Resubmissions
31/03/2025, 16:20
250331-ttgcgsttbw 1031/03/2025, 15:33
250331-sy8rvssxgz 1031/03/2025, 15:30
250331-sxh5tasxfs 3Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2025, 15:30
Static task
static1
Behavioral task
behavioral1
Sample
EasyInstallerV2.exe
Resource
win10v2004-20250314-en
General
-
Target
EasyInstallerV2.exe
-
Size
954KB
-
MD5
7dc8bd5f288db84de1673551e097091c
-
SHA1
74dc9cb4c1e34fa9fbdfd9f1368517136592ba4f
-
SHA256
68310e7362e3f6a42dfd3f30b1664d5bce98045d606ba9e321ae5a2aa12fb034
-
SHA512
57d7c3edd1de49aab4c83171adce94f2ef2b02a8ecc39db6f0e88f4541839f181e8b2b9a11b96f063577a3268796e55663473db533b2987fe9ea07ce8573f759
-
SSDEEP
12288:uLXxYS9cj/sTS9cj/ssFIM0KteTMN4Or4D3OdmZg5WHEaEDIGBBjgrIQtD+tVqDi:u7zMTMNNd+g5Wk78GBBjgrIQtDg
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133879086514007332" chrome.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 2312 chrome.exe 2312 chrome.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 652 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 19 IoCs
pid Process 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe Token: SeShutdownPrivilege 4360 chrome.exe Token: SeCreatePagefilePrivilege 4360 chrome.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe 4360 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4360 wrote to memory of 2584 4360 chrome.exe 104 PID 4360 wrote to memory of 2584 4360 chrome.exe 104 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2444 4360 chrome.exe 106 PID 4360 wrote to memory of 2444 4360 chrome.exe 106 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 2104 4360 chrome.exe 107 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108 PID 4360 wrote to memory of 4292 4360 chrome.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\EasyInstallerV2.exe"C:\Users\Admin\AppData\Local\Temp\EasyInstallerV2.exe"1⤵PID:2032
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff9a13bdcf8,0x7ff9a13bdd04,0x7ff9a13bdd102⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1964,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2232 /prefetch:32⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2072,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:2104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2400,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2224 /prefetch:82⤵PID:4292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3216,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3236,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4340,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4360 /prefetch:22⤵PID:636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4768,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5392,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5340 /prefetch:82⤵PID:976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5604,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5340 /prefetch:82⤵PID:3520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5712,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5696 /prefetch:82⤵PID:3780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5704,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5872 /prefetch:82⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5700,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5744 /prefetch:82⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5884,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5652 /prefetch:82⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5640,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:6128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4876,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6068 /prefetch:12⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3640,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3088 /prefetch:82⤵PID:5756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3652,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3648 /prefetch:82⤵PID:5852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5852,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3384 /prefetch:82⤵PID:5652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3368,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3648 /prefetch:82⤵PID:3200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=5880,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:5444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=6320,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6292 /prefetch:12⤵PID:5488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=1204,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:5156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=6600,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:5960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --field-trial-handle=3644,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:3216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=6008,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6124 /prefetch:12⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --field-trial-handle=6632,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:5744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --field-trial-handle=6228,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6276 /prefetch:12⤵PID:1076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --field-trial-handle=6496,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6148 /prefetch:12⤵PID:5396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --field-trial-handle=6576,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6832 /prefetch:12⤵PID:5816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --field-trial-handle=7140,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=7080 /prefetch:12⤵PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --field-trial-handle=7056,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=7124 /prefetch:12⤵PID:5916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=7244,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5672 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --field-trial-handle=6248,i,18442436487643735159,10346605207921365281,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:448
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:3944
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:800
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4a0 0x3941⤵PID:6092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD586eccb4f05e29013d46fff96b84e5e45
SHA13f17af7b5b8f101ae6f17612f110d06b6b9b5603
SHA256d1d885a18d732a8194b977e6122929e1cd08b0cfba7b9fd45bf3f0cea1c9ee7f
SHA51271b3dc8e93b0689cc4acb97fb1981859b1ae4b7aa121703cf5f2f1e7bf2045b6380313a77ca8ac17015938f0aa2f50e8bae873a3789292ba37a67e0339c66af3
-
Filesize
649B
MD5311415f9126ad8923049247b8f1cb3c3
SHA1c9ad23f628153f74ea18157a75d078a6dd0d29ef
SHA256b8dfa43e858d47a28dd6b7016188181ba6fbc5ef842e6c9cbc1ca47d50c68baf
SHA5120e98113197e6fd449b486e55301a1c25d71fa9999960bd83eb3b4affb9be299dfe1c5ec1ad40c522d378663906f0bc2de8c8e8edd1596b11f15ae9c428377cf7
-
Filesize
63KB
MD51901d2bcbbabee4bbb9804c30642ae2b
SHA1f31774bc12614be681c0b0c7de3ac128f0e932db
SHA25615eba349e5829f11363614b8f3dd9c3d04994586601d3c4c4d8069e0f5655310
SHA512bdb94d7d8cf47b239c61559545b1dd26e05da909fec05d215471388545879cd8ec9e1fea51c04ed43927e2b07b5b80a74f09eb9038c8d9045e4161ea69df215f
-
Filesize
38KB
MD5f53236bc138719b68ccd1c7efb02a276
SHA126b7d3eea5d3b12d0b0e173ebf2af50a7d7e56d6
SHA256787c14f8cc865430c03c96a345044b7c5b8dc8a032511a500d4a42228533acd8
SHA5125485bc7ccce8ec75f60bca3be846086a4bd4466009c8e22da9cdd16bb1154529af2fb2667cd3a97485cc4f6635fb79ac0fdda4f3e1f39f25f6196f708a92d740
-
Filesize
38KB
MD59436affc97843765a966b3568fa7e5ec
SHA17bfda74bb30589c75d718fbc997f18c6d5cc4a0b
SHA2567165713d3e1a610399471a5e93d5677508f62ef072c1151e72273bf4bd54f916
SHA512473ec3a843c33e18d6d194651fe11353fcd03a7959225faeabf8c77484155ea6a7bccb72dbaf2093ed53c408faa3be9f6fc907f7a5ddf8223375f9d09b504456
-
Filesize
72KB
MD57b85ce6d64312e6f0d8f712897a45a66
SHA1431224de66f74e70ae5b37a67260b795352861eb
SHA25603a79fc56e2b58121ca2fe5938be882582ca7c26cc4208ebf777de6220f59fe1
SHA512b22d7680c82a5a45d0094dc16b0983ff59c5e3e0567d2854be14cde6a56af63729a1c4e041223fe26569e92961c49a80d603136e88d60f8f7b78ca1999b4fb3c
-
Filesize
202KB
MD52935dc6c9be56a94b53ddd066704e3b4
SHA1dd79fee5dd202c30c96d5904d16be7f51b1282c2
SHA256789124733dc2f59cfd38ed0b90e314bba0a533fde97e7ef502b2d0d71c623f18
SHA512457ce952c12c93508f8c1c2e2faed2fc6ddab3f01276b35d7e90fe3bcaf5149f29735b77f4bb7a02bed414f0b40cfe24dbd83c833fbe3af9862f56455145c459
-
Filesize
413KB
MD570630ee9e4f353a34d169c42506afe55
SHA18ea35a27ba4a49282929372d8565414b094683a7
SHA256fe2c315054af6b7537f79d99f35ae5283e9ba2848a1e28c95d1547def2b576bb
SHA512fb4976d051736e4360d7c694fb280848a599fa61d13e2d789a53da7eafd923c17d8ab44a569a400caec42dc88a16d6f5865ea8096d2b3b8356c11db3dde26925
-
Filesize
78KB
MD5b109202cdd80f8da813c70b55b502282
SHA149b4c094d5823ef35d2db07cf7a682c32c4f03e8
SHA256f1f0a9fff798f306b3bac1a4a1c7503c3a6e9000e6458b106918dae28a60e865
SHA5122fcf4fb5046396250eb56b573c998ab55040b80578f01e04fe0dca3e23f7f6052f18c29dc8c18a6d7a335b28482c2944b80e000a396aa24db8a845cd334f13f6
-
Filesize
216KB
MD550a7159ff34dea151d624f07e6cb1664
SHA1e13fe30db96dcee328efda5cc78757b6e5b9339c
SHA256e990d9d31c4c7d57dd4795e43baea05501fb6ea8b7760f89001be660425dd01b
SHA512a7768dd7e315b07754a305080e0fc023765e5a224b2c3824e8e10f29286df63bbdefef379e069941fd8cd9c7c3befce976779ae2efdfb6e7da697b09d7f07250
-
Filesize
480B
MD51f4f3175956e41a0cda679fc3f56e225
SHA12558222021b4522d81b2d7f5ad6be80f407a2e4c
SHA25624538bcd89f7023617810387061e1854d60c6cf0621243167449a074de6741c1
SHA51295df7847b2664de4ede9c479eb86e6f53bc8f7c65d65c6b9ce99788499a0516c19368f13215287fea011b91d8fd89ad07aec681656d492dabd539a538080e19c
-
Filesize
5KB
MD5ca6027cfdf2498de4f159ef46456cf7c
SHA1522e2d31af5d0a9bcf9626ac4e427eb8d53ee06d
SHA25614e82a0a6f57569f023ac7cca0107f0b453c778deb6e346603f3bb24b41cb967
SHA512ab76b15f03f3e56438a085c67ad1341b9411be9f57440ee5b79ff29610767fe460d60061138f7b286b8313249eff505dffd1a6bc41b5f70ad7ae78331ab6440a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
10KB
MD57a45da8a6cbdbf5ea15cd7a27e589d21
SHA15cf206821199afa6413682580443ced5d6f9769d
SHA2563c38f1506b4cf1c01bb18ef5d39f2d8d8f8c901e6cff074ace75b9993f97177f
SHA512863ca0d597eb653a942ef25cbf216aafab7deb4222b6ebf2c0c4bb09b5f695291678b2f2fda6a0a08e2a4f9a6115721cbb5073484e3c91b686e7251ebad436b9
-
Filesize
12KB
MD5a24b6027decaca9463a6170c3651b4a1
SHA1c7af892c8cfbce5ce3cf760e0a67a51eeebd23b2
SHA256b107244bb6be22e59453087d4822af094ae06148ae558c2f1d602b04b26f9314
SHA5122d6f2e0555be714bdfa1f9dde39df7b78b1334b7f837652c2ea83247fa1c30a7e19c76995b1bdf5056bd04d345857193a7980c004c7c3b2a296374fc053b4077
-
Filesize
12KB
MD5bd0672457e12c4f1138da8b55522690e
SHA1e81c7a99d97b14afa5baac98962cbb08c625b791
SHA2561e7248e6c19be86532831ef2bcb86dc919b4e8eec8942006b729bc05e1da32ce
SHA5129fcfd7559568e598f3bc8dd74f034c80126919bf2afa4ce02333f487f282a31b3676934af35bba68dfc05a08f12274b79bc648dd4cbc331fb04d9744e726aa2a
-
Filesize
12KB
MD5be7ec49d0299a78fe44d5d3482cfca6c
SHA1f20654c3bc97a8aebbeec5e1e0a756ce4409ac5c
SHA256d9b2814408739ebb512173addbf19fbe1d6f14271dd64883e9bd8f7b484a93c8
SHA512d2477099e5c6ef45defd4526c0a4869b84bdb057e3b23bf03b4651c8715ee889a248238b3ebc6eff0fd09dfc051072167ab9e4c268bfcbf359709702e831eaf7
-
Filesize
13KB
MD57a2b654fd39653cd74fa0a4ce60402bd
SHA150a32e1657223e198328ae7c74875dd794bca174
SHA256bc14683b5ae67731472b94c34f4cfc1ff834c0dcb04b8f96c4545167e575e4a4
SHA512cf18c7dfd8a63974d902fd65cc714c7e48ac6725f2611610aa80a693007ef7a43be34c75daee867467ed47e6bd8d7ed9173e186799b565abbcf8a840d753a500
-
Filesize
13KB
MD5a78b6bf112966abde4f3fcac634b9d5c
SHA16be9501c962c68224ac2091d79bd2d10de4156ce
SHA256703fa7297f3155b382cf383bcbc41507bc81ae599fe6a961e2e1e5bce0ddb848
SHA512bf7cdea404053f9399acde392713141c4df2c6776621161d325bb42ecbff06d3dbbfc63071ae4063d2b130f93063b0925116c2ebc345fae6b44430c21d21db7b
-
Filesize
11KB
MD54032dc847190e7d66cf1345a884ecfb1
SHA1f0a162ee4c6d5e0d0a96fbef0ceed7e58dcffa80
SHA2569e53a943d62d374c1c44fd34800707f06c14f39c332bb12c78b29c38ade5cce9
SHA5125e93efbf4d49423418971c3281e489b14c30f3c3045eb0d86e04c7eb488d85acc6a1414cd1c39aaedbd5c0e603e128aea0d36b4703add9a10b8179a28a8764e6
-
Filesize
18KB
MD52c1a90930b85ab9ce7db52d8a07b1daf
SHA1003582ead1b1daf07564f35519f8b0d265780359
SHA2564eb4044fddd7b45ddb6e8cfde063f11c53ee7f9f12ac24c19bd2a637ae2f5c5f
SHA512d9eef8a89053d1d46e2b2d9d5e84d596dcf3b4c6d7c07fa612f45dd0e90383fb61eb3c22b1e4ff9ef309c1ee8e247f0638cd303ad4c07070647251c50e0d424c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD59525bf97d12ee1e8dd7d2f569cb86efc
SHA13ebcacee42092f88fbcc7a8520f002ef74797583
SHA256d59526e1738a59f033619bef402bc5581904ee97659a88f0cd1c0804a254f6c4
SHA512dcfbb5f9f8358b0f802968b628df35c398625694c9914ef2cad781c6c5e90ca18f1c78b730b6af0e36c9f67ba50f147013049b3c85e762b84886fde7a8c8b7bc
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD5bb081e1d41d3c43bcee5522131340581
SHA189deda2a9da297af8f97f95bc1e4fe5ab683d66c
SHA256127abc2c799f3a1e39aa10a13e20322eb91e3b48454ed902a3329e7899cc3b47
SHA512471b329208e4f38bf9ca09bff181ed38317560324300df21cacad2cdb7683570e3e1ecac12c57e9ae8fd75e75699080cca19411eec5b756d71cbe02200d74fd3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58604b.TMP
Filesize48B
MD593206fd61b5dac85d465bcd2bba8af1c
SHA17c57d30aa9cf0f8400452b43ff31aa11b711854b
SHA256ecb6560f9f20faac8fac7fae8871649b9e0f1fb34979a20f9f75ad8ffcd9e6ac
SHA512b6199d86fac7aa15fd906cc0b527299d3463287a348b00e2e1846edff5508ab834ab78c83a99211915ce78617833e38699967c1c0eac448789d428e89a952322
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\ba72971c-aa03-4fdf-bb8b-0574e22ac6c6.tmp
Filesize13KB
MD5dfc32b2a876a4af663d4d785fd3e3691
SHA1ba10d9de0bf8c3448d2bf36af494fe82dc03657d
SHA256ae5807ee1364a5ac2df186e41a339388db780e9c85441cf20d7b2e5a257d465b
SHA512fb2bcca4e30e6b98c7c2658d554bb287f7578adaa042c1f9d11c335473d0a74d38df5843516e88cee293cf97b8e67dac6c5e29afe3feb7a21d18e8b341616bc0
-
Filesize
80KB
MD5a81731adef335fe1bd50032fcb718bab
SHA11bd2dfbc4f6ae5ea4e37fb3be9862a2d9bbfbec3
SHA2568527ad4f3bd79eb24ce9cd7d736aef778c1acaa9bccf0a50ecf87cd2aa73cfc7
SHA5121ac78bb3fa4db2d9f70f261dc9abadea6366f73acfc46122189501a3c5134e92f02d10c16d4ce4122b04d6e39df101f3ad70cd0ff2ee44d302dd4c7e70e256cd
-
Filesize
155KB
MD5b932a1730f4fcc1617550649925e88ef
SHA1ccf8ab7813b3a3fa80d9586ac1f8d8169160e0d8
SHA2564f3c3ac8f1d560bdc918d50d0965cde7eda9aa96857ad41291abdf2d04bcdf1d
SHA512093bc2c99bd67c6ea336fc17cb03b12700aaeda917c57deab4fba78db9273329412e98a3ec8ac9d000b0125d7e46c289e5cbbcbc5e07c480fad1189261b76c62
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4360_1196821967\feefcda8-237b-497e-ad59-212215f30fe9.tmp
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de