Analysis
-
max time kernel
90s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-02-2024 18:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://steamcomunnutiy.com/gift/activation/feor37569hFvrba1
Resource
win10v2004-20240221-en
General
-
Target
https://steamcomunnutiy.com/gift/activation/feor37569hFvrba1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 236 msedge.exe 236 msedge.exe 400 msedge.exe 400 msedge.exe 4368 identity_helper.exe 4368 identity_helper.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 664 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe 236 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 236 wrote to memory of 456 236 msedge.exe 37 PID 236 wrote to memory of 456 236 msedge.exe 37 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 2056 236 msedge.exe 87 PID 236 wrote to memory of 400 236 msedge.exe 88 PID 236 wrote to memory of 400 236 msedge.exe 88 PID 236 wrote to memory of 4968 236 msedge.exe 89 PID 236 wrote to memory of 4968 236 msedge.exe 89 PID 236 wrote to memory of 4968 236 msedge.exe 89 PID 236 wrote to memory of 4968 236 msedge.exe 89 PID 236 wrote to memory of 4968 236 msedge.exe 89 PID 236 wrote to memory of 4968 236 msedge.exe 89 PID 236 wrote to memory of 4968 236 msedge.exe 89 PID 236 wrote to memory of 4968 236 msedge.exe 89 PID 236 wrote to memory of 4968 236 msedge.exe 89 PID 236 wrote to memory of 4968 236 msedge.exe 89 PID 236 wrote to memory of 4968 236 msedge.exe 89 PID 236 wrote to memory of 4968 236 msedge.exe 89 PID 236 wrote to memory of 4968 236 msedge.exe 89 PID 236 wrote to memory of 4968 236 msedge.exe 89 PID 236 wrote to memory of 4968 236 msedge.exe 89 PID 236 wrote to memory of 4968 236 msedge.exe 89 PID 236 wrote to memory of 4968 236 msedge.exe 89 PID 236 wrote to memory of 4968 236 msedge.exe 89 PID 236 wrote to memory of 4968 236 msedge.exe 89 PID 236 wrote to memory of 4968 236 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://steamcomunnutiy.com/gift/activation/feor37569hFvrba11⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffda6c646f8,0x7ffda6c64708,0x7ffda6c647182⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,17528220556896836262,7773424343400549018,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,17528220556896836262,7773424343400549018,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,17528220556896836262,7773424343400549018,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17528220556896836262,7773424343400549018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17528220556896836262,7773424343400549018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,17528220556896836262,7773424343400549018,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,17528220556896836262,7773424343400549018,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17528220556896836262,7773424343400549018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17528220556896836262,7773424343400549018,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17528220556896836262,7773424343400549018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17528220556896836262,7773424343400549018,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:12⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2080,17528220556896836262,7773424343400549018,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5556 /prefetch:82⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17528220556896836262,7773424343400549018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17528220556896836262,7773424343400549018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17528220556896836262,7773424343400549018,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:540
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD558670ac03d80eb4bd1cec7ac5672d2e8
SHA1276295d2f9e58fb0b8ef03bd9567227fb94e03f7
SHA25676e1645d9c4f363b34e554822cfe0d53ff1fce5e994acdf1edeff13ae8df30f8
SHA51299fe23263de36ec0c8b6b3b0205df264250392cc9c0dd8fa28cf954ff39f9541f722f96a84fbc0b4e42cfd042f064525a6be4b220c0180109f8b1d51bbdef8ff
-
Filesize
152B
MD53782686f747f4a85739b170a3898b645
SHA181ae1c4fd3d1fddb50b3773e66439367788c219c
SHA25667ee813be3c6598a8ea02cd5bb5453fc0aa114606e3fc7ad216f205fe46dfc13
SHA51254eb860107637a611150ff18ac57856257bf650f70dce822de234aee644423080b570632208d38e45e2f0d2bf60ca2684d3c3480f9637ea4ad81f2bcfb9f24d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD5b04e80e4fbaa82a09fa70262b199175e
SHA1d5d8125588a0d6899aa17c95adad34939135d89d
SHA256f10ea2127a625d28e3692af6c2339f069443c893cdabc1a9b8972594fe8369c9
SHA512163c3f3f915eae1ccad76bb336dc378b61cbb9203bde70ff652331766b120e61f43bb0146a8fffbbf249b76ef750f0fb17641bafe39ed0cc102f323c6d539323
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD56f265e74cfe632f6d65b06439f2005c4
SHA122bb7f0a80cff2fb9797d580ef812b66438288a4
SHA256e3fabc6ddeb6630f3f89ec16d8026c4e3bd7ab0f6421aed7f5f951a1f5bfb4ae
SHA512ece482829024d61eacd7287a107fdd73a413284b6972cf473b2deab608fd9424fbb27ab086651abf101340723623b477d77379e392d36e3c9b562f09ba2fe790
-
Filesize
543B
MD51ff6ccb6f1bf2be9e00d8ff5964da7c8
SHA1b0a6c6d7eed5eec018e7e2507b129e731d8ea9ce
SHA25642fd0965f5cc7df2837536fb492bd35bb0d83b60e6762e6b464e53030fd4d22e
SHA512917db73849c3df9bad01efebd81ae633e8074cf1fc9d5f5797b423de3c69e37bdc99f8fd31ec1869df70d2ce97c3c96c5082d9a9ceacd7bcb57db4acc6793ae9
-
Filesize
623B
MD589b64b4aea547e4c9ea679c459e44b9f
SHA1781c0288689a16404bba3b3733d5a986f60f5164
SHA256c2bcc8a595628627a8f915982057b99401f7b1245aaec83968d25793e8974cb7
SHA512446cc2ecefa4174d7edd56cb67084cd4021417d21dabe4ed4e137dfefe30b9a59689b498fc2de89ff3be66a55dcb00a5077f41e561c49e99a63bfd5a11c3e5ed
-
Filesize
6KB
MD518f5a61883b785d1716fd97a42b5999c
SHA1c7a9f716e452e26266cf0a355e4bcbf847ceb5f6
SHA256cb9d0cf190d4bb9ad84b5417259c384a9e8844c8f3142b50636697cb6bb67280
SHA512326bae3bb0a646f4be7d7cac304b053e81faf084cf49d3179f1d024e8efcc60a39add2094397d86583448c85799b0407f57a368a3abe60e479f0c4086652ad39
-
Filesize
9KB
MD5542b3bc10f319b9c954758329b779a51
SHA1b2fba50e728d9edecfbcee8a84d03ce331fe7f3d
SHA25633d45fd04a58a0dfdfd1c1aa2df8a9f3271b19df1c9fd5d4afc1b3d4a6de8b1b
SHA512e94f3596ffbfe47d839e243f285d178f357b9a4beafbcaffea80273ea82219da4b7efbdf79eedfe392c34ccd4115a5fc5631c45abba48c3d0d0b096c0210a1f7
-
Filesize
6KB
MD56197216bbfd7735c37c156013f782fec
SHA16a27dd774ed6e4ac2fc7320ba19c53067043cdbd
SHA256dd594b95b9598c87b81fba99674118ab14268780e91effca98a14c3b630e4cd5
SHA5121c6c5aa1ccf14f1399ebcd4745703602ed5f74f6970704b0f041df7b8f042c6eaa3486c2962a39331acf405cf1da8413fbbc99c5da397c3f2b9ceb2f513c01d6
-
Filesize
6KB
MD5ff7304626d6a6f33fa00ff3f2b3948fc
SHA1db3a0e406779a32500726cb959f47e7da71c37da
SHA256772ae0391b3e7d42a5c96b6229a8912a262d552e32aa73d9d36be1e22ac2163f
SHA5129ef09f6fd8af256cb050f01686532cff6ec09ee2daf13d1532d889c33f1ec5a2b719faece7c2d22d0f566205ad64f58518ffe8c74ed340762c2d0d24b145db0b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\bab3acca-0378-4381-bfe5-2ce9f412ce34.tmp
Filesize9KB
MD55373369662030eb0bfd1006076019348
SHA13527536e0b7d47cc72aef3371e362350d7f92297
SHA2560b48e289b017136ed80c27fda43b7cf01af44547f4362da958aed74bfcb8b8de
SHA512aac7eedb7a7ae3ef9fd501cc065e271f0e96d4d183ba7f31be22d3d36a122c6833fe2afbe252cebca7d890ab47603d538af7539add5b370f1dda929559ee12d7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53459d0cf8726ebf2ebe919a52aed524c
SHA1aaf1a6fb53516c6910faeaa3581e62334a024a03
SHA25684f4bbb25d2d23864916e5ff8ec3731cec2317d6bc8b0ff6558d7aca3df69d4b
SHA512c3bfe5bf0b72d45d714ded6d8af2cd0e2c7a7c440649f95c50c6892b61610685783ee517b0b2f53b47b54980bd7ac42b9d98464c5d9767374caaf6fa01d78973
-
Filesize
12KB
MD59b0357009fcff1d7fd0fcbad4fc37628
SHA15028ded405de958cc6516b6f7d5668950fde5a0f
SHA25603a5069c315093cb4c168f26a3a44200aa3006466d67d8528a772ab34af5c81c
SHA512717e78195cc71ea28dbb73c08075e2c581d1aa0b3b981d49f2eab18518721fdb3ba0901aed42dea1486d202fa59f2daeb5631f0ac4fae1464689dda4b1bb6d31