Analysis
-
max time kernel
44s -
max time network
43s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2025, 21:11
Static task
static1
General
-
Target
Teletubbies-Asst-Thumbnail.png
-
Size
237KB
-
MD5
a2e5b9bf96a0bb0ad5afa765bdc88a3c
-
SHA1
e60cf3bc88e35b7b471a20f1ca619ce7bf268bd1
-
SHA256
b101408bab05ffc25b0ef735770840f40230fb99d9e10d420337d6113e6c1f5a
-
SHA512
79aaf6510936e77d0adb03fdee72a4197a645ed84b9e32daf708146e8a96bcffb95fde699ba2dfb646a88a55de9c77f4b1582c403e1982b5dbce2d1e1a6a90f5
-
SSDEEP
3072:sA+McPEy54C5TmVveG8cO/RqYG1FCk6paC6Q8LByqWmhhpaGhWGBom9u03m7bNJD:VSEGB5TGR0paBvys/9u03mHNJg9WrCm
Malware Config
Extracted
latentbot
epicpbglobal.zapto.org
Signatures
-
Latentbot family
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133893115336051179" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 428 mspaint.exe 428 mspaint.exe 1384 chrome.exe 1384 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe Token: SeShutdownPrivilege 1384 chrome.exe Token: SeCreatePagefilePrivilege 1384 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe 1384 chrome.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 428 mspaint.exe 428 mspaint.exe 428 mspaint.exe 428 mspaint.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1384 wrote to memory of 1312 1384 chrome.exe 99 PID 1384 wrote to memory of 1312 1384 chrome.exe 99 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 5808 1384 chrome.exe 101 PID 1384 wrote to memory of 5808 1384 chrome.exe 101 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 1924 1384 chrome.exe 100 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102 PID 1384 wrote to memory of 624 1384 chrome.exe 102
Processes
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\Teletubbies-Asst-Thumbnail.png"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:428
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:1144
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x118,0x11c,0x120,0xb8,0x124,0x7ffe730bdcf8,0x7ffe730bdd04,0x7ffe730bdd102⤵PID:1312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1804,i,14561828449609851228,9973650343886523837,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=1800 /prefetch:22⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1600,i,14561828449609851228,9973650343886523837,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2056 /prefetch:32⤵PID:5808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2396,i,14561828449609851228,9973650343886523837,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2408 /prefetch:82⤵PID:624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3208,i,14561828449609851228,9973650343886523837,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:5756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3224,i,14561828449609851228,9973650343886523837,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4452,i,14561828449609851228,9973650343886523837,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=4480 /prefetch:22⤵PID:5992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4644,i,14561828449609851228,9973650343886523837,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5468,i,14561828449609851228,9973650343886523837,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5480 /prefetch:82⤵PID:3268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5460,i,14561828449609851228,9973650343886523837,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5588 /prefetch:82⤵PID:5176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5704,i,14561828449609851228,9973650343886523837,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3952 /prefetch:12⤵PID:6060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5848,i,14561828449609851228,9973650343886523837,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:3208
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:4008
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5468
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
414B
MD56898183ffcf284bf8afa82d8dece05e6
SHA1ede202fb361c20a24a9cb513de467592691e7908
SHA256bccda7fa356f1d86145e3a64e4c1f4e8b97e9881959b24566d5cb921294381c6
SHA512c7b06c8a8d9586030f676455ca7ade8a7c6d235e196306db419f76d45d8f0032f4ffbc9670aaf501b9f523452ee466a1138430979c26a929d110c2a4452014f7
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
10KB
MD51833e17ef0bfc93cf402a32c2ff54ac2
SHA19312b9bf2eeaa14977b302ca3b71dd35f8f1bc50
SHA256e81aad53ca9af787934637807552a252148b23155ea4be03193df4ff8ebfdab6
SHA512b271f373427005f31a196949ba4b9b57da20558c555c7ace7e481ebaaf174f9e0b26d67a29e9c5fd48c352e3fe6a7fded10ff444bfdbfaeb6fd564192502e16f
-
Filesize
15KB
MD569575d9f91e629656856a2ad78be2aeb
SHA1071c8f023c7a364fc7cf5927754dfdab539c8850
SHA256bd2cec3b7ced2ec7a9db7d477c9c274eaf55931b29bc092a204431e0b17008ca
SHA512962b2e369f4b06bf8594445834adcfce6e9b067bebc7cfe693527e4388ec353779e0b3e0181f189f914f08954d35040132da4fd9b108f850003c40c000c7656a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD53bae8694e505355d0c08fe38e043e71c
SHA1008f53ff8f08437ae0404f49702ab95edc23855f
SHA25624da3b37d605784d055f5d2b4081ccfe7580fa1530cf4f26ba2c715e486ebbff
SHA51251cf760f5de6b217cfe37ac4c0c0d128967048b45058544fd41b3dece922af024fa7fee5617f2512cbd7f8b16ad2cf82b258316e0c8293531fbe18b297e14a0b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5804ed.TMP
Filesize48B
MD5245607fe80fe366e994f30649a98885b
SHA145316fb74732f33c3f43a97becc690aeeb084534
SHA2561aec6d698e8288f678131a2da3aeaa2e8d7ca68dc9cd8ea38b9a73509b2819e4
SHA51240448eb7813b698b4316b023c7d70bc225121fe6d0225903cf352773e148a171390960d08dd1d9f4ae776d59ed52bddf34a7d9cdc990d99dcce84cbce338345f
-
Filesize
78KB
MD5e232fe1c24aa8d4e542a0d9966440d64
SHA1c500c48cefde4cb7918e04999fcbe230e10bf4f9
SHA256f9f0d5bdc84ed0b90b41aadc3cd46ad446bd01998fef6b59c92fb3d772b654a7
SHA5127fa7acbee67f9be135bd97cc695e96adaebd316b9f4fab21116a6fe2154e9788d90622762d7210737ea4a8fed420f1cb603aca8047085674ceb4c9acee7e4e4b
-
Filesize
152KB
MD51cda631d12c37dbf0c1f8ab7d3a6eb29
SHA16410cc94192530166dc47b23eb0d298c9db8858c
SHA256ebbc1e79c964db58ec0695db2ac5cdd132a9372549104c4d71b1a9d2b7d09dc0
SHA512fe8901f86da1bcea7fc7b48b3443b5a6ff9606ba001a90bae029c8f96592dda503251af4fe66ac790c616e1aeff7808c118286a6956dc2cf36fc7555112787da