Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
funnyvirus.exe
Resource
win10v2004-20220901-en
7 signatures
150 seconds
General
-
Target
funnyvirus.exe
-
Size
129KB
-
MD5
3f8735d8153a05fad43415b88808c041
-
SHA1
67f21b1a25f9fea6767d8c994eb73b5a3ccf8b12
-
SHA256
9172c2505515acd23d0f28dfa60301d36b286e6817fd16ceb48b93bd9ed09bf2
-
SHA512
ebe5aea259148bc7bbf0906ace13ee60f7506911d1d80a597439d9f295c8ea31fb413596eed948f1b77d8411d256f16c05a9d48becb117cc1748050354ebf30e
-
SSDEEP
1536:x+XCbdTqMllaUPHXYTTPmC+chT9mWEtwZQ/ErHot2/TOAghItB9:QSb0MKWY3tfR2y+/ErBrOBU9
Score
1/10
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4068 chrome.exe 4068 chrome.exe 4092 chrome.exe 4092 chrome.exe 4660 chrome.exe 4660 chrome.exe 1620 chrome.exe 1620 chrome.exe 4064 chrome.exe 4064 chrome.exe 3900 chrome.exe 3900 chrome.exe 4200 chrome.exe 4200 chrome.exe 5024 chrome.exe 5024 chrome.exe 4376 chrome.exe 4376 chrome.exe 1040 chrome.exe 1040 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4204 SystemPropertiesAdvanced.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe -
Suspicious use of FindShellTrayWindow 61 IoCs
pid Process 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe 4092 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1884 wrote to memory of 4740 1884 funnyvirus.exe 42 PID 1884 wrote to memory of 4740 1884 funnyvirus.exe 42 PID 4092 wrote to memory of 4184 4092 chrome.exe 99 PID 4092 wrote to memory of 4184 4092 chrome.exe 99 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 2540 4092 chrome.exe 100 PID 4092 wrote to memory of 4068 4092 chrome.exe 101 PID 4092 wrote to memory of 4068 4092 chrome.exe 101 PID 4092 wrote to memory of 908 4092 chrome.exe 102 PID 4092 wrote to memory of 908 4092 chrome.exe 102 PID 4092 wrote to memory of 908 4092 chrome.exe 102 PID 4092 wrote to memory of 908 4092 chrome.exe 102 PID 4092 wrote to memory of 908 4092 chrome.exe 102 PID 4092 wrote to memory of 908 4092 chrome.exe 102 PID 4092 wrote to memory of 908 4092 chrome.exe 102 PID 4092 wrote to memory of 908 4092 chrome.exe 102 PID 4092 wrote to memory of 908 4092 chrome.exe 102 PID 4092 wrote to memory of 908 4092 chrome.exe 102 PID 4092 wrote to memory of 908 4092 chrome.exe 102 PID 4092 wrote to memory of 908 4092 chrome.exe 102 PID 4092 wrote to memory of 908 4092 chrome.exe 102 PID 4092 wrote to memory of 908 4092 chrome.exe 102 PID 4092 wrote to memory of 908 4092 chrome.exe 102 PID 4092 wrote to memory of 908 4092 chrome.exe 102 PID 4092 wrote to memory of 908 4092 chrome.exe 102 PID 4092 wrote to memory of 908 4092 chrome.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\funnyvirus.exe"C:\Users\Admin\AppData\Local\Temp\funnyvirus.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\funnyvirus.exe"2⤵PID:4740
-
-
C:\Windows\system32\SystemPropertiesAdvanced.exe"C:\Windows\system32\SystemPropertiesAdvanced.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:4204
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffc45f64f50,0x7ffc45f64f60,0x7ffc45f64f702⤵PID:4184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1628 /prefetch:22⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2016 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2376 /prefetch:82⤵PID:908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2960 /prefetch:12⤵PID:1352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3852 /prefetch:12⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4464 /prefetch:82⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4648 /prefetch:82⤵PID:4604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4784 /prefetch:82⤵PID:2344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4712 /prefetch:82⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4592 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4912 /prefetch:82⤵PID:5052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4556 /prefetch:82⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4568 /prefetch:82⤵PID:3244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:1308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:1788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4000 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2772 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:3024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2660 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1492 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5448 /prefetch:82⤵PID:384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1612,1140168442474851262,5999750744602748812,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5452 /prefetch:82⤵PID:4516
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3992