Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.exe
Resource
win10v2004-20240802-en
General
-
Target
89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.exe
-
Size
4.8MB
-
MD5
9e69a054a4f8bd2955f38b5c6f1669f1
-
SHA1
a9c82ac9b649760ec9c31c8f631d59f1e3727410
-
SHA256
89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92
-
SHA512
37408bde6e6806a01caaeeab9d702735f71e60f4ec0078b377f46c7a11a6ebc834492d8244d8a087cb50a4c46c9c35fa66654ea2ca07b56b50ad5cd5cb737f3b
-
SSDEEP
49152:Akny1B/KCGZd0qgNEf16lhulJLirHJIZ/K0tDAy49uO7G6XSq4vFWVRxYOKKJY+l:Akny4WQtZ/K0tGOFWVRuLftCTx
Malware Config
Signatures
-
Executes dropped EXE 12 IoCs
pid Process 4724 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.tmp 3136 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.mm 4844 GOG.exe 1264 elevation_service.exe 1304 elevation_service.tmp 4908 elevation_service.mm 1564 GOG.exe 3276 chrmstp.exe 4604 chrmstp.tmp 2792 chrmstp.tmp 736 chrmstp.tmp 4612 chrmstp.tmp -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\GOG = "C:\\Windows\\GOG.exe" 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.mm Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GOG = "C:\\Windows\\GOG.exe" 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.mm Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\GOG = "C:\\Windows\\GOG.exe" GOG.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GOG = "C:\\Windows\\GOG.exe" GOG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\GOG = "C:\\Windows\\GOG.exe" elevation_service.mm Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunServices\GOG = "C:\\Windows\\GOG.exe" GOG.exe -
Enumerates connected drives 3 TTPs 6 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: chrmstp.exe File opened (read-only) \??\B: chrmstp.exe File opened (read-only) \??\A: 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.exe File opened (read-only) \??\B: 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.exe File opened (read-only) \??\A: elevation_service.exe File opened (read-only) \??\B: elevation_service.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe chrmstp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\IEContentService.exe chrmstp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoev.exe chrmstp.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe elevation_service.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe chrmstp.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe chrmstp.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe chrmstp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\policytool.exe elevation_service.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe chrmstp.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate32.exe chrmstp.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe chrmstp.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe chrmstp.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe chrmstp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SkypeSrv\SKYPESERVER.EXE chrmstp.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\FLTLDR.EXE chrmstp.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe elevation_service.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe chrmstp.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmid.exe chrmstp.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe chrmstp.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.exe File opened for modification C:\Program Files\7-Zip\7zG.exe elevation_service.exe File opened for modification C:\Program Files\Microsoft Office\root\Client\AppVLP.exe chrmstp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ORGCHART.EXE chrmstp.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\visicon.exe chrmstp.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\MSOHTMED.EXE chrmstp.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\dbcicons.exe chrmstp.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe elevation_service.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe chrmstp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\tnameserv.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe chrmstp.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe chrmstp.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe chrmstp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSREC.EXE chrmstp.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\klist.exe elevation_service.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\klist.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe chrmstp.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe chrmstp.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoia.exe chrmstp.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Wordconv.exe chrmstp.exe File opened for modification C:\Program Files\Crashpad\metadata chrmstp.tmp File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe chrmstp.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\GOG.exe GOG.exe File created C:\Windows\GOG.exe elevation_service.mm File created C:\Windows\GOG.exe GOG.exe File created C:\Windows\GOG.exe 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.mm File opened for modification C:\Windows\GOG.exe 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.mm -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chrmstp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.mm Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GOG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language elevation_service.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language elevation_service.mm Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GOG.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\GOG = "C:\\Windows\\GOG.exe" GOG.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133702648034953273" chrome.exe Key created \REGISTRY\USER\.DEFAULT\SoftWare\Microsoft\Windows\CurrentVersion\Run elevation_service.mm Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\GOG = "C:\\Windows\\GOG.exe" elevation_service.mm Key created \REGISTRY\USER\.DEFAULT\SoftWare\Microsoft\Windows\CurrentVersion\Run GOG.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\legend of mir2 GOG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\legend of mir2\WinX = "1" GOG.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ chrmstp.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\legend of mir2 GOG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\legend of mir2\WinX = "1" GOG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\legend of mir2\NowCount = "0" GOG.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4664 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.exe 4664 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.exe 4844 GOG.exe 4844 GOG.exe 4844 GOG.exe 4844 GOG.exe 4844 GOG.exe 4844 GOG.exe 4844 GOG.exe 4844 GOG.exe 4832 chrome.exe 4832 chrome.exe 4844 GOG.exe 4844 GOG.exe 4844 GOG.exe 4844 GOG.exe 4844 GOG.exe 4844 GOG.exe 4844 GOG.exe 4844 GOG.exe 1264 elevation_service.exe 1264 elevation_service.exe 1564 GOG.exe 1564 GOG.exe 1564 GOG.exe 1564 GOG.exe 1564 GOG.exe 1564 GOG.exe 1564 GOG.exe 1564 GOG.exe 4844 GOG.exe 4844 GOG.exe 4844 GOG.exe 4844 GOG.exe 4844 GOG.exe 4844 GOG.exe 4844 GOG.exe 4844 GOG.exe 1564 GOG.exe 1564 GOG.exe 4844 GOG.exe 4844 GOG.exe 1564 GOG.exe 4844 GOG.exe 4844 GOG.exe 1564 GOG.exe 4844 GOG.exe 1564 GOG.exe 4844 GOG.exe 1564 GOG.exe 4844 GOG.exe 1564 GOG.exe 4844 GOG.exe 1564 GOG.exe 4844 GOG.exe 1564 GOG.exe 4844 GOG.exe 1564 GOG.exe 4844 GOG.exe 4844 GOG.exe 1564 GOG.exe 1564 GOG.exe 4844 GOG.exe 4844 GOG.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe Token: SeShutdownPrivilege 4832 chrome.exe Token: SeCreatePagefilePrivilege 4832 chrome.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4832 chrome.exe 4832 chrome.exe 4832 chrome.exe 736 chrmstp.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4664 wrote to memory of 4724 4664 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.exe 90 PID 4664 wrote to memory of 4724 4664 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.exe 90 PID 4664 wrote to memory of 3136 4664 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.exe 91 PID 4664 wrote to memory of 3136 4664 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.exe 91 PID 4664 wrote to memory of 3136 4664 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.exe 91 PID 4724 wrote to memory of 4832 4724 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.tmp 93 PID 4724 wrote to memory of 4832 4724 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.tmp 93 PID 4832 