Analysis
-
max time kernel
1800s -
max time network
1746s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2024, 20:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://tlauncher.org/en/
Resource
win10v2004-20240221-en
General
-
Target
https://tlauncher.org/en/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133531940751731069" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 396 chrome.exe 396 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe Token: SeShutdownPrivilege 4720 chrome.exe Token: SeCreatePagefilePrivilege 4720 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe 4720 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4720 wrote to memory of 3640 4720 chrome.exe 85 PID 4720 wrote to memory of 3640 4720 chrome.exe 85 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4312 4720 chrome.exe 89 PID 4720 wrote to memory of 4600 4720 chrome.exe 90 PID 4720 wrote to memory of 4600 4720 chrome.exe 90 PID 4720 wrote to memory of 4644 4720 chrome.exe 91 PID 4720 wrote to memory of 4644 4720 chrome.exe 91 PID 4720 wrote to memory of 4644 4720 chrome.exe 91 PID 4720 wrote to memory of 4644 4720 chrome.exe 91 PID 4720 wrote to memory of 4644 4720 chrome.exe 91 PID 4720 wrote to memory of 4644 4720 chrome.exe 91 PID 4720 wrote to memory of 4644 4720 chrome.exe 91 PID 4720 wrote to memory of 4644 4720 chrome.exe 91 PID 4720 wrote to memory of 4644 4720 chrome.exe 91 PID 4720 wrote to memory of 4644 4720 chrome.exe 91 PID 4720 wrote to memory of 4644 4720 chrome.exe 91 PID 4720 wrote to memory of 4644 4720 chrome.exe 91 PID 4720 wrote to memory of 4644 4720 chrome.exe 91 PID 4720 wrote to memory of 4644 4720 chrome.exe 91 PID 4720 wrote to memory of 4644 4720 chrome.exe 91 PID 4720 wrote to memory of 4644 4720 chrome.exe 91 PID 4720 wrote to memory of 4644 4720 chrome.exe 91 PID 4720 wrote to memory of 4644 4720 chrome.exe 91 PID 4720 wrote to memory of 4644 4720 chrome.exe 91 PID 4720 wrote to memory of 4644 4720 chrome.exe 91 PID 4720 wrote to memory of 4644 4720 chrome.exe 91 PID 4720 wrote to memory of 4644 4720 chrome.exe 91
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://tlauncher.org/en/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd65259758,0x7ffd65259768,0x7ffd652597782⤵PID:3640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 --field-trial-handle=1880,i,17934572267102528495,14756153539091845635,131072 /prefetch:22⤵PID:4312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 --field-trial-handle=1880,i,17934572267102528495,14756153539091845635,131072 /prefetch:82⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 --field-trial-handle=1880,i,17934572267102528495,14756153539091845635,131072 /prefetch:82⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3024 --field-trial-handle=1880,i,17934572267102528495,14756153539091845635,131072 /prefetch:12⤵PID:1352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3016 --field-trial-handle=1880,i,17934572267102528495,14756153539091845635,131072 /prefetch:12⤵PID:4708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4332 --field-trial-handle=1880,i,17934572267102528495,14756153539091845635,131072 /prefetch:82⤵PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4436 --field-trial-handle=1880,i,17934572267102528495,14756153539091845635,131072 /prefetch:82⤵PID:3436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4924 --field-trial-handle=1880,i,17934572267102528495,14756153539091845635,131072 /prefetch:12⤵PID:3528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3312 --field-trial-handle=1880,i,17934572267102528495,14756153539091845635,131072 /prefetch:12⤵PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4900 --field-trial-handle=1880,i,17934572267102528495,14756153539091845635,131072 /prefetch:82⤵PID:3516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 --field-trial-handle=1880,i,17934572267102528495,14756153539091845635,131072 /prefetch:82⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3812 --field-trial-handle=1880,i,17934572267102528495,14756153539091845635,131072 /prefetch:12⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4264 --field-trial-handle=1880,i,17934572267102528495,14756153539091845635,131072 /prefetch:12⤵PID:3436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4892 --field-trial-handle=1880,i,17934572267102528495,14756153539091845635,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=2752 --field-trial-handle=1880,i,17934572267102528495,14756153539091845635,131072 /prefetch:12⤵PID:3880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3312 --field-trial-handle=1880,i,17934572267102528495,14756153539091845635,131072 /prefetch:12⤵PID:3496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=4824 --field-trial-handle=1880,i,17934572267102528495,14756153539091845635,131072 /prefetch:12⤵PID:4444
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5963e8d2bc23f686c31bc6a586105c40d
SHA16afd9f1924a891375d5a4147b627dea47acdff60
SHA2562d77efe4b0225013c5b6cd8a827a8d173346a60b71deb2de1227fc5ace5e355d
SHA512d5fc5539767e351c7738c7fead469ec1b92cd863567b269f16f371472ad60aa8915d1f16a74fbd9a67bdb7330bc76d303a79bdc265dc05e32bddc1e0916797da
-
Filesize
6KB
MD569b1351abdb46568ea1c8072b0617c0a
SHA1bc1ec2663a2c28c093c9697d26d43ed8ddfae3c9
SHA256abab7b6920a8a757938b5080e04a5365a669a783a87c58a6869d036a53983d8f
SHA5126857bd5f22720ee96fb6993a4b7e5e6f43108a82220718916d82e9250e3082b06cdedda9939e485a469f6694501293930fc5c49c6d25ddd6aeec93ffa0e7d2f1
-
Filesize
132KB
MD50c0ed36cce468a55c5e9283fc21ae6b2
SHA1d1e54c29f96ae29b46e47e70525c5fc61e6d2fd0
SHA256be25d09fe28d2077c29929a6dc92eedc8c46add1be9b9edd3615f9e020ee578e
SHA512398f1421b3f1eae1fa44611bd45a9f056b0c7eb9de6637d4b3c5db45f8d086522c4fa7d9ef74a1f21b98a092604ea062a3f4791f8655ed76a24dd821deb39cb4
-
Filesize
131KB
MD56cf8e2b15ac29f6eefd19afae3452666
SHA1cdb506a751fc1e9b7a0124fd77c198e7ad5126cc
SHA25631481ea1221915ce808286ab83c3bc1e1acbdc4168f94fea0c152cb0c8f37705
SHA5125cfb4cefef2c29a2477e649a778c65efcbab7aa85cfebc2c97a1aee737e9cd5a1d72e8535bbece31776fc4f62f92481f425cb834cffe38971f2773a298af7517
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd