Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
24/11/2023, 14:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=https%3a%2f%2fclient.adecco.fr%2fs%2f&umid=84bf7c4f-c9f6-4018-be93-ddfd830778f7&auth=65a620fa4b6e2edf0405a6ed61dc7465231096cd-f5b5afee4c22f861ad693ef84972705b0593fae8
Resource
win10-20231020-en
General
-
Target
https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=https%3a%2f%2fclient.adecco.fr%2fs%2f&umid=84bf7c4f-c9f6-4018-be93-ddfd830778f7&auth=65a620fa4b6e2edf0405a6ed61dc7465231096cd-f5b5afee4c22f861ad693ef84972705b0593fae8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133453083002169310" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1216 chrome.exe 1216 chrome.exe 3156 chrome.exe 3156 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe Token: SeShutdownPrivilege 1216 chrome.exe Token: SeCreatePagefilePrivilege 1216 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe 1216 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1216 wrote to memory of 2400 1216 chrome.exe 70 PID 1216 wrote to memory of 2400 1216 chrome.exe 70 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 288 1216 chrome.exe 76 PID 1216 wrote to memory of 3620 1216 chrome.exe 75 PID 1216 wrote to memory of 3620 1216 chrome.exe 75 PID 1216 wrote to memory of 792 1216 chrome.exe 72 PID 1216 wrote to memory of 792 1216 chrome.exe 72 PID 1216 wrote to memory of 792 1216 chrome.exe 72 PID 1216 wrote to memory of 792 1216 chrome.exe 72 PID 1216 wrote to memory of 792 1216 chrome.exe 72 PID 1216 wrote to memory of 792 1216 chrome.exe 72 PID 1216 wrote to memory of 792 1216 chrome.exe 72 PID 1216 wrote to memory of 792 1216 chrome.exe 72 PID 1216 wrote to memory of 792 1216 chrome.exe 72 PID 1216 wrote to memory of 792 1216 chrome.exe 72 PID 1216 wrote to memory of 792 1216 chrome.exe 72 PID 1216 wrote to memory of 792 1216 chrome.exe 72 PID 1216 wrote to memory of 792 1216 chrome.exe 72 PID 1216 wrote to memory of 792 1216 chrome.exe 72 PID 1216 wrote to memory of 792 1216 chrome.exe 72 PID 1216 wrote to memory of 792 1216 chrome.exe 72 PID 1216 wrote to memory of 792 1216 chrome.exe 72 PID 1216 wrote to memory of 792 1216 chrome.exe 72 PID 1216 wrote to memory of 792 1216 chrome.exe 72 PID 1216 wrote to memory of 792 1216 chrome.exe 72 PID 1216 wrote to memory of 792 1216 chrome.exe 72 PID 1216 wrote to memory of 792 1216 chrome.exe 72
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ddec1-0-en-ctp.trendmicro.com/wis/clicktime/v1/query?url=https%3a%2f%2fclient.adecco.fr%2fs%2f&umid=84bf7c4f-c9f6-4018-be93-ddfd830778f7&auth=65a620fa4b6e2edf0405a6ed61dc7465231096cd-f5b5afee4c22f861ad693ef84972705b0593fae81⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff81c389758,0x7ff81c389768,0x7ff81c3897782⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2044 --field-trial-handle=1852,i,1868186391707103417,7819477699203161786,131072 /prefetch:82⤵PID:792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3032 --field-trial-handle=1852,i,1868186391707103417,7819477699203161786,131072 /prefetch:12⤵PID:2488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1852,i,1868186391707103417,7819477699203161786,131072 /prefetch:12⤵PID:952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1776 --field-trial-handle=1852,i,1868186391707103417,7819477699203161786,131072 /prefetch:82⤵PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1852,i,1868186391707103417,7819477699203161786,131072 /prefetch:22⤵PID:288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4476 --field-trial-handle=1852,i,1868186391707103417,7819477699203161786,131072 /prefetch:12⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4956 --field-trial-handle=1852,i,1868186391707103417,7819477699203161786,131072 /prefetch:12⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 --field-trial-handle=1852,i,1868186391707103417,7819477699203161786,131072 /prefetch:82⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4468 --field-trial-handle=1852,i,1868186391707103417,7819477699203161786,131072 /prefetch:82⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4580 --field-trial-handle=1852,i,1868186391707103417,7819477699203161786,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3156
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
600B
MD5b1b2f8f1ffddac4131afe5ceb8df487d
SHA1846025b203d31a1379a979bd0f646613c7c78a96
SHA2566d0e9875bf68f371935c23a4c5735249a9e893d392c84648daaa7ef46790e997
SHA512c72bb80a69ceafffd49ccd71dd40e58912903e37185c73e58084d6896c0a99226b1224d57035b5556ae76730931dcdbcec34fc5481b724ba59e5f40a2f90e57b
-
Filesize
1KB
MD5a8eae3e01b587ced9ccf81a03abdc145
SHA11bb5f8e9949152e44da801331f9107d652a9a9c2
SHA256659dd276321eceb31bdc331ed00c3abedbcde3203e3400f1a96eeda25afe8d9d
SHA512d6dde1bee4ae5fc995c088427f3c815a81059c15ed03634d841f5f63069e2f5ca09504886d2443394660006c822cc2c0097a85d2dc48ca23899098cee45dbb27
-
Filesize
872B
MD53e7cf15ba84a0156e72a8f1fdac3ec6a
SHA1293f1515810fc317e75e9850eff24abc573cd7e2
SHA256b71c1f3dd4a40064553b89a7c94f0cfa7ffd921e398e757eb3a7f2be3d8d2e5a
SHA512a918d2db7fe40437149af05a33b263283f98a745265d720b0f87b5beb080cf53e50ff1ea32bf733e4abe25a91565a1043d9c2fd58b5c341de195e38441b19a8c
-
Filesize
872B
MD50f215da0869fe6d784fffce49486ae64
SHA1f7231093be3372aaa25da91ecabd44dc075bbf97
SHA25690ad39fb799312f8092274e2621ce1042ea902d4f9fe2d821854546a203de893
SHA512cd205796a15ff27def2e290c010e56ddff5c8e94028fd1ae22e244474226935f67ddbd4d0a6d435808a32dbdd27c3ea2b8cbd964285d39cc57fba47728d950bf
-
Filesize
6KB
MD5b60a10d895b05a30768174bfb45888fc
SHA1865e9cd477888e01551ceebeaa28c8918214ba94
SHA256ec0c2bfce8811d11dfb7abb05f17b2b8eea1a044f892f8b79fa351e4f2d29c9f
SHA512a98d15bc87fd03151f315c8660f2f931d74e4747c2bbcb3ee2b4194cd98cdd339a34ad147c3096cafefbc9446d22cdc55c793e35f560bade5026e25ca183f4e6
-
Filesize
6KB
MD538dd5feb50d4aba8a70301ee4eae8e70
SHA1c20900869074038adc7cdf86a479a5fcc6597d66
SHA256d8762bb3eb9ad62c78bf0b0a40d7d84e4f31b4a93549b4ec11cc2e6e5fd2cf8e
SHA5121aa93f075e3a6bd1512d10068f5e3a8689d27b429292e1550d4209aad7308bcb7dbbc0c47202d10f5d15df91167906105b2de563d5111b89d6bb0771417ace8e
-
Filesize
6KB
MD5ba997c0bb1eb95f3dd19b1bca49ba584
SHA157ddb95665f3163ac503ec6b0c713718a7b5ed11
SHA256a10af6425ee5ec0b9a81f6f11dd80640634ef17004dc48fedd5df34047bdc55f
SHA512eac253b0485b3c0e77a7f4459bdb3688a373f1a647bc38dae9ad7308dac23612710987d93a7485d3897b6d95081ab3f3f7491bb88755e8a8f9c55c6674c08b85
-
Filesize
5KB
MD5f4a05f35002bf47393bb522b8da202bc
SHA15768ee904947b8decf124695c582771aa7c4fd8b
SHA256fe7bcd4eefc4bba030ab4f8f40fee7bdb3daaeb4d4e39e77cafc74090075e7ed
SHA51273243777c385a25c1c60f53b87de9f6cba60bbe8a3371352f2e1d8c950b21be69fdc27e0c1d4318b292169163dda1c239fe1ec8ba0120030120a0a0da101e235
-
Filesize
106KB
MD5ec965aeaa07e25b24b43086550ec812a
SHA10a581f98e57c90196063112ce3db2949e25a94f8
SHA256bf4ace7551d725240e8e04f3f58de3f42ec3d35a887e7dc012c40dad7a1d1e25
SHA51241819b5ad994c2b6a751d426ec0debe5e5079a8649b8ef4a8214435af6f20f2de3d1619abb3b1391614a8b28f530c50c8ea65b8d89eee55746682aa83538935a
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd