Analysis
-
max time kernel
90s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 05:51
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1520 msedge.exe 1520 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 4080 identity_helper.exe 4080 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe 1736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1736 wrote to memory of 4768 1736 msedge.exe 83 PID 1736 wrote to memory of 4768 1736 msedge.exe 83 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 2620 1736 msedge.exe 84 PID 1736 wrote to memory of 1520 1736 msedge.exe 85 PID 1736 wrote to memory of 1520 1736 msedge.exe 85 PID 1736 wrote to memory of 472 1736 msedge.exe 86 PID 1736 wrote to memory of 472 1736 msedge.exe 86 PID 1736 wrote to memory of 472 1736 msedge.exe 86 PID 1736 wrote to memory of 472 1736 msedge.exe 86 PID 1736 wrote to memory of 472 1736 msedge.exe 86 PID 1736 wrote to memory of 472 1736 msedge.exe 86 PID 1736 wrote to memory of 472 1736 msedge.exe 86 PID 1736 wrote to memory of 472 1736 msedge.exe 86 PID 1736 wrote to memory of 472 1736 msedge.exe 86 PID 1736 wrote to memory of 472 1736 msedge.exe 86 PID 1736 wrote to memory of 472 1736 msedge.exe 86 PID 1736 wrote to memory of 472 1736 msedge.exe 86 PID 1736 wrote to memory of 472 1736 msedge.exe 86 PID 1736 wrote to memory of 472 1736 msedge.exe 86 PID 1736 wrote to memory of 472 1736 msedge.exe 86 PID 1736 wrote to memory of 472 1736 msedge.exe 86 PID 1736 wrote to memory of 472 1736 msedge.exe 86 PID 1736 wrote to memory of 472 1736 msedge.exe 86 PID 1736 wrote to memory of 472 1736 msedge.exe 86 PID 1736 wrote to memory of 472 1736 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument http://steamcommunmutly.com/gift/activation=Dor5Fhnm1w1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8dfe46f8,0x7ffd8dfe4708,0x7ffd8dfe47182⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,18296987382442917265,3792722063952584618,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,18296987382442917265,3792722063952584618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,18296987382442917265,3792722063952584618,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18296987382442917265,3792722063952584618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18296987382442917265,3792722063952584618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18296987382442917265,3792722063952584618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4616 /prefetch:12⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,18296987382442917265,3792722063952584618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,18296987382442917265,3792722063952584618,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18296987382442917265,3792722063952584618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3868 /prefetch:12⤵PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18296987382442917265,3792722063952584618,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18296987382442917265,3792722063952584618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18296987382442917265,3792722063952584618,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2100,18296987382442917265,3792722063952584618,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3008 /prefetch:82⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18296987382442917265,3792722063952584618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18296987382442917265,3792722063952584618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18296987382442917265,3792722063952584618,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:2508
