Analysis
-
max time kernel
152s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 22:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://Ipinfo.io
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
http://Ipinfo.io
Resource
win10v2004-20231215-en
General
-
Target
http://Ipinfo.io
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ipinfo.io 14 ipinfo.io -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1768 msedge.exe 1768 msedge.exe 2476 msedge.exe 2476 msedge.exe 1440 identity_helper.exe 1440 identity_helper.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe 1340 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe 2476 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2476 wrote to memory of 4776 2476 msedge.exe 86 PID 2476 wrote to memory of 4776 2476 msedge.exe 86 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 2192 2476 msedge.exe 91 PID 2476 wrote to memory of 1768 2476 msedge.exe 90 PID 2476 wrote to memory of 1768 2476 msedge.exe 90 PID 2476 wrote to memory of 1252 2476 msedge.exe 89 PID 2476 wrote to memory of 1252 2476 msedge.exe 89 PID 2476 wrote to memory of 1252 2476 msedge.exe 89 PID 2476 wrote to memory of 1252 2476 msedge.exe 89 PID 2476 wrote to memory of 1252 2476 msedge.exe 89 PID 2476 wrote to memory of 1252 2476 msedge.exe 89 PID 2476 wrote to memory of 1252 2476 msedge.exe 89 PID 2476 wrote to memory of 1252 2476 msedge.exe 89 PID 2476 wrote to memory of 1252 2476 msedge.exe 89 PID 2476 wrote to memory of 1252 2476 msedge.exe 89 PID 2476 wrote to memory of 1252 2476 msedge.exe 89 PID 2476 wrote to memory of 1252 2476 msedge.exe 89 PID 2476 wrote to memory of 1252 2476 msedge.exe 89 PID 2476 wrote to memory of 1252 2476 msedge.exe 89 PID 2476 wrote to memory of 1252 2476 msedge.exe 89 PID 2476 wrote to memory of 1252 2476 msedge.exe 89 PID 2476 wrote to memory of 1252 2476 msedge.exe 89 PID 2476 wrote to memory of 1252 2476 msedge.exe 89 PID 2476 wrote to memory of 1252 2476 msedge.exe 89 PID 2476 wrote to memory of 1252 2476 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://Ipinfo.io1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ffe731c46f8,0x7ffe731c4708,0x7ffe731c47182⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,17000288426274075384,4623231426487060578,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,17000288426274075384,4623231426487060578,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,17000288426274075384,4623231426487060578,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2272 /prefetch:22⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,17000288426274075384,4623231426487060578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,17000288426274075384,4623231426487060578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,17000288426274075384,4623231426487060578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,17000288426274075384,4623231426487060578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,17000288426274075384,4623231426487060578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,17000288426274075384,4623231426487060578,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:82⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,17000288426274075384,4623231426487060578,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,17000288426274075384,4623231426487060578,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3668 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,17000288426274075384,4623231426487060578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,17000288426274075384,4623231426487060578,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,17000288426274075384,4623231426487060578,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,17000288426274075384,4623231426487060578,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1340
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:416
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5011193d03a2492ca44f9a78bdfb8caa5
SHA171c9ead344657b55b635898851385b5de45c7604
SHA256d21f642fdbc0f194081ffdd6a3d51b2781daef229ae6ba54c336156825b247a0
SHA512239c7d603721c694b7902996ba576c9d56acddca4e2e7bbe500039d26d0c6edafbbdc2d9f326f01d71e162872d6ff3247366481828e0659703507878ed3dd210
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize768B
MD55023129b913dd5ef653361ec4300ad58
SHA167ab036804aaa27f67eaa8e0b18c70e964eb0268
SHA25676929c604670f3671c11896565f600b60c3cd1330de9239c55c0baa2f0971d43
SHA512ba29531f2dc1a1c2b9e488d0bf70c832057ccc51cf5099110fc1ad6b8d62f89b41e974aeb04afdb589b9fc492e1625aafdea067f42ed9a9dd5a49bb8ff7a60e0
-
Filesize
3KB
MD5ad23df12236cc83415086ea347c9a7fa
SHA13e3d0e20c0e0205b11c471cb0f1fbe788391cecd
SHA2567d1a769b2c5cf4ce0518e025732e42f16a2ebedbfe5c7f65568ca5e81b88debc
SHA51204de0798745647e95b58232f9f00ba2999d8d0769e3ff050a7b4bd03e0f9f5e4df745ce2c824a5ea334c4583999e82a370c7886f8e955c66dc4c4b8c094eef50
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5b0170bc3146176eb1da74f811264f72a
SHA134321c66dfeee51cf4b151a9d41afe45cbb8988d
SHA256db59f0842b4979e4b5059acb33271658bb260193b9c2fb26e91f011f5d68e266
SHA5122ba2d4019fd41cb385ae11889fac03b1be5e580cf3c1c5925ae2d62e3aa0fb1148471efd64dd0459b6af964b0f6392740151d416f58a7fafda0d34b657845efb
-
Filesize
6KB
MD591ad70a63b607597f1121b98a0ba49c1
SHA1d0dd5669fcb13ae8cb1916ab0bd8a03fc9ad7d58
SHA256f08f187aea5f026da059df4c08b0d52d8df92e78ce36bc055cfe72fa7ea2c9f1
SHA5128d89b7a3ad76fb281325c99c945902823c67bcf51c762ba6a37a3e106fb8bff978502ccc8d773409b00726c240116c5f01d9cbe98035f68cefdc2ce05d3a15f2
-
Filesize
5KB
MD5d86f496d8abfd43d56db35e917029b93
SHA1598eac8d8516b39af0bb7aa022b7cfdeb3601421
SHA256cc805c0711b6a8f690d660e50afbf9113604e3b21c185ddeef7c23958b4b691b
SHA5129b57d531256643f0e80d34d49d4850c93db56ed6cdd12620cbda43589a7687ae7515ffd78ff414808e8f365ffce0146b184a826400c5065cad989a68152d1a99
-
Filesize
24KB
MD5f5b764fa779a5880b1fbe26496fe2448
SHA1aa46339e9208e7218fb66b15e62324eb1c0722e8
SHA25697de05bd79a3fd624c0d06f4cb63c244b20a035308ab249a5ef3e503a9338f3d
SHA5125bfc27e6164bcd0e42cd9aec04ba6bf3a82113ba4ad85aa5d34a550266e20ea6a6e55550ae669af4c2091319e505e1309d27b7c50269c157da0f004d246fe745
-
Filesize
1KB
MD54919d7f03d0fc0db2b094c8b94ae90bb
SHA1b4dff5b6f10c391572c22c24db7366196734d6fd
SHA256cb9de9dbc487923260e37574aa99b41d6cdbb7df5e472b7cd3d245b136eb7b90
SHA5125ab970c6877cb16b23f4aad8db48822f0bf19a60e6f00e52167805be58875799049fa1f2d6e31852426bb06c50f71aad0696169619b1c269d4bd80758073ecd6
-
Filesize
1KB
MD568c94fc1629bc432cff31c50e553db79
SHA16cc4b840e8affde0afc2289900202d2a6f27bcbc
SHA256aee22bd4ecacf0e542da76defb279da61501d0a8bb686d9a6755dad53d23c466
SHA5120fcf526a9667148963c2141ce37dd75cc532a9d280726fd736bd17540ea8d1524c6a5b5a8ac719828b0837a86e208eb98798ea6d024339982728e7d5e838508a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d27d132da0b1daaa760d0a8ae2dca124
SHA1ad3fee0115a498731edb22e35d3519b1696caddd
SHA25603ffe57fd5d4a34076238a74df4807777d1e7151044b6fd5af816f20a2885cb3
SHA512609624ac2107b83213c0356a1cdad5694c1798a3a35b4365ea64ee5b6748b4a79291b0340650cbfa60fcd028c9ce0e8347fe6e5a06052731eacd659fc6eba3b1