f1ef4977386e816d05f76bbe8d51af
SHA512d2b7cd91fdb866fe5187cb886094fcc990750f602226d5a6832d07e4e96371d8f9b337283d40b7483485b717fd10ffd32db11722890d24054468f6b2f999814b
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
6KB
MD5bd2bf91c1b45977392d1d0cdec11b68b
SHA1cf33f13e0118e50b62b310cb171493416adfa19b
SHA256252ab95e8a94642dbadba2408cc8788eb924ac045d161f9c0202e7d90ef3dff7
SHA5127e0063158f6e2cce46275e84f4392f36de99c66c0d66994fc8f104f59d4e3a42c14a33ca7f50bd9a1f886a2eca4c3ad63c666a7231eb9548d31efde9d88de461
-
Filesize
1KB
MD5294f0d5608a781fa722a1622e4acd54c
SHA106defba1dcc3d7db1dfe00600af0df72818c4334
SHA25635d8bb5d2ff52b6fc618310928d0dff4495c1ccb623baaf4f22e52eca4705890
SHA512e20dfc171e939abd16591e8b2bb7e394109ac46aaa693b1e4928a9704682b035fcdbcdf05fa22c527634c6fe7ddf7914a835176ce2e0cf0a936f645d07392570
-
Filesize
1KB
MD5df37fd3a075c791f3b96f528da8463fb
SHA160d7e60be83ee800290016567951544cb52d8e3e
SHA256b71f64ad4a394e977c37e2fa247835f82747c8215eee95d240156dfa532b0cc4
SHA512690e7def2e0a8e3926a6fd88a640fff781a6548b8bd8f27bebcf8b906268f07219ed439eeaa01663da137608371172978c94bfd21c8ae62963397b82e915e94d
-
Filesize
1KB
MD5779eb5794bab57cd4db196926e79a7da
SHA19c17b432920bc709ab3c7eb1de2df924feb78c52
SHA256763e7b0842f4e0d0a6cb38179fdb417c1975cfb23ea72ffc7f263b61aa8b5f12
SHA512a9ebb7d095a3b8c229ab9f1a2e7c2a975789f63c5e6d360302583551e380303c16d43021e1ed7a68bb5914f41c7de11789cd0915f9e0cae1bded29268a0bbd4d
-
Filesize
1KB
MD5813c007e665bf462cce1d568f97c8395
SHA108d0da81f470b19822902e2292feca089e040583
SHA256538bdb15343cd832adfb73bd6459c70fd2cf7414c6c24e653a1d1e586d75fe8f
SHA5129ae292b6ab11e2046c5aaed54b023a51256d93a13661c2bef51b85686ee79ad58938e6d104377eda1e35f974248cb30dc8bcbe87fb0cebce3d25386250327a55
-
Filesize
527B
MD566894720656146ebc6bf7fea381d66e1
SHA13fa9bd7eec91d7151fca759a06dca9c0c5e21e81
SHA2565894929c6be057fa1bf2672bc24957d6e2d19db3f7fb29cffba33529ec92fc78
SHA512d1b35769a9d8aca439ebe2b2dc9c847346ff32e15f398aeb39f65b00ddb6f18d4c27d41578bdf0b3428ad1ec89beae957c4cd3c7ddaac71d0324632cdaaf11ab
-
Filesize
1KB
MD5b5fa63e42f3306296ef1dc8ab6172e4c
SHA1b8d5ae99510aaa0bca9b23db60b01aacee99e38b
SHA2567f85d29aceffa9084b578712cb20998352a792b4f7e6baf843019ae9e52c259d
SHA512bd07669231099461c7cd797e3acc07e1eee30e07e7bfbd9e9785161e50aff28b8beb9ec86a4b2ae5e7285fe45a9ead4a9270609e80b288924687e77fc162b219
-
Filesize
1KB
MD5f527c643459c90614bb571013f46a475
SHA18420ea0346391f831494e83ea6e433faf8b56188
SHA256f0ee0c49070a237766af73c80023691c459d382d9abe2f314032577be748c0f7
SHA5127f2eb02e894cf166fb8b4a957f171f682eed5ea9f0064398ca106d95a2d3c22d30f052643a3974c651bc1e6be7ef682f8bc987b978b4309edf3f1d181fd3fdf8
-
Filesize
200B
MD551a3d71fb861901c34a4ac82b14e5954
SHA1f30017b5a36e2f8877311dd305cdad2767708b12
SHA25628b439cf2bf8859c426f85cdd70bef38106f83964528fe6d8a95a39f555afa0c
SHA512288312ab281cb24cf4d4f76768d1a3fa8eb13161fd83b3acdbe62c696c4df755d4573a66b6d2e77e37dbfde22c0dfd970b7a8bc1a2f9ffbd76da2f07203ab4d8
-
Filesize
6KB
MD54fdb0c5d348d9a74a33900787b7f9a24
SHA1ac4e0d5c9c38ae29126b19b78b599aa6fb8e44b7
SHA256f6bb5c7ce2481b899251c9bf6d4c81e1e655300133d3247b3206499a7ad8d7e5
SHA512a679e98a40c3870b080ed25f67fc339cfd1cfe69a326a0a9ae7dd3adfd723fc5994a1e3df6463f49fe2cb333d01b9ce6f3604ffda09c85475c4bdeffa99c4482
-
Filesize
5KB
MD56bfef190764a0a9c2ad1b248db7b5eb6
SHA1e8cda703f3de7ab54b15677622238e6a44e39146
SHA2560cc319c0f2fd40726512821b83f4dd21d66161e87c5b37164c15fbfbea7edd2f
SHA512754bb3916d1d1c2d52881c8edf61be0476e7fce47baa63b10d92f85d751bb3d240b9d706aa18637e00534f019346561f19a75d535e2f9b8800247c57d0d04db9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\CURRENT~RFf77ccf0.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
298KB
MD50c32e42836b9156ed6291700726d16b3
SHA16057b796de1579765441da902a5039078159d122
SHA25630745f3633d828995dbbc9c6ee5e9609e195177b6c95d738bb71b682036715f6
SHA51235cee49ad3313bf3588c864ac1a4628ac198b46ebe98ae195a6723c1bf0dacb5f2813dfe2f3c4b714c48c5d8414d6177f44c2d5ee40ef60839d9876d2abcd372
-
Filesize
77KB
MD5648d029a133b5ba80ee5d90f7c49f718
SHA137a3ce01ef2df9c823064919e4d63c4e779d8105
SHA256d87ba42b169b1c86e8ab0451413f3aea768ed9867bbbe1ee6a5c14cedfd3f3de
SHA51213c363c783e5b1d4b8ff7996112d882b4e2dd55413c22668e8575b0600b7167bbc783768913bef957a92c40e0823191fef76c6c8c1f855c7fac13cf0460dfe72
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b
-
Filesize
72B
MD567538e2f44de02966bb9d71c22c41141
SHA116502e1998f26391d84d108c81f6be1af294bd66
SHA256682896e4996adeb0536c6cafbea77869529e9fc3c4988fc37c69a5409aee11d3
SHA512ceeeacabeeb5876fb183012e10123bb2d732a770600a1eeccec82dac3b1eebda1f684a4454e3011971d8282b2d834b841006eb2cb4fec9aaeb532b7f69423307
-
Filesize
179B
MD526fc6a2143cae620a7cf2df78333ded6
SHA1a92829252bd6c6d74176f5b621da843d50a87e4a
SHA256cf0b04aeaa38451231773d8a3c98fa3e0da0678b09cd49618c4e79b7a18f6e93
SHA512f51b5530876cbedf3768165be5d68d5da3a46f27e75ffaca5dae12c9e2c28c13623a4d64e5162366073e62efd678d11bcf1207c0a8c7000d4737dd316511e8ee
-
Filesize
24.4MB
MD5314b8bf7c2b288ecff17d73d1ad59e7a
SHA163a4475fe73845c374115a8d1c3cfea8a2845fbd
SHA25604cd11e030a6f4e36cc93d2491677c27dbe725d6a3d5509c2a27b315193b5e57
SHA51292ac4b6f95347f4198c39ee8e94a0ae721d53848b41b088706e4a92920eff6072af165ffe8d4eb7968ccf872f7cf4d2c75de4b118888403b6af1b5fd978dff57