Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15/10/2024, 02:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://trusteverything.de
Resource
win10v2004-20241007-en
General
-
Target
http://trusteverything.de
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133734342454641000" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4156 chrome.exe 4156 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe 4848 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe Token: SeShutdownPrivilege 4156 chrome.exe Token: SeCreatePagefilePrivilege 4156 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe 4156 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4156 wrote to memory of 3348 4156 chrome.exe 86 PID 4156 wrote to memory of 3348 4156 chrome.exe 86 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 1324 4156 chrome.exe 87 PID 4156 wrote to memory of 996 4156 chrome.exe 88 PID 4156 wrote to memory of 996 4156 chrome.exe 88 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89 PID 4156 wrote to memory of 2616 4156 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://trusteverything.de1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbb02fcc40,0x7ffbb02fcc4c,0x7ffbb02fcc582⤵PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1896,i,12336339880219445551,569604302144528855,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1892 /prefetch:22⤵PID:1324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1908,i,12336339880219445551,569604302144528855,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2120 /prefetch:32⤵PID:996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,12336339880219445551,569604302144528855,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2428 /prefetch:82⤵PID:2616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3044,i,12336339880219445551,569604302144528855,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3080 /prefetch:12⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3056,i,12336339880219445551,569604302144528855,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4492,i,12336339880219445551,569604302144528855,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4524 /prefetch:12⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3332,i,12336339880219445551,569604302144528855,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4632 /prefetch:82⤵PID:4220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4460,i,12336339880219445551,569604302144528855,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4656 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4848
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3364
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5a563a8e4939d22f8bbcec685ef13521b
SHA1560702decadb380c4719bb64f7d06f01d7f1220d
SHA256ebfe77697eacdaf69becc333d80aeea97c1ce70350ceae469ba3632947441d12
SHA512602b36d62822515d59bc4f2db33fbe4b52cdbeef7ea09c758bcb5fcbbda00819c8130c6578f4132c4073bb05ac3fb93333dc794920bc274c1b1d9965f5e247b4
-
Filesize
216B
MD5e84928b7f9c219d1a2781c4b8935ca86
SHA15514ec306c53805d930b1468900736f234316310
SHA256e151f9e66d07b9cab5b8c412776fc50bd0076218f74c05409c0cbaa1eb7ab950
SHA512c90e4e3d93884db0529d218c70fe738a8679beb36e5cba2eaaa0486251919acda16b0db35abe38be33455d3507211114fe7b94528e4e2a4393d55367429191ad
-
Filesize
4KB
MD5c5e24a700d59e58721125231c60ba473
SHA17603bf380f8e0f1c9ec7f17f0fa354e3314dc6cd
SHA256e3ab0200498f4b341d9be00323a4d8e318db3b573ab700ca544b53bafb05bf6f
SHA512c6224172a3ea478dc305e0d624b224f0bbefa63ae0883b3b67da5bc220edf7ba69cf4c293a3f710dcd0100deacdfa23b4a4172d7c248fad113b100e1593d450c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
858B
MD5f4b20d11984fba409cdabef4c932c143
SHA132291d1ad8848b75897f2ab3fac98578540396f5
SHA2566889e19aacf27f74828504b98afaab53d87bd98a5b7f6a2eb17da4e79f44284f
SHA512ef64d254ee0815e22708a748b5049b14dea4d60f840b8c810971ed764a883568ddff3ad5c82c16b9b0437982f8ed621bd6d267144fd43b1387acfcd178ef24bd
-
Filesize
9KB
MD51e7d348b23a278fb08460317c94bb26e
SHA11501db0066c48f63f21816a9caf001fd32f56767
SHA25646f04a41f88b3dcaad379fe0899bbd0329c26bbd99e46704287699f216650a85
SHA51223eab1fdd368a9d0d98ef23e12a878c5fa6d7efcfdf4ca05a997f027a9cfe8626d089866bd854b49d3e0485a0edfbac624c168bc6d8cc1eedb6a962168126f0d
-
Filesize
9KB
MD5493201f7f3a45927b63fb54b771b3fbd
SHA1f9840346f5aafe71999f19b4d0f047b1f85299c0
SHA256788d5a37694bf96fc33636a17ce5fd7cd653c6fc82b57fecf62bbf8f25ce20d2
SHA512e7091f5beeb82f13b575c62803ad23f6ad3f14611f76ce7c5a44489fd0ef3b4b64e309e05dc6e81a24e280cf613d2930dad49a4de71faea2d54e9501de71ba31
-
Filesize
9KB
MD544b07b051d57454dd96319f5e349aa5e
SHA1d5d2813d0c6645e7fd18c50ab5ee257eb05f8a45
SHA256c10d19c6d439cd6e30e863b87d7fa5a10e8e68c537cd9c930d16fb46331bfbca
SHA512a4ca2d4d8b690cdc75ec7b79b0a983f625751ea126a9a87be47c49bcb593e1273e4bd5525c2efa86e96ec2618cf06037dc057e7ec0bc11326ce1a631ca9563fb
-
Filesize
9KB
MD507e6cc49261bf84549e72d363b716e45
SHA1f989960e33ad045d8fc6f573b0b81d0ada9147f8
SHA2562bc47ea2db001022fa17d16ba127896b421534a846ead0d03449ada8e271cc6f
SHA512b2e9fdd627703ba4690ba6b5fa6861fd53bd26ec31b0471706c2c87ee05fd71c1d56014f3b52d621d5a3f79e2f00800bfedeb8274f9c849eccebcc40d4dacbbd
-
Filesize
9KB
MD56734bf466484bf353e08b3a9d7b2d514
SHA1f461107bb684559ceb9206c73577c1aea764ed24
SHA256ff5ebba2853277e008794c65430596751767d8ea43424723fad03476dfae5b56
SHA512d593cf7908df5aa0db9272fa4107b12dad69abecd4d53d77efad0ae25e7ec7a356778d270c0727bcec9b3b6dae9f1ee84511b6ecd66bc9e318ed3d8e4ad381e0
-
Filesize
9KB
MD51379a4f5b6436d87f6c73ce5fb698b4f
SHA13d78a2212b27e54662c7c981d61b17790d0e801a
SHA2561bda50f85809c8352390ddfc070d979c8458cfa8d0a96653c3122004902173a9
SHA5126708a6395ddfe67cceb98772b8a8318abdf80ee016e89d77adfc5575d2ef4bafe496412831dbf4b788aed369fbdb8d448300b0617f229dfc0d914b83584950fd
-
Filesize
116KB
MD5ebeda7aa84105083f899638aaa63fb14
SHA19475e754fd576c2f018b2c7e7879d0659d0278e2
SHA25683567f6a3d55658541a2338fbf7832e8b94d50c827916abdf338711104c1c9aa
SHA512366ba55153528020048b6a02cab8fe902354df521acac35ad81cfa7fc0e25d5fc5ffb50d053fa3c51100f9bf75e8f847267a13d239beaa97c6113773831213bd
-
Filesize
116KB
MD5ae61fd8187caad6bf030dec12826e787
SHA16378fa97e092969d38a50862c204f387b8c088f4
SHA2560b71f713a796a7396628d9e0a473e13e02eed6227c3b2fd08a5aa515c464db79
SHA512a4f66e81b4617c5a628a3d96cdb5b42d533375042a0e0a7887426fcf150e99ab50404f0119063a37493bdbe5d6486167b8f38b9e00dbf4c773a1e04c0e593dcc