Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1800s -
max time network
1690s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
25/02/2024, 01:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://exitlag
Resource
win10v2004-20240221-en
Behavioral task
behavioral2
Sample
http://exitlag
Resource
win11-20240221-en
General
-
Target
http://exitlag
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133532965615158689" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2672 chrome.exe 2672 chrome.exe 1488 chrome.exe 1488 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2672 wrote to memory of 3400 2672 chrome.exe 69 PID 2672 wrote to memory of 3400 2672 chrome.exe 69 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 4708 2672 chrome.exe 83 PID 2672 wrote to memory of 1412 2672 chrome.exe 84 PID 2672 wrote to memory of 1412 2672 chrome.exe 84 PID 2672 wrote to memory of 500 2672 chrome.exe 85 PID 2672 wrote to memory of 500 2672 chrome.exe 85 PID 2672 wrote to memory of 500 2672 chrome.exe 85 PID 2672 wrote to memory of 500 2672 chrome.exe 85 PID 2672 wrote to memory of 500 2672 chrome.exe 85 PID 2672 wrote to memory of 500 2672 chrome.exe 85 PID 2672 wrote to memory of 500 2672 chrome.exe 85 PID 2672 wrote to memory of 500 2672 chrome.exe 85 PID 2672 wrote to memory of 500 2672 chrome.exe 85 PID 2672 wrote to memory of 500 2672 chrome.exe 85 PID 2672 wrote to memory of 500 2672 chrome.exe 85 PID 2672 wrote to memory of 500 2672 chrome.exe 85 PID 2672 wrote to memory of 500 2672 chrome.exe 85 PID 2672 wrote to memory of 500 2672 chrome.exe 85 PID 2672 wrote to memory of 500 2672 chrome.exe 85 PID 2672 wrote to memory of 500 2672 chrome.exe 85 PID 2672 wrote to memory of 500 2672 chrome.exe 85 PID 2672 wrote to memory of 500 2672 chrome.exe 85 PID 2672 wrote to memory of 500 2672 chrome.exe 85 PID 2672 wrote to memory of 500 2672 chrome.exe 85 PID 2672 wrote to memory of 500 2672 chrome.exe 85 PID 2672 wrote to memory of 500 2672 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://exitlag1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff17829758,0x7fff17829768,0x7fff178297782⤵PID:3400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1564 --field-trial-handle=1808,i,11050445836293959672,5184190205517808131,131072 /prefetch:22⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1948 --field-trial-handle=1808,i,11050445836293959672,5184190205517808131,131072 /prefetch:82⤵PID:1412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2172 --field-trial-handle=1808,i,11050445836293959672,5184190205517808131,131072 /prefetch:82⤵PID:500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2824 --field-trial-handle=1808,i,11050445836293959672,5184190205517808131,131072 /prefetch:12⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2856 --field-trial-handle=1808,i,11050445836293959672,5184190205517808131,131072 /prefetch:12⤵PID:2620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4580 --field-trial-handle=1808,i,11050445836293959672,5184190205517808131,131072 /prefetch:12⤵PID:4700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3708 --field-trial-handle=1808,i,11050445836293959672,5184190205517808131,131072 /prefetch:12⤵PID:1372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3764 --field-trial-handle=1808,i,11050445836293959672,5184190205517808131,131072 /prefetch:82⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4548 --field-trial-handle=1808,i,11050445836293959672,5184190205517808131,131072 /prefetch:82⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4936 --field-trial-handle=1808,i,11050445836293959672,5184190205517808131,131072 /prefetch:12⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4820 --field-trial-handle=1808,i,11050445836293959672,5184190205517808131,131072 /prefetch:12⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=888 --field-trial-handle=1808,i,11050445836293959672,5184190205517808131,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1488
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195KB
MD5873734b55d4c7d35a177c8318b0caec7
SHA1469b913b09ea5b55e60098c95120cc9b935ddb28
SHA2564ee3aa3dc43cb3ef3f6bfb91ed8214659e9c2600a45bee9728ebbcb6f33b088d
SHA51224f05ed981e994475879ca2221b6948418c4412063b9c07f46b8de581047ddd5d73401562fa9ee54d4ce5f97a6288c54eac5de0ca29b1bb5797bdac5a1b30308
-
Filesize
144B
MD537a268cc7888e236bb1f99c65b13ab1b
SHA1a41e77d7bf587d134b7187c01787a4d29d509543
SHA256919314b95c166fc83e57f7c7e65d56f78154d82de6bfdbb832a2cc429cecc33b
SHA512f22de878f723b3182b327fc739f94e1a4201b7fdc7e2073a479e7f142a16ecae4459ad344d659696e506c743eb53f172df0f9de02d6323e5c9a7b17a27961b6d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\7ae0998c-6d88-43cf-9000-f3c38fd62af1.tmp
Filesize371B
MD5afa1e740c2ec7e8e0c02221d205ca56a
SHA1bb86a38663530e7d26188f6b312291c69594abfb
SHA25612c02233beeece54b68545d176879d7ff3609f89d642b59bfa57f6055afee351
SHA5120eafff99415106d84b81c4cc905a80e288f4739eef6623a148411e900238997f49a0de502f18c18c7aa60e1b555567afa7c78f5265ee71a43854abccdfe459cb
-
Filesize
2KB
MD52cc0e93272f066b734d23c38bd00387f
SHA12c0d2b10e30c35c192b0481dc0c637faf2f311c1
SHA2561f667868053c2373af335ba18126a5df2a5eb12a41baea9d4a3903ac57a12c27
SHA512e6b20cc41191e6f259bf36a9afab05d0cacb376ec94ebf919144e3b7eb4295c9ec5cae7187c8deec543632162dfaeb32c21c4ab614f852345717521966cb4ac3
-
Filesize
1KB
MD5b99985e1c763be7cbac5a1a26457eea2
SHA10bd93b99fe952bb9dbca671394077077c0625500
SHA256e3f8acbcf68ad9b025e760e00a61c40ac5f71cc7376f7e06cd3335ca28233113
SHA51206fb91096a5d40200b49719618f1afe37e8d9a981d8a7efa00459ef3a5b77a74827f30321c19a31453f325fd8237d7a7c863926fb4cc525c15bb993e8a5e131a
-
Filesize
1KB
MD574f5cd3717b0d05dd58d7efb5b75110a
SHA1ba4f542611d1da6d175c1f285ccb5cfbc319f5bf
SHA2566f831e0ae715ee273827a8d2303db2e4a1d9d6e03fad80e97d0a68b39543e83d
SHA51288cd8003a05d597899927fa4a463147fc01d6f135f553e691c5b2b9dadf9367be7963b457a8a0d0b42d0b22be807ebb97cb6d8256914a04000ca1ae5ec12f250
-
Filesize
6KB
MD5c804cb42f591686e8f4e625b39c4bd18
SHA124e8f40a422b0e3b3ec2d29c9207c5163d90e121
SHA2563eb4d8ae85c16d209ba9b9106971c641ab7c1398ea5481885329f4e5cda17a46
SHA512863052847cc872f61bf317023a2b56ea7a9a9a190b96a68f02c58664425f4fbd36d2775865d2a9d040c5a0abc3c1defe878ac279fc5f8b941ce8dd37c4885bc2
-
Filesize
6KB
MD5a03ff4c30028721b4598fab19547cd56
SHA10ba083672f1569830fba547aec95baca1369bd8f
SHA256bfe1a5dabba2015ed39ae5616730e6196656787c07070eab2fd067e1615bdb2e
SHA512891292d369cb46365deaf2a14820a87b0dd316f0ba4c1bfc7be14fd62b2d5761bd79dd8cedfad9f51fdc831dbd97684ce47f0f5f334dde20e001dfc617661fa9
-
Filesize
130KB
MD59b537426f5f011c5e581e3bb767e4251
SHA1a4def8098f6767e123d67759b4e60bb3e66bbfc4
SHA25601df16de7232d0f7efc0f041c4280f150ccae7707556351a82645aa5263b87df
SHA512eaacf736353298b37dc78b97414fac4aa71231f2bfabb64017d868b64365bbba42ab18c4baf4f0b8df099908dc2f48af385d1c7f5a1ebfab0ece57792e8c31bd
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd