Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2023, 01:36
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://edocupdf.icu/
Resource
win10v2004-20230915-en
General
-
Target
https://edocupdf.icu/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2940 msedge.exe 2940 msedge.exe 4252 msedge.exe 4252 msedge.exe 1848 identity_helper.exe 1848 identity_helper.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe 4380 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe 4252 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4252 wrote to memory of 4960 4252 msedge.exe 47 PID 4252 wrote to memory of 4960 4252 msedge.exe 47 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 4908 4252 msedge.exe 86 PID 4252 wrote to memory of 2940 4252 msedge.exe 88 PID 4252 wrote to memory of 2940 4252 msedge.exe 88 PID 4252 wrote to memory of 2500 4252 msedge.exe 87 PID 4252 wrote to memory of 2500 4252 msedge.exe 87 PID 4252 wrote to memory of 2500 4252 msedge.exe 87 PID 4252 wrote to memory of 2500 4252 msedge.exe 87 PID 4252 wrote to memory of 2500 4252 msedge.exe 87 PID 4252 wrote to memory of 2500 4252 msedge.exe 87 PID 4252 wrote to memory of 2500 4252 msedge.exe 87 PID 4252 wrote to memory of 2500 4252 msedge.exe 87 PID 4252 wrote to memory of 2500 4252 msedge.exe 87 PID 4252 wrote to memory of 2500 4252 msedge.exe 87 PID 4252 wrote to memory of 2500 4252 msedge.exe 87 PID 4252 wrote to memory of 2500 4252 msedge.exe 87 PID 4252 wrote to memory of 2500 4252 msedge.exe 87 PID 4252 wrote to memory of 2500 4252 msedge.exe 87 PID 4252 wrote to memory of 2500 4252 msedge.exe 87 PID 4252 wrote to memory of 2500 4252 msedge.exe 87 PID 4252 wrote to memory of 2500 4252 msedge.exe 87 PID 4252 wrote to memory of 2500 4252 msedge.exe 87 PID 4252 wrote to memory of 2500 4252 msedge.exe 87 PID 4252 wrote to memory of 2500 4252 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://edocupdf.icu/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb4c5446f8,0x7ffb4c544708,0x7ffb4c5447182⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,9522492636591443241,15651588777803972965,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,9522492636591443241,15651588777803972965,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,9522492636591443241,15651588777803972965,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9522492636591443241,15651588777803972965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9522492636591443241,15651588777803972965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,9522492636591443241,15651588777803972965,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,9522492636591443241,15651588777803972965,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9522492636591443241,15651588777803972965,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9522492636591443241,15651588777803972965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9522492636591443241,15651588777803972965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9522492636591443241,15651588777803972965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9522492636591443241,15651588777803972965,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9522492636591443241,15651588777803972965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9522492636591443241,15651588777803972965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9522492636591443241,15651588777803972965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:12⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,9522492636591443241,15651588777803972965,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:5564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,9522492636591443241,15651588777803972965,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4380
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5db9dbef3f8b1f616429f605c1ebca2f0
SHA1ffba76f0836c024828d4ff1982cc4240c41a8f16
SHA2563e0297327872058355ac041a5e0fc83ed017faee0f6c0105b44bb3e5399a93a1
SHA5124eedc387fe304f27f9d52ff5d71461c7f22147f7a8c18b8e7982acb76515528a36486a567451daafe093f9563b133c6799f2ad046e04256ccb46c83eb99e86c5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD55d7bbb126cbadbb356c6452ef8d08ac9
SHA1c7379c8610573d3fae755de08e3a6db0f1fca114
SHA2561e7523e18a3964fb5720f5539fab28ce66f1e0057d44abfccd4b3e2a2c2fb2b0
SHA5127e509b86abc8e6af00722419e9b2cbe61b945900404feef14b18caccacfc11d5bab2fbe53cada5a64ecfad93b6dd1e29f728485af302ad4a1798fabdfbf9b047
-
Filesize
938B
MD56c92a957722d3a2ac038139d6d18fd5c
SHA143aa22c1c67d9d1342b1818e9525a09e33be5b63
SHA256584d80483a45d00e86e45981e44732f96c689b291781e4ccb77b92d9ace30f15
SHA51214f2630f90b339a2e9daedc728014c07649e9768030ccf16b274ee60686a0585b2dd69a1c49e9177e7d650cd4d8a3ebe4a4fe013b150fb84adc7c019ad4f508e
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD59f9360c9a4fbd96aafb341195c2df827
SHA168235acd878d49a7ee44a587ecd45311eccaab33
SHA256bff3561607965349d3676b9b48f97e768d11d9ae46edd4608f6f43c6a9f202d4
SHA51256dd36d1861a65b0a911c52c067292c7e2470987a276a80a9b38d1f63331b75f14700a5bb18608da9d27e53d5b955adcf30b1a740ccd8dd8d93e28f499f53ea8
-
Filesize
5KB
MD5f72f6b578ca2d556e8f5638ab5888a85
SHA1ab683c07439081a4f2c02edf67e3d73b69c7aeb2
SHA256eccdacee3fe9f5d3a5debc14ff43b05e1c6ce3d11581cb1683ee33aa36d624a5
SHA5129790e38d54c65b0a1da33870ddc15da2ac40c4de76df62a009b1cd3eb64920d0ac4ae9ea1e6ecea7aa9a8b5ad3aae06365f469d44007ed6935fa672093512cf4
-
Filesize
6KB
MD525985c8137d1f15d7513cc39f819dc2a
SHA14238d6c76b9da7b632840113b30e0d0bbe3d26a4
SHA2562bf6379a7afdd9bbfdeb39f6fa176987e8516756396db28d4e8940548484ee78
SHA5124451a878321d0f07ab96e085f489d6ecc13b78c395f702a3f41ee59ce3486a30682bb93aadf86ff49d4e15921b9d34af29c889e092b28fb665ad895089142b81
-
Filesize
24KB
MD56dcb90ba1ba8e06c1d4f27ec78f6911a
SHA171e7834c7952aeb9f1aa6eb88e1959a1ae4985d9
SHA25630d89e5026668c5a58bef231930a8bfb27ca099b24399a2615b210210d418416
SHA512dc31807eaeb5221ac60d598035ca3ccab1dbeecc95caaff5e1f5a2a89ba1c83ef0a708ee0b8ed05b588ea5d50e360032a534356f84c89d3791df91d419daeff9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD542348e08e0635c723bf06f7768ae6f11
SHA1ae66342f05ae95817d1afe038ea011074d6fbc32
SHA25671cc8a62f4ebfb3de5b55ce760776da726355d7d506986e0093fd9030a97b638
SHA512dad6379592b1a634147155ef626200e5f0bb4a104ccbf6c8f7f53f5454cac9baae1bf06d4c11573da3b19daa3e192d880f847bf10e9b04621d82f271aabaca10