wrote to memory of 2912 4832 chrome.exe 95 PID 4832 wrote to memory of 2912 4832 chrome.exe 95 PID 3136 wrote to memory of 4844 3136 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.mm 94 PID 3136 wrote to memory of 4844 3136 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.mm 94 PID 3136 wrote to memory of 4844 3136 89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.mm 94 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 3364 4832 chrome.exe 98 PID 4832 wrote to memory of 1112 4832 chrome.exe 99 PID 4832 wrote to memory of 1112 4832 chrome.exe 99 PID 4832 wrote to memory of 3584 4832 chrome.exe 100 PID 4832 wrote to memory of 3584 4832 chrome.exe 100 PID 4832 wrote to memory of 3584 4832 chrome.exe 100 PID 4832 wrote to memory of 3584 4832 chrome.exe 100 PID 4832 wrote to memory of 3584 4832 chrome.exe 100 PID 4832 wrote to memory of 3584 4832 chrome.exe 100 PID 4832 wrote to memory of 3584 4832 chrome.exe 100 PID 4832 wrote to memory of 3584 4832 chrome.exe 100 PID 4832 wrote to memory of 3584 4832 chrome.exe 100 PID 4832 wrote to memory of 3584 4832 chrome.exe 100 PID 4832 wrote to memory of 3584 4832 chrome.exe 100 PID 4832 wrote to memory of 3584 4832 chrome.exe 100 PID 4832 wrote to memory of 3584 4832 chrome.exe 100 PID 4832 wrote to memory of 3584 4832 chrome.exe 100 PID 4832 wrote to memory of 3584 4832 chrome.exe 100 PID 4832 wrote to memory of 3584 4832 chrome.exe 100 PID 4832 wrote to memory of 3584 4832 chrome.exe 100 PID 4832 wrote to memory of 3584 4832 chrome.exe 100 PID 4832 wrote to memory of 3584 4832 chrome.exe 100 PID 4832 wrote to memory of 3584 4832 chrome.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.exe"C:\Users\Admin\AppData\Local\Temp\89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.tmpC:\Users\Admin\AppData\Local\Temp\89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.tmp2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --force-first-run3⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbef1ccc40,0x7ffbef1ccc4c,0x7ffbef1ccc584⤵PID:2912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1892,i,8310109042296899018,10064390005914416679,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1888 /prefetch:24⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,8310109042296899018,10064390005914416679,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2184 /prefetch:34⤵PID:1112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,8310109042296899018,10064390005914416679,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2460 /prefetch:84⤵PID:3584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,8310109042296899018,10064390005914416679,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3172 /prefetch:14⤵PID:1168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,8310109042296899018,10064390005914416679,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3196 /prefetch:14⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4532,i,8310109042296899018,10064390005914416679,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4508 /prefetch:14⤵PID:2380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4808,i,8310109042296899018,10064390005914416679,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4828 /prefetch:84⤵PID:4060
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings4⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3276 -
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.tmp"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.tmp" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings5⤵
- Executes dropped EXE
PID:4604 -
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.tmp"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.tmp" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x268,0x26c,0x270,0x244,0x274,0x7ff7f6354698,0x7ff7f63546a4,0x7ff7f63546b06⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2792
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.tmp"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.tmp" --system-level --verbose-logging --installerdata="C:\Program Files\Google\Chrome\Application\initial_preferences" --create-shortcuts=1 --install-level=06⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:736 -
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.tmp"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.tmp" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x268,0x26c,0x270,0x244,0x274,0x7ff7f6354698,0x7ff7f63546a4,0x7ff7f63546b07⤵
- Executes dropped EXE
PID:4612
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4724,i,8310109042296899018,10064390005914416679,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4716 /prefetch:84⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=728,i,8310109042296899018,10064390005914416679,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5040 /prefetch:84⤵PID:1796
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.mmC:\Users\Admin\AppData\Local\Temp\89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.mm /zhj2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\GOG.exeC:\Windows\GOG.exe /zhj3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1264 -
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.tmp"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.tmp"2⤵
- Executes dropped EXE
PID:1304
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.mm"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.mm" /zhj2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:4908 -
C:\Windows\GOG.exeC:\Windows\GOG.exe /zhj3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4308,i,15436195446242760253,4000484513008731869,262144 --variations-seed-version --mojo-platform-channel-handle=3484 /prefetch:81⤵PID:1664
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2080
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD566e109ed41b1e7d8c631f61560162496
SHA152532aa4a5cced9641527e3c004e1d8e32bc905f
SHA2560997c9139adefa7d1046878686d50710fe41e61bced189c300e0cc33a17236b6
SHA51243468488028a0f88d06f8b8888281651ca0777ff231b082e5cc7caf18db69daf6f3b2b35ef92d08f67f7ee92935561dc5aff439c9d06c343c898e56733c65416
-
Filesize
1.4MB
MD5a917bf43cda658e63ff843aa857cb825
SHA1186752a6088faa5791a73ae87f4e3e7e7e8ace9c
SHA2564443b3d0500384b85a49cbda8a6b77c39f13aecd155a5dc4a18cfc822e4f8214
SHA512ac0add324471b976978f7457bdefaca915cda1067b2986c87132ad302d65162b93ab43b3430b236235b30a9a080ffd338542b9f137d8d4149640961eb5809c14
-
Filesize
1.2MB
MD5f68533525e87c0871b70b82025b63fe7
SHA1ec19ae4710aebbc402a19866b21b6f0f5feee91e
SHA2567c8e641351c8b0b6fbf4539b91ac42a78815d753aa3429f1ddae7494d55165ae
SHA512a39c7ea54cf47f47a02f97c63982fde16bdf3603ddb9622fadd064523906beea6ecf63cc8f98f1d60667e8dcc4faaf08a2c2f1f3f609b4af6c8ea7396c2f340b
-
Filesize
555KB
MD56e5a5826c71d578dd89278d63792673e
SHA1395fe63f1158935965f4bac06fc95b01db519b5f
SHA256273449b1d87e598aaaffb04bc7996b2cd27eee7e5d301d513f414398886d9941
SHA5124da57d7cb904000565fa9fff115dba43895f962994dd1ca5f4a8f0fe598564f92c52a2e3ff196fb34916187c7034d48b8fcd5b9f875b3be1723916d16b558186
-
Filesize
823KB
MD5773da47a3cd30355e54a522a23311d2c
SHA1fb00bc6e8581f17bf629929d43dbbc94ffc2c193
SHA256499fa1eedc845f0e8f0d6ceb9a011697ae3da7a9e5fdc83886975586ef60b869
SHA512fbca107e42c829bced4f87ed962bde839c7bcb8f7bfbb7af938abcad802221e39508fc7433993ed929fa4bb139aac35c376b95af997baf8af26ed85f6b1884e5
-
Filesize
589KB
MD5817fab17bc53d7392005cc42a33e8a5c
SHA1a0965fee7322fdd790f8bdf41632daa6b2d2ed74
SHA25619a9d05f7ddd0c0aa8fd5083434eb5a0bcb5cf6cd46bbe1c66e4b33e7279f77e
SHA5123284cfc9ef94b08599a163d6d9435d6a970310a6762c9cb7de294e383942c0ce1c9d96685d6564106e5d19b7f48127dd9450c4a6be242edcd18eb52a9ebe16d5
-
Filesize
900KB
MD52beb13dc0c7028582317e06d3b1a4115
SHA19667bbb57a4cb9810de4abed6166cb60c80fbe88
SHA256255063db8d6c3c1cdcf5e1a43e4cacd82ac41c8f6cc37c96ddeaafef0c401fb4
SHA512616bfd1faa94e052d3aaaae225b13f306df81b4ec2beed46ddef887dff1476fefcd83fbbbbc114e3fbf8468b6812926b13a2a8f3c93f32ecf3deab98137f1d5b
-
Filesize
637KB
MD58215d1cd7c47a6cecd59efaf0c377d0d
SHA18d7290be623f2417ef2882786aff416ec70fe507
SHA256591ceee82cda26c86b13058d25eb36226dc4e92fb5c7384ef80032659ade7392
SHA512322eab99d332bf384b1c3084fb6bc7c4f5af4fb60752b45c39216b2b344e0d8cb56c35f2cfe2e47fc564872296354c1ff4f4b90816ac5319fbef8f13ff539c82
-
Filesize
4.0MB
MD570d3d83642c32f2434b1d7de6458d05b
SHA163b34676c8b7652af010f30f900e2dcbc95a0ab1
SHA2565a37e0219828126c70be497f77dc498b856c3fa62fbfeb109448f98cdca58535
SHA512656ba2fcecb0a4b5012adbed917cee121ccd7b2890b7bc85ce55c7b224951a5fbb355f6d929c47633f95eb5836451149e1d29bd164e386d12c8171c932b43d06
-
Filesize
4.6MB
MD5f0f8822aefea8cc5dbad33a915244647
SHA1430e8af85de77930873ad32c82a0a73a58d4b74c
SHA256655cb2ece7df1be107f34d82184c111eb6359fbc7cc774031b84076a8dad27b6
SHA5125629ca02a8b830e1441935fd3a04e282c887c12611a8985cb97d103067848694c0c069bc443b53364c30245aef37caa2d349abf69b4b689e06fa297015d49069
-
Filesize
1.9MB
MD5b8cf4074cb8a96dc415f904ed2411aa8
SHA1bb391b9789b097b132d11037c964e159654c9f28
SHA256c90b47465b115e76cf11d3de6d22bdaf4bc395375a1df6c96ee42b3627bfeb58
SHA5123e46d8a675d22bcd62bf3d624dfc0d4fbbebbc6c8c602b3a472a72935794bd74b8191772040b7f0e32159868ece05c85f409b0af87b08854c58d107b9ff73253
-
Filesize
2.1MB
MD5eef5d2d272d6bf4d857762b930bb5171
SHA1e2fb31d4fc9f2470edd7dfb2a854f772eed42067
SHA2561c56e2241ee5fb9704941a762e042fac07ad44dcc71942da5d07a8e266cf24f7
SHA512d1e9e451a198546378ccb906b3ccb0def57abf2710a7ca3b83864877666b2c2ed47727f29ac6ac47065c2f2c6ad581521c825f9e83b9f14a7b5d62b0018af439
-
Filesize
1.6MB
MD5b87d2e23c5eedf830fdd58858782507b
SHA177316b7bdd0a4f8c242299ba2f345c77e2bc41e2
SHA2560bf621c252d90bc29e65b6cce86e5130721412e4cd133b07a6341f6d64b76f1e
SHA512233302337434bb1c3b280f8a9cdcdecedbf4eb867f50d636192597ad09a4713a7ca2e3f7eca84fdd1210adaec9033f16738dbbf7901c177c858db35f6e9738cc
-
Filesize
1.8MB
MD576054ed18c15904484b5dc4dc273fac8
SHA121972210393360ca08edb3666a6476df66458ce3
SHA256e9c7ae73a105bdbd8b48d535d697167cd7cbea59ae5cd7d20ec49b64d33e25f9
SHA5125b5d6434d2a1960e305223270ad72ad635127b295c5965e33f69b51f3ada7860f5cbc9659c2cdf201616379edb12625568b295bdfc52ad5375b39d38a1583e5a
-
Filesize
1.6MB
MD56c3bafdddf5aaa734cdd3c0ec09cc723
SHA1e998910ea172fc88af7d202b1f3ab1d26775fb2f
SHA2569c4002692494d3207ab049ec6decf9254fe9ecbfff51d8e802f3a100a068e983
SHA51201a08ed6a791bb7263b45b39574cf1c474ecae226e3f5de7da908393afb49a24792a1d4270327c87104e38a575470140dba2c2641eef6ed4c222f7002401543f
-
Filesize
564KB
MD5d6682f401131aaa49fffae2af55007f4
SHA10488dcaded69203c5cad7b19fb0639a299630da8
SHA256e7a7f485c5e921c5d77f64f79baebbbe0996703a446ec7159c688f7aa117cda2
SHA512d19b94f35fa12df0dec79d5718f0a6227e531ddb381f63ef4769f8a69090cb0f02f69915f3dd5c50c98b616df609463cf89ca57cfd563644d94464f311ccef69
-
Filesize
564KB
MD5bcc323371e230005b3bdaad39e64075f
SHA17cc88c242173eb781c34155b35f3de4567de944a
SHA25621341cd71f3e58fdfc15ffff22ce1102ad5338e4fe97397120f1c1f29c29d20f
SHA51216273d8a5beae8bf7e6203f296cbfa504e3741e5a1dd4f31286b4669de39665cab5efa3674a9b59d421ac2493804a047032365bbf28e666b19a4e8fb2746237e
-
Filesize
564KB
MD5178fc96776156f797c8db1057c68d6b4
SHA191a713b07b5affea2cb67b1dcfde6d23abc37bed
SHA256d6eb3c817fdcecc86464453f4e7e3d89747095c2c09c81cd1dbcbf96f39ea64f
SHA51253ff34109c702e43e9841702abca08f4b8e2a945c23aace208662ceb3770b4088f88bc8c6ee03482340470360c9508ee5bc0616d5fa9f7926eca1c8ec54c0d4b
-
Filesize
585KB
MD591c40ec03fc891015eb4c62c3d8e6eec
SHA19ea91fd525ff0b17ee58f3096d50574c1409c075
SHA256ef1a375579c8419e2d078a401beb132aff833ef259761bcc1d46b085bf71ea6e
SHA51218c7929fe1e5f25dc8dd382db4020a1119cff849358c8751c2aa7f1eac9225b6feb851d0936a674ee837f7e3a7bb2722d3700fcedc7a883f81323cf38b38439c
-
Filesize
564KB
MD58b8a7954900bad9b5883f4f6e61bbb6b
SHA144f5de12b59a4effc219ace2304e550b39cd1bfa
SHA2564c3ec134afca8d4c8df1d1f7f1fbff5e2a035f53ba974148be53162eb50e7fa6
SHA512d9b8d4246767a6abc4b8cd550e9257db81e7de00b0f8f5463920660631b97b25e7943e959de0b4f9ad15bccb54ec558a89912793478ce5dc955ce80e32b1e0e9
-
Filesize
564KB
MD52ca281fd4579246c7ef50accf6d57ecb
SHA1cb9d5525306918238ee8f1cb213fc547e0a44749
SHA256229a81e7601649a2d3ba07c8cbf7a6752fa7bd81ec0664427ff70513f4efdca4
SHA5125e39d37d452cca17bb6618b505c1227752c72c08fa8d30a2d3c9941da46f84bbe60a22b72e28732e2504d1ac7293d48936cc1cee0b465c3889d09f3d5bca9a62
-
Filesize
564KB
MD59413e331efbf71a27b125e5f6ced8b75
SHA1e22dd26c8aae6632d3d9421167c8f743a348213a
SHA256dfc737899f4d69cac70f7ae1fba61015a4cf69c73aee13f3ea43ad7e236c6275
SHA512fc4264648f55bf15eabc3729d343b7d671dd6086ba26833dd81a492832b2e1c717843a058b4c1a9ef91c29346dcbb24f1bdabb257599de0f903d9a4def90f257
-
Filesize
564KB
MD51a2c38a028cd75075f0fe1e46cbad872
SHA15035c70c491af627316618a62dd1fc91011a6b8d
SHA25665d03837a2b76efa27f6b998cf757e2715516cf48297a4307629930da8fffb9f
SHA512152663a8bcfdda55585a126d81e675170591165449d3f7a9d0a3ec7cdf9d13c9b72f7361df6f3ce5098793e47d2404b12081c8f77e731ffc3fadb398767fabfd
-
Filesize
564KB
MD58edd0b5e4e9455ca1e485797499af8cc
SHA109ad8adfab5bec3ef0977289e2e55c0fd6f41052
SHA2562911e2629d5e5e7453a710325766cbd47d31cd6f1d78b06f817063137c51aa2f
SHA5121e6c2fd02ae2b35a94617dd22ea0a1063685b96e1f8a7bb0422b42b8f6529b37fe94da7a80b2ae895b89e28f39cab2679bc3b472bc126003e82441074ea86b40
-
Filesize
702KB
MD51560860c0ab7835619fc4cdc45f705a1
SHA1cff50d9eb7c5b70cf760b9cb5a0636d2c2578355
SHA256fa14c951a39ef3cc70d0ab28b26cba0f5de84ca67df53177a90a91bc921d9b22
SHA512f86d54faa8a0f27eb447bd6acf4767428c5bbe56f3bba2bb3b4970c7314d4546b343a037bb094aa815e3dbd03628fd5293c6edb47257d2a6f35a1e02dfee8f7f
-
Filesize
564KB
MD587f8adb00076bce53b2589cac0d59efa
SHA106c2326ac519ee51a5a2895c6cb1c16fe52858b1
SHA256fcba6310e361b652f2589e0f2af6ea79c307d5baac9eff7b37245fc8db3f5c10
SHA5128b16a08920235d3d5a8c0410936ef2c5ea7f7c2839d78a36e1ff3a492ceb85858c4180d9436e4320249a09861e02e07718215ddcba257059424b2559346ecb3f
-
Filesize
564KB
MD5f1977a38c495f5dbb5f99112a5ce42d1
SHA12db33bda1a0407eeb63dfd7b1813e91063811f64
SHA256c2a6fa7ec49ebd4dc4a5797683a8c8daed97d9532fdf5e4ec5c98618ac36717f
SHA5126cef4d952d9c1c2687a8208bd1f70e2a9b8452ed18990c761d9093efb3e3a974f7511e9170765154214e2457088896f3aeb3679922fa387c909e4d1f80e01054
-
Filesize
702KB
MD54258206534de8b06475757bf1d1b83b7
SHA1c4f8da98f371def4e764a96d4c928e01db61ffe9
SHA256959cd53e2858e131f7b1d72adda5d760444c1ea299840e5247c7b5e7c3c47a65
SHA512d19702e4d219e4bbe3fd6d10da102494a163be28160dd0a44e9056ee29f638375a3b0527a150cfb6549cc1bb375d49aa1e4a8c284aa59455e7abb81581d82fa2
-
Filesize
826KB
MD56e3b57c3778405aae880b1f3f4c2f466
SHA1350cffebf77ae0d949be3f3f0f96c86351c0eb94
SHA2562746bce37d4540e743c1af4bb1179b1dfd724531a1131dd9dd98aaeda9f42051
SHA512acc12bee7d847a6648206ef675a1cbca94e5b761c217df749edef7ad34ae9178aee5bf79e3e2a6bf08d6a734c6e6c2caf3558328d4fe32e8448a8ba8fe616d2c
-
Filesize
1006KB
MD5456500e601ee7e266cda52b89ef50a8e
SHA1c5276b1e549fb0941dc7edf88cb3a5a74e52ac78
SHA2563353756d34d056ad4ea99388a44d1aa530c50b3ed062c838286ccbe41a997bab
SHA51258220ca20abc7c6d96071634c62a91c28dce5b10c5707c7162f790eab01319f827a3f810a96580b3564e2e8abf4421748e366b562bac2cd31eaddbc5f6056750
-
Filesize
564KB
MD583f574fe5ceb178fdf93862e816ecfc9
SHA1914b35bab2bf81b7759966980fc8b9f866785737
SHA256715e4a2b746bd1d04c1889756aee98d018d1cbe9c732302b312cf2d5625e8feb
SHA5120fe131662c46e6eaa57f4591025297b029a5007d5238907a82e1434710ed6dfac882dfda854c59a8d3ca58923e1be277527e039005aac2306753162557fa3688
-
Filesize
564KB
MD5381c7f945c6178ca553e80e5cd674cbe
SHA18b0feefc7bf8c4a9c5939763470a2be77746d887
SHA2563a4e47203fff2c254b6b6242c5b6617bac6fad79bcd0983898cf145393e6f859
SHA5121430a6d19ee4e327e9f0c16765047a5d024e848a8dbd117e1b218c7e01b6b3b234599a3d537cc4f10419e32e731408d4f34c7381f92b056405421bf8d2dbcc61
-
Filesize
564KB
MD5b3c635b6fe3fc829949b363b6a7702d8
SHA103466c7fa5714b1034c1ea4454d202d7dcdf4987
SHA256cfcff69aaed3e94db62540d71049f02ebad248df8307a30c90b5ffeb0e01f1dd
SHA5127f6314efe546e0476e3e1871ad4fdb330a2f074a5153b582976addda01de9e4bc0b965bd2b321a5bb0f63a38dc1478f1b65046b2c696daaefd97088d21ee2a8c
-
Filesize
564KB
MD5994428a35b05049264638f291107b5d2
SHA1ba169cc69dae335eb617a785dcd81e9e3d2d9d5d
SHA256f5398feda99fb1b65a77f60d43ca0961a1663864ce71c3f1cec1e2f3174d9302
SHA512cd0e9de5ef64812dcca77eb5c600c3d828ba3e275f7c832a94469fdd29ebdc0a8fc5c2fbfdcba055bfc16e0c9af1503de0593e6e20a25c40eea8cdbcb63b4562
-
Filesize
564KB
MD55c26d136de3446ba463a04e0d4ac46eb
SHA17f58ed5404dc3a0686ddccd847a29d8b847041ac
SHA256d4f13242243142b36f6c1c0f3632f4e2067a21bc0e3835394671d289fbefe758
SHA5123123288f87795ae94ee657ea6fed736e9a99ab708cd06db9c9193cb6dda89d2309b7ada22b554809044c6563b8d3dc0c049f5849f095f05298de97b448cb3ec0
-
Filesize
564KB
MD514d9299c0a59fb027d631d611d223417
SHA1fa556581a3ad77707358cdf17eb179d871de01e0
SHA256d8dcca3011e9a52e0bd32a278cd4eed9a05cc92da1956ad1af18c14d5a084ec7
SHA512999eddf84fc9967d7328db1a3e14d2a3c95af408b56fbf14a8185f7efaa3a944e46ffa2d29ad2ec443018596b4183b7a6f9448b1e155c8d71b71f44d55373c69
-
Filesize
564KB
MD5c5abcf60fbbd726e1a45170a9e1c62d1
SHA150d5cd6314165ac1a0c7346acc171482ac806381
SHA256768644b1c1953a5c5278f0bf28f4e004179402895490a083001ba436196758b9
SHA512460f8fa876ec573eef591303a377f997b9ea218bfde80105744a740bcfe6cbbaeacc3ff16b133af7e82ce01264f0dfd95b6ec21c558bd57e1327cc6eaa277605
-
Filesize
564KB
MD570b2c6ad2f22a1be4f3db4b958977ae4
SHA1ebc2ec0b2975fe16074186022cfdfc3426e4a7d1
SHA256e12ad897c5945ade7352eef93664d03d19469ef3100bd27ca81f3cc588fa549d
SHA512e19446e12ffc8c3e829bc5016dbf672276b43483fb0ad1051e111391b31e7d17c19010608d1e42ec24c105106e9fa4c565879cc612f33ae67b83aefe2b64bb09
-
Filesize
564KB
MD5d71d7d3121d10a69f0567ee949acc302
SHA175f2f9ab660c6ea5d1e5a56f3af329649be51720
SHA256a4856321288d7ff4422c965cc77d8b019f7b0ba774cbc5f332c3d7297cbc4d96
SHA512b93962b6799cc60c947e69e0f15b8d58bbaa2f9c064a1d006e04aab8cf436b071bfe55f0929dd6770a5e1e820d38db8ae52f1b2b3f5b5d96f9308f15cc29e603
-
Filesize
564KB
MD521362dd5dcd3a9f1f46f375402affef0
SHA1772c410cb31a6c6c76cc3b3c29e410c2b0ba045f
SHA25651892f1b5f57b61e6a45644c42a3befb268e4b7c01124cffb880aaeba3cc4de7
SHA5127f95dff262ac7ecf03d9d4b08a850c9717337d94af83f276ccb722c609a9f03f8e039a8e8cff58040949a7136722d168732c16cd4422b3108e19a6e6e0c7c5be
-
Filesize
564KB
MD5ae1ebcae178b9464b4bf826e9c9c5ebb
SHA1fe603e34ee065c6f04c18dbb422939465993300a
SHA256fceb1965f0785569ca82a37f635a8d3d24c3a33e231b94ec87f475c4ac68b7cc
SHA512663a2f3969b1fb229c4c461cfbd91ac9c787fb30b62331de5a0a8b4527bd302863153ade90a7bcc9a0e537c8f913f1dbc75bb47312c8fcdf951b0e3e8e6d141b
-
Filesize
564KB
MD5187cea38a0d52fa37f1d5210a1668842
SHA19aabde5c639c68f24d3cd98e1adc1573178dd0a8
SHA2563d1f680ae91fe208f11e061c86ccfc29f40f220c1f5713c2513e51a1fc68232b
SHA512eaabbd7b484e47ac616d7a01c63f91023ed9798041935a94072938d72a446e82a64ed3df94c081b66ecc1cc0aa8a6a5b955e609bcf9d58fa61cb615d5e91861c
-
Filesize
564KB
MD5a627c4e1adcfe3ba817caf5279dcb83c
SHA1ad35a032d6b887178bd53dd907499fa494a900a7
SHA25663ed370b09c190c658ba9c302265f2ac104a16bfcaf90bcb7ab67217c8033bfb
SHA512b67ec1c3c0f907f9f7b1e0c6f45898d0601ea0053ec5837b325f6e3b70643928bf99293a2e3ba137a44079c31f211d6a44ca605173f7b30f1442364110c057b5
-
Filesize
564KB
MD550d2ac4a9b6a659f5cd847c7450c5db7
SHA179281be18c4a8bb1023c1c7d60b68a3a94f93e52
SHA2560410c5e502fde244d0c5ebd418d1e2b3e47988d5299b66bd982312ce790ef8ed
SHA512d81eb91cb9212b9277e8245554cf931b2f51dbe3ac59118eea6bbed86f3034f55fa6903b897e010bc5e1805ac2427ebf125bf935761f987fed27d012ac696547
-
Filesize
564KB
MD52cd87e2de7acfaa4317b3cf3627e1a31
SHA1f63d0147ba81fcf9d584f6d5b1e7103231b3f232
SHA2568e4042657e67b8f78c4bdb360b6e6ae8e4e8206149ec1b803f040dfca2a0d89a
SHA5122b0a8dddb488983770da85c4e30af42050267cad3aade64b100bdb4e0801b115d6fbe698aa5fece8b9240112f7489f71d464c6c9a6e0a7c350b46a9e94f20ff0
-
Filesize
564KB
MD536e4eecc0550e9ae9c436fc988ab78cb
SHA15d6de637af62a6d08cf8838abd38ae6ffecb2d11
SHA256304a099ea4160f4314ff04b10e7a83d1e8289803f718c3b80b93da92cf13d15d
SHA51202bac4ec6f369f3f1cba7238494384d20c599e4f35eea10349b78b3b314156da8ae29f0084a95f1bfefbcaa1467a77c681d0697670d681ffdec57c7f3413e7d2
-
Filesize
564KB
MD575b8a24bfc05c5dda05a0e49662cd5c3
SHA14822e67151c6f513048559d62327b7b0c20f7a29
SHA2569c9787812c7b3757eeb654c1040d6cb139903d5f12bef2fb3fca13cf85242f80
SHA5129234691898105f38694a16c2e6de2b8f966093c0fcd9c74e59cfb03570e680a1ec6148b0a94fd609bd90201475b93a7bd0921fc6968c1dea4c43d6de99915bdf
-
Filesize
685KB
MD5c906708893e7c4cd6ec1d4d04d1904f8
SHA146fe834997e0805e656eccf6d007745c2604e8f1
SHA2567703a0c0e5c41766694b74dfbe22ca68af64ca8542545f24caca60b8eb3587ca
SHA51219712f1ccd2ffd7b738025c0cd989f4342e5b03ca12dc205a4d63678c60cbae884d0b712f920bbfb1f1eca74c587fdc5511503ba93db4048611cbae774f948e8
-
Filesize
597KB
MD5211360b2bc41956187ac434cad5b1464
SHA1e222faf0f2d3e2fb9d87298a8949928614c9e34d
SHA256725193f2d95089b29008bc81dbf846d6218105501a48d04d9c84c1103215cfc5
SHA5124c54ea3a555bee7989f1a9057873457ad4c374605ab2ba8ad17dfbaf5af945fd9baf8c21029242ebf4b2619c7b89d669136e355598f01ea9a5fb3829253bdc22
-
Filesize
605KB
MD5b88b5f2e3ad2d85208d8d6cdde410145
SHA1d20a774420688f5b9259fc06860a68395b1bac60
SHA25603b4768c355a5ca1ce5ec14d963f6d97e76700444bc2ff689f6bce5ec12982a1
SHA512d98eca30b9b644063f00822153741ffb1d1489d7c5d0e82b4c6af75d2d68036c75391113361a55851c388ac6871ae65662e096850bab46cd8855003050901c7a
-
Filesize
605KB
MD5850f0cf62e2055295c6e59f7e6217af8
SHA1a4323a0cfe6e919e02c10159a217cb06c99464f3
SHA2567aa9e3c9f1701695ed287850cb6cf90abf5f76fac67a12427218fe75b24ba954
SHA512a1098b94bd7e05dac2bb6e4a24f135339d1a03125b47e7868c8fe8cd3346854e9e0ad8126b340772fa52d451fb421e7b68811db73f5c55c5042fe40790cac10a
-
Filesize
649B
MD5887312fbbae3aeb6ce83e936cacb267b
SHA18016417446d3f6951c0584700e80e90d905b79e4
SHA256d0fa2c2bc2b3649346410d340288e0c9d25718f1d8455409ee58b4c8cbc81346
SHA5126e94bbd388e0153da90a4b8fa504b64f8e2c46ff94ad9f8a29b2cd0232e02d94a522d65f098f839408d3c5da46027600d7ef8df35324285e65179aa028e79759
-
Filesize
192KB
MD5a8cf54419129b874864cf206392ece0f
SHA12d8f78e5d6951faedba3257d5794227f34c50967
SHA256b8a7649c907c010db609d7143f3f0601a385b9cf803f4b0bddb449c41151cc1f
SHA51202a77857be5123636fdc44791f6cf7a4532fa53e34576be7f6ab21da51ef400fc138d7dda6a2880b2b42ddb22a803a1897e4f95ea3479487af61a199c7929a8c
-
Filesize
1KB
MD53c7dbed325ab18fe3a6ca3aabbce932b
SHA1a1dd7988515a8503330be17b08fff6f1e0aca5da
SHA256057eb3a4bf2518c5f708c58739417f77e4a045da46c4c10227654b4b316a1733
SHA512453f6c2cc2e693679db54245111adeb6f46c8cd00ca291b64db1e2dd42a3ca25cfdfec007d3609e39fde113bee72eff1ea7c44821cdb6bce33b31ed0fc7f0914
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD5a9e71a05dfc012fb305f7e175981f5ce
SHA12eb33816eca10d94b81a6276fecc74c4e95a15c5
SHA2564039152a15c57dfb4a005ab68e2c4a1c898d44398c76d130081277d2fa881bcc
SHA5125dafc58521a75cb9163b3577f4c676ee88a692d342aa5e6635ea44065ab21d677dc7e7bd3292df03f05a1397c40bee510bd240c72ebe0635b8db577a6c377fa7
-
Filesize
8KB
MD5f78e86a6ad41de0ce3ae3474c8f643bc
SHA1339357808ca5641b8a7890f26e690d79ed7c4fb8
SHA256c31f34beacc58bfe00ef9c993326f86c491c4ade7dc3adfc6bcdaf399fe4e5d1
SHA51251020c32926e0c52a253016eed3cef8dfc6a8450e357bbee9b44fbcc7113b1cf335ccb50432ffc3bfd2a0d44ff1a44fa5658ac73f47b84e157e7aa4d6ddc2ac1
-
Filesize
8KB
MD52a89fbe001d1434714734a119d021eea
SHA19ddbdf9831859180b98ca0953177e091fb2edf71
SHA256bcefd052f2880b98aa143dd12c7ecfbd7a7c24eba9b5e934797f38eae25296b4
SHA512c885b86329eeb421771dd5792dbec650835676e40f93a6cd57c8a5ff814e366f240eae1a85b1771c8569a528a9c6350bed442f9c31064474d073fa4cebffc92b
-
Filesize
8KB
MD50079a8c3a283f21fce8e42a0d39c4dc9
SHA11f13617461830bb9aedcafdc2abb13167c4eaaa1
SHA256076d762faec4d5f7697dde367dc564d9774a18799f29f1261f3d089ad61cac9d
SHA512082d2b499171576ee30aa7d0d85950a705e647f4d87f3cce9f92be75562f491f6101c5f08429eac9615c5afe26416ab9840e067eb358e4c483623b605ef84a98
-
Filesize
8KB
MD5f5608559f08d9969cf45cbf110f50e1d
SHA1470208acc6631312d169c271504a0a442ccbcefa
SHA25632bd4bf2b13a671048065450ffaace9aed606c82a4ddc24f4135399bd6f619dd
SHA5120b30aa4af8f0adc62ce8762619f12e133069780f2eca11761d9c63db22d9d7f284345dfe5ffffa1a00719a55b13ce7d469152e7bd6c288632987443befc5102a
-
Filesize
1KB
MD5ff7c98ffddcec6a9ef665790cb07fd18
SHA1889b8ee97ca86a7fbbce53983c65870f91d33bee
SHA25689d2f6c02c6a429492c59038301f756138620f64ffdb9b523cab2d1d42eb4b92
SHA5121f84f42966b3f86fc7b03652e5faa084ef7a481d5f2e39939aa109bf59f8ca8fcb091f149a0cabaceeafa3d9d1edd4b65354afa1b24ca889ec2986a88b397d8b
-
Filesize
15KB
MD54c9bfa44454188cae2963dcf4d22f98e
SHA1b7d1f2068bf3c86f5c663c9c1bbb8f2b964cbc6e
SHA256ed7fa06f66f03166aa7f49f3c1bc2b44ac468d9263fca7a74a8c562e60ed15dc
SHA512b0573150d42438e08763db1fd35d402c7d811007c5cfba3244b2fc911d5afd862a2952012a45d39c59b3fa5da06f028376bff71a5db76d2ff48c54164e78b4f3
-
Filesize
205KB
MD5d46c96bc0e0b28cfb3dacbb7e01e5793
SHA11e8f248d12fcdde886d9199b1086d7aa5579b550
SHA256d2354784a7be02b0fbca3eba49648bc2fe917228a5c2a8d38714afa730431813
SHA512ea04830e81c1b1e3911b58dc7a6ef03f3440cf031a3366171692a43f9b56d347ddd06b8ee5d120ef296b0353c2fd8d29242208ed483ebdf97fa15e16a391d245
-
Filesize
205KB
MD5b17f9efeb5cc9618796efaab323684a8
SHA1202e46c94f1d6fbc8b7b987803ea6b84dbee71ec
SHA256b4d160ced3ceee60d9686e4c7d4a2061bba9582e6b223cf8c64894ba5d0e0482
SHA512d945c60638413c1ec9f1d26ee864b7997cbac8efe090741f2b1822c9ac356eb607f0ea03169a17d1dbfaec2b53f8c4f971b63ecce203f502148e47a5c07ec2be
-
C:\Users\Admin\AppData\Local\Temp\89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.mm
Filesize541KB
MD5ac0bdf7fe5cd798f94e5074b2d3e27b6
SHA1ee505bf5aefc040876dcb7f11141adda0a59108a
SHA256f40ac1bb43ae44dbdfed96398c4f84a4fd9833e2bf9a208ceaf2145a7d438b8b
SHA5127f281e06eac389dc4aeef466500e839c99f7a9530eb9d009cd01cb55522e250275c9bd45e38d9652447130dac3244738f0ac05ec911266b5fbd206bb79e751a9
-
C:\Users\Admin\AppData\Local\Temp\89d29a8bec914eba32cb43f75c9545fbb82837a2d6b6642ecba0ba9e273bdd92.tmp
Filesize4.3MB
MD5c451c81ed46b64c08d9db05237dcee8d
SHA1ac63c873facf263439de14edde1b03f51514e0fe
SHA256a8c4ca099a07dbd87d9045f22be0e4acb34857323b8633d7fac46c97dc41d6ef
SHA51255649b927b706ba5fdda88539236e8344df8ed7ae6cb2976b8bff1b71bb1ba2dd88d3aea488ad178f6b184941ea38cdf49a19fbedc98bd8bff2fa6039c6fe763