Analysis
-
max time kernel
60s -
max time network
53s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
23/02/2024, 11:30
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://shickesteve.com/tradeshows/iba
Resource
win11-20240221-en
General
-
Target
https://shickesteve.com/tradeshows/iba
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133531615599329044" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4280069375-290121026-380765049-1000\{FDD627AC-99C2-4299-BF25-00BCC16B4DA0} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1916 chrome.exe 1916 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe Token: SeShutdownPrivilege 1916 chrome.exe Token: SeCreatePagefilePrivilege 1916 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe 1916 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1916 wrote to memory of 4388 1916 chrome.exe 25 PID 1916 wrote to memory of 4388 1916 chrome.exe 25 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2776 1916 chrome.exe 85 PID 1916 wrote to memory of 2820 1916 chrome.exe 83 PID 1916 wrote to memory of 2820 1916 chrome.exe 83 PID 1916 wrote to memory of 4084 1916 chrome.exe 84 PID 1916 wrote to memory of 4084 1916 chrome.exe 84 PID 1916 wrote to memory of 4084 1916 chrome.exe 84 PID 1916 wrote to memory of 4084 1916 chrome.exe 84 PID 1916 wrote to memory of 4084 1916 chrome.exe 84 PID 1916 wrote to memory of 4084 1916 chrome.exe 84 PID 1916 wrote to memory of 4084 1916 chrome.exe 84 PID 1916 wrote to memory of 4084 1916 chrome.exe 84 PID 1916 wrote to memory of 4084 1916 chrome.exe 84 PID 1916 wrote to memory of 4084 1916 chrome.exe 84 PID 1916 wrote to memory of 4084 1916 chrome.exe 84 PID 1916 wrote to memory of 4084 1916 chrome.exe 84 PID 1916 wrote to memory of 4084 1916 chrome.exe 84 PID 1916 wrote to memory of 4084 1916 chrome.exe 84 PID 1916 wrote to memory of 4084 1916 chrome.exe 84 PID 1916 wrote to memory of 4084 1916 chrome.exe 84 PID 1916 wrote to memory of 4084 1916 chrome.exe 84 PID 1916 wrote to memory of 4084 1916 chrome.exe 84 PID 1916 wrote to memory of 4084 1916 chrome.exe 84 PID 1916 wrote to memory of 4084 1916 chrome.exe 84 PID 1916 wrote to memory of 4084 1916 chrome.exe 84 PID 1916 wrote to memory of 4084 1916 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://shickesteve.com/tradeshows/iba1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb9ba49758,0x7ffb9ba49768,0x7ffb9ba497782⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 --field-trial-handle=1820,i,13330842858605523252,9831849621737787281,131072 /prefetch:82⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2148 --field-trial-handle=1820,i,13330842858605523252,9831849621737787281,131072 /prefetch:82⤵PID:4084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1656 --field-trial-handle=1820,i,13330842858605523252,9831849621737787281,131072 /prefetch:22⤵PID:2776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2948 --field-trial-handle=1820,i,13330842858605523252,9831849621737787281,131072 /prefetch:12⤵PID:1576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2928 --field-trial-handle=1820,i,13330842858605523252,9831849621737787281,131072 /prefetch:12⤵PID:1476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4548 --field-trial-handle=1820,i,13330842858605523252,9831849621737787281,131072 /prefetch:12⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4580 --field-trial-handle=1820,i,13330842858605523252,9831849621737787281,131072 /prefetch:12⤵PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 --field-trial-handle=1820,i,13330842858605523252,9831849621737787281,131072 /prefetch:82⤵
- Modifies registry class
PID:688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5112 --field-trial-handle=1820,i,13330842858605523252,9831849621737787281,131072 /prefetch:82⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5516 --field-trial-handle=1820,i,13330842858605523252,9831849621737787281,131072 /prefetch:12⤵PID:400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 --field-trial-handle=1820,i,13330842858605523252,9831849621737787281,131072 /prefetch:82⤵PID:4564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 --field-trial-handle=1820,i,13330842858605523252,9831849621737787281,131072 /prefetch:82⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195KB
MD5873734b55d4c7d35a177c8318b0caec7
SHA1469b913b09ea5b55e60098c95120cc9b935ddb28
SHA2564ee3aa3dc43cb3ef3f6bfb91ed8214659e9c2600a45bee9728ebbcb6f33b088d
SHA51224f05ed981e994475879ca2221b6948418c4412063b9c07f46b8de581047ddd5d73401562fa9ee54d4ce5f97a6288c54eac5de0ca29b1bb5797bdac5a1b30308
-
Filesize
2KB
MD53dfefe33c7a0e091f0893956e0a129f6
SHA1228ec952c87508edf6739b12c0a11f6b43ff39a2
SHA2567cdc50c3bf8a339f4ef5679fe46105514209f0fc423e19c6387263e3168767c1
SHA51203975152a6867742589dfa001815e1f116745469d2d88aa8c8ccbc9a660f614436a8028add9ddbe51398b5d4688e638601bcee9c96d8fd42d2e43bf1d404c911
-
Filesize
1KB
MD5a69e44be9e6cad41e44b673cd6bb071d
SHA1f434a7fe8d577bd90818226cc066f3a5aebe8e6b
SHA256943230c88f30e7e727b336ba7fe0f5c44401e0a222ba95938e4d65e6d46a0a50
SHA512ab5fbd673df83db4268e90065cd92e74c4a75e4b0f1b1a6d5c3c59bfad2cccc75e0055c581401847d78be9500592015f13b44423395a28997184ddb77040ca7f
-
Filesize
1KB
MD5408cb57449f13d03b1a8c2b91d7c0de2
SHA14e5a187af760933e459860eafbbe1637f7da189b
SHA2565c7d74aad8a2f47c7c236993572d9838275df61024e69745bcd1aba7bb68183e
SHA512f512fcfc37f72646ae4256ca6a9e8cd3d803efa0c92b9c621a6b6c15c021d3ad5d87b9bb3cf486dc3ef99e9f9f7fd03b41581339ad6e3abf3f214d5643be3633
-
Filesize
6KB
MD5dd530340a4c30d227d1ff1c7356bbf17
SHA1118b8d1029542c22f20bf6a2dc1e407530f69a42
SHA2560a04e6e1f6d688606929f84f5ba77b493e1b556de2affe613484b48e89aad819
SHA512d864a544c2ba0f2470ad7caceef1146cfee4b2b2693d53dc18de19342aac77d3b776e25f588419724368bb22a1178c4f0a2f0e2f29936c82329e1284162f2e63
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize56B
MD5ae1bccd6831ebfe5ad03b482ee266e4f
SHA101f4179f48f1af383b275d7ee338dd160b6f558a
SHA2561b11047e738f76c94c9d15ee981ec46b286a54def1a7852ca1ade7f908988649
SHA512baf7ff6747f30e542c254f46a9678b9dbf42312933962c391b79eca6fcb615e4ba9283c00f554d6021e594f18c087899bc9b5362c41c0d6f862bba7fb9f83038
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize120B
MD55503b914bdc7ae292ffcc608b65bed8d
SHA11dbd6ee2dc9ada76de99fd563303ac43f60d0fe0
SHA256beef47585f00020c0e2703027923b5b428b690c1bf873fcaf4d870110d302420
SHA512ca217b49dc630889a1f9955e40a6861901e5cc8fab75a815d88f80752b325908e63a749fe6db14d52e30eb41dbc50946039be5e1fa9d904e819335eaaeace5d8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe5762f0.TMP
Filesize120B
MD51c499dde3f0c666099254e750e2202dc
SHA16ffc3a1a5f36966a955c50ddb938a355b7498133
SHA25652f940bb24f1f212b075cdec176db5640aa08f4e6db0cd13716cac5f76d87169
SHA512c4e8a56bfddfec63ba303b75bba6178fc1cd152a1e8f8e6178dfc4a4ef2580f2e8d7b34ad0af575e3136c8d315fe78a347866dd683a831259ffa5af4ea1b2a39
-
Filesize
130KB
MD57f0337fe4ce20473c75ffa9db1ba9e50
SHA1e9a21e04444f68fcfe15802fe17fe6eb67b03979
SHA256c9006c2ee366a1609e3c79e022e43011b6e620027b86e11a8b574b6bebb8c3fe
SHA512fb838785f88524c325f68afa10c2aa23c4067af40ad02197b81c962048cf4d2b87acf1e8a9d47c4197e665180e54897dd28cfc0ddad04c2eee743cd91d780406
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd