Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
04-09-2023 07:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.keyence.co.in/m/138200_2?mc=2&msid=1&mcid=18907676&alc=16839924&alv=3ca99017dc79be0f77cc1686183adaa9
Resource
win10v2004-20230831-en
General
-
Target
https://www.keyence.co.in/m/138200_2?mc=2&msid=1&mcid=18907676&alc=16839924&alv=3ca99017dc79be0f77cc1686183adaa9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133382854549466310" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 236 chrome.exe 236 chrome.exe 856 chrome.exe 856 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe Token: SeShutdownPrivilege 236 chrome.exe Token: SeCreatePagefilePrivilege 236 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe 236 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 236 wrote to memory of 5080 236 chrome.exe 30 PID 236 wrote to memory of 5080 236 chrome.exe 30 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4832 236 chrome.exe 88 PID 236 wrote to memory of 4304 236 chrome.exe 89 PID 236 wrote to memory of 4304 236 chrome.exe 89 PID 236 wrote to memory of 852 236 chrome.exe 90 PID 236 wrote to memory of 852 236 chrome.exe 90 PID 236 wrote to memory of 852 236 chrome.exe 90 PID 236 wrote to memory of 852 236 chrome.exe 90 PID 236 wrote to memory of 852 236 chrome.exe 90 PID 236 wrote to memory of 852 236 chrome.exe 90 PID 236 wrote to memory of 852 236 chrome.exe 90 PID 236 wrote to memory of 852 236 chrome.exe 90 PID 236 wrote to memory of 852 236 chrome.exe 90 PID 236 wrote to memory of 852 236 chrome.exe 90 PID 236 wrote to memory of 852 236 chrome.exe 90 PID 236 wrote to memory of 852 236 chrome.exe 90 PID 236 wrote to memory of 852 236 chrome.exe 90 PID 236 wrote to memory of 852 236 chrome.exe 90 PID 236 wrote to memory of 852 236 chrome.exe 90 PID 236 wrote to memory of 852 236 chrome.exe 90 PID 236 wrote to memory of 852 236 chrome.exe 90 PID 236 wrote to memory of 852 236 chrome.exe 90 PID 236 wrote to memory of 852 236 chrome.exe 90 PID 236 wrote to memory of 852 236 chrome.exe 90 PID 236 wrote to memory of 852 236 chrome.exe 90 PID 236 wrote to memory of 852 236 chrome.exe 90
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.keyence.co.in/m/138200_2?mc=2&msid=1&mcid=18907676&alc=16839924&alv=3ca99017dc79be0f77cc1686183adaa91⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa75ea9758,0x7ffa75ea9768,0x7ffa75ea97782⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 --field-trial-handle=1892,i,5356885300797147621,16989040058592147041,131072 /prefetch:22⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1892,i,5356885300797147621,16989040058592147041,131072 /prefetch:82⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1892,i,5356885300797147621,16989040058592147041,131072 /prefetch:82⤵PID:852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2880 --field-trial-handle=1892,i,5356885300797147621,16989040058592147041,131072 /prefetch:12⤵PID:3236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2888 --field-trial-handle=1892,i,5356885300797147621,16989040058592147041,131072 /prefetch:12⤵PID:4444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4732 --field-trial-handle=1892,i,5356885300797147621,16989040058592147041,131072 /prefetch:12⤵PID:224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4792 --field-trial-handle=1892,i,5356885300797147621,16989040058592147041,131072 /prefetch:12⤵PID:408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5204 --field-trial-handle=1892,i,5356885300797147621,16989040058592147041,131072 /prefetch:82⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5900 --field-trial-handle=1892,i,5356885300797147621,16989040058592147041,131072 /prefetch:82⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 --field-trial-handle=1892,i,5356885300797147621,16989040058592147041,131072 /prefetch:82⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4508 --field-trial-handle=1892,i,5356885300797147621,16989040058592147041,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:856
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:528
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2e0 0x4f81⤵PID:3504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
816B
MD58f8ca7d8f5ccdced5a283cac947e465a
SHA1bf0f41042de88ea4195efc6ee7ff42c9987b0fe5
SHA2567a56d138bb9f492f056631334296563dd2551dab45223f232369fa18f14cb324
SHA5124afa0a7635acc2e855fb8423a361c917b0340dbe27bd3d167abc0844951c8508bf87b3e4b59b38024cbd8f6276fedce1bcdb89638a839bc25fba3e09fb8f8ea1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.keyence.co.in_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
4KB
MD579bc475f7d7b8f16370f0a3edcb4c4f0
SHA15b1a4ca293cd57af38ce5478e2cdff39366944f0
SHA256d59b73369fae94ba343d11bb74061c68b084d4a0e3913012c632923ba7a3c902
SHA51254dd9ad8809f3aef5922f5706632b915c0eb38ae0a135385ea49ed7b49eb2d482d493487e540391f5ef22da1757eaf5e58e5cadbec1a9e83996ea92b9780569b
-
Filesize
3KB
MD5bb036a875a4a47f94f1f8d4637d208d9
SHA1c993edff3733365991af99bfb877d04bb2ab473c
SHA25672787e2389fcad71639321e6b164363b0518c9c6f2c01bf9ca465aac6fb71cdc
SHA51298fec8d3376ad4a2ef83779e827e3e0afb40f3709692b3e6e934e79bdce83bd16f55d5fbfabcc7a4c2a7b0bddbc757b94cdf97092ce57c6331617dc7b36a87bd
-
Filesize
1KB
MD5015e70b62ba88c8f6d64f872ebe69f82
SHA1601024978e0bfe090b1f6d95cbf2b8802ab9a865
SHA2560d4ef0989670d8435a0cc7af0012735eb5b2dafb0e8d561b778bd3afbf3936e2
SHA51299d1927306f9d5f812436ee1704a3cccaa0b28cfa91f1154ad3d0571d7df0c383ff32f1cb987b9e3704e55ae8352634c38775bfc624480a74d1ee13fdd6443a8
-
Filesize
6KB
MD5a13c552f9e6567b2b37ab529232bab74
SHA1022430e68044685427b50721d41d7d27353da024
SHA2562ad34d23e9dafabd987b16d6db1b7d0bbae5775e6e313529daf40171a3b957c5
SHA512d78fecdad26d822b13d48439397d27c963544e5d0b27cbd00c5e41eeeb75bb26778525500332d4dd9ca4f793a71dd724d80090c6bc261fb37239cd2d109eba02
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD545a360c4ee6a1c8082c7dcdb6331685a
SHA1939ca2290dc2155bcad4cea9bde7c919b72bd8fd
SHA2569ef65a0888473ba4a00c2f6a9e61a76d5ababd990bf0ef91b9f24ff005cabdea
SHA51216646cfef7641c2c8b50b33164e4fa8d2e045dd42aef12dbc92e0956ca6d6292e65a82115d49b545fbf2f3209139fe1adb1ea3f3930fb5cf424aeee47e522882
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57eb69.TMP
Filesize48B
MD5d1baadd5093b80f8618ddf32cdcb12e3
SHA1239095c8e8e3c053eb3df268ae4b2bd54e389bab
SHA256443e1c98b0533d26bf86edacd3a8bd1afe83de6cb845efd881a51d0df87e709c
SHA5128d3c5aa9beffcb3c434a0e824046ec4845e29635ccda94bf892a0a4ba163397837bc52bcd71d09415d265bb493c82da65bfb1824e4030aa6ac2103b5c507cd4f
-
Filesize
97KB
MD51933a488fe5c57eb7e7a28986788a909
SHA1fa8c790936c366783a04110bf565cf003c4d0b4a
SHA256bcb64b75d4af05b94b0e5b0926324749f4af3b29c0475e88212d33cbf5ddfcc8
SHA51239f4249df2dc7a98dc2943e07b6a0d248e11d40763b4605bbfc82c4e0eff564b7a630aa5b8cfd270d19be070cea597b3aa05656e4dac9445a6a86ac03f4dc93f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd