Resubmissions
24/02/2025, 02:19
250224-cscjgayrdl 824/02/2025, 02:15
250224-cpz6csyrbl 824/02/2025, 02:13
250224-cnmtmsyraj 824/02/2025, 02:06
250224-cjnkdayqen 824/02/2025, 01:57
250224-cdr1lsyqaj 824/02/2025, 01:53
250224-cbfjssypgm 8Analysis
-
max time kernel
315s -
max time network
314s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/02/2025, 02:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo
Resource
win11-20250217-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo
Malware Config
Signatures
-
Downloads MZ/PE file 2 IoCs
flow pid Process 26 3124 chrome.exe 26 3124 chrome.exe -
Executes dropped EXE 3 IoCs
pid Process 2400 Alerta.exe 248 Alerta.exe 3728 FlashKiller.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 2 raw.githubusercontent.com 25 raw.githubusercontent.com 26 raw.githubusercontent.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 2 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\Alerta.exe:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\FlashKiller.exe:Zone.Identifier chrome.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3992 3728 WerFault.exe 117 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Alerta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FlashKiller.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133848372833500748" chrome.exe -
Modifies registry class 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-580533235-1933962784-2718464258-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-580533235-1933962784-2718464258-1000_Classes\Local Settings\MuiCache BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-580533235-1933962784-2718464258-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-580533235-1933962784-2718464258-1000_Classes\Local Settings OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-580533235-1933962784-2718464258-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-580533235-1933962784-2718464258-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-580533235-1933962784-2718464258-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-580533235-1933962784-2718464258-1000\{D635B906-9BEC-4442-B1BF-D503E018B377} chrome.exe -
NTFS ADS 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\041bc20ca8ac3161098cbc976e67e3c0f1b672ad36ecbe22fd21cbd53bcaa742:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\Alerta.exe:Zone.Identifier chrome.exe File opened for modification C:\Users\Admin\Downloads\FlashKiller.exe:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4276 chrome.exe 4276 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe 4856 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe Token: SeShutdownPrivilege 4276 chrome.exe Token: SeCreatePagefilePrivilege 4276 chrome.exe -
Suspicious use of FindShellTrayWindow 60 IoCs
pid Process 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe 4276 chrome.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 1396 OpenWith.exe 1396 OpenWith.exe 1396 OpenWith.exe 1396 OpenWith.exe 1396 OpenWith.exe 1396 OpenWith.exe 1396 OpenWith.exe 1396 OpenWith.exe 1396 OpenWith.exe 1396 OpenWith.exe 1396 OpenWith.exe 1396 OpenWith.exe 1396 OpenWith.exe 1396 OpenWith.exe 1396 OpenWith.exe 1748 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4276 wrote to memory of 4996 4276 chrome.exe 81 PID 4276 wrote to memory of 4996 4276 chrome.exe 81 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3508 4276 chrome.exe 82 PID 4276 wrote to memory of 3124 4276 chrome.exe 83 PID 4276 wrote to memory of 3124 4276 chrome.exe 83 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84 PID 4276 wrote to memory of 3844 4276 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/Da2dalus/The-MALWARE-Repo1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7ffa1656cc40,0x7ffa1656cc4c,0x7ffa1656cc582⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1784,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1772 /prefetch:22⤵PID:3508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2080,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2104 /prefetch:32⤵
- Downloads MZ/PE file
PID:3124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2128,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2192 /prefetch:82⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3064,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3076,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:3380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4520,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4532 /prefetch:82⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4864,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4644 /prefetch:82⤵
- NTFS ADS
PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5028,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4548 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5000,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2684 /prefetch:12⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5220,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5464,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5480 /prefetch:82⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5472,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5548 /prefetch:82⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5632,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5352,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3088 /prefetch:82⤵PID:924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5328,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3488 /prefetch:82⤵PID:4200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5432,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5036 /prefetch:82⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5176,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5788 /prefetch:82⤵PID:568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5272,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3196 /prefetch:82⤵PID:2360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5964,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5204 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:3688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5736,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5332 /prefetch:82⤵PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=3248,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4364 /prefetch:82⤵PID:3376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5944,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5716 /prefetch:82⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=5748,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2592 /prefetch:12⤵PID:1232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --field-trial-handle=5004,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5876,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5848 /prefetch:82⤵PID:1116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5860,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4736 /prefetch:82⤵PID:352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --field-trial-handle=5480,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --field-trial-handle=5100,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:1104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=4760,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5792 /prefetch:82⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6080,i,13126801812413088898,10302970121432588162,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5872 /prefetch:82⤵
- Modifies registry class
PID:1508
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1236
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4784
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1744
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1396
-
C:\Users\Admin\Downloads\Alerta.exe"C:\Users\Admin\Downloads\Alerta.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2400
-
C:\Users\Admin\Downloads\Alerta.exe"C:\Users\Admin\Downloads\Alerta.exe"1⤵
- Executes dropped EXE
PID:248
-
C:\Users\Admin\Downloads\FlashKiller.exe"C:\Users\Admin\Downloads\FlashKiller.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 2522⤵
- Program crash
PID:3992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3728 -ip 37281⤵PID:2448
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004DC 0x00000000000004E01⤵PID:1404
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:4292
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:3352
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
141KB
MD549f43bf361d37bbfdc29f90c4fdc0f4b
SHA107757e0d3fdb11d3a942df3ec52560d0834e958d
SHA256bc2b1413074fb1abac3ffc91e00aff8fdf44c64ecb3907b58cfb6cce21882512
SHA5129e5ec84688ed78dd220dadcd67002857672266d619e07c9af6a7a142f2652a7242335c17f5b1bd7c33e69fe8037966385d02693cbaa93273c4db2e6e5c4f2342
-
Filesize
141KB
MD57cf96b2249c22a7ee0a1a685eee2a751
SHA1ddc8167dc6da3af1e8b476370208bd9bdd7913d8
SHA256ac847d9c231edc6e7ff0d28196f39af1192e23222c4188cea6bd1e83d67e8d51
SHA5123b332cb4db3b035c08e6902a16a372a1dc6f142b94605cf919f1d6ddf3a58948d112a01a1db1e7e35d58aa95b0ddd79a6f7ca788882560235091f4d4ebebc3d0
-
Filesize
1KB
MD5a059f9b35be0d806c14e5820f23d1faa
SHA121d270f58b7d20c0e201ba4794a4ba05f0c51825
SHA25684537ecfe737d1f14cda9c9bd376712b88513aa86af46caba8b769a49e85b1dd
SHA51277fa0c32dc16660f25a0065b8abd1116cd7ee3789afd6dd2b50e1e4d9df7ef43563d83c3a58f644990b84756e1631b2c2b86f5b4643aec04d580b81a7cb44880
-
Filesize
2KB
MD5c3ee3e0a0e622443f06d80d95ebadba7
SHA1413a92429ea297cbe3e9c99d4ed5b3ab5456e5dc
SHA2566df3a2531d2ee3aa4ab67f1a7b7ca00b7a3064320717f08ab4a8a1b80c8bb9a1
SHA51208869ae3993d53f568bce4e93cd9001a9d35466dc28ee46a6e4684d94bcfa1b7c234ffd18712c83375d5424a02df1d3f28502bca8d2ee94f5056e7374dde30a1
-
Filesize
1KB
MD565a4418e6fb9fc1e515e1ae938624eab
SHA17cde3f6bab52b39c4ad085bb93982fbc6461bc75
SHA25667f970e31c3a90b5b0be12d3b0092f2c9f8ac4f0bbf9976a4bc60ac25c1e50ab
SHA512476e154d6659f679f823c6220d61053291fa0efcd0cf3640986c4caf599a87361723fbb9def58b736ebfadb3f15561cdbedb5b56b15b8749c2960cf46663c6d8
-
Filesize
3KB
MD583391e0be84d695e09360350104913bf
SHA1107eb68210523d051bb115d49f188820926257c2
SHA256a1c0dc60b4636497d025bcfbb598a1e83cda39476986bdab0f81b4202e05eb53
SHA51211389ff903793b2951119c277cb01e41419696d1b990af6b9e17151d8c6d3c80bf007f3ccae6057a923f9a484642605cb76e09a3cf34a1a2164c2b28e3d3556e
-
Filesize
2KB
MD5e221be6ef9e18aaf213ece1fae45ec84
SHA147f34cb0631de0f9e018c9a6d3420b4b065f2e65
SHA2562784abb8add3bf7e52be3bf3191d11a3f7dccb6504ba07d8c1fce5b180a968d1
SHA512f3672258d1f8f9eba4ff0676e44406af8df6598659967744fb3878acf9742350cb92b56ead40eb079cd00a6801e5b523b2561bb97d6d35724597060a64dcfc01
-
Filesize
10KB
MD582c3ab5cb7e203562b5204058aa86598
SHA17483c38ae22732c9f6c1cbeb997880621f14312d
SHA2560ef435786a3b8564f1e0238a22726f212cb27175db72df46e912c697812942f0
SHA512aab162218cc7de28515acd9a1e10b349714a405c552b55895df899f0932b322b4f8de92374d40b3208074e826714d8d9105e23989d878daac79e21b2ddcbb69a
-
Filesize
5KB
MD5d87f6260d557e04b303093223926a688
SHA1d85efed1af986edaa26bfefc0f4f5a51bd9b8c30
SHA2560123e33faae168e2a2245276ed07b738790e951286e0001949b98efc55dc5397
SHA51230556cdb456c358d55dfb39e2c77b235812fb21086ae96336801ebafa88d5d66af6c9f40403e1d3691c53bd13b89e04e3377f74678f5131907c5b6e35c6d5c87
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5ddffd48b41f01096f81f56ca0b71f2fe
SHA1bc0bb2af62e51767549f9f1190a0779d239d61b6
SHA256cd3c7599712029911302cd5b859959214e8830f7f17cd4ce11ef8573ffa2a80d
SHA51239fb3f366a537d4624209a772d20bc9c78721fa645ced2da76b06ba58f76fa74480e8b04170347b4986491f6654f7248043330f21329e95d3c9ef0772a435edc
-
Filesize
1KB
MD50aa0865c13cad06a3fc7c71755d41ed4
SHA104c01860b5cf86f670de8d20b12434c5e87f5800
SHA256304663d8bdd5c609abd62a2009800e1d13156a3084021ddf04ceedcdec6421ac
SHA51224112ca3634bc4be9a0cfd3497ba4603b8db1d8856bdb7517805f4873f6b6b102f5cf537a0b645e83b6c1b305e489b522b569696a95e741ac7d57ce0d63d76e1
-
Filesize
1KB
MD516db39892c525ff807769dbb83386c5f
SHA13e77e862ca397521812c6e895c221e0973f771be
SHA256557408e6bbf5685321cfb9823ce263f8052bfc7667b59bf41a8395e54452664b
SHA512183e1aabe028bf286a8909a43ed360b78ceda9f15ce9f6e23dfa94b558884d4a3c685c80575c1ba97c339a3fd794c62d6a65c06853ebc18bf4fdd5663a5f66db
-
Filesize
1KB
MD5249ca24df724ff4b7e61780761135192
SHA19da3946b9866a50a7fdb74e3b1b6292ad9b1b463
SHA25688c56417a8b2b92767ed602de49d5d39153c617bf39610907dc833edbdfeb42b
SHA512faae976fe50ad5262ddd3ed3786603bc6249d7e967abd96c4e0ab127432090d2276ba45cf29a3df0b8126c6316894e6e9d14cad6045adea8aab2b586736592a9
-
Filesize
1KB
MD55944554c793a29d00bcda4212f161b8a
SHA1c6c9dce4365020c742ef3177528ebfcb9ee1aaf4
SHA2565e8d987ddee8fd3d229715ffa8f68cb774243c26ac64f60539723e7902e17abc
SHA51236c8b39c4cd2123b7383cad0637f519645443575ab340545e642fd631be09512dd2afacc3e1402d34ae2a808c0afa371c524893789a77f8c9c2126a6466da395
-
Filesize
1KB
MD5de87b50922d8c43853d3cf410b39d7c0
SHA1c2a6390f9b388946b77bb52f47c7499a9c5fd1e8
SHA256a5c5f112047e11ccd090bc167ecbed6974cda3d8017e42d5af45f6787e293b0e
SHA51219b6fbc4a29266e439ba63d67b2314ccc94cda5c2fdca07e20b4d22f3f9d5a01824a09410f90b267c940187c74712ce75cc58e0fbda1c361695ab426375790ef
-
Filesize
1017B
MD5e9b96fc00f9104d606ffac6412f954e1
SHA171437b1c87594a0005d7e4351af3f8e80577facb
SHA25620885affec8d1f66847da9abd486d81c460a05c993a55a664c8f112d13652afe
SHA51215e18060eff32afb3585563744b0961f66f395658d3c8a9d414875545e5e7dc852938ad86d6e7083e885198663fb5c2d1209d94fe70f08eb7d94475d6e8cf258
-
Filesize
1KB
MD558c73cb6c19a984eb8b657428341937d
SHA15124e38bace0eae328085793c7d8afb19e532191
SHA256c11171167962e4f5b5f709c0d3a477d409a513db2c34bcbd5b1b9512b1ed25d1
SHA512cb2330d1f4a40bc504f766900f687b404e947965ab01b25d380874b7f7f53c542c7d887b5bba129876922c664df0de5ab2092471b287849d8bd1f48c2fc9006a
-
Filesize
1KB
MD5c531da575314755129cf10216168bbba
SHA14341e52147b0b88f29d8d68cfc2a0dddb4b4bf0e
SHA25691d46977402880f628fddee686a37b89f17410b82ddfba3a063ebfc1809b16b9
SHA512e7b3597413d6f356c0b0142136057300c4d67bc310b7626fdc1a85bd05cf77de0b843896ac3214b5c22644ac005a59abb3fcf524d20dfc568be9675a8e175689
-
Filesize
1KB
MD5e8b4ca37bad1632cb2bf7ad774c2f8e0
SHA191dca84bbe9eace2d70e0ee00aeaffe1c670b7f2
SHA256c18413473c17b9c5e5517b8f921c501822e824d4017b758ba1b0884eebdf5188
SHA512877e6066fc0ca403466149aef5e7a2f40672310e7d1761a16e6e718891b0611ec848e83f6612b81fdf20c08ad1bcf6cf9e2d33c1030aa60b8e09feb445e49816
-
Filesize
8KB
MD57a159330af615272de3bd5d4e19eaa63
SHA10ae1914edfcb2eed10ef4d20992c621c932daeb3
SHA2566aa8d93c0e9cc985494f64a9fe5c4ef94c1c288729ab859f33942a6e03d8be91
SHA51202e1107ea6bb56f517de77b2bb704e57fbb1ad0e16ac79dd3acb906df58e50e794622e9ce1ab59542415ddb6f9d3c1a8cd036f3ba4d96fbcd767e108797258d8
-
Filesize
8KB
MD5da553f4ad2612b97ee9b378d8abb0682
SHA196c42e845a2244289f5c564b36371d5e245573c9
SHA256eceb092c027fe6b2e5e55b0ce8cd4f4c4987073171c9c11f97be0e79880c570a
SHA512eb379a724093957b025a3d09b4cc016c0164195b15545a5d797e3be65450885d8498d2a708d94739237bc09d4a97b715ac9812ea1a416051a75bf7d8e37e4e4a
-
Filesize
9KB
MD5e3981614affebd526d318758c54b8e21
SHA18137d75e3c9d77cdadb752541e8203fc1170a9dd
SHA256a1ceb39d759b93f1a0d5965add8bcdb83775bdfa3084930d5d995a2117dc8ceb
SHA512ddf30a2cfc5c53ba1115cac4646b5c6373e1831cff439042e36dd6b94a596cb2f9c290359199c24fd23fa7d365149e29b183d4eda1ddd52c53f0b25d414b1f85
-
Filesize
8KB
MD52b31f1205cff41a9f91b6216cce8773d
SHA17cbfe3361f1e08a12eaf42cf6bf7845cbca016b0
SHA2565cf6d09ccfa2ecf71ea562aef1bfc8e5409a1eefd49b0bf5326086e30779c726
SHA512cae18169a57fd4488cf343da086c91cada4fe748165ba3ba80c8c7b5b9114734c46eef5a66100f3922cda57bfbe71b1cf891704a0ecad7c5b4c66a58b4ff25c3
-
Filesize
8KB
MD5debce1a8756a2a49a67871e90b27e547
SHA18dc4ee50ec4574646a524feb39646c7e48936317
SHA2561338cd77723fcd7da70bd7389f3dcf280703edd272e58e49e812283df5913473
SHA512a7dfd3485457282c7ac71b7d1b406ed3918cf573fb733d8e875030a8d4a5794f82329d00f1acc0dade37c9ea0ef19048771f070581c11c6f5101b52ec29804ed
-
Filesize
8KB
MD577cf817830e4063154c2ccf10dbf1b72
SHA11f578529711d31f3d533c01d28d1679189e6e9f8
SHA2563857c743c3b02e4af04f6e88354893c3f95ff4ab216d69294d3fd625e069dd43
SHA512f8156e062036885a30908588bdf231cd1fc8ac79790adf31ed638d5d31472c5f9777f2ddc67a1ad4ed4bff6c2ad01e4c7803a0639936d7b4352291a993b60b29
-
Filesize
8KB
MD5d6eac159a5e31f00e49a121e78a32bcc
SHA163b3247beb1506add8636536ec3d7a5bf2de050b
SHA2565d8d1ba5d7e640fedd86d086c81b66263b6958131398d7929da363477e5d9354
SHA5121664975a2f0ff62915483c3960f666bbad856a5b258ff0af0a72db1d33411ef3f796f10075e32143809ff4504bd41716992fec8a8ab9d1e51310b7b1ddde6683
-
Filesize
9KB
MD514256ed80a418c8619783d0b9cd098e5
SHA1831b3d971e1e8fcee4f944c69b18e7543e0421c0
SHA2561f73b4fdee0d94f09322cb1b2bfdaa03fa144f3b9a4437b667f1eb2f96674444
SHA512bec94cf509b6a462ebd182dc114ce1d0f3f5d91ced6b8255ea883c7cded91e4f4e45143286441632aa9a02a3b889beebf18a8c5579c00b98d706eebaa504ba6b
-
Filesize
9KB
MD55f831086d091c73c4ee5a0f405dacd5e
SHA1d8e18a2584ad503d100dacdd80f887824268a7b6
SHA256e067dcf4dbe17c39f6c29b9fcbfc588238eb3189635d146cf40de271c4d6eb1d
SHA5120680dd460c5ea58b0b0953890228ef38f87c5efdd5bb85002b3fc7655710c882862084a6dbd7678a7c4970cfa23fc73f44e1767ed88c55a5837173bc5d43b5a0
-
Filesize
10KB
MD5f1e71251f6c01cba44a903a14a2b69df
SHA132efba0d6d556b4917a9f1f74343e8f640b5dc69
SHA256dff945d9397402b0b94c812d7e4008695e5cf60ab437c419f3e8f68ca436a27d
SHA512d67e2b631eedb6a27b03492616e4b6f2948e973ebe361e56f6c1c742eeadf516a2dae52d327d1286d98b0cbe0c79df165581cf314dc1f4537b7908b009a67ede
-
Filesize
9KB
MD5c0ef76a341f9d6ec67f0be9f9fd53100
SHA1f3e3bb96eeed239035858ccfef133fdfab4e18a5
SHA25633441472b54b6ce93c851804bb2279d856c41ca1353b49d4ba997d2b75e5b5e2
SHA512a802ae2c25d18e35d790962dde1734d49f88ff18f46037f0882d01a7a341ede72a8bde7929b91ad8c9f658640556432c6275ce7da105126664804526dc30233d
-
Filesize
9KB
MD59ca53de477cc0d8486b9c721e7f66949
SHA1a4375c6d4fad3189e6c10f14552d60cd9198f1c0
SHA2568b6d951dbcebcc3ad9972a67ca03a1140253be6f24d8560bed81b591d38034c0
SHA512930d56b5f6964507f275284c73bc8ff4868c1e9039c82e0e13e104bc1f8eba9548d679e8a2cefa73ffab5e80e53dbd6d9915aaea2ccbffa07426cbbf0f344a00
-
Filesize
11KB
MD5edeb35333bf5a9c986f0db5c93e825e5
SHA126b6fdbc527057e519927ea0710cbd29071709a4
SHA25621b56619d96c465c803445758dff6c08ae5b09d68accc7fdb249ac4a3507bf05
SHA512459deb59c547fd286e4ce6aabb9add0de6e28cb841332175bb3f944521c04c2aa9b2f8e0b5302ab4d8a52b6e032a00ebf68cb207d38282f40dd884be114f6e5d
-
Filesize
11KB
MD54c22563aaed8046cf59cbb60dd501a0d
SHA1120e607520a0e02bd733d1c43ae52495ece60721
SHA256af35c4b4cff1a93c7880cb825f4f36f192a78b1010c91798ef6599db677738da
SHA512809d58455e5b0d319d5c9c0be70383f139d0c429d92ba46ad10ca1f25d8a96a575605a1afadf371882af842f03f21e4b943a9cbfb3cd4d1578db2e295f4653c0
-
Filesize
8KB
MD5d2c600ac3a87f504ad9d746749791b7b
SHA1996f2e5b2e91926cb0ab147c1e2eb1aea6c53245
SHA256b8c949c914adc0a67404c316de0eb6266cd5d7c18b94463b8eec15de63c70f52
SHA512adb55973fb253f5b4b529383ff2e335aec55eba95a0f6faed0debe09c8ee9938846b6da36fa8dff87c3ce27a34ef4e5f8e62ff0e21aea69d5946cf3eb69e8636
-
Filesize
9KB
MD55771c4fc5400ece30a52dd5a4da7e846
SHA14014acd438a36890741ad59e25e10edc2b44fbe8
SHA256508242ed90486e36c17a4756c643c94632081dfaff397cc9e120b540b2452884
SHA512dd621b5837906c6f3fea07bcc5406ad627db3ee99c905feceaf03d8ff705b21702d8ac36450da9a6036463ea54797ea6f7a7a3511821fb8c588c254bcaf4a975
-
Filesize
11KB
MD508ee94bd4e53e519cb29eba8faec9e19
SHA19437fb16d9ed90beeab7d6b2e0f6fd12d76398ef
SHA2568075342bd0e0bdc660b08f57dbd2e6a864488fa7709e53a42a2ae80f4ad90edb
SHA51285b97c05beec47eb0afc0318c81343126fac9b52aed3567497853b114781df8335d1b6da96e6915e2a0021238b1af4e7c1d1cabcb5ad71c91bea25cc0c0e7006
-
Filesize
8KB
MD5fcde4897b0c51427baaaa44eae57b969
SHA1f5798573807f2c4378bfbda0eced1bc8abc5a677
SHA256e8015f5c92b52c104ae7e773a3a6dfe4e520dfa7672eefd8dfb9cb7342ca1271
SHA512f755cac588736338b5ef5378b13b071b3d9a2570de239b169e6c0a1a0a825b98f357de6699b1f4d6e05db9ce77e1bb5c41bbf2a342741fd89571336b7981137a
-
Filesize
11KB
MD55bdb3b875650cb4c5b4a65fda44df6b0
SHA188c8bf46bb47bfcb6729d7df8621e9a84ae68cd6
SHA256d6aba397c0ded4c439483b27d7378d815b4135d4ed79507936501660009f8041
SHA512f58b544daae099b3113dd15339da494a5380c1e1f2cbbce02d07c39cdbfbab25071239d5db982e7f748c17081dd16f212f0de6cbbfca76446f2a9449fbfd5314
-
Filesize
11KB
MD5963f68ae01886f7676d40b5c10abb1c2
SHA19770bf82e3bc3f79e884db64bda6f230c297b994
SHA25668af34e34af86f4fa86297ed099743c8b4f2fb9c7054faed5aef633005678f18
SHA51204ecf511b2b5291b1d9156818c0870e0bd24e306c64317dccf45ac8eb3eb4fd56e8e89561ab826c84764ec9a521cb0131879b605454b32ed1358270bc5a91d47
-
Filesize
11KB
MD5d3e43018b92e54ac64c9f1e6fe6f2e34
SHA1cdeb6e4ecce3d6d0c88717a2306642f36ac1d62b
SHA2568136ddbc75c74ae386523d3cf57c4b6b0205a511961529147985ae6411d234b5
SHA512efb2799e3780d056a75b5e43e794f8eb82ae0e194e0a6a27955863a266d26eb474e5e2f8ac40bebc101d8bbeb46452a26c7bf5f90691a60512f194a1643cf876
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\c559450a-2c0c-4fc2-b155-6f88e87f18da\index-dir\the-real-index
Filesize2KB
MD5bdeaf757bd2898b117ed023d46f4f022
SHA18ed79b8e34318a8deef1ff75a0e10ff85bfedd06
SHA25669c29c01f45855a7cbc459fa8e17bfa634c34157edaff3c9a43f0b1079305eb9
SHA512c809270b429a35be16a5dac92ccf132f2cd65581fdf7bcff8a6f3f3f4ce817e75702d722086dcbae8a98fc24abffc7eda6440c510827424cf7747f00e9670743
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\c559450a-2c0c-4fc2-b155-6f88e87f18da\index-dir\the-real-index~RFe5b5996.TMP
Filesize48B
MD5d15bf72b4f3f1154e246db69476e47c3
SHA1efb95d69a73708cbc1cac4fc1e96272ec373f215
SHA256c8f14f1b1e4e9659f79d2b0b1cf60a3bfd444b39e7dc03421a21e6033cb212a5
SHA5123378e59a97b51d234640a9c19185e27923ea9e3fb563c51fa68d0f22bb7b4ebd452a338122906eabb0c4a33eeb18a1f03d997d02860b08aca7f40d347e53bd03
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize176B
MD579edaccfe9772e41d8dbc04f3f335647
SHA138ebd36016681d3fcd9c9de32b1b33cf7980cb19
SHA256bfe5d2e5d1aef657010b8980aa708876ee3b92920c8c016e4fbcf5066e0b69b7
SHA512837ce2b326769d84ee6e859cf3ab48725125f603012336a9b6fa8923fe5aa74dd4b4a530b167f0d40170043b46563ebc9703adbb566975e4f67b54140d7791f0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize114B
MD56761abfc63715bf598a5fd28db862052
SHA174fdc058a8e43498a4ae8411337eab33727ef8bd
SHA2565c9f95f9197fc2be2101ce19bc84b3fad0d519d750839ae611ca570bab6f5a55
SHA5120414fe6f2fcc088abdf23441286170344b2c9300a82fbe095e0830474287f51f9f05e8021cd79d9e6739903ae953b2de97d0de2f69220fd726fab6b318c8af24
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize112B
MD5ce4f7d3f1162d7d65c4899b26aea49de
SHA17e77af6700bbb498c9c3aed866c75adf4feac162
SHA256bde05ae09b5c32de0cb7779eb703b5071369bf8b6a5704f5e0172c1a6c330dfe
SHA512d4faf390531356eb477866e3fc1659d6aae3f0ceec795dac55e243ccce9460f1ce2972f062382ea17c50aab2517ded78f714316773d595f269062262181e06ff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe5aecc3.TMP
Filesize119B
MD5f815eac7085481721d40d571cfb2e3d0
SHA1980c223c900f5bb1e258fb63e01682117c60ace7
SHA25622b27445734d2e0118f06bee916719efb756e6620654229cb45c26528f5aea4b
SHA51251b44c011e7e74a701bb026a8b41ec5b1fdd1558ab3849032f8cadbd1df9ab4075abd2a3b4aa504644fed9605e8dd1b6339778896112a58e060fd38d5d912069
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5b5e7c28eb6cc792a33344bd12d72c489
SHA1afce41090a4a76efd444b477b8d766992360a8c3
SHA256b8fa6889873419ef47b13e4fcf47d4d921cbf90937112096f187f510f0bd4204
SHA512e7828c52a60d3f27020b2642aef56af5c1e3631ee59e5a0a3bdc30444878ae2f51eef1a7dd5fa6e6f98fced06cf25bd38e702f2ca6b1eb17520481e379b5dace
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5b3bfc.TMP
Filesize48B
MD591e4f09a1df0d91cebd4039b6fc18c42
SHA12c15817c03007fed51e6a9c9f719e854accea256
SHA25694185bb891e1bfa71ab6a19850139b9ade1c4fa9d081a0cd96800bed26677a8c
SHA51295e77556c354046c102191691b7925f9f196dd05c1addd9287d9ff72a9c87ff383366bc7fcd75da9709336e25aac831f278ae9a5a47cb6d9f93d3686e50ef312
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp\scoped_dir4276_1685690103\Shortcuts Menu Icons\Monochrome\0\512.png
Filesize2KB
MD5206fd9669027c437a36fbf7d73657db7
SHA18dee68de4deac72e86bbb28b8e5a915df3b5f3a5
SHA2560d17a989f42bc129aca8e755871a7025acb6292ce06ca2437e95bedbc328fa18
SHA5122c89878ec8466edf1f214d918aefc6a9b3de46d06ffacff4fdb85566560e94068601b1e4377d9d2eabefdc1c7f09eb46b00cf4545e377cc84a69edf8e57e48b2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp\scoped_dir4276_1685690103\Shortcuts Menu Icons\Monochrome\1\512.png
Filesize10KB
MD5529a0ad2f85dff6370e98e206ecb6ef9
SHA17a4ff97f02962afeca94f1815168f41ba54b0691
SHA25631db550eb9c0d9afd316dc85cdfd832510e2c48e7d37d4a610c175667a4599c6
SHA512d00e2d741a0a6321c92a4aab632f8f3bafd33c0e2875f37868e195ed5e7200a647b4c83358edcef5fc7acbc5c57f70410903f39eac76e23e88a342ac5c9c21cd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp\scoped_dir4276_1874042051\Icons Monochrome\16.png
Filesize214B
MD51b3a4d1adc56ac66cd8b46c98f33e41b
SHA1de87dc114f12e1865922f89ebc127966b0b9a1b7
SHA2560fb35eacb91ab06f09431370f330ba290725119417f166facaf5f134499978bd
SHA512ce89a67b088bae8dcd763f9a9b3655ed90485b24646d93de44533744dfcf947c96571e252d1ad80bdec1530ff2b72b012e8fff7178f1b4e957090f0f4c959e0d
-
Filesize
122KB
MD56926a051f5889a48ef3828ea611c3643
SHA136690a85b26b4831552067344b8912216274e585
SHA2568649e10616df0ffe97c68ac298c79bcf44cdca675cd0723088e47cca4443f5e4
SHA512e0c521f65059cc5303c2fd21b980b3bcfd0de725f65b0d09a08ad2a2adc002096f92580c1c5dec5e510706ecea063d316e0699f4e678d90f95cf96c1f703795b
-
Filesize
122KB
MD5942272d36e16bc78ded8027d8e606998
SHA1a5b243ab915894f0c30d8ed7a526f53152228f6e
SHA2569fdb12fbf2d8fdf600b17ddfb0496fdfd525ff01a2771791675b3efa2e22bff6
SHA512b4fa46f1478a3c99f04c06aa86c135e773da236c74d3ec17950f2faf4f7dda314ee563cc341d63c4fa8d521b66425c17eb8701e7e1eb4e01f39891b80bfffe01
-
Filesize
122KB
MD5ff476715af49a5127bf68df28f8cc81c
SHA122b0ce4ac86eabb22bfd9c7e8933139b3168c6f7
SHA256b7e1b399aca4f131a4c16b8955c684ba0cff614b7a0f21cb6c8cb68893e71156
SHA5124d73047855a977b412465dcf702ef3ab902351fc0b5215e6ec4e426d969f29e508d21a70057966edb472a017c3c9213ecccbd1bdf767e795608b342857ce417d
-
Filesize
122KB
MD5f37d3c785ec7abcd4d4214c7bf797d58
SHA1e410f784f708726be6e1bb3223998b1f77916ebd
SHA256c310a7b7cbc2bd258b78a48424fe1b3e18f6972de00b19248fa6225efd9839a6
SHA512be2e74a76fcd758748056a73e78dbb4a23baefd3930b02a80b8e4e0f4e633cb0a0fdafe42ca6b8ae0a2da74104d65e2c92cbff8038144fcea306ad9a4b526f6c
-
Filesize
122KB
MD561ead90a36ea94613d5a4dae2be83737
SHA1ddc3fe8dfa620da7427203d590e9ff4ca0213c24
SHA2560fde51362118ecd3c06dd47d2c430e0429eb969aabd3f0ea80b7838cdf80c5b7
SHA5128b45edd3168d772f7d126a41d13c6e8bf972d83b3cd7044f190e64fd7f63e6bc3b3c8ff0d8141b7520c3dd2f885f911e76075d3a0319a5c5f9308b64d3ce1680
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\161ce6a7-7a62-4fe5-8507-e0ae43f92190.down_data
Filesize555KB
MD55683c0028832cae4ef93ca39c8ac5029
SHA1248755e4e1db552e0b6f8651b04ca6d1b31a86fb
SHA256855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e
SHA512aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize23KB
MD596f36c2acf32c990fcdefa63b834673c
SHA1e6789e2116691b32c8a5546cf06dce92593e7db9
SHA2565e64cc195984ea46ee3afdf1ff05fe5a91882ce64f7ba036b55a09e9fa5483a1
SHA5122db4c973235c8b2ec52df5a7ca981a84ec167e03e4c015f41583f2e06c3d1fa054ccf349d2ddb5ce0ee455496d801879cca21df1fbbbdaadf47a89fb23a3f647
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize23KB
MD59087ae74d30d2e2b097ee71597c836d5
SHA1fa53fd233fe40713494c877d602d594eaef823e7
SHA2560f556a1dc8300722d5c9e1fa02e9f752de0ad6218bec80c942d664bf9256cb97
SHA5128b36a58eeb967c69762b67b7931867cfed4757eb9eb397b6cb381bac83874928eb18aa43a43bdbbe9ec425bf54ac55fffcc565d56b33438b613c815f3a5940ba
-
C:\Users\Admin\Downloads\041bc20ca8ac3161098cbc976e67e3c0f1b672ad36ecbe22fd21cbd53bcaa742.crdownload
Filesize8.7MB
MD576fe4fdd628218f630ba50f91ceba852
SHA16e90f2fe619597115e5b8dd8b0d1fb0c8ad33fa4
SHA256041bc20ca8ac3161098cbc976e67e3c0f1b672ad36ecbe22fd21cbd53bcaa742
SHA5127956505ae0d8479a92ddf97bb09a757566ef526934ee06b4273f0fc450e4da9204808ffa4f4674f4e6e313eb718a7c65f258ef8d23b9769b8aa12d47610d8011
-
C:\Users\Admin\Downloads\041bc20ca8ac3161098cbc976e67e3c0f1b672ad36ecbe22fd21cbd53bcaa742:Zone.Identifier
Filesize26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
111KB
MD5e8ed8aaf35e6059ba28504c19ff50bab
SHA101412235baf64c5b928252639369eea4e2ba5192
SHA2562d2a22db20a44474afbd7b0e6488690bad584dcae9789a5db776cc1a00b98728
SHA512d007c96b2fad26763d27be8447ca65e0ab890deb6388b90cf83c0b3431e09b225f7424098927b54f15fe34eae953b61b45371b0df4b2d89c60be9c006ffe9034
-
Filesize
4KB
MD5331973644859575a72f7b08ba0447f2a
SHA1869a4f0c48ed46b8fe107c0368d5206bc8b2efb5
SHA256353df4f186c06a626373b0978d15ec6357510fd0d4ac54b63217b37142ab52d3
SHA512402662eb4d47af234b3e5fbba10c6d77bdfdb9ff8ecfdd9d204f0264b64ea97fc3b5c54469f537173a26c72b3733550854749649d649bc0153c8fe3faacc50a1
-
Filesize
229B
MD50e3b065cb0f4014befce5784b7043733
SHA17b72b2ab8edbc93f293b865939b0233a3d9edea8
SHA256250cad9f32c0d70a55899dc7170063a2a56e7f53c21b2d3fa517d765cd8a6758
SHA51274d18feada35c61cda4d5a00847ce999579780f290814343c6523e1761cf23522928de404ef767b5de49f8d7204ec2662f0d91bd4f55c474ebe1b2328bee5d31