Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
299s -
max time network
295s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
27/01/2024, 03:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://transcutaneous-moonfish-0fc93fd3c34c.herokuapp.com/m?mid=6596d4248caf1b00019e41a4
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://transcutaneous-moonfish-0fc93fd3c34c.herokuapp.com/m?mid=6596d4248caf1b00019e41a4
Resource
win10-20231215-en
General
-
Target
https://transcutaneous-moonfish-0fc93fd3c34c.herokuapp.com/m?mid=6596d4248caf1b00019e41a4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133507999634437776" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 4128 chrome.exe 4128 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3384 wrote to memory of 3024 3384 chrome.exe 72 PID 3384 wrote to memory of 3024 3384 chrome.exe 72 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 5068 3384 chrome.exe 75 PID 3384 wrote to memory of 3632 3384 chrome.exe 74 PID 3384 wrote to memory of 3632 3384 chrome.exe 74 PID 3384 wrote to memory of 1536 3384 chrome.exe 76 PID 3384 wrote to memory of 1536 3384 chrome.exe 76 PID 3384 wrote to memory of 1536 3384 chrome.exe 76 PID 3384 wrote to memory of 1536 3384 chrome.exe 76 PID 3384 wrote to memory of 1536 3384 chrome.exe 76 PID 3384 wrote to memory of 1536 3384 chrome.exe 76 PID 3384 wrote to memory of 1536 3384 chrome.exe 76 PID 3384 wrote to memory of 1536 3384 chrome.exe 76 PID 3384 wrote to memory of 1536 3384 chrome.exe 76 PID 3384 wrote to memory of 1536 3384 chrome.exe 76 PID 3384 wrote to memory of 1536 3384 chrome.exe 76 PID 3384 wrote to memory of 1536 3384 chrome.exe 76 PID 3384 wrote to memory of 1536 3384 chrome.exe 76 PID 3384 wrote to memory of 1536 3384 chrome.exe 76 PID 3384 wrote to memory of 1536 3384 chrome.exe 76 PID 3384 wrote to memory of 1536 3384 chrome.exe 76 PID 3384 wrote to memory of 1536 3384 chrome.exe 76 PID 3384 wrote to memory of 1536 3384 chrome.exe 76 PID 3384 wrote to memory of 1536 3384 chrome.exe 76 PID 3384 wrote to memory of 1536 3384 chrome.exe 76 PID 3384 wrote to memory of 1536 3384 chrome.exe 76 PID 3384 wrote to memory of 1536 3384 chrome.exe 76
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://transcutaneous-moonfish-0fc93fd3c34c.herokuapp.com/m?mid=6596d4248caf1b00019e41a41⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffd9eab9758,0x7ffd9eab9768,0x7ffd9eab97782⤵PID:3024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1812 --field-trial-handle=1800,i,6362536966857094659,7883003843764950811,131072 /prefetch:82⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1800,i,6362536966857094659,7883003843764950811,131072 /prefetch:22⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2108 --field-trial-handle=1800,i,6362536966857094659,7883003843764950811,131072 /prefetch:82⤵PID:1536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2864 --field-trial-handle=1800,i,6362536966857094659,7883003843764950811,131072 /prefetch:12⤵PID:3872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2852 --field-trial-handle=1800,i,6362536966857094659,7883003843764950811,131072 /prefetch:12⤵PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4884 --field-trial-handle=1800,i,6362536966857094659,7883003843764950811,131072 /prefetch:12⤵PID:1388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3792 --field-trial-handle=1800,i,6362536966857094659,7883003843764950811,131072 /prefetch:82⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 --field-trial-handle=1800,i,6362536966857094659,7883003843764950811,131072 /prefetch:82⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4636 --field-trial-handle=1800,i,6362536966857094659,7883003843764950811,131072 /prefetch:82⤵PID:2488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 --field-trial-handle=1800,i,6362536966857094659,7883003843764950811,131072 /prefetch:82⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4380 --field-trial-handle=1800,i,6362536966857094659,7883003843764950811,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4128
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
856B
MD5da63ad09d475bdef54a83ddbedb7392c
SHA119ee0cf564a21d9a39e204841414da81cd62d8c3
SHA2569d35ea43146ccf9bf8acbd76d2f0f12858b45a528c0859e18bb4ade61bb1506c
SHA5120a77e679a3e6145a3460ae3c075d3c68560e0738db3cf56500dbfbca935365472146ece99fd28501a04a1ca39669a62a8e602f522088df5d410e037d6855af01
-
Filesize
539B
MD52aa0c89adf9062bcb70eb9769a093f00
SHA1a7d7b87666cd4cc475ea2826320a2e55b8d5e4c4
SHA256de901adea02e00dd8554f7b42c742ba0fcf56978020b49ff69a9ba2a3035262f
SHA5128141e8f87ea8d51fd2b029bafe864f749e2365031a487dac537cddad7fad902c2fd5300eb72ee09aec5d9f696d1e948f0dc67ae725b9f54a4b0513a9e246ee64
-
Filesize
6KB
MD51618d68ec72a75aeab09e7316966e70d
SHA193a04eba642a6cc8ec4d0044aad53f69d8ebb9f7
SHA2562788b2c52010d65f4d85b236fb75908253911c227b015a5e9a8242e6c840317b
SHA512307329d8a5838800c29cdf6a6ad116c7791677ae253c857324b97edc6cb0a80f92c297f4f1d5c996374d0b78323170f58952f2b80e60fb9a2ccb0a28362ec8ab
-
Filesize
6KB
MD53373a9649fca295990fe640784e78500
SHA1fccb2451d3e40808e6a5890232890c58ddc05dbe
SHA256c6ba42a99bdbddc5046354d94df072cb5dba31df49a36962a055f1d3e7a4dd62
SHA5120e9c73064d14d3cb86064f419aa003e203940a0760fe930654aaf15f408da4daf8dfbba510f306cd596b45d0c184cc4ffec79ab3bdbf7035d4d5d1afd8887603
-
Filesize
6KB
MD5dff726586a0a9b6761e98b809ddef2e4
SHA1f3a9e2b220978e782aad8c2cea50c18b5a8678b8
SHA256086d1820f1b1bc3c10110efd193fc0669255dbb1d363d25c2920abf127860bf5
SHA5126b191d6d96ef5f3734dc5a768ec6d7aa975ebde2efbc77fe896e5ad7ce6323eb2a8145f45ba45d6afe8567668ead4a42ef3eb2a07b4358a0f9c0c04b0816aa66
-
Filesize
116KB
MD5fe10d08448bae35f2c00ad3abcbee86a
SHA16ac55cb4a92c00066ca087066d0515ca61502e1a
SHA2567dd2d478538736cbe02638b6511c49116feb797462f3b95ade3f3507efc74b28
SHA512c5d01f393ee81259af322ad727dea90bd0e06918510c63a766fe9a0801261ee62cae899c3ee44b114d751d45f70304ee45a2632373f35da3d4024a4e352194af
-
Filesize
115KB
MD51c937da6c29b8c211d1a0a3898d80db6
SHA1ad95b593e4f94aadf510fb6767ec354469ca5bde
SHA256854d25dd21c96342d450fa6a2b2bbe2c81bdce5a7dc9a6967bede4dfb63dde1c
SHA5126e528a3cc37ec5157af406bcc2215f45ef29217ef58e32c96f3acccaf06dba93de1c19bf06165f062ab0bdfb3e5acc8484a8bbd560931eed11147e5e76321400
-
Filesize
133KB
MD567742edfbb0e79bd2795f1de438ea78c
SHA11f006f04734dba05845d07c610a3f437b2674206
SHA25685f4655feae270e1afaef0dbbba0424d70585b237a955c305143f10085453f9d
SHA512200dee299c8ec9d8ac9bd6c42606c250c320fa5cae8c5ec3021bcf89744fe002bee2e39adb804f24de0733040a8215c6bdb978990c9d91eb74a1990b6a40c239
-
Filesize
115KB
MD5279cc7e3aadab3aea9c4db433fcb772b
SHA176e52b01b111109b8ffd0faf33cec69ad6f53512
SHA256e8ffe0e01486dc75e846259d37294494c0c7ea35b99a4e994a6faa2da7b777cc
SHA512a893f3502141c4e7a5805be55d28565143fe6c8510e85dfb74247178dfc846e2fe007a7203fedd977516ad9b043e3955d25555dda26591e2ad64d8eb6078ddd6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd