Analysis
-
max time kernel
156s -
max time network
155s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
29/08/2024, 02:26
Static task
static1
Behavioral task
behavioral1
Sample
file.html
Resource
win11-20240802-en
General
-
Target
file.html
-
Size
312KB
-
MD5
0a5c1e6fefee243b96ce81c67e5b4730
-
SHA1
eaf7746e12555ddf6d0067f720df1b33bbbf8a38
-
SHA256
70f1f09c05c501ae46ab309d1eba6af43c17fd3db75a9268f59d39a7c46d49c4
-
SHA512
fc3afb1548d2e25209703057edb8efd81feb0e75ffdab7618ebb994539d4222143a7d3f0542dc7f5c5d81a5bfce9485f81823f2bb830a85502fba1c938efd6ca
-
SSDEEP
3072:+i5gAkHnjPIQ6KSfc/3HxPaW+LN7DxRLlzglKlVrVk:fgAkHnjPIQBSf+RPCN7jBlVrVk
Malware Config
Signatures
-
Creates new service(s) 2 TTPs
-
Executes dropped EXE 3 IoCs
pid Process 1288 setup.exe 2368 Client.exe 3048 setup.exe -
Loads dropped DLL 14 IoCs
pid Process 1288 setup.exe 1288 setup.exe 1288 setup.exe 1288 setup.exe 1288 setup.exe 1288 setup.exe 1288 setup.exe 1288 setup.exe 1288 setup.exe 1288 setup.exe 1288 setup.exe 1288 setup.exe 1288 setup.exe 3048 setup.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\parameters.ini Client.exe File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp chrome.exe File created C:\Windows\parameters.ini setup.exe File created C:\Windows\Client.exe setup.exe File created C:\Windows\7zip.exe Client.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 72 sc.exe 1988 sc.exe 972 sc.exe 1260 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133693720349315064" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2842058299-443432012-2465494467-1000_Classes\Local Settings chrome.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\My first python game.zip:Zone.Identifier chrome.exe -
Runs net.exe
-
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1180 WINWORD.EXE 1180 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4876 chrome.exe 4876 chrome.exe 32 chrome.exe 32 chrome.exe 1288 setup.exe 1288 setup.exe 1288 setup.exe 1288 setup.exe 3048 setup.exe 3048 setup.exe 3048 setup.exe 3048 setup.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 4876 chrome.exe 4876 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 4876 chrome.exe Token: SeCreatePagefilePrivilege 4876 chrome.exe Token: SeShutdownPrivilege 32 chrome.exe Token: SeCreatePagefilePrivilege 32 chrome.exe Token: SeShutdownPrivilege 32 chrome.exe Token: SeCreatePagefilePrivilege 32 chrome.exe Token: SeShutdownPrivilege 32 chrome.exe Token: SeCreatePagefilePrivilege 32 chrome.exe Token: SeShutdownPrivilege 32 chrome.exe Token: SeCreatePagefilePrivilege 32 chrome.exe Token: SeShutdownPrivilege 32 chrome.exe Token: SeCreatePagefilePrivilege 32 chrome.exe Token: SeShutdownPrivilege 32 chrome.exe Token: SeCreatePagefilePrivilege 32 chrome.exe Token: SeShutdownPrivilege 32 chrome.exe Token: SeCreatePagefilePrivilege 32 chrome.exe Token: SeShutdownPrivilege 32 chrome.exe Token: SeCreatePagefilePrivilege 32 chrome.exe Token: SeShutdownPrivilege 32 chrome.exe Token: SeCreatePagefilePrivilege 32 chrome.exe Token: SeShutdownPrivilege 32 chrome.exe Token: SeCreatePagefilePrivilege 32 chrome.exe Token: SeShutdownPrivilege 32 chrome.exe Token: SeCreatePagefilePrivilege 32 chrome.exe Token: SeShutdownPrivilege 32 chrome.exe Token: SeCreatePagefilePrivilege 32 chrome.exe Token: SeShutdownPrivilege 32 chrome.exe Token: SeCreatePagefilePrivilege 32 chrome.exe Token: SeShutdownPrivilege 32 chrome.exe Token: SeCreatePagefilePrivilege 32 chrome.exe Token: SeShutdownPrivilege 32 chrome.exe Token: SeCreatePagefilePrivilege 32 chrome.exe Token: SeShutdownPrivilege 32 chrome.exe Token: SeCreatePagefilePrivilege 32 chrome.exe Token: SeShutdownPrivilege 32 chrome.exe Token: SeCreatePagefilePrivilege 32 chrome.exe Token: SeShutdownPrivilege 32 chrome.exe Token: SeCreatePagefilePrivilege 32 chrome.exe Token: SeShutdownPrivilege 32 chrome.exe Token: SeCreatePagefilePrivilege 32 chrome.exe Token: SeShutdownPrivilege 32 chrome.exe Token: SeCreatePagefilePrivilege 32 chrome.exe Token: SeShutdownPrivilege 32 chrome.exe Token: SeCreatePagefilePrivilege 32 chrome.exe Token: SeShutdownPrivilege 32 chrome.exe Token: SeCreatePagefilePrivilege 32 chrome.exe Token: SeShutdownPrivilege 32 chrome.exe Token: SeCreatePagefilePrivilege 32 chrome.exe Token: SeShutdownPrivilege 32 chrome.exe Token: SeCreatePagefilePrivilege 32 chrome.exe Token: SeShutdownPrivilege 32 chrome.exe Token: SeCreatePagefilePrivilege 32 chrome.exe Token: SeShutdownPrivilege 32 chrome.exe Token: SeCreatePagefilePrivilege 32 chrome.exe Token: SeShutdownPrivilege 32 chrome.exe Token: SeCreatePagefilePrivilege 32 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe -
Suspicious use of SendNotifyMessage 36 IoCs
pid Process 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 4876 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe 32 chrome.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1288 setup.exe 2368 Client.exe 1180 WINWORD.EXE 1180 WINWORD.EXE 1180 WINWORD.EXE 1180 WINWORD.EXE 1180 WINWORD.EXE 1180 WINWORD.EXE 1180 WINWORD.EXE 3048 setup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4876 wrote to memory of 2372 4876 chrome.exe 81 PID 4876 wrote to memory of 2372 4876 chrome.exe 81 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 4444 4876 chrome.exe 82 PID 4876 wrote to memory of 1660 4876 chrome.exe 83 PID 4876 wrote to memory of 1660 4876 chrome.exe 83 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84 PID 4876 wrote to memory of 4304 4876 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\file.html1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb500acc40,0x7ffb500acc4c,0x7ffb500acc582⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1776,i,8315030248770029798,13532037818850123391,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1760 /prefetch:22⤵PID:4444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1920,i,8315030248770029798,13532037818850123391,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2032 /prefetch:32⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2148,i,8315030248770029798,13532037818850123391,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2360 /prefetch:82⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3100,i,8315030248770029798,13532037818850123391,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:1068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3132,i,8315030248770029798,13532037818850123391,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3332
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵PID:4796
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb500acc40,0x7ffb500acc4c,0x7ffb500acc582⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:32 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb500acc40,0x7ffb500acc4c,0x7ffb500acc582⤵PID:2784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1704,i,11887062493285583028,7491487705181638309,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1700 /prefetch:22⤵PID:4024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2028,i,11887062493285583028,7491487705181638309,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2096 /prefetch:32⤵PID:1440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2172,i,11887062493285583028,7491487705181638309,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2180 /prefetch:82⤵PID:4568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3060,i,11887062493285583028,7491487705181638309,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3096,i,11887062493285583028,7491487705181638309,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4392,i,11887062493285583028,7491487705181638309,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4516 /prefetch:12⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4772,i,11887062493285583028,7491487705181638309,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4800 /prefetch:82⤵PID:2528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4828,i,11887062493285583028,7491487705181638309,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4796 /prefetch:82⤵PID:3744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4940,i,11887062493285583028,7491487705181638309,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:4032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5148,i,11887062493285583028,7491487705181638309,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5008,i,11887062493285583028,7491487705181638309,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:1936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4740,i,11887062493285583028,7491487705181638309,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:4824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5536,i,11887062493285583028,7491487705181638309,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5760,i,11887062493285583028,7491487705181638309,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:3480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5936,i,11887062493285583028,7491487705181638309,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=6252,i,11887062493285583028,7491487705181638309,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=6268 /prefetch:12⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=6476,i,11887062493285583028,7491487705181638309,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5872,i,11887062493285583028,7491487705181638309,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5924 /prefetch:82⤵
- NTFS ADS
PID:1744
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:784
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2708
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap27480:102:7zEvent186131⤵PID:740
-
C:\Users\Admin\Downloads\setup.exe"C:\Users\Admin\Downloads\setup.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C net stop MiningeService2⤵
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Windows\SysWOW64\net.exenet stop MiningeService3⤵
- System Location Discovery: System Language Discovery
PID:2796 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MiningeService4⤵
- System Location Discovery: System Language Discovery
PID:3360
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C Sc delete MiningeService2⤵
- System Location Discovery: System Language Discovery
PID:4860 -
C:\Windows\SysWOW64\sc.exeSc delete MiningeService3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1988
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C Sc create MiningeService binpath= C:\Windows\Client.exe start= auto DisplayName= MiningeService2⤵
- System Location Discovery: System Language Discovery
PID:3520 -
C:\Windows\SysWOW64\sc.exeSc create MiningeService binpath= C:\Windows\Client.exe start= auto DisplayName= MiningeService3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:972
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C sc description MiningeService ServiceManagerForMiner2⤵
- System Location Discovery: System Language Discovery
PID:4880 -
C:\Windows\SysWOW64\sc.exesc description MiningeService ServiceManagerForMiner3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1260
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C sc failure MiningeService reset= 3600 actions= restart/60000/restart/60000/restart/600002⤵
- System Location Discovery: System Language Discovery
PID:1360 -
C:\Windows\SysWOW64\sc.exesc failure MiningeService reset= 3600 actions= restart/60000/restart/60000/restart/600003⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:72
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C net start MiningeService2⤵
- System Location Discovery: System Language Discovery
PID:4824 -
C:\Windows\SysWOW64\net.exenet start MiningeService3⤵
- System Location Discovery: System Language Discovery
PID:4188 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start MiningeService4⤵
- System Location Discovery: System Language Discovery
PID:656
-
-
-
-
C:\Windows\Client.exeC:\Windows\Client.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2368
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Downloads\SendGrant.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1180
-
C:\Users\Admin\Downloads\setup.exe"C:\Users\Admin\Downloads\setup.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD51eb34c97499d5de69f067ed37f2a3a5c
SHA10f9e5c1792e5c8e03075f09c7b15af959d73b38b
SHA256d1f4804c565d6079ee2472b8c87f2a37dc7d3836c1fc4186d309fe79b74ef124
SHA512240db569ceecba6bdd8131d2bd0cf07ae24aaccbcdbea5076d7110d557419d055173212ef63d81f16ffcb765f2d9afab552924115eb05fdbed991b3cddf04727
-
Filesize
649B
MD5b6c65abf732484c50bb0ab5413afca05
SHA18a49cd30da27137ca2968eba4ec76d0e246ad360
SHA2560522198bf39ce487d5beb7010ce002bbf3075764549c5a508fb25e3b4594e3be
SHA512c88b1c2d3b399982ab8ef01cd5b429b930c701660d85e4a87dc78f39e8e296fa1f42713146644dc2113418f53fbd4fba81253768b27f102037a3aea45372d979
-
Filesize
44KB
MD56746f92833cb6b541f296a94f8ff6e07
SHA109536875392249157363d25552114d0f8fc8070c
SHA25604b7465a254c8b03c3af2143fca01ba8a7cee76b856f0377cbe609c6d5e60c2e
SHA512e5d328cf74a1855df86bbfe7acc09a145e6f79fc0a4f3cbdb39ecec3b871e7b6f4036e06cda54d8cc325d3ee8348b8d65e9341d5dce4acf927040b01105503a2
-
Filesize
264KB
MD595746dfd2bfc9f46709eda864cc00286
SHA1f7657c54b9a5cfdd529fc2e0cd052512581c015f
SHA256de1ff415cfdef62582758df29795852a8f24f6da630d671ac6c1a316340554f1
SHA5122c483e5a3624c0319b90b3e30a2a771d06f282de04d096a662e611d29f38e23bf2d1c0072c027553f1e2f2effc8d992d489913c48b5940ad56109f09e858a878
-
Filesize
1.0MB
MD5b43646994d43801258c24078ac529600
SHA1cac4af5d93be9afd14bea45cad887fdddeb35e1e
SHA2569de67cb4add3d78e68818439b3dd3224be6ca83074d017afba7db3d465bcd9ae
SHA5129508fb370aad5a026ca68cfcb9b5e0b03dfd9a9bd9be54a7ea96772cbd36a8473b646918427c94326eaa9f69ba0481a0425f0dba8c91ac9762a2edf857cffac5
-
Filesize
4.0MB
MD566bad3e30bcd0694f6d7b3fc0bdb83b6
SHA136e2687d8675b0b85ecdc6ef143e6bb6ede45d0f
SHA256d12941b881f96bf43346f83f5aa50e3e0598807b5bc6d0cdacc25ccd90956d96
SHA512c4675251097fa7e7c597d97645c5207c9793ab39062b5ecf47efcfa39113b08e605330c67fb1d4beb1c5341459c70bb5423a0218f49d5055868d67ca0f6b78af
-
Filesize
71KB
MD578785e96048fa7b9b699ef7ea59fc32d
SHA1acd9044511dc3a866dfcaf5858f5da4b8a977f05
SHA256b94f0b65e4cb0564a64d9842a417c1ffdf2a17439380b9aaadd3d518e8b2617d
SHA5126f94a978f17ade51102faf19eaf1a98f4cd994427f405f689e5681d4124c88801dfa51e2fd86fc11bff1556199441c91c3e8c9e9546fe17bc899b0119ce3721c
-
Filesize
18KB
MD5e43bd7521e0f746e6d75408abe76b53c
SHA10cd660b213192bbd434f2cadf3a5b3fd2ec49285
SHA256430854383f63f9aa8fc83519e53a9f08b996a501612abe91f927eefd366a8471
SHA512396665ba8edc5679f0ed0311a65bc887ce071c41e44e9a51b20b6ebae3fde13132a9eb19c1a768ae2d5ae0524dd44d018dc5bc649fe8386033c024be4f862fe7
-
Filesize
83KB
MD51fbeef8d851646f10b0d3f0eaf79e7fe
SHA155f4388683ff3007f789fb01c12cec8bc8511ca2
SHA256c74e03c94616c50042e7c2b6a04976d05ada0f940b82c8c466cbaa3c07e0581a
SHA512e0b8fc87fffc7bde8b10f98259ad02d56f9ee481c6785ef8d2574f4fc731969d782ec33c55eae10fb1c8bd360b203db9d0fe3a25cc6459f4886fbd5ae501e527
-
Filesize
21KB
MD5660c3b546f2a131de50b69b91f26c636
SHA170f80e7f10e1dd9180efe191ce92d28296ec9035
SHA256fd91362b7111a0dcc85ef6bd9bc776881c7428f8631d5a32725711dce678bff9
SHA5126be1e881fbb4a112440883aecb232c1afc28d0f247276ef3285b17b925ea0a5d3bac8eac6db906fc6ac64a4192dd740f5743ba62ba36d8204ff3e8669b123db2
-
Filesize
20KB
MD587e8230a9ca3f0c5ccfa56f70276e2f2
SHA1eb116c8fd20cb2f85b7a942c7dae3b0ed6d27fe7
SHA256e18d7214e7d3d47d913c0436f5308b9296ca3c6cd34059bf9cbf03126bafafe9
SHA51237690a81a9e48b157298080746aa94289a4c721c762b826329e70b41ba475bb0261d048f9ab8e7301e43305c5ebf53246c20da8cd001130bf156e8b3bd38b9b8
-
Filesize
36KB
MD5265de96d25dcd5db3f1b208beea2fa31
SHA1508d86b66d8c2828b8dc1c09b8c55c0760eff04a
SHA2567cc0d250dff99f4b003c15d1cab767a6339f739ea0b84ce5233f90614bcdf470
SHA5120081d6285df8e9bc9d28eb1bb340fd47f5a0e33b050dcd100c25a3db68524f5016e4fa15e4ea8cafd0ec725f781f9d03ff39ed5cad3065f05df73ec42f87aa45
-
Filesize
108KB
MD58e81cb333ba6f3fedaad4ac35b33b127
SHA19849869caab82ddda42b4faca2ab95e02490a2f9
SHA256ca69a954af798a667b6b7faf2cb4953291790da025d6f372929ecb8bccc733b8
SHA512202463f56cc1be61f3f1168f4245c557658e6a5d4fc61300c0a31e78e3a149e778c28d395d72a1b5715357dfc267c9e78c8b2ffb9645381edcfb647aa573a46c
-
Filesize
77KB
MD51f3f88716b32607f6311ac086001b3c5
SHA1794d8bfac1d4db89ee695ac610bd4ef83d03bcbf
SHA256d4bc83181e7b1f318cf323cd8959aa7334999d4aa553589a9453b68ecf73fc9f
SHA512011ba29d8874bb4a3740139447ed2e7e2e14a782d04106db98b34b7a9a3a1720d642086574a5991c23f1eb98e4763c6eb4e023182466124d5f6fa0424479a868
-
Filesize
54KB
MD5217079349c46e3d977cbdb78df80809a
SHA1e5bc35d55aee2bc8a5f1c6018de375276efb45fc
SHA256d8d76798afc043e91c703a21c3bd201fedc2c40da2ec4a743d60e445bf6e2205
SHA512f0accdba23b3b9235793e5f040ef58612200fbe232f78f51ef2810dbd21fc018f66fa60f168bd69f156b463f509c847e2530054dd5687b8c4d05047051418a5d
-
Filesize
1KB
MD5746ce9f93c8cbcf00acdd642655a895f
SHA1e0e906cda5117603637a87c41a5d47bcfdf3e1e9
SHA2568b79a5e09765dd29bf8c41e66b145551247d3fe0c0ade9307142051aeb16af17
SHA5128dd8fec123cc72e30763ac66e29e031dc33be1c774117507787c754270585981c0920edf9912c62742b9cf9090a038765b78f4d2fafc55ae8db764bb44fc32e7
-
Filesize
317B
MD5dba90ba003d87f815298e03291c4a6e8
SHA1154ae26e52e2d45c47a3bbfe6e41ca760940b3df
SHA256e1be65c5eaadac28f2ff0668ddaeabbc31579b89670832cc3b665408d02928b2
SHA51239fbe2fc5f518e0708e2f4605499e03e67137c2a4b382bd8702483b0f3febcc64421e6e88bb8fb6d18bd9dfe0938f9ca4e1e02cacf9b9663afba403600dc379b
-
Filesize
44KB
MD550ac4fce2b0c4c2094836aaa7f85bd00
SHA17f95f3967cd0038aae65122d480a50776f24eabc
SHA256a2ef52eace20800cb5a438934bc9b46fc6e96defef0b261d1066fe22c31dc055
SHA512840b21d8a4accf5d25e97eee5c060b953495a13a197e7a9609aedddce811ef67a898db278994a58f81059b100c428f295ce172af425b191b2c12384c3b3c3dc0
-
Filesize
264KB
MD512651a9513bbc1c3c912b01e76765289
SHA1305662e12eacca335d1f06e728521fa13aea7f0c
SHA256fa04c6d671c064c2221070e9d0ad5e6273eff830e29da0f63dbf2fbd1d8b4fcc
SHA512aa6de0e60b6c3c23058f04220036cb4dbde2bfe9f6fb67dd7d4803d7158f2aba3d18b95f88e48ff8c31d443a83b0f843673f12a7b77cac4e238c3567f02daa71
-
Filesize
1.0MB
MD5ccede51f8bf447301e1707c3f4b227e5
SHA17c7b6516e86efa5f69eb782d9b8dbccb85ef349b
SHA25649789b75a9b9d6f7f2b2bbc948b843cfa213fbc226a140bd821ccf58c8520afe
SHA5128b57be5e3fb725bf201a33494e8fb2f5f224c00e10c8bbcff0afb0f7d762d29933821cd9bba25e5f7a3533b311ca14a98ed5420eacefba0ec50d8ae91a04736b
-
Filesize
4.0MB
MD562a60c9f364c39e879c4a014a43dc5d2
SHA1f38434e5bd57a29c5d5683d171f60ee8d008de69
SHA2562ed75ee97034fbd5b68b3868c0bce6dfce22ed29959d48a3282fe41217e937d6
SHA5128e181053c6c44a1a982478e78e9f424f5c61bfb601750c57880f19666de949ac8cdca2fdfe1ed0bc24ec2ee48aaa193dd75c499a9af765a1d761a9fd49bfee67
-
Filesize
160KB
MD5b2a948dd028a540c7c484a7ff701f5b9
SHA1399aed47f7e91fccd6cf83a1ca6a939b199137ac
SHA256ac6d523195120383d836616bba29893e6cf3c777738b1757137847b56ab18525
SHA5122be0f38bb25bac1d8c02de65aa6fca0e6707e4e8e861784629b857cb1beed1f947720244cd0ebd41491b6d4d7f4b0f63c9e2cbf3fc92000175f6474d38895dcb
-
Filesize
429B
MD5e0c16d645221a76161de03681a092b2c
SHA1c2341200472a02b87b425b6af36a5bca53fc06bd
SHA2565ce4cc302c03b572130226bcddc6e802c31e0a41c9197e52ab96a3e26ac048cb
SHA51278053501156cecdc80ffe80cb80cf8082f90f4c43d2b0b0131b2ac78946714bfc549d99ea3aba3a8c14affc576929d02636583adc74b638277e625277dfc1c5b
-
Filesize
329B
MD587636e6b49f721324d0f8b6664f3b474
SHA1ae119209a8265f639cfe2a461e6bd640f68baa4b
SHA256f17b716b4c7c948beab57cc019a808f63057c31252d684c45dc021d3ede8e894
SHA512dead2b06de87e908ddf98a40e0a0ad1b326f41f29114fcec4dc52477407f3629c1ddefcecfc3b73517b6ecf86d0b09ef3f5cd00d2ab993fb8b365ce98386f5bf
-
Filesize
20KB
MD54e4449335630119e97fb2569c5fe2369
SHA1fb116d29171b4da11fc0c3f6ffcc880358340ecc
SHA256c70358fe054b29075487684a5b4684faf7718b4e912e668abe20eaa54358f0ec
SHA512412ce2243f2636a9edabd3384a6335e27e59e1a669c41e33b22943272b9ce068305ec64385e387bb6de4b51d84fb718ccc44c95d09dad176e5749cb9fa7f6192
-
Filesize
4KB
MD5b6e8b8efa09f7641485cf982fa0beda2
SHA1bdd30bd1dfe96193d18ca0fe0b020ed9d4ac68f4
SHA256333ac65dc52f7cf3f029432d0bd256c8e771f17d930687859cb49921af2fc720
SHA512787104d70f3a024ae7759054ce3c388c1ebf9c403678e618eb390aadeb2fe70764387581448fb7c8a75607efd067f68830a79ca79f251c506bd6f23e8e5f4054
-
Filesize
22KB
MD59cc304f7f7a2c6b2a35110863546e14f
SHA1c55d4cab561c5c48e60b3cea96e551876a9cdd1e
SHA256d46715920c961b496abbda0b31f8c09b8d50d26c958d216b1783a506448c16e5
SHA512dc79b708c5a3ea54e6a57639b13d8fa2cb2d3612082c79fda2e3f1264443dc36e06ffb723a2fb19821cdaadc84227d7fd82e98f8c4f9c92036329aecfcf8a0b8
-
Filesize
36KB
MD5ca7f779a661248b70eb1cc6c32f4b822
SHA1abb0fae8572fa10e95cf7ed0ed1f04cd66bca575
SHA2565d1ad60006df81b8ec78d72e04737085112309ecf2f9ca1b4b923460bace2bde
SHA51265ac361b95a96a8bc32c843e161bbcd0e7872de784af6a46337294630dc4697e2de8b7fe80bbdc0eea3fb7cfd07b3f9c203a28286977034a530de0efb64df292
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
858B
MD5c5bd6f1d9b56163fde815c2b2fa71327
SHA130a2b22ae8c42fdc457fe22c1e87aa7e9baec232
SHA25690f8d39aab1b485186e49e0a94c45027e53a832f0541298a752c96991ec5b03a
SHA5122bea0f77307002344322db9262615e0dfd818dd9ec081eeaa94d5e65909147fdaab6030edf90348998064be928725e23b0a0f59d04357717a6430b41cfe716ce
-
Filesize
2KB
MD5db395d29b30074e468dff1bfec7a6166
SHA18ca21e0768e6177e1f2cb2dcb07aed2dee69a027
SHA25617a9af9c1dcba15c38cf1d80f01b18524bb2eef94742e292b288dc29dba4c4d6
SHA51299af264773ba6b1afe22343478cc5c13807f5e78dfc9e86eb897facf90e66f78326ff30058bff10a182839188e1f6d52b0378052dfa39daf24ae70af343117f8
-
Filesize
2KB
MD5469e9903dd4d9767aa1e73fb05b9661f
SHA1eee3a221a22b72383de739e661a11887066d4ee3
SHA256a9e5721b335aa811d72d021fd04adfbbb16129e97113a6ead1128b315168e5de
SHA512cf9e82c83e3c5bdae67d2677e8bf54b8c596b334dd7e4607419fcf5c40dc6e352538b9eaa80064935baa5e085a8aaf4342fe0a918273edda9fea63884934f880
-
Filesize
856B
MD5d29effc252243f7893305a2dc89a08bf
SHA11fc299ebe362333bf12261d3d6139a9bdc341d6b
SHA25616fa8ace1392af3e52be952d98f3f15602250663da060d4554b3624057a2caa9
SHA512d782a15f10b447c8327e730ea6198e5d0c68c0cc5f4fe85995974633c9f3d152df7ba3989c74470f3a1811e26bc158973f14ef4b52a9e531788f11a1c914b2ab
-
Filesize
9KB
MD5d80a5a75f979fae2e8b5ab7c597c36c5
SHA1b47c17441a7ffbf306ae8ecbe8e4353d10b4e92e
SHA256fcaf2df8a4fd3ce1c1cc291970e1cd311faac80c37d40d5155aa75fe0cb877e4
SHA512698628af72d021d98a60d891793c1b6c1b82d9a74ab6c8f8aae8acceaa2134c8143ea707a3c47e12f1430b17df80809321e7b785b4f54028d3f0d750a659693b
-
Filesize
9KB
MD5edc5d2062bc8f21832dc41117dfb1586
SHA1e53520e027b0dded1814650de8a276adeff875aa
SHA2560a5a5866bd0ff23e9fb01b9391b4b7821ec808075f91d09fe13b0f4c2a09856b
SHA51218fe5cdf79933affcad72e145639c22d45882b7e73eba5bb8352e2cd8095c36b20b8de309b1194012bf65c274734e74ce6f9af9c7966db6baefed6032bb2105a
-
Filesize
11KB
MD54ec58e7bcee3a5cbd324587afecfafa2
SHA1787deda11cd880fc816f4a7d08c9bc4eb54f2a79
SHA256adab7b1b3e162e6ca62309aa21151d48b4092ff4d2d0fe28cdd95810bbe97b61
SHA512f5c1c48b745a6126db5292cb8bf60ad7da0d949beeea1f3f58e6d40b753046701c58752062fb313bfd3dcb55411eaf98c7be0c712c5bcd42b34c7df883b27e7c
-
Filesize
9KB
MD56657d09c184bec3f234228ab9c01a4b7
SHA1f1b9b3664785aebbc849a9b3c130561f48160a99
SHA256236031cddad2a3ea03fc516ff8184e09c8f12a6718a0c0917f4ca8980c242fdf
SHA5123f66973098f7fbf28f4f562fbee3c310de746b5fe2474aaec5bdba37d4e54eb25657fc8448fa7560f11facbf335aefffa54d5ca1868d953dd7d4ad12015d1c8a
-
Filesize
9KB
MD5ebdb39e1033a86acb2ba0bfd7025f126
SHA1bc6902439e0d84d2148d84fa6d26541522ab6173
SHA256048f92ce7b40d6ff714c245872fbc20a7a6364efcdb9829a663d35ea3824e23f
SHA512c6ebc7368251e1c7c38b5a497d6bdee31231571a23696af93190d950cf6b29af833d07dab020a77a18bea51b4717932334e52c95a27ad1236e6c6590a1e9fa29
-
Filesize
10KB
MD5be7785480ecbf97f1a510189740d5a40
SHA1dc25a147773cc8d34f33b0cbab4f8ec700caf8d5
SHA256578cb6548ceea3b6c506b75df1651db6d916107a13ad54929a7b54c7d10fd2ae
SHA5123759847b5fef956952d72b158b828f3157faaec767b7df011daca3eb7f07986baad74ad7aad2d3e5e7902cbec3bf67f6e9a14edbee9139aee5b4e66edac8035b
-
Filesize
15KB
MD59d2f7c01599c88b20ca07a2115985635
SHA18ae370950cb3d56acc2e6192b66aef78d5661247
SHA2562e5bf94251c5d56cf4084d8bbf9fe6c96171763652ddec1fba0d4f0bbf8a2353
SHA51293e70b92035f8adadc13b7bf28558c46758fa6934c5c913f832c7190f3cd02bc01df0c643eaad2eae28825b56b7fcc46c9ce4e83db1b642af58a8e478709ef58
-
Filesize
333B
MD578c723a0684b45dd4ca0c66ede746f17
SHA1ce89c48cf5b18c28929f190e5832b97b55a17ff5
SHA2567921259a420cf50c8c0b1b131bf1c2b11bcdb457a1d0bc331dfa021de00c2d06
SHA512de4c927a5ff2841be472a018d85d070f1b08f87154cd17c1f26ecf06947a0d21bbacd21ead6447245877a9a7f83af2812d98dfb3a3b77ac1b136a0f781945f15
-
Filesize
317B
MD50e750036d5e1c8d1b02516f0627608ab
SHA1a45be29143d441de37f32075706c20bbde5888c0
SHA256e4a76458519f6c2a9457be50b63e42a279121601bde619bba715fc2baea0d60c
SHA512904b132439f3e3cc4f99c40d9c57ba7aaef2e215d981e476547b1024a147144be675f975b627bb769cc0ada1cc0d58dd12a6e4d2ec02edbb395878505c573a0e
-
Filesize
5KB
MD5f013bd77f364a8d373f02a9ebaab5251
SHA1bae899f511935bdf9725d3e86703047644adc000
SHA256dc22914ffac7005d4246c8eb790cee5893bfd1ab1711f510a7f50308359ccf95
SHA512ea77d5d47a894b162da93f8a79de289c05260d0956f03821ab0376a5277d7521d146bf5bf209c03be021cff817dcef5c2b1abe3f29b45471a9e093da32772219
-
Filesize
348B
MD5a590c377d9be868ba2ffc4e5490c3160
SHA13c61f12dddced12dabd39b072220f2241548de75
SHA256bcf4e7327110e546d564ccff74dee316b5b96eb33d14b40e6e730f3c44b9eac4
SHA5121f4481d03155b9d38284fa1888b6f601ab4d19e8808bb072a552daee95b9d6a977ef98446bf5ea98ef23705cef8c3f712fe8e42e951187c39ce9a0bb53818e8e
-
Filesize
324B
MD5e768e0eea01039e599177e5e41f37fb4
SHA1b2a030626ddab48a164df6fdb302f451276d023e
SHA25619cb29ffcd41e9bb1a67498bcdf10103160a945589c8b4bdd79460c44b588b0f
SHA512b8a75b0728dcb13b95cdcd350ab7f10c395155b291facf1bc87c263730c47f3d99ee5163a7c18c7ef07763412122d71327ef44f0f7e55d495d8994b0ae551b23
-
Filesize
128KB
MD5d523f457a6b1f7800eaee3d2e3bc9624
SHA1ea0ada8d67104b915b7bbfed6f8786da43e0ed72
SHA256153f037de2f0697cde63e2b0aa3fbdb87ec7ce92c56b6b85968c5c57995616b7
SHA51253c477d16517585b0cf0b2d02414711f44ba2675f599b3fd2308ad95a2e6f68e5a64c44179f21836dcd6b7c0d72b73b8b012d03f803341cbb6acd058400780c0
-
Filesize
40KB
MD5bfcea99b412a1fb8228f19f5a00ceb7e
SHA1e585723b6b4bd63ac25e858a47bce9e080c35f5f
SHA2565a9a9f48d8f629a3638a3047394a9717f5b2b0bced019438ccd9bdfcd420c4f8
SHA512ba12f4a84e7c923d1b312a6c9cc11c8e8c99ed80c0dcb8c81f80686631f5e885bd22f905015ff48fd76661c3c0035e7b9eadbb1a184343e67174e44ddf9920c5
-
Filesize
8KB
MD528422dae372c79235dfd80c0ddd250ca
SHA100cd0130c8cdc967d224f62e26400eaa9d00d24a
SHA256efb12741ba8e4a92413a7c7d01dba5558a98b0ded968288821b6c9e2a55a9aee
SHA512af44847d269231cfffbbc9ceacf09af0aa0de5671bfafb7e393b66bc9019fd4f283515c094b548c912ef4605373ede341fb2f220383bd9e0419564b541bc87ff
-
Filesize
18KB
MD53d3259c9215a9d453ee1044745315549
SHA1bf61f09bfed58d7d31321574424055146a8c8016
SHA2569c1ddc4a9a98baca4f471a190c3a7d0b7edfd3128beb13200937e0d39c00618f
SHA512369450b435e811fa52ed679e07bbf3f80cad58ca7e42cc85bdc7496afa0739ec4b99f094ad1de53a1eb676443b1263b2d5403d198beeb680412bcce4e7f9435a
-
Filesize
317B
MD58455a3a7a7f447e42905d6045c082111
SHA112b066962922ad9d360d8b2f943bf1626c15018f
SHA256254b50e78ffec9432d6b8592d04de3877f9463d8bfc3d3baed2c217ca4c59cb2
SHA51200464e8cd64c74663480c4df95cbded80a77bb38446c27e03d4a532f0fa84324a0b4d0f968c0fc79fc1b3b9f54f2ce11c30eeca9a7cea6639b5e912888e9958b
-
Filesize
1KB
MD54e4b075687a5dfdbc1af9a97e7dbcd2a
SHA1bcfa230dc0ab3f42c63f02cab059f12807d6adc8
SHA256e92d25669210e02f6291ee604b99b41289e74362dab3811a8f2d171634662df5
SHA512c5e6bf4bd2dcff7b0feb5d7e7f7efa5a3f11c6b454ead3551eb7bf5be70e972326e24e4ed923fc54702e3e2357c6de465a5b33b013e6afcc9ed15e30050284a8
-
Filesize
335B
MD56a091d10af1d5182c7d64ac140350e33
SHA1dcbd1f406156d13f64e3c7881168d5059d9b3d3b
SHA256eca7e7005951070e8fd543ed8b5746f38aaa8d433f4cd6a40134a0f5b97d9332
SHA51251795cbbc6481ac642b735e1d10465e872333d2da5557df2812b69814d359079642e124503e30b20e3940b47aabc0886ad87476a57e3ca22247e741e98f9828c
-
Filesize
44KB
MD59dc76f42b019bb0399296426efcd5285
SHA195d8b70589ae8dabd1d6cade651f773b546b5b9a
SHA256d48fcf17f03048d7911dd5868ae2b7cd0cb21038b8cbf42efbc0bb11577f7908
SHA51208b73fd4f4150f0b3441eeada3931e9ae4cf4d3a2bfa42d95082bf8864834832db78f3599a7aef35f706a5a2ae30c647ebcb11fbe51b8163198a032f5f8fcbb1
-
Filesize
264KB
MD5f3ab04f982b4746cd8ba11c3d16bd494
SHA1995c01f10f2c092b65454e9e923d28e80bc211a8
SHA256239636bcc59c7f407cd943de7c298422e2c7007b22ed7b943eb367e0b05c7f86
SHA5129b442dadfd998f00e339608d29b3f760234d56690c393ab9a556260d0d8fecb12c451f793143c0024822853896f8e2cbeb68c6c2b273058a1a0fcc6d7e37072a
-
Filesize
4.0MB
MD5317885f45b03137b2dc896146c168034
SHA185b1db306931f4851840855a838e9eaf0ade9840
SHA256bff4c217a5054fe9d4555af90c09c9c14bbe16d7966ba194e83a90762ac56409
SHA5127d185295bebf4e464b57603e4c173ecb3d4e656fedd6a3845025e1c8d797e1990513ef88cc0ab20b8b16db0f430535faa52d6af4d3e77878b3d44076a445280d
-
Filesize
19KB
MD5e3eece69c822fdaa32704d883f61f9ba
SHA1c926041d6279e86688591c0709fea56aa0f852fe
SHA25602908ffb93522a338fb55ba4d602c43697e1021bffc5faab39e591b8bdb32166
SHA512d948a065beff7fc52eaafe8069ab0bb6a8dd16847495635c5b706e75c31d4e09873cb0a13a7fd23cd7e934b6243e2110287d053c7c0a8187ad8e41a44520c67b
-
Filesize
19KB
MD5371644ee151d4452b8b1f3c56525106a
SHA160127f3d8857ea9437d464ee26aa3acd738ecaec
SHA256e59f870252c3d8dc1665e1189d943eafc3023b09893387510b944722c9ac21ff
SHA5126484b1f2eb0a5cbe260fb4467922d1375f6ec446d821817f074e393ff00c04b73e7797bcfe7b803fd0458d79f6bdce3281122664a2093f2806b97ef445efc0ed
-
Filesize
19KB
MD5cbba9cab2fa99d9f1bb235f2340256c1
SHA10b49e2b46f99455cf4c4b35e73aa2016125cd945
SHA2568fdb284e288b180dc4261d0c8e6b73f74a3f3d56225eac421cb6a554494053de
SHA512344771d2079353703790befc95766a1e03fae7f0ed7f062a4c8ea4400d3f2cc33629cbc8ec05ab2d2f1452c87d523323cac8c40df2fd2dfcb27140d875c922b2
-
Filesize
14B
MD5ef48733031b712ca7027624fff3ab208
SHA1da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029
-
Filesize
195KB
MD52194d2a14a9c6887cc73656c6a75df6d
SHA16236f33f352939b76682d533397b28be421aa9b4
SHA256080697f4b96e4de610c30dba685448f4548579a27fd329dd2200ff065946ca13
SHA51213b300eb3083c2dc6ff98c2282dda4f7a1657761edfab7f81a701aa882db470ea96e1c46bcb4a8bfe9c7fa43543e4f77403526e9b3352b99d540ff1a021dc0c1
-
Filesize
200KB
MD5e9b489ee6c6f1385239b998e27114d66
SHA1dcefa11c5b395540435f54a6db3b988c9e3134af
SHA25665125b76869c19bfeccca1c7c3dc26b5f62d93f17c7a0aa7871bb2554b7f9598
SHA512cd96839d053d3cd8aa6932061dd9a7ef87c06d9ff7f5292d99898c1fec2b9108ee16c56e03c5b69793205df306491f671e8a8b14ef0c60b88a5419bb08e6fe03
-
Filesize
200KB
MD5342b145593e1aee6a283481ca0ba61bb
SHA15590bcc6c25b75059eba9bbde13b1deb855fe1b1
SHA256f5f9714580a2db1e9f7c1c1ddc978de1b136d57bf96c26b47ec2dca49dc7ae1b
SHA512211559606161b18f38582046e197cd1c30880c271d570bbb8e42917069f527d0ef1db2dabb9f9394582f8b0c892c2dead2c2775759b3815fce4c273a3b0d4789
-
Filesize
200KB
MD502d00e1d08330c6a402481e237250eb3
SHA11872486661c206bfad8a89e2b79f42dd307bcf73
SHA25668396141b64f0045821277f22c075c63de4e1a90920dffa6ae2efe2268c6f57a
SHA51248ec69cee56cb025785031a129148e11835bc35537fdb7cb42d429fe682d23a58cd58828619a35e48ffe5aefdffe9ec3af1b69fcbd9ef48a24372c86da8c0604
-
Filesize
200KB
MD5d81a458b2b63447bd1022f48cdd81357
SHA109f3a77daf1f3373ee381335d74699a85a6b67c3
SHA2569db340339b25d2f0b16750b7b9e21eae05f518fb850132d372cde9425e7b608e
SHA51239266b5c8fd1c8a8e9831df463745a5f4bac14ad72e7c201da2e3a13a7754400c822cba512d687df28b7a3df725ead41d7e7b2b4b17e3832c749bedf1ce54fe0
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
86B
MD5961e3604f228b0d10541ebf921500c86
SHA16e00570d9f78d9cfebe67d4da5efe546543949a7
SHA256f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed
SHA512535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472
-
Filesize
4KB
MD555783efbe47b027752f4f9a94fad5c1a
SHA11e107751059efff3546a8c56ce137e1699f29108
SHA256988521b29e144dbf4d83a97936d44479583ad8222f47e526f97919dda091e28f
SHA512a26bc6306a8b00cf139248e708b5b728b3368427eaa98d7bb555345a77e8be1958e2edb9168ce23dd3366b70f81450bec68aa01c9a69d6c48427e776f2eea9e8
-
Filesize
6KB
MD5b5a1f9dc73e2944a388a61411bdd8c70
SHA1dc9b20df3f3810c2e81a0c54dea385704ba8bef7
SHA256288100583f65a2b7acfc0c7e231c0e268c58d3067675543f627c01e82f6fd884
SHA512b9c8d71b5da00f2aff7847b9ec3bd8a588afeb525f47a0df235b52f7b2233edb3928a2c8e0b493f287c923cc52a340ad6fee99822595d6591df0e97870de92a8
-
Filesize
4KB
MD505450face243b3a7472407b999b03a72
SHA1ffd88af2e338ae606c444390f7eaaf5f4aef2cd9
SHA25695fe9d92512ff2318cc2520311ef9145b2cee01209ab0e1b6e45c7ce1d4d0e89
SHA512f4cbe30166aff20a226a7150d93a876873ba699d80d7e9f46f32a9b4753fa7966c3113a3124340b39ca67a13205463a413e740e541e742903e3f89af5a53ad3b
-
Filesize
223B
MD53273c140f038704be46c0c58634d6e13
SHA1418cb5829801b78174ab13e436ee4f3728dd352c
SHA2569acb34be178d17d2c8adadc6f21efe518f14210ca157cfe29e26d9c02dbba7f5
SHA512fff74d206ff68129d259981d6f307eabd00a4ed43205231f7978d7c6b369d25061bf179936223b95ba0c0c0308426df0d5c3421a34162e2320a01472f106bacc