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3692
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize528B
MD579ba302e51e2a1348b5eb8fa75ea7464
SHA1947a9198dda881e9acb27fcf991db39f6c79db44
SHA2566dcc50bfd363415db7d1358b0fa5ca547fca0621c2f15d110362474797a1e1ec
SHA512981158af8230d1cd3af2ea78ad8fbe342e0b82174a04c3864fbe314905e984d20e1199f7207c93d4a32a766b0c6ac0630433536fb26a6e62edd850d774144c4d
-
Filesize
769B
MD54530dde2b84c035ad4f4faa02e27cbbf
SHA1be1b5c53c612862ff93570605752e684d8942f8c
SHA2568fe17a1f676009657d8836c78971b1bd2e42cb8356884468ac8f89f02f536aef
SHA512a01c0e268a71771b277f340170ef2b74ad720d9db0aefd0ab098c23e42c9a47fb92ba05a4257bbb6ec3194ae0e4ec7ca034948a582316cefec7bab8a23e20917
-
Filesize
6KB
MD544bc9c4fd337535a49c42b0fb2050335
SHA12cb478b2e67ba539783fbf094945d2816aeeb8e7
SHA256a693e14b86c810bb7394ec0b2cb2ecf6e7af4550a15709a253432ff82c54cf8b
SHA5121fb1b4bb8e98f2b68e094c6eacf5d16220b4e4973a2ef964c06b2eb246f984ae896184f938a74b110b549f17ecc8d040135946e1a43a86c6af6c4defbe9b2cc0
-
Filesize
9KB
MD503ebe95d0063f42d5e93445b21d7f56d
SHA1971bbcb72ebb755f1f7439f092e9bd7f7ea87ff2
SHA256f02b61e0f3fbf88ee7faa32869aecb08fd29972810066f3c8b352580deef5cdb
SHA5128db25b4cec71f1bc2d378496d033c095f14fad2ecaf41516be598b21bd523d82fccd2c8f6023a0a7379ca65bf7aec99172dfc40fb2c25cc4bc8a2cbb493cf9a8
-
Filesize
9KB
MD5a6e900291146d0cef915c00441bf2c51
SHA185d7bdc9506f5bea36c7f180eb2223e2a49a1212
SHA2566cddc0ec13da1052003e5342f141bbc3f503d2223d1de2a388611f689d87a830
SHA512e2febe7f7cc4ca963f6055ffc801336c6b433de2a50508bb7867d3b75bf12751156ce23cfad635b1c3c45b4ceb1201e02e415026c747c0187b877a66746a5a94
-
Filesize
5KB
MD5c40cc279e79654e9679ee65459cf1c67
SHA1c7951f1f7d8acd711c6aeedf9c4681763a9e20e6
SHA2569324ae90ff765d95521e15edcbb0f9e642c1643f860caa341689d9c08921fae3
SHA5123ca8dac8b933683d698be815f64b43f608eb2b6de0860699dd3717c4f3dce9e655cf9f64b8588678bb189b0c375481d5d3c2b9ff1c6728dee524f3aed44008d8
-
Filesize
8KB
MD56015c63ebe50c38204a098b079eab0b3
SHA124cb5dfcb3f97ea0a7882dbc9ee17dd720dbf03f
SHA25607ea17fa5b3ff2a0befc2058072f0478d3cd370c3dfea9f9d85d2c1c208a253e
SHA512ec5c46735f020c51350e6bc660a0eba36f9b600e7126a901c23f14b3d038bc1206ac0eb527f2950bc0d708c1295b92077e993ad69aa2343b29553b08f6169281
-
Filesize
1KB
MD59d216b9f9d22ac7dac6172da75c79fe7
SHA1299abeb729ae5c751c6b25ab492acd1aaa9c11dd
SHA256cfe4732fcb48b77bc8b72f1718cdc9dcc75de66a5abc8c113f8601499a2e2651
SHA51219f467a5b3746bb02c2f71ed7c38255ced4e0210ce9a0d3d869a06c7956cdb72cc1d8d5c65926202bfb38513e730049de8bc66585b3eed937fbe5ddf211d364a
-
Filesize
1KB
MD537acd2d4b24a11d6d4b3d8842c0b4332
SHA1fb92aff61647c6f8820d3ab9115e0424fb7da0b4
SHA256099e837fee0398af52058e7dbab2ad9d48fed14080664cb5b9f6cd8982d3b428
SHA512ff2bbd7bd328c06a2c5bf195588d323c29d49c22d4e5dca2a995ce123c7e650f27bee5a3d6b1d9f36d0a7830080143a77e2e8e6ecfac579168d522ebb4862123
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54228608b55959eb34985605754342dbb
SHA1b37b1aafdc41e2e0d6d2de80c91d71b87fcb7781
SHA256a4503aa19fd4b63ff8ba6724e8583fa977137ee0b7057a9215f88b1fc554aeb0
SHA512ec71222759be7d24753e5c8126f9032e4d7275808da2b5dd88133b1fe45f8935ab368458cc922a182e6c8df324afd82ec218ab38b099dde4110970369097ef5f