Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2023, 22:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.cvattv.com.ar/live/c3eds/ESPNHD/SA_Live_dash_enc_2A/ESPNHD.mpd
Resource
win10v2004-20230915-en
General
-
Target
https://cdn.cvattv.com.ar/live/c3eds/ESPNHD/SA_Live_dash_enc_2A/ESPNHD.mpd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133408468424842147" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 3748 chrome.exe 3748 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe Token: SeShutdownPrivilege 992 chrome.exe Token: SeCreatePagefilePrivilege 992 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe 992 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 992 wrote to memory of 4976 992 chrome.exe 82 PID 992 wrote to memory of 4976 992 chrome.exe 82 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1148 992 chrome.exe 85 PID 992 wrote to memory of 1076 992 chrome.exe 86 PID 992 wrote to memory of 1076 992 chrome.exe 86 PID 992 wrote to memory of 1064 992 chrome.exe 87 PID 992 wrote to memory of 1064 992 chrome.exe 87 PID 992 wrote to memory of 1064 992 chrome.exe 87 PID 992 wrote to memory of 1064 992 chrome.exe 87 PID 992 wrote to memory of 1064 992 chrome.exe 87 PID 992 wrote to memory of 1064 992 chrome.exe 87 PID 992 wrote to memory of 1064 992 chrome.exe 87 PID 992 wrote to memory of 1064 992 chrome.exe 87 PID 992 wrote to memory of 1064 992 chrome.exe 87 PID 992 wrote to memory of 1064 992 chrome.exe 87 PID 992 wrote to memory of 1064 992 chrome.exe 87 PID 992 wrote to memory of 1064 992 chrome.exe 87 PID 992 wrote to memory of 1064 992 chrome.exe 87 PID 992 wrote to memory of 1064 992 chrome.exe 87 PID 992 wrote to memory of 1064 992 chrome.exe 87 PID 992 wrote to memory of 1064 992 chrome.exe 87 PID 992 wrote to memory of 1064 992 chrome.exe 87 PID 992 wrote to memory of 1064 992 chrome.exe 87 PID 992 wrote to memory of 1064 992 chrome.exe 87 PID 992 wrote to memory of 1064 992 chrome.exe 87 PID 992 wrote to memory of 1064 992 chrome.exe 87 PID 992 wrote to memory of 1064 992 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.cvattv.com.ar/live/c3eds/ESPNHD/SA_Live_dash_enc_2A/ESPNHD.mpd1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffddf589758,0x7ffddf589768,0x7ffddf5897782⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1888,i,10131818192770112621,9982589444766858452,131072 /prefetch:22⤵PID:1148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 --field-trial-handle=1888,i,10131818192770112621,9982589444766858452,131072 /prefetch:82⤵PID:1076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2208 --field-trial-handle=1888,i,10131818192770112621,9982589444766858452,131072 /prefetch:82⤵PID:1064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1888,i,10131818192770112621,9982589444766858452,131072 /prefetch:12⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3060 --field-trial-handle=1888,i,10131818192770112621,9982589444766858452,131072 /prefetch:12⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 --field-trial-handle=1888,i,10131818192770112621,9982589444766858452,131072 /prefetch:82⤵PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 --field-trial-handle=1888,i,10131818192770112621,9982589444766858452,131072 /prefetch:82⤵PID:4572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4940 --field-trial-handle=1888,i,10131818192770112621,9982589444766858452,131072 /prefetch:12⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3236 --field-trial-handle=1888,i,10131818192770112621,9982589444766858452,131072 /prefetch:12⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 --field-trial-handle=1888,i,10131818192770112621,9982589444766858452,131072 /prefetch:82⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 --field-trial-handle=1888,i,10131818192770112621,9982589444766858452,131072 /prefetch:82⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3716 --field-trial-handle=1888,i,10131818192770112621,9982589444766858452,131072 /prefetch:12⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=992 --field-trial-handle=1888,i,10131818192770112621,9982589444766858452,131072 /prefetch:12⤵PID:1000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5060 --field-trial-handle=1888,i,10131818192770112621,9982589444766858452,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3748
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
103KB
MD5debaf749e7602a12e065595ff3bc2969
SHA11e9618e4db9b338db6b0e8ef5a659850fcb7368d
SHA256d5ba8ce505b839c8df7398975002d00eaef4b38b5b112b69a30678d06da68f78
SHA512b283d58a6a20e1d1fd4f09a6e1e734b06dc7e45d3f62e903044c34b5fdc40d2a752a670da3b756fea8005a33bd004e5a94860f54c9f765bbf5cf6d185dc71669
-
Filesize
5KB
MD5c4cfdfdf5768bea2d4c9a2afeed60199
SHA16dcbb2966ed7a01f22980aa717b4459c9f5496ba
SHA256cb6c5b89c565f757fa7001b19a6be05685f192642ee7b0cb6efa77d9d0a83a17
SHA51254b3fc2f422f8e43f1a33feeda44129e67a2307b7c3f1e6cfbae0c84addd54aa881be34bcf122aa62dea8b14fdd277a2aae08614f4de86bf4cff9ff45d9d519a
-
Filesize
5KB
MD5e4697459eae095fb29ccd100c37be56f
SHA1813f9a8e9c126175e0f876348ec818839af967ce
SHA256aecd65b0a5d255ef98d165d6e0f5b1b5383fd4ac82e4b22c2bc9d788ecb30dfb
SHA5125beeedbbf5b1639d22d24c12e685833952b1c5ce2601c28aa9f0e4243cca0f3fabdde13430bc9ff56335d74b83d6adfd8434c9eeeb999ca2efdd3c0fc5529d8e
-
Filesize
5KB
MD5a6d4f3278b1b897b4b2b75e575f7974e
SHA18802dc43189edbe7d3a8b65e597c989004e7b040
SHA256b7d5a0b3abc48ed34fb0bfa8c8eec2c8bad5f5ca4851c859d2524f2ea51058b3
SHA512632a8eb4273b3e253caf1402f08d773053c36ebad76993da867953029ec40153d4134dfdca37e5d8b3119cbe4755d4531f8972a5c9603b461d1b9963dd0d9849
-
Filesize
104KB
MD56224e78960d5905c00961bfe844cb846
SHA10c2932eeedc585ea0bc03ab7d19cdde502845fee
SHA256ef3b91f30bacc3998dbf3669bb309b897637c43fdf0eaf2ee45394b1284fd014
SHA5129631b69a893c9b25a1301f1b29b9b64b261d554e0049ff8dd1cd8d57f17527e60cfb25c5d7d7b990b9d7c2652396d87f8aa7df776672bf67bb0d1e685d7a837b
-
Filesize
103KB
MD5db9a51c046cc90f5925eb2fa73e59de2
SHA1c7c6aaa3720b5748183b0bb89df5c26c61101df6
SHA2562de13dccc092a597075a0b0eb916d8e5d75af1f3cc5b5b59ff86a804be28d686
SHA512d951147291da4a69c79d4cf8b8862902819c950807b7962e3957e0758aa403f82990368237c19dbfc5b7f188e40b5773e0e8e4a17388c7d3e70b0d20b08a5c89
-
Filesize
126KB
MD5fd337ef357fa0857d886f1b92055a656
SHA16098677284e49ef5d32efa7d81b6db423451320b
SHA256981a4e2794e2a3f842f96e63d923f703ad9c737e77f6ee9054cca3a70ec199ed
SHA51245301899b522ef16e1878b22931b572b4f963cfcdfd07ffc7ef3971ec0adaa5ba82806155118c4c33f7f118e3e1ceefa054b0a74107c940af574878f1f7d8ece
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd