Analysis
-
max time kernel
155s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2023, 05:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.apko.lu/nos-mentions-legales
Resource
win10v2004-20230703-en
General
-
Target
http://www.apko.lu/nos-mentions-legales
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5076 msedge.exe 5076 msedge.exe 3972 msedge.exe 3972 msedge.exe 4496 identity_helper.exe 4496 identity_helper.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3972 wrote to memory of 768 3972 msedge.exe 81 PID 3972 wrote to memory of 768 3972 msedge.exe 81 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 1720 3972 msedge.exe 84 PID 3972 wrote to memory of 5076 3972 msedge.exe 83 PID 3972 wrote to memory of 5076 3972 msedge.exe 83 PID 3972 wrote to memory of 2092 3972 msedge.exe 82 PID 3972 wrote to memory of 2092 3972 msedge.exe 82 PID 3972 wrote to memory of 2092 3972 msedge.exe 82 PID 3972 wrote to memory of 2092 3972 msedge.exe 82 PID 3972 wrote to memory of 2092 3972 msedge.exe 82 PID 3972 wrote to memory of 2092 3972 msedge.exe 82 PID 3972 wrote to memory of 2092 3972 msedge.exe 82 PID 3972 wrote to memory of 2092 3972 msedge.exe 82 PID 3972 wrote to memory of 2092 3972 msedge.exe 82 PID 3972 wrote to memory of 2092 3972 msedge.exe 82 PID 3972 wrote to memory of 2092 3972 msedge.exe 82 PID 3972 wrote to memory of 2092 3972 msedge.exe 82 PID 3972 wrote to memory of 2092 3972 msedge.exe 82 PID 3972 wrote to memory of 2092 3972 msedge.exe 82 PID 3972 wrote to memory of 2092 3972 msedge.exe 82 PID 3972 wrote to memory of 2092 3972 msedge.exe 82 PID 3972 wrote to memory of 2092 3972 msedge.exe 82 PID 3972 wrote to memory of 2092 3972 msedge.exe 82 PID 3972 wrote to memory of 2092 3972 msedge.exe 82 PID 3972 wrote to memory of 2092 3972 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.apko.lu/nos-mentions-legales1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeb31146f8,0x7ffeb3114708,0x7ffeb31147182⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,1221365355873027910,12260136897397268487,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,1221365355873027910,12260136897397268487,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,1221365355873027910,12260136897397268487,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1221365355873027910,12260136897397268487,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1221365355873027910,12260136897397268487,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,1221365355873027910,12260136897397268487,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4608 /prefetch:82⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,1221365355873027910,12260136897397268487,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1221365355873027910,12260136897397268487,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1221365355873027910,12260136897397268487,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1221365355873027910,12260136897397268487,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1221365355873027910,12260136897397268487,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1221365355873027910,12260136897397268487,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,1221365355873027910,12260136897397268487,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3640 /prefetch:12⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,1221365355873027910,12260136897397268487,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4868
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3620
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53423d7e71b832850019e032730997f69
SHA1bbc91ba3960fb8f7f2d5a190e6585010675d9061
SHA25653770e40359b9738d8898520d7e4a57c28498edddbadf76ec4a599837aa0c649
SHA51203d5fee4152300d6c5e9f72c059955c944c7e6d207e433e9fdd693639e63ea699a01696d7bbf56d2033fd52ad260c9ae36a2c5c888112d81bf7e04a3f273e65d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\1d8eef3d-2e11-4d15-b56c-dd6ca2f99a18.tmp
Filesize5KB
MD57ab8c31b75f77e5ae6a6ce3240c1d82d
SHA1154b0b7bf448c671eb970b9527ef70ad16aab438
SHA256ce4cea15e174f207e5a7d7bacb3d913191639bd5a14603327aa5f31874d953c5
SHA5125854721943313b8aeddf490a35ff7ca7c86ed792c44140cfc5fc915112c981ab5d3f93088a931b8e7509abdb12685df9bab6021d27e35b0f38c5ed38732f9a40
-
Filesize
180KB
MD5497835d373e12af4cd257487dd5d3612
SHA1425950e9427926ac0aa7940c4a18a44ab59df47a
SHA256e11ff08dff0a884b311133e2469146b2a54319cf60094511e098df0c3677c4e0
SHA512aa05611f56185e02289345f9c286ca98f96d5e1d24c8d152605e866e60013dc2945fc60f826e81459003ca9c2b7d439c0f6fdd173cbee57cd751ee51b18d2bf7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize576B
MD55a9b9665d3b18bd1ec531880bf007312
SHA1824d59733a0d6e7b5618b9ed52ed5b5744c23e1b
SHA256d854b80ce8b76b74a45ec56b038f1b6cb6b4fb5a7392b68dd7797f51d7e44cbe
SHA512456aa483e0082363e864993ea7a2255e52b5b551cb624c7fece2edd8e7a3a30746ebdd123c89956deebfbe339dd42b81bfe52f0f5c26e4b25437abc55218a329
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize624B
MD5280af76932a4daab53951f6fdb2b8c8e
SHA16f198f23bd9a9d3acd2505362d609b20ebd7c931
SHA256e98b8ebd59693aa93853c560d8bde3d685cf2da7eda1af3fe5af911908e6e722
SHA512657bf16fa650b7774c3e9f25a6850abb97120b25bae1366f7ee649e8943bc300879db2273aaceab6dc49ace3875c80179bdc8eb2eb4825fd5f9c14e90bb062c5
-
Filesize
1KB
MD563f23948ae8b41a9383c805d511393f1
SHA13b8ee744c0b2da496f281b74ab48f5e815b34825
SHA256f5329c89219d6702baae79425922f0ae4a57b65b7154826cdae9146d377a3e23
SHA51215eec71c11f9bf77263e3121da3d28d6f57680e7b0bc462d5445d0fba0bd4c83b51c3d02c311980973f019e61b2fd408e609a99a5e9c06f7697aabe0cd7e93f3
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD544615b51e434a068877166703ef25eb4
SHA1912733b098d2e20f590bed5c9a7c75dfd87ed1f3
SHA256ca153e64259f74262551efe49c00f8c66137009c949f2bb54547cb1f39bd64e7
SHA51229c86b0b029c32fee2a9680f0c1f511b45b529a346ceac4147adf478594b10eba2629d0ce0e3e6ea3df5cf26172f1f91dc8b05efba792f6081e2984a45787c9f
-
Filesize
6KB
MD555d2015d237fac310040a4f0ce7627d9
SHA1e8d46c36e25b4131ace1f160dbf39ad28e3ed24f
SHA25663727025cb4ed08cb9ab222bbf994ed884970fc38ac0e9f857e96608455b52f5
SHA5122b64a9061eff2df01e7dcee05b9ca783bf1b599cf70e88c8965153882ead44b79572de58d4fd3a8359a8f231ecc583011e3ec3f4759b016b912b487fb95c9eec
-
Filesize
6KB
MD54f6f73e6681644c7482b3afc7efbc9f4
SHA15bd157f5d1d46156cb08cad726bf502e42163b06
SHA2563a9c470caccfc3f2593c02829b78c5120534d55667073e400e47dc6014316274
SHA512305bc509a4d3208a38aa567c57dedfeac4e0efde227ade88cb1533c11ebaeaf12142119b409c46d3943979ce5eb771ffb2b82ba7dc67f8a7c44bd59d0275d97d
-
Filesize
24KB
MD50e78f9a3ece93ae9434c64ea2bff51dc
SHA1a0e4c75fe32417fe2df705987df5817326e1b3b9
SHA2565c8ce4455f2a3e5f36f30e7100f85bdd5e44336a8312278769f89f68b8d60e68
SHA5129d1686f0b38e3326ad036c8b218b61428204910f586dccf8b62ecbed09190f7664a719a89a6fbc0ecb429aecf5dd0ec06de44be3a1510369e427bde0626fd51d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54877ec6d6a73c111ebb23be296e69904
SHA1fbb4317e7e53a35a01d325a871822dfc6ff186a6
SHA256257e7f0aa1bbee034887d4d2527e811b0f104dba582a093931d70f862b738557
SHA512be9e312aefd678e29211f4428e4fb1b67601783eb0eed1ea6b44e4c0ab4972c6eb5cbc927f6a1f910bede0f4dc7390764671ab296e2be9ab0ad83230e4d8b1db