Analysis
-
max time kernel
29s -
max time network
27s -
platform
windows10-1703_x64 -
resource
win10-20230220-es -
resource tags
arch:x64arch:x86image:win10-20230220-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
19-04-2023 08:28
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://unseenreport.com
Resource
win10-20230220-es
Behavioral task
behavioral2
Sample
http://unseenreport.com
Resource
win7-20230220-es
General
-
Target
http://unseenreport.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133263737468521181" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4232 chrome.exe 4232 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe -
Suspicious use of AdjustPrivilegeToken 56 IoCs
description pid Process Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe Token: SeShutdownPrivilege 4232 chrome.exe Token: SeCreatePagefilePrivilege 4232 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4232 wrote to memory of 4372 4232 chrome.exe 66 PID 4232 wrote to memory of 4372 4232 chrome.exe 66 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 2620 4232 chrome.exe 69 PID 4232 wrote to memory of 4696 4232 chrome.exe 68 PID 4232 wrote to memory of 4696 4232 chrome.exe 68 PID 4232 wrote to memory of 3112 4232 chrome.exe 70 PID 4232 wrote to memory of 3112 4232 chrome.exe 70 PID 4232 wrote to memory of 3112 4232 chrome.exe 70 PID 4232 wrote to memory of 3112 4232 chrome.exe 70 PID 4232 wrote to memory of 3112 4232 chrome.exe 70 PID 4232 wrote to memory of 3112 4232 chrome.exe 70 PID 4232 wrote to memory of 3112 4232 chrome.exe 70 PID 4232 wrote to memory of 3112 4232 chrome.exe 70 PID 4232 wrote to memory of 3112 4232 chrome.exe 70 PID 4232 wrote to memory of 3112 4232 chrome.exe 70 PID 4232 wrote to memory of 3112 4232 chrome.exe 70 PID 4232 wrote to memory of 3112 4232 chrome.exe 70 PID 4232 wrote to memory of 3112 4232 chrome.exe 70 PID 4232 wrote to memory of 3112 4232 chrome.exe 70 PID 4232 wrote to memory of 3112 4232 chrome.exe 70 PID 4232 wrote to memory of 3112 4232 chrome.exe 70 PID 4232 wrote to memory of 3112 4232 chrome.exe 70 PID 4232 wrote to memory of 3112 4232 chrome.exe 70 PID 4232 wrote to memory of 3112 4232 chrome.exe 70 PID 4232 wrote to memory of 3112 4232 chrome.exe 70 PID 4232 wrote to memory of 3112 4232 chrome.exe 70 PID 4232 wrote to memory of 3112 4232 chrome.exe 70
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://unseenreport.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff8409d9758,0x7ff8409d9768,0x7ff8409d97782⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1932 --field-trial-handle=1764,i,8617648784482416592,4797745401850626778,131072 /prefetch:82⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1764,i,8617648784482416592,4797745401850626778,131072 /prefetch:22⤵PID:2620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1976 --field-trial-handle=1764,i,8617648784482416592,4797745401850626778,131072 /prefetch:82⤵PID:3112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2748 --field-trial-handle=1764,i,8617648784482416592,4797745401850626778,131072 /prefetch:12⤵PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2736 --field-trial-handle=1764,i,8617648784482416592,4797745401850626778,131072 /prefetch:12⤵PID:1412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3480 --field-trial-handle=1764,i,8617648784482416592,4797745401850626778,131072 /prefetch:12⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4680 --field-trial-handle=1764,i,8617648784482416592,4797745401850626778,131072 /prefetch:82⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4788 --field-trial-handle=1764,i,8617648784482416592,4797745401850626778,131072 /prefetch:82⤵PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4524 --field-trial-handle=1764,i,8617648784482416592,4797745401850626778,131072 /prefetch:82⤵PID:712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3192 --field-trial-handle=1764,i,8617648784482416592,4797745401850626778,131072 /prefetch:12⤵PID:1240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4940 --field-trial-handle=1764,i,8617648784482416592,4797745401850626778,131072 /prefetch:12⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5104 --field-trial-handle=1764,i,8617648784482416592,4797745401850626778,131072 /prefetch:82⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5116 --field-trial-handle=1764,i,8617648784482416592,4797745401850626778,131072 /prefetch:82⤵PID:2104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5368 --field-trial-handle=1764,i,8617648784482416592,4797745401850626778,131072 /prefetch:12⤵PID:208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5404 --field-trial-handle=1764,i,8617648784482416592,4797745401850626778,131072 /prefetch:12⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3772
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD547ae9b25af86702d77c7895ac6f6b57c
SHA1f56f78729b99247a975620a1103cac3ee9f313a5
SHA2569bde79a1b0866f68d6baa43f920e971b5feb35a8e0af7ffadc114366f8538224
SHA51272b5296e3dd1c5b4c42d8c3e4a56693819779167b9f02bc2d5f5a626b519a9cf10bee59846d614c929c42094b65d13039f6024f6cb1c023e740969aaefd060c4
-
Filesize
539B
MD5c11db4e9c33c1abd768266d88e46cc80
SHA1132f6e020233026ae5cc24e68b97f8a661566ad4
SHA2568d6d836fb2bc7b91557d183f3a46441619f3c12b857bed08b692c37b3d6bbc75
SHA5127bab2014b52de2ec20de0241cb1a1ce0cd175944f699650462e96772c3898d4a124ceaded9d6820ecdaa08ef5eb349fb9436667eddd15137dca093786e38f31c
-
Filesize
539B
MD568e191aa9259b56d26d222f152420897
SHA1d2629b2e0255f2f809f253475d510afe215cd082
SHA25629892c68ce266a7a6ed82ab830357a47b57d2c5ce0c50e4aa4e232c50925990f
SHA5124bd0e460ca7ae05508b3b4dc56676d87f6c53ff7abeb96b50f2f82bc3125d1bc964ce4095394dab6c59a4236f2e1e5b37d515a298d175760ce1630c3c1aa16e9
-
Filesize
6KB
MD599c510da402211ba859687ffbbaa7c73
SHA1d22fb977182d07a34d57f7407a1a4cbd8dcfa85e
SHA2568329f64b3ba7f6d030bf0fbcdb6d34944adab51b3df57345a38317ea34116bbc
SHA512fc87de2b5a14709bd1892c7260a31ff7f7e9d20bf5c1b97ce8637952568ce4ae90055540e0d58fdb5f121a6f7d0e19cb8d8a6adeca5d195a9a3d72cee188ba24
-
Filesize
6KB
MD53bf6f06731ba796028d10e9ffa2de1f9
SHA1676cafc907702bf3663af9989c8332080f886ed4
SHA256e8aef2cb509d26844362a8cf16433db760aa635cec07e112724c97736b3c4c25
SHA512715273d9f7eb28e24564e3dc9ca4def2c8b9f55e0f53eb042af0ca74349a391f2eda50ed441a3b621e4e7b908fff14c536109eb31f0bba6ac9c4aad02b3eeead
-
Filesize
12KB
MD594543c73a63d3440599ab3691c354c4d
SHA15fb3029953e3c84062b3194faef8aca118b4df28
SHA256af26711e1751d1b604f42d407c3489e9210c1ded51df2fc75b3d86d55197f695
SHA5129f22395b6eee680856819a81db5dc661292238620b77aa3e844e7f7fa46c7cd7b7312a69619d1df50c10e0a612ea28cd8c21006beadb292baef85a1a1c134c8e
-
Filesize
200KB
MD5be3e80eb97c8750e0b99080147aae766
SHA133680069acd1ff8870a5f321de22ace46ac66ed3
SHA256f876b8cf8724eca52bcbe057ff85a977d841a6ccc0cb545dd5e48ad4604aa403
SHA5123b601a3aa74a13a6f0cb7b403bbd10a3bf34aa9549c2eae14bb629747e0fa623dfd88845c92e01ec50b629ff770016920d78fa07a0f5e5f33a4827e0fa57dcd0
-
Filesize
200KB
MD5036e95f7879ff2f1c0eba68688ebb7da
SHA129cbb975954db32f669fdcb49540e89c992fd706
SHA256b6b6dbc01249a1f1f7a44492fc197da2f8b0759be25512655bf6fc7387f54fe3
SHA512c1d96d46c92eeaf3ec24069ac58d5e91037a20a4b159fb46db54af960d803b7b58919bcc8e9e12be373646f283b314573901cf56736f6efb80e4c33303313d65
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd