Analysis
-
max time kernel
41s -
max time network
44s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 01:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://v3q90-philanthropy-astronomy.8cca6dce4ee16b18dc13f22d.workers.dev/MTcwMTkzNzQxOQ?wkH9JkvGjL7vQnooPiDs6fa2ZYBUzPXLTrv4561-sfmaxgen-pgx--ifxRekun-isxscangl.comsf-1MC4y/wkH9JfixedkvGjL7vQnooPiDs6fa2Z/YBUzPXLTrv/4561sfmaxgen-pgx-ifxRekunisxscangl.comsf-1MC4w
Resource
win10v2004-20240226-en
General
-
Target
https://v3q90-philanthropy-astronomy.8cca6dce4ee16b18dc13f22d.workers.dev/MTcwMTkzNzQxOQ?wkH9JkvGjL7vQnooPiDs6fa2ZYBUzPXLTrv4561-sfmaxgen-pgx--ifxRekun-isxscangl.comsf-1MC4y/wkH9JfixedkvGjL7vQnooPiDs6fa2Z/YBUzPXLTrv/4561sfmaxgen-pgx-ifxRekunisxscangl.comsf-1MC4w
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 49 cloudflare-ipfs.com 50 cloudflare-ipfs.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133535566371827765" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2792 chrome.exe 2792 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeCreatePagefilePrivilege 2792 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2792 wrote to memory of 1628 2792 chrome.exe 69 PID 2792 wrote to memory of 1628 2792 chrome.exe 69 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 1336 2792 chrome.exe 89 PID 2792 wrote to memory of 4340 2792 chrome.exe 90 PID 2792 wrote to memory of 4340 2792 chrome.exe 90 PID 2792 wrote to memory of 4484 2792 chrome.exe 91 PID 2792 wrote to memory of 4484 2792 chrome.exe 91 PID 2792 wrote to memory of 4484 2792 chrome.exe 91 PID 2792 wrote to memory of 4484 2792 chrome.exe 91 PID 2792 wrote to memory of 4484 2792 chrome.exe 91 PID 2792 wrote to memory of 4484 2792 chrome.exe 91 PID 2792 wrote to memory of 4484 2792 chrome.exe 91 PID 2792 wrote to memory of 4484 2792 chrome.exe 91 PID 2792 wrote to memory of 4484 2792 chrome.exe 91 PID 2792 wrote to memory of 4484 2792 chrome.exe 91 PID 2792 wrote to memory of 4484 2792 chrome.exe 91 PID 2792 wrote to memory of 4484 2792 chrome.exe 91 PID 2792 wrote to memory of 4484 2792 chrome.exe 91 PID 2792 wrote to memory of 4484 2792 chrome.exe 91 PID 2792 wrote to memory of 4484 2792 chrome.exe 91 PID 2792 wrote to memory of 4484 2792 chrome.exe 91 PID 2792 wrote to memory of 4484 2792 chrome.exe 91 PID 2792 wrote to memory of 4484 2792 chrome.exe 91 PID 2792 wrote to memory of 4484 2792 chrome.exe 91 PID 2792 wrote to memory of 4484 2792 chrome.exe 91 PID 2792 wrote to memory of 4484 2792 chrome.exe 91 PID 2792 wrote to memory of 4484 2792 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://v3q90-philanthropy-astronomy.8cca6dce4ee16b18dc13f22d.workers.dev/MTcwMTkzNzQxOQ?wkH9JkvGjL7vQnooPiDs6fa2ZYBUzPXLTrv4561-sfmaxgen-pgx--ifxRekun-isxscangl.comsf-1MC4y/wkH9JfixedkvGjL7vQnooPiDs6fa2Z/YBUzPXLTrv/4561sfmaxgen-pgx-ifxRekunisxscangl.comsf-1MC4w1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe77309758,0x7ffe77309768,0x7ffe773097782⤵PID:1628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 --field-trial-handle=1896,i,4019417746406212840,6956895359320062781,131072 /prefetch:22⤵PID:1336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 --field-trial-handle=1896,i,4019417746406212840,6956895359320062781,131072 /prefetch:82⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2236 --field-trial-handle=1896,i,4019417746406212840,6956895359320062781,131072 /prefetch:82⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3164 --field-trial-handle=1896,i,4019417746406212840,6956895359320062781,131072 /prefetch:12⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3184 --field-trial-handle=1896,i,4019417746406212840,6956895359320062781,131072 /prefetch:12⤵PID:1584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4564 --field-trial-handle=1896,i,4019417746406212840,6956895359320062781,131072 /prefetch:12⤵PID:3184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4668 --field-trial-handle=1896,i,4019417746406212840,6956895359320062781,131072 /prefetch:12⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 --field-trial-handle=1896,i,4019417746406212840,6956895359320062781,131072 /prefetch:82⤵PID:1732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 --field-trial-handle=1896,i,4019417746406212840,6956895359320062781,131072 /prefetch:82⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 --field-trial-handle=1896,i,4019417746406212840,6956895359320062781,131072 /prefetch:82⤵PID:3780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=5244 --field-trial-handle=1896,i,4019417746406212840,6956895359320062781,131072 /prefetch:12⤵PID:3668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5348 --field-trial-handle=1896,i,4019417746406212840,6956895359320062781,131072 /prefetch:12⤵PID:4724
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195KB
MD5873734b55d4c7d35a177c8318b0caec7
SHA1469b913b09ea5b55e60098c95120cc9b935ddb28
SHA2564ee3aa3dc43cb3ef3f6bfb91ed8214659e9c2600a45bee9728ebbcb6f33b088d
SHA51224f05ed981e994475879ca2221b6948418c4412063b9c07f46b8de581047ddd5d73401562fa9ee54d4ce5f97a6288c54eac5de0ca29b1bb5797bdac5a1b30308
-
Filesize
706B
MD592b57dce7ea6a572e3164d5f2d1d0f7e
SHA127295cd2c8d2f8d0992d8ef5ac6ab097d31dacbe
SHA256ec1a657897201bf468f6df6189c2637a0a5c187293559267b708257cd54d16dc
SHA512a357b4f6e230c3f63da4b7da281802541d518c0aaa2aa703a402c145ea50800a09c334dd189f29e392e0cef31243df55d6ce59d078ada690fa973ed0a1ada1da
-
Filesize
6KB
MD573b5deebbff1c8e9c19bcf3f94c8a968
SHA1309426c52d7075b95a5a1cfbdf918b47b14cc1bb
SHA256509e6bcad16c89a94dede0a0baf55477def5b290357489c0e7dcbfa6b8913472
SHA5121e53d2d932884b8ef7de687dc29722604b147b175f480b370b7b66a4659336b3d72d09303cd07de0c31519a26e4d03aa0cea39545bb856e88c331a7b800758fa
-
Filesize
6KB
MD546373d6403d1c6c83ae73390d5010e0b
SHA1397d44e4ba3be71d62d4943f429d6876165c3961
SHA256865b06a2171232d4c6390c8e70e3e8bec0e0c412c3e439ec8b57526e99441fa7
SHA5126fff41a2bfda247a9f70708ea4f67c17c76df4fd67ace5d04ebe1223aaad5329ff74516e8398614bef13e7ae4d53132488740472e667ae2487498c5767290981
-
Filesize
128KB
MD5663adbdbf35d76a4a36acbd1b3efaf90
SHA1b93926e0bdcd7db81392377f8a49f23aa53f7f80
SHA256b98885b075a83577cf3d7790d093a38a447023831ce10397e9caaf9fdb4d6222
SHA512c4a9670a87ebd4915cb040d604e59dd72a349fae22f34b688e95da9134e60ebf71a01c9f764d35e9f084d4dcb5afd38524c7f7e5df570d132f994840d1836a1a
-
Filesize
103KB
MD577f69b9347375e90baeda2e8c8c838b3
SHA12b20f8f29539139dadcb38c242275cb8153e9636
SHA256640f3c7c4eaae5fbed15d3447a792bc9d0917fe3c8056b7e07ff2fbb776aa8c8
SHA512aa5955cf551af25a1ff2ce84586f1df90c7ee830617bb824027370d4f0959924da66693c5ed4a5f5d84edcae00d6eaf5a9f09da0917fb670ceadb5428636774f
-
Filesize
100KB
MD55bbdf0fa17bfb55e918f76e5aba97117
SHA1ef5a9a7c6cb8107e5e195f59d94e432871d1b611
SHA25682929e1cd9f39c0c0887bfcccabb0fabe2221bda5e1b67608f4d54031b84e97f
SHA51253d9d82475d35731a73e155e487a55e7f49daae8950fefe4a56b675c12c98fe88208dc48fecdc70efde847bc6e83808c057350bd1a9d42ab3ca42694aa1abc65
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd