Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
388s -
max time network
388s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-fr -
resource tags
arch:x64arch:x86image:win10v2004-20250129-frlocale:fr-fros:windows10-2004-x64systemwindows -
submitted
07/02/2025, 14:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/uc?export=download&id=1A-NQjyTwhCybq54Zzou2DglS3rwQMlrR
Resource
win10v2004-20250129-fr
General
-
Target
https://drive.google.com/uc?export=download&id=1A-NQjyTwhCybq54Zzou2DglS3rwQMlrR
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 4 drive.google.com 6 drive.google.com 180 drive.google.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 173 api.ipify.org 174 api.ipify.org -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\INF\display.PNF chrome.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133834126137643113" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5080 chrome.exe 5080 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe 2976 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe Token: SeShutdownPrivilege 5080 chrome.exe Token: SeCreatePagefilePrivilege 5080 chrome.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
pid Process 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 4392 osk.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe 5080 chrome.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4392 osk.exe 4392 osk.exe 4392 osk.exe 4392 osk.exe 4392 osk.exe 4392 osk.exe 4392 osk.exe 4392 osk.exe 4392 osk.exe 4392 osk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5080 wrote to memory of 1580 5080 chrome.exe 85 PID 5080 wrote to memory of 1580 5080 chrome.exe 85 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 3644 5080 chrome.exe 86 PID 5080 wrote to memory of 4808 5080 chrome.exe 87 PID 5080 wrote to memory of 4808 5080 chrome.exe 87 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88 PID 5080 wrote to memory of 1620 5080 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://drive.google.com/uc?export=download&id=1A-NQjyTwhCybq54Zzou2DglS3rwQMlrR1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb891dcc40,0x7ffb891dcc4c,0x7ffb891dcc582⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1900,i,4827169503549124391,13286736948313510153,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=1892 /prefetch:22⤵PID:3644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2132,i,4827169503549124391,13286736948313510153,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=2180 /prefetch:32⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,4827169503549124391,13286736948313510153,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=2212 /prefetch:82⤵PID:1620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3132,i,4827169503549124391,13286736948313510153,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:1272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3144,i,4827169503549124391,13286736948313510153,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:3280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4628,i,4827169503549124391,13286736948313510153,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=4648 /prefetch:82⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4860,i,4827169503549124391,13286736948313510153,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=4996 /prefetch:82⤵PID:3388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=5024,i,4827169503549124391,13286736948313510153,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=4548 /prefetch:12⤵PID:3708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5264,i,4827169503549124391,13286736948313510153,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3528,i,4827169503549124391,13286736948313510153,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5248,i,4827169503549124391,13286736948313510153,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=5480 /prefetch:82⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5736,i,4827169503549124391,13286736948313510153,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:3532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5828,i,4827169503549124391,13286736948313510153,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=5860 /prefetch:12⤵PID:3568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5992,i,4827169503549124391,13286736948313510153,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=6080 /prefetch:82⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5996,i,4827169503549124391,13286736948313510153,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=6148 /prefetch:82⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=6084,i,4827169503549124391,13286736948313510153,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:2096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=3244,i,4827169503549124391,13286736948313510153,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6268,i,4827169503549124391,13286736948313510153,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=3008 /prefetch:82⤵PID:3284
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1768
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3364
-
C:\Windows\system32\osk.exe"C:\Windows\system32\osk.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4392
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x404 0x1501⤵PID:1516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5d05f5f787f49fbc9de56eeede39940b7
SHA19d2614f7a38a3fc9ed0af29894833876f0c374bd
SHA25635520645eb18450c83e7acbe26066bdef22e99f42ce2190752c9fb0acd7abb3d
SHA51213e095cb574b99df526312ebdee6e49ae7455682d550c12e896c820d83c5c2a25494347a6faf71590382b4390edf16dabfc6e8cfcead212edac5ad8b972be2f5
-
Filesize
24KB
MD52b77b2c0394bfd2a458452006e617f96
SHA111eff89a8e3e64401818f81a02bdc84e8ecc4325
SHA256c46f001852fd8e16bb731f21cadcfa0cda8e7d064e11b0faa18d6bb8325acb1f
SHA51221dd89b9d6874539477e8b8dc8d98877c86595a8b0b8deb624547c3f407fb41550f65ff744c22f25c574994414a28e73f4d0794c5bd49be890fdac7906f0ba30
-
Filesize
1KB
MD526a5215ee1792dd22e91a914adf1d1fb
SHA1ad19b9083e73334e1a0b32298e17835f19715fbe
SHA256c2e3969652a2cbac548a76939b99f6d545327f6e74c2dae4742e069bb146e814
SHA512ee5de2ee428bda9dd437cff89066943e926a1df787abbc124a6492dcb77cc88f9571303fdf3eb1489cab90108232b0715dea28ab8b03bccc05a9bd98ab34805f
-
Filesize
1KB
MD5416d482a7a291dfb86834f7d4d4135cc
SHA135e5c9816837fde6c104d174c80b361c661f9361
SHA25601e1f64dc7593adcf51067ea7c23bb07842f6d3b0cdb463a7c1d07db74c898d5
SHA512d21f5c7759e0b056885860d3d08bffb56e912aa9655004095b691e52ac00ab933ad16901fdf330d4a41eb7d5d3e7edcced07e5406b4b0aad52cf0c679182aaa1
-
Filesize
2KB
MD5dd479f7e6c625e063fb44a586b65dbfa
SHA1b5bb0bfb43efe748cd63af256b14a8f813504f34
SHA2563c4b871fb510fd43c93fd57f31df5d6fe09d4ac6f1bfba59a8774d0088cd80da
SHA512f99edc6e302502b89a29d8fad3f3e370d77c6e97ebabebb6c942eb84297bbc4f42c883fde93ab64800cd260283529f8bb99ad6e0eaf5364acdf768d5969739a3
-
Filesize
5KB
MD5b90ff2b3a6a425ec3892a8d67d565f5a
SHA11d1462342398098a13c5405928bc9fce37d30438
SHA256fde5a455494f835ee28ff2c0cbb3735d1527152363d0217e24db2a093a6cb31a
SHA5120e04203e740258f841d3c98c231b70f0bcfeea562a507bda93e42c439a30483220c8dc137e906749b6eb4f46777d07761a59c42f89d9ce95e29771b75f4a4d52
-
Filesize
6KB
MD5c84a7e1146313841107cf29add0f0566
SHA175c524d39571c615f5546a86ab1adce1b2e0bcef
SHA256466845ef0650bf28cd26a2a8cc1e21e617774b448dbb4cdceab6128934bfee65
SHA512205c91bd5557417a666ee776648f83f26704ef8932d0396925cf68a264c196a119805e20858d05e8c2089047d58573affdf05ff0bf4ddfeda9fab3a4a5778977
-
Filesize
10KB
MD5a5ae73a96acb782180ce6e42bc4ea9c2
SHA124bfab538e4a8922ec13db934f0649fb628d2640
SHA256d06d1a185b82aa7a24c006442427a190368e737b98f0a7397c58cc790d368c68
SHA51209751b193e7f689cf795e2b78ec5968fa613c488d23c405f2ccf29a6fa50c2d7a56b1be117b72c4b51099ff00cf06d79a337a7e3a3393618e3e082455ec83c9f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
689B
MD5656e9beb549b048f0b25601f54b50270
SHA1e1c0581b2cf20fecf69525b475e3c6e9a410b8c4
SHA25633b3d18df1d6692804be9a5681411b79952e4e4afe9c3155dd386a97a6a45ee2
SHA512f9d7a0ce2e54fc4350cdc0d3a0e959364cb965a7829403c17bad15ba1a222390d4668e59494f6117f67d5ea9290b92943547dd0403910a868d9ee1a8b699d4c0
-
Filesize
1KB
MD5226cdd145a36942ea488f7409e9aa2ca
SHA1731f185f90fde55f3e248e3519e9b172f9822e60
SHA2565c9071e986b9e379308dc4ca513c0349716b90f860f1e8a5cb03e01a318ddcb1
SHA512960669ae1392441d9102862e5f835ae5156254ceade679e3c3450e02b947418645eeacd48b96785ab5f1a50410228d25ff6a711f751e0576d2b3e61ab3938c39
-
Filesize
1KB
MD5fb4ac2d5c572f6f0eaec53227287e443
SHA105c3a03db5a55045ae21e84a861d692469325aac
SHA256128150bfb5d4b24b5536f5f0c35d2f6d489bef1a8c0e4fb4ed80f22e74f77edc
SHA512663560498ab3b97202abae002677becb11027cabb1b0ab8ece25c451c1885810c4084e54b701a9ffe99d0ee86a3795a4fedf2cafcd5b8ddaa9a8f498ccc8b83a
-
Filesize
2KB
MD557ec7d7ed0b2b18d438982d9ad07df12
SHA182ac7246291cb81bc2885c356aaf90be492ad7f5
SHA25686d1407e5aec45af4e8476cf0f15fefff80627fe3a05ca6fd4351146cbc7e015
SHA51254cb9f6e0a9ad94acb6a411b520c1d0e87a9321fa41f723134474788fa855f624cb76909a5a71cc89a467e0a6a4ed3e53047c31e8993bda89324d925eb5651e3
-
Filesize
689B
MD5a918d3296ccaaa1715eaf1f8f2e22045
SHA15554eac32c0faf73cd4ecf40d4c2b439f31ad79b
SHA2569762d0c31c6a1c07798bc34b5ef1786a35d91ed85121007f8003acfd4fe8cbf8
SHA5126da8565b5a49b8be392a7d9655d3f350caa93195a299abb9106fa5e22a2398f5b28160fb126ae3143036d5f21763d69d7176143c598dcc573e55fffca6912b23
-
Filesize
1KB
MD53187cffe06c9e9650e96fb077d7e2cd9
SHA1d0f63947e25a2f1fcc661e3f129a974823463ca3
SHA256e3d748878ae1b592623b948a15943b82ebec8886a3abc6bbae864aa985ccfb8f
SHA512af15126cf16c340fbdb2af34571a9036f6f6249f9ef2b5794af60b163320d62dcf53551dbc6545ad575312544dd5d3c6f002b98a4b22fd03cd55e29dfa496b5a
-
Filesize
1KB
MD558636b56fe45e4b100dd89f45b7cbd8e
SHA1b89e2fb45cecaec6df3236f22faadafe64b4f992
SHA25665a3b6798fcd72b6a558c034b48fd66949bc770fdd4a3cd015ffa99a97b32770
SHA512ed9d66e4901567e7297de5a42f3e23263c7b620766cab04a0cdd7756a7e44f13a37a221111851954e69c712d52472e62538111cc260d57da76e334703f5afec8
-
Filesize
9KB
MD5b1e19df3428bd2047c6269b742ef6a6b
SHA10bfb82c703f5225b5b8ac7a79a315b7abdcb026e
SHA256c77b34fa6f3e10f0e4cc3a20a64aa828dffcb4782de194c7b8321178bccbb01d
SHA51265f270bef7ab7353a44a0298de007560e2a8e0293300abe51aa0f93557bd782d96163ea15754385ca8cfdfd8cf81b79b182118a12df495ce079c2e40aa1253cf
-
Filesize
9KB
MD5ab86cbebfa0d3754e50c3ceb4959baa8
SHA11f55b0ea32c3377718daf9d910d66305d4bae340
SHA256a218df4729566b83dcc2d6d058a0e1dee2a140ce5382c9caad35486c8cd56745
SHA512bb9e486f322f02f83663ed8469a73b962f5d79e641d959ae55ae500c87d796f4c7ec283d4509872dbea32ebfe71630e16254ad3465bed77248ca51a8ce3aa218
-
Filesize
9KB
MD5e67ef2096ade35ff2023d3d7f9f978d4
SHA1955a3ef8220fa5a7817261ed4784c94d55da032f
SHA2566fa0f11ba2848d89b56a9e6a9b7908a6e6cdc4cf4b66386e38bccf4f4b7da883
SHA51214d63131fbc6b7cb467444a90d3924334a2a733eb3543b0d8b0f81307f29b18b2576fc332c2d35a73800ec729474575a240900df6e0f3c190818635f1b10f4e1
-
Filesize
9KB
MD5c64027e013acaaead134ce9d400c5592
SHA16561992b9e109a04e4a3deac3b1492a26f763f08
SHA256ab5d9e4c1018d0feedd4abcaa7607837ebb3532c3290368d8d8ec24bc41ff8b7
SHA51289bdc2f37e7d16d61d3c77d028ff3aae5448c54dc6b5c0b42b63bbf73d52573123fec2fa05504bf206b46f6349fa570fcceb7abddba037bf59693b8f3ee8df72
-
Filesize
9KB
MD547c366b26782e209186d302433fe331d
SHA15756bbb774ab84e2fa8c588a086a42f73fb73039
SHA25664a1675bf99a69e4f342aef4cee6ca3ef38f38693df7c7a359b7c4a62614dc90
SHA51299357390adbc1abed9b320d12f3b9bb97f27b949e35077b50ca105f98c304205adf3907a029f37fb5751afc5901618a6c82d7f59c95d199960afece6ee4a64c8
-
Filesize
9KB
MD5affe631d717c149a87a2157b8330a7c9
SHA1cb63cfc4b7e4d324bd691c26195c2c2b56c4b6f2
SHA256f3f743413aafc320660fa2e2d452c806eeb474be7362c22c396a8dbf6924cbd5
SHA51253b9a1f44354e71aad89bdac02ac2faa981f3af96006a9a74de829c46d07d917ad10c60af9c1a4d80bb0793774ce426a0139f4e3d37306006492e8c79f19b286
-
Filesize
9KB
MD523231d48f5ee046956b190015ed02b82
SHA1677deee860a492216f1b05f36e68a90d2fcdba62
SHA256792850ea4b8f5e55b87eeeb363b488199a8311e43a63edab4f988f6b5bcfd875
SHA51235012f5d80b4147776670c991d09db54aba32285c1e88cf269d6cd95e729852c130fe728926afdc607a26430a2efcf5f14e497694de81f20b079e88e2960dce4
-
Filesize
9KB
MD54c335d56dbd1ac6f9ac5cd4940213dc4
SHA1dd1dbcbe21be3a368ace3fdff9b5f8aef50f1efc
SHA256a8d6f017e4870104bca9f78acaa5d7e7d71b0ac2750742900da31444aee4b956
SHA51253774bd676dd373f66b259ade0062933a4c951d0717267a0ccc615106e90028157d04f569248c5d3b3f2a05180f179e3db36c95ea5ecd5f3eb28b33c684021d1
-
Filesize
9KB
MD556d3f27a0c2ced063e77d45914179ece
SHA139a0fe0cb85405ea6d58079de4225509a2ae4bd3
SHA256c995bc7ff43fb0d59251a07e4561f49e168e27c8aa8508fd308cca0d8db4b6de
SHA51287dc3dce6e8715f8901a2bc6383a1cf8d39d663421256c7d976567832270d62af8aa3f73e5f9293970ba097c563f121314007f49802a3e5404186a458d687c8c
-
Filesize
9KB
MD5ed14d9c14ff0eb983770275d764af213
SHA1382ae0d946cf1b9eb937149589f9d369b218d097
SHA256d687b3243ca2714866de31a914f5472232a6dbac2a4fe164dddd89e5210a5128
SHA512e4be02d495ac43bdcbb27d0928281b877d8a798bb3d2a7cea09fe5baec996282525799ddf73f0543f8c816fc1c8885c170b41dc68cea5411aa4f14b07f6237b9
-
Filesize
9KB
MD58625737ebe4edb0290253d2b808b903e
SHA17c438bc1e29f72315ef9ef45d3aa3074adfb54aa
SHA256ba3e7204e3ff9da6322ed1cfbd3d8833f2bd2feaaba98e73eacffa97a58300de
SHA51248bf9c3f959ac98ebb73ade3f6fd3694bce27eedae9d70ce07ad0d7ba90b72fb2081e7cf37dcb816568c99a2699759d942ace9e52bb8e723d3a47800adc1f42f
-
Filesize
9KB
MD54b5b1fbe6a306038c87d261f74a132cd
SHA1758018f13b7bd4103e04e2936c94f0a6a9f7967d
SHA2569f0c5cb58dbef753a6d4bc1a6ac410a562c2d0861405a541f2f033901981c7e5
SHA512cee0a6e019cd6c4322114918e9e1f372b7aa4d9539360f3b391c2af10dfeb9bfb182777759e952877af85939840a0ec5c973cac7e9613cf1356985eab36f3121
-
Filesize
9KB
MD560b7f65f34b5caa0763a342ecfa840f2
SHA11114cfd812ed2407bcbb34db0d115b7397485add
SHA2566cd193612457ecbefb96b11fef5c3bc8a8b07eda216651b12e4619769f8165b8
SHA512cd33660972b9fe938ede401d2bb0ac4531d247512bd35afc19318b2f2b4c70f1849f6bb69b9f1339ca2d97268c0f2f2fd32650e49ccf64f3f6b031f1b1cf8eef
-
Filesize
9KB
MD5b5746b8205c68675c68b3fe9aab0a36d
SHA1e03dd5957b41738b3693cbc8bd234c7ed8119566
SHA25657600929c396d89937ebc4c6be4f92ebaf92826b5bb37e87c7cf2f5b2046eb79
SHA51232ebb07e8777d54552eba97654ca29e8c8a3d3339b3b6c656a2048456a995e726e56a7315decb5b490ce2096cd98df5402607432c161156897021a53b35bb30a
-
Filesize
9KB
MD561aa14b4e490caea5b418f1affd17edd
SHA193a661919f406a3e22d5b0e1c100cd57ba84c3d1
SHA256ac8df6951575d7acdfeeac21c3b6a052146a8556baa4d33b1cad2ee8dd02ebfd
SHA512c53f95ac6f0f0308356af006d7469e06ddd2c8b7d6fe1f4bd6953f71b8d47831350bdaad9b7857c7aaed2e753d51a94cdc9109b864e75aacd70a4b839822ae9d
-
Filesize
9KB
MD51afad41784dc20203fdd78aa3566b48d
SHA1a01aca3b18d55f6837677c8ea579333a18d1c37d
SHA25675fd50fe5eba3598e12f9b3cd9da22e44de597c7f000d5e931ea907e85fac22d
SHA51284a142b942bf861803c762d46ea9afe0e4698bec29fa54668822433ff88fe42cbb13fcadc56a2d9d391601f47b6280b258766d12c5763796f3509f48d3e04e4e
-
Filesize
9KB
MD55dec11f6efbcf1fa76865a34bacb4568
SHA14150ac8e782974553a792fd12a5c661ef21cb62a
SHA256d6bcfd46ad78fafeeeef92d54bdd29016fb62a5da59398d7127e9672593f2122
SHA51258f2279b245594c03c659c96fbdf49233e50c5aa34179249bff14f2c91983a02cfbfeaf5fbab48eb315780526f434b064190f1251fbbcd7aad56a2c7b6c54325
-
Filesize
9KB
MD57293c9b6cf2f525ced089d97cb13b96c
SHA125174b16635d22d43c13df27807ef563e03cf1c2
SHA256d0c15808775d0f67e1a9bf8dde6c0c236645b799fa9f6486acc52b35b77d6858
SHA51210e7daa5d01a79490d04abc305ce3dcb0bbb2f73b83a2ca3884f9c02edbd40435cfa2ede1ac33c226790b8630deb54f2bf966e53e62d674731ae39f509cc557d
-
Filesize
10KB
MD53111b3cd672d35a294079854ca9560a5
SHA13c6dd08c4dddd7f07c7d3b9125f4cf5a09196380
SHA2569d9aed8799b66e44e2fb3e870102e29cedd90ef947c7603515615f7775ebf7f1
SHA512d7a3395a689df201acb8d3b7197cab7f971e1b506619714fbf5f65a1a3628c6a00e2f6198d16dbaddc1e993bc59044ef151cea119d098cb3917d9e9389527d48
-
Filesize
9KB
MD54618ba1ba46ac4304d3e6048b47d0b45
SHA1adce2874c8f177e2eff014b26dcb06b33ecdc390
SHA25663b3f9cd50bc65c0f5540e2c9333d80bbc320ea39fb81114ee02cd6c04432656
SHA512ac38f36a30bf027b42c31da3db2e3b005d59bb59df2a7a4c8efcf3c2c71db918bff0d99200ec37c38d19253c9b9e7b482084728ec4c40987f046a0b6fbee2a1c
-
Filesize
10KB
MD513c56e539ad58718291e8f66900fb942
SHA162beb3fe913a9c43c495e1bcc62b6bbfa2ce8165
SHA256fa3cc53e95a230096311b9745d43acbab6213537f23ed6e8c258ed515816db2c
SHA512dc0f64fa4325b7b42b70b0736050dca8100929ffcde27dd72c1d93351e685e8621ee8d4d6b8f7af67d2c6ee3980fb5bd45e3cd099e8ab9cfbf46e8a57176cce7
-
Filesize
10KB
MD5e7f277a050ff4dfd3bf9699da9f77c24
SHA10be5b4131493a70336b4269b52bda81fd957698a
SHA25637d8c7bc5a8704fbbef74349c48c2f7374522361b12d4c81d9d815051fc134b0
SHA512812ab694fa5dc15e70dd2b1e8822441950228f58b794a28d24314a9d1f9e719eed729ad8e3c9c9be5a0bc927c41441b175097d63bee2f555dba14a809ed88444
-
Filesize
10KB
MD5d38918c2b893423569b9fa948af3ac36
SHA1ef21137db9eeaac89db63b48bf1e985203f8f42b
SHA25627768bddcf7e50c95e983af050879c96dd3e73a7b78a605c5550b1f68235a46b
SHA512d7c26d238d72aa310ba07b145919b772a3698f91173996511053e62c8795f3b69d39a0075d2ac1f016da73afc7451494c5296e4a4cbf7ce1038b63709041f6d9
-
Filesize
10KB
MD595261787fbc081c89798c2481a2cdb8d
SHA179426e60f583a141978d2e7ceec7559c245557b0
SHA25693901308160775452e24b046dc784034f354d75dcde9c03c52f3647b25b37667
SHA51266907447be06c3969293dbca8044e4e44b1a2b3533f40bf9ea063e06afd9718b7731a7abede856f6d0706397c420759c59b3d7bfec51ce419bad44f965369ef9
-
Filesize
9KB
MD54cdc0c9cea543739625ceee47e76ffb5
SHA1586ca92f3ed26b6252bb0b9a6d9574f42a50d04c
SHA256a3f278be0e14df119ac1d4c6ea5674ae7f60cc5275c670cbd4fd5bdbc89a04f8
SHA512e8d6020dd1c12cd3dc7833aec6738cb7340cb7135d3929bdbdcc42382e63f3456a1c69ccb173a6e185506de0e624d5a141da58cc42580c5ecff05b9228c75f38
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\e1d0e148-4373-4bfd-be15-2c5c2f7895f2.tmp
Filesize9KB
MD5cd2128ae89c951dfee3e18f987d0a56c
SHA1d966f9cf2ee1d375d7e4ce2aaba8cff1e2994ead
SHA256b1bec89419eab25ce0dc2dd7548ed64730fd2eeba0a1f0bcd9817c2fc6340136
SHA5127c937e81f7c8dcf88ae161180af4075a791d7b337ad404d34ebf3a666a2e6baeb79bb5cfc5190efb23738a14234b260aa58d7aa828abcac98a989ccbfadc80c4
-
Filesize
122KB
MD59733c61464060e7f2f0285074aadae61
SHA1c398cd455ecf536e77cda6cbf13407d91ef32713
SHA256f64341b063ff942838f25f75870fac67ac00d0be30f080009d5b91a5e79c8be9
SHA5129a145fa36c8c751893287cddab8b119ce896018407a2b369a4b7102f13dad3d1e9b142dfa4cffd5d269de5a0e709d7bca04577e4269935d09aaaff7b1df91091
-
Filesize
122KB
MD59ac828271076aa44665df65dcae51030
SHA18088fa297c8e034425d755ba190f87819e38a59a
SHA256672b86989754d87bfbf464e6a93d366627a46935da4b0b6b06b835f8b82c93f0
SHA512ddf24637e14631b4edc26e6bfb1dfac0b3a90d8a8571bd89ff2384631632fa0f9ed5bd457ecc8d3345393bcfecf15e3b6c3ad89fbdc139ccf2715b43890907a8
-
Filesize
122KB
MD5897a45bfd87b7f9a76987b20ef1c4161
SHA1c5cb40d502e4e28b7d8a802c72d9c0e28cb477de
SHA25616704cfa5ab9ee77540ab9932788e121419ab96eb54c5fc4c2a2018ca83e0f54
SHA5123fb7ff9f11c9ab6a01b50ca5a70d894e884fc3d049eac2839984dcb7e62cb68e5c76019028c9f9ecb17457f5224af9d5aee153de8a7650ff3f21daab87b148bb
-
Filesize
122KB
MD58f2d5e64c8734d56daedd7ffd8d629ed
SHA1d29739855906b42a9517c50e1d49bb777c42e37e
SHA2560c985c70770c1dd58dc702bf6371ea9b44aa46e79b83c7f04666c83bc8cbd3dc
SHA512e54a3ffdddef8dbfd2a29c11af89a0883e731a993707b2e65e5dc14a59ff08293e00cebf833374af8e68302a99efe19bd44179ac1ee0280e8d15fb295fcca956
-
Filesize
122KB
MD5381a1ba65eb72b83aa9f591db0d6e013
SHA18899b7f2183a5cc58683076899907b83aa427a95
SHA2561315cda050f5cbd267d6f8623a1acc91b0955ec3b9f377ac85942b1547f7fc29
SHA5122d3c7ffa8d038276deae7a50131a469c82069ff44399943fbd922c10e6dc0d612ff54788b0e9d06834b1f0f1a7096d37e7d5c8e4146c0345ec078a47efadaef2
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
312KB
MD52955ba82b90ad5dd65c16cc0f2ae9229
SHA14ef27976d6ec87ecf9033696db74bc28ca4c1649
SHA25676005d738b9209e6f2b0dc92060545077abd56e565424086d91a35827a21bdd1
SHA51277bcb929ca62060a01de454ae44ba124b6a57ce3fc49020362c9415a50bfd4a239b79207fa925ae0249602271d8a4f06f269ce5309080ae977f982a5c85a3c14