Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2023 04:27
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://public-eur.mkt.dynamics.com/api/orgs/baeda178-8c56-ee11-94d2-000d3a48615d/r/7FaSZzdIa02SmZRxhfFl_wEAAAA#c2VhbndAcGFyYWdvbmlubm92YXRpb25zLmNvbQ==
Resource
win10v2004-20230915-en
General
-
Target
https://public-eur.mkt.dynamics.com/api/orgs/baeda178-8c56-ee11-94d2-000d3a48615d/r/7FaSZzdIa02SmZRxhfFl_wEAAAA#c2VhbndAcGFyYWdvbmlubm92YXRpb25zLmNvbQ==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133397440453756979" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4020 chrome.exe 4020 chrome.exe 1924 chrome.exe 1924 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe Token: SeShutdownPrivilege 4020 chrome.exe Token: SeCreatePagefilePrivilege 4020 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe 4020 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4020 wrote to memory of 5104 4020 chrome.exe 84 PID 4020 wrote to memory of 5104 4020 chrome.exe 84 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 5024 4020 chrome.exe 91 PID 4020 wrote to memory of 1660 4020 chrome.exe 87 PID 4020 wrote to memory of 1660 4020 chrome.exe 87 PID 4020 wrote to memory of 4932 4020 chrome.exe 88 PID 4020 wrote to memory of 4932 4020 chrome.exe 88 PID 4020 wrote to memory of 4932 4020 chrome.exe 88 PID 4020 wrote to memory of 4932 4020 chrome.exe 88 PID 4020 wrote to memory of 4932 4020 chrome.exe 88 PID 4020 wrote to memory of 4932 4020 chrome.exe 88 PID 4020 wrote to memory of 4932 4020 chrome.exe 88 PID 4020 wrote to memory of 4932 4020 chrome.exe 88 PID 4020 wrote to memory of 4932 4020 chrome.exe 88 PID 4020 wrote to memory of 4932 4020 chrome.exe 88 PID 4020 wrote to memory of 4932 4020 chrome.exe 88 PID 4020 wrote to memory of 4932 4020 chrome.exe 88 PID 4020 wrote to memory of 4932 4020 chrome.exe 88 PID 4020 wrote to memory of 4932 4020 chrome.exe 88 PID 4020 wrote to memory of 4932 4020 chrome.exe 88 PID 4020 wrote to memory of 4932 4020 chrome.exe 88 PID 4020 wrote to memory of 4932 4020 chrome.exe 88 PID 4020 wrote to memory of 4932 4020 chrome.exe 88 PID 4020 wrote to memory of 4932 4020 chrome.exe 88 PID 4020 wrote to memory of 4932 4020 chrome.exe 88 PID 4020 wrote to memory of 4932 4020 chrome.exe 88 PID 4020 wrote to memory of 4932 4020 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://public-eur.mkt.dynamics.com/api/orgs/baeda178-8c56-ee11-94d2-000d3a48615d/r/7FaSZzdIa02SmZRxhfFl_wEAAAA#c2VhbndAcGFyYWdvbmlubm92YXRpb25zLmNvbQ==1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffea659758,0x7fffea659768,0x7fffea6597782⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1868,i,7825134179983824234,17827943122205165481,131072 /prefetch:82⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1868,i,7825134179983824234,17827943122205165481,131072 /prefetch:82⤵PID:4932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2996 --field-trial-handle=1868,i,7825134179983824234,17827943122205165481,131072 /prefetch:12⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=1868,i,7825134179983824234,17827943122205165481,131072 /prefetch:12⤵PID:848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 --field-trial-handle=1868,i,7825134179983824234,17827943122205165481,131072 /prefetch:22⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4568 --field-trial-handle=1868,i,7825134179983824234,17827943122205165481,131072 /prefetch:12⤵PID:3788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4892 --field-trial-handle=1868,i,7825134179983824234,17827943122205165481,131072 /prefetch:12⤵PID:3980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4524 --field-trial-handle=1868,i,7825134179983824234,17827943122205165481,131072 /prefetch:12⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4912 --field-trial-handle=1868,i,7825134179983824234,17827943122205165481,131072 /prefetch:12⤵PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 --field-trial-handle=1868,i,7825134179983824234,17827943122205165481,131072 /prefetch:82⤵PID:4140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 --field-trial-handle=1868,i,7825134179983824234,17827943122205165481,131072 /prefetch:82⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4708 --field-trial-handle=1868,i,7825134179983824234,17827943122205165481,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1924
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5475c2ef5a1d53d3f669969dc2ab50d10
SHA111cf1cb30b70969eac726efb6b09d57412a7c412
SHA256a437999823f123ce3823e6562387a7e93ff7dfb3ad6befba297930831e513b5c
SHA51279df6376c5b7683b8eae105e1868c958e8f796c9f3ed269d5987653d4c960aa7b8323a46042cb16ce84100c492e9120c4294d49e1c6f3f0030e29019d0fa2e13
-
Filesize
2KB
MD5e5e6438ad4eed5d3dad4628a94b565ac
SHA1835a267409018fd4ad4fd6fff260e249419316cd
SHA25647d241a40f2eb723cd8b3e7d27bd427cd0571d307ce6463a47de055d532a817c
SHA512b5485d15393f72e14f3c754cfab554dded201c376a80236bc151a1674807b562efd77abbff05b52bd5567ea2e6d57d53e9c0b774384a2e5b4f71810e68ded46b
-
Filesize
2KB
MD56d101bb929124b4a8f45e36641e2d5a8
SHA16ce7ff988d980ee46495b9cb14777f2b09509b3a
SHA25694c0760ddf1787a26d27d54e4a59ddc01ab5c3c84fcffbaf8e216b9ba0513a83
SHA512b3e801fd465a751b0cfe54ca885b3594a07d994a4975d2a4d0763d55b9b87e1b4a841ed9668cc407dd0b10ae39acfb8b6691f1f01ff0111f5928bd7191dc1bc3
-
Filesize
706B
MD5f3404a4ae853e62a06b465287b6bb86d
SHA1754cf3926fed475407f597a09e3da8011c54671f
SHA256fa51569522240c79ac6e24ed2677f875d993d46129453b5f967454d728e16680
SHA512b8a998e0fc058c2a1b5ff485aa05b835f2f6f837be1e049f7b5811bd8b65b102ccde34668c37e2676aa2bdd060550e082980f3a4165fc386e4f7d7636bb68fb3
-
Filesize
7KB
MD5d90045d1e8dca0dc2103fbbdb3e4b11c
SHA13d35731fbe1c7014f689f6d2e6c172650d67f338
SHA256b40ef1fba5b5755ecd3546f58421bae6152f78a2f78e3fffb4f35a48401b0e6c
SHA512d07013b9ce4c23c00147199abe8185046385a773aa0d3751be10a348ef516315f1f3d0b0a55df4f4c82ab8a89e16c1ce31d6e5abbf44b206b293685648cdb679
-
Filesize
6KB
MD52e804bf0ea15b49ffc76ddf5c458405e
SHA153f7c911da71f1025ab7e25d12dffe12b63048f1
SHA25631725b82fd191c6d26634410ad6818ccab4fe90b9d49c610d38e713c728c6c97
SHA512f4bc22573f6bd76142ea099c70f8353bad093da7e0b4da0932ddab80ec6aa4672f86f117e833e6b0e33b6e83c9643892da2c0c2bf203059980331dbd77da6657
-
Filesize
102KB
MD5a4a242878b3a58ea2c3c4261a80938f2
SHA1cc78e4ab62a1afa6da91d25e151ec1ce3940b875
SHA256234352298769600bd010d5f0bd8adfc1ba73a7f48f9d352dcd8d2f7f89019673
SHA51243de0e68202c3fdb77d77b325c2873beaea089c827d4f3741134d68fbd41c81e8b64b9965f2eed978f27f100fea4606df91f0d36756a9cabf52fa473c8e67c8b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd