Analysis
-
max time kernel
221s -
max time network
227s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 17:32
Static task
static1
Behavioral task
behavioral1
Sample
redirect.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
redirect.html
Resource
win10v2004-20240226-en
General
-
Target
redirect.html
-
Size
6KB
-
MD5
747079a3eb4b74870eab6308a8d36425
-
SHA1
c40459e59c648f22a3f5195cc5015734e52da7d5
-
SHA256
945aedc7795bf7bffb3066393828504c3cfd270ecf61e667d87f0c4632929c9d
-
SHA512
ebc9c4cf0d622f019092369e71688bed95ee37617d2755013e18ecf87aea379250224ce5c3d31dbacd07bd3a9ed83d55c7be015e5ba7ba3f5ec36c0d6071713a
-
SSDEEP
192:dDHLxX7777/77QF7yXyr10Lod4BYCIpjhO0yX9XX:dDr5HYD0+CIptOBXF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133544793891777525" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 488 chrome.exe 488 chrome.exe 3400 chrome.exe 3400 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe Token: SeShutdownPrivilege 488 chrome.exe Token: SeCreatePagefilePrivilege 488 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe 488 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 488 wrote to memory of 1192 488 chrome.exe 86 PID 488 wrote to memory of 1192 488 chrome.exe 86 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4444 488 chrome.exe 89 PID 488 wrote to memory of 4832 488 chrome.exe 90 PID 488 wrote to memory of 4832 488 chrome.exe 90 PID 488 wrote to memory of 2228 488 chrome.exe 91 PID 488 wrote to memory of 2228 488 chrome.exe 91 PID 488 wrote to memory of 2228 488 chrome.exe 91 PID 488 wrote to memory of 2228 488 chrome.exe 91 PID 488 wrote to memory of 2228 488 chrome.exe 91 PID 488 wrote to memory of 2228 488 chrome.exe 91 PID 488 wrote to memory of 2228 488 chrome.exe 91 PID 488 wrote to memory of 2228 488 chrome.exe 91 PID 488 wrote to memory of 2228 488 chrome.exe 91 PID 488 wrote to memory of 2228 488 chrome.exe 91 PID 488 wrote to memory of 2228 488 chrome.exe 91 PID 488 wrote to memory of 2228 488 chrome.exe 91 PID 488 wrote to memory of 2228 488 chrome.exe 91 PID 488 wrote to memory of 2228 488 chrome.exe 91 PID 488 wrote to memory of 2228 488 chrome.exe 91 PID 488 wrote to memory of 2228 488 chrome.exe 91 PID 488 wrote to memory of 2228 488 chrome.exe 91 PID 488 wrote to memory of 2228 488 chrome.exe 91 PID 488 wrote to memory of 2228 488 chrome.exe 91 PID 488 wrote to memory of 2228 488 chrome.exe 91 PID 488 wrote to memory of 2228 488 chrome.exe 91 PID 488 wrote to memory of 2228 488 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\redirect.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab4b89758,0x7ffab4b89768,0x7ffab4b897782⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 --field-trial-handle=1856,i,4079815670250730076,4290212140284017710,131072 /prefetch:22⤵PID:4444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 --field-trial-handle=1856,i,4079815670250730076,4290212140284017710,131072 /prefetch:82⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2192 --field-trial-handle=1856,i,4079815670250730076,4290212140284017710,131072 /prefetch:82⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3100 --field-trial-handle=1856,i,4079815670250730076,4290212140284017710,131072 /prefetch:12⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3108 --field-trial-handle=1856,i,4079815670250730076,4290212140284017710,131072 /prefetch:12⤵PID:1352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 --field-trial-handle=1856,i,4079815670250730076,4290212140284017710,131072 /prefetch:82⤵PID:4152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2728 --field-trial-handle=1856,i,4079815670250730076,4290212140284017710,131072 /prefetch:82⤵PID:3108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2916 --field-trial-handle=1856,i,4079815670250730076,4290212140284017710,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4120 --field-trial-handle=1856,i,4079815670250730076,4290212140284017710,131072 /prefetch:12⤵PID:4020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2828 --field-trial-handle=1856,i,4079815670250730076,4290212140284017710,131072 /prefetch:12⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2208 --field-trial-handle=1856,i,4079815670250730076,4290212140284017710,131072 /prefetch:82⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=904 --field-trial-handle=1856,i,4079815670250730076,4290212140284017710,131072 /prefetch:82⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD515b6ffd2ee326d21a99c1f6d6c1cec3a
SHA140696743f3c8238e0cd82ecbae84b6041e50453c
SHA25648e83f01abde6e7d2002be65d2afeafca7929a4d318b34803e49117c520e3895
SHA5126958c287d3dc7b75a7306352feb9ff1298040a0e341887e2f79d18a88ec4c2d682653e8a24141f1650febcdb8796a8a54c035b4174fb30746af971ed3b7d4666
-
Filesize
1KB
MD5939c795f61f6bdbcca3038747368bbba
SHA1d5d9771fc800a834e62fec9df9712efaf0a05610
SHA256716b9033b81c58535799e2f52105d1f10e9226a947e90a95b592853be069da1e
SHA51262f73ff28a32e932f4fd27f3da0c76ecaa2c03f324346ea9d4477bf381311f107c1458efd2545247f7e0b5815ed0d54d39e7261e8e2ee37c94a7e24974a45095
-
Filesize
1KB
MD57fa89395d97e53a160eb087074d6fb66
SHA122e0d8d9ca457c172546a1f2fbb89602abb9f034
SHA256b76345689ea2b98705b88a55856a84f039749f1b2a25301290b07531c3eb8a1a
SHA512c79e68513562e3c1fb5f0318adc172f7f81b3998c966019f0819e022fde6dacce223bf872a2c8158ce4ea64fd739e42b136dee9fe1d9f3840d1b7b1d64a110ff
-
Filesize
371B
MD52a76728c3d0fbdb8889b4d7b67f4d2f0
SHA1ace62aeb7489d3ff85de54a2f771d5b669c716f0
SHA256ca7f60dae6bd35867d4996c8da5f84b58dd215461e80f7da7a43da1d172da9eb
SHA512476debe7aa537eb74471fb5d86cb6bb2458465437848e68810a874e76fccdefde9091d55f2c773d3c59122f6a029570fe2ac18614ec87e41152b2bd7611244a0
-
Filesize
6KB
MD5bd34f58d1a3ceff17173d2f3f3a33067
SHA14546983d9cf33e94a0a3be58012b10a729a5abc5
SHA2563865454d150ff6e8fd2ab3a2eb4bccff5f4e3f03e527a5412f782d40115bb19c
SHA5128791d045f917286d0b671c500edb1cfd82cac44c6a5bbd1484b5ce0feabeb8f6767716bb4e7e6845766ea8a2961ba73251370e85c2bf3edc9c5a19009f951939
-
Filesize
6KB
MD57e2c1f7be3853a736f70c254c481338b
SHA1e8f3836e5dac6b5f04e6acf8f33d1abf605af48e
SHA25648baab560d964c88e9f64f08dac379e13409618480b192842c058418ef9d3c65
SHA512da9844609bd2992a561b013ed57ec2544753bc7bb625090870ef041115e445c6b46116aca74483d4a39cfa5515401f115eea8a175df9d47fa4b7cce52d12ed53
-
Filesize
6KB
MD506f2bd1e8cc2fa4c406c6e33136de0c0
SHA1af1b2f8bbb6edfe3e0bd66479b6c2578ca1769e0
SHA25644ac17ced6e7505d27bbe80954dfe1413d62d0d2756ecea7789e5760a0e779bb
SHA51277115d98ba62351f8a3a3c2bc64ae6e6a281338d8f87ed44e697d325ca6bace567f80857d448fe1c242d4fe7a8ce7e254863fea5ba4a4320d6dbe681d957f521
-
Filesize
128KB
MD59ecc3a2be09973ed3873af4ca620cdfc
SHA164197d7eb2d066aeac6a7a0d000c618253b4bf41
SHA256666c2c55e2018641c2da3bd65ef0164e4ae986e8d9ee1d777a7e091b5d24d332
SHA512a0b5b1aa446e49d6f5e6285495022c04660c92506a9e8cc03ff708553840c4d8426840201bc31831ba4cefb34c45ec67c6212f7a6417b3ddd5833bbec6f3f1a3
-
Filesize
128KB
MD565a0fcd984c95125fca1f5e88fbbbc46
SHA134c0169438e4c4ae74062a03a07f3cba32c730da
SHA25695b17c46bb668477d1df7c9f23205288b24a5feb7098e858940c7459ee8bf7f3
SHA512855518ef21864be25886e2da6783680f9ea69f592e0bdfaa7ddaf3eff22a2394b5688f0ab8ea0826cdb32fc5d350ab15d191d138ca18e6291189763e514d7044
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd