Analysis
-
max time kernel
137s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2023, 14:30
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.google.de/amp/s/socorrocargas.com%2fwp-admin%2fcss%2fcolors%2fblue%2fdueon%[email protected]
Resource
win10v2004-20230703-en
General
-
Target
https://www.google.de/amp/s/socorrocargas.com%2fwp-admin%2fcss%2fcolors%2fblue%2fdueon%[email protected]
Malware Config
Signatures
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133353738527960223" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2108 chrome.exe 2108 chrome.exe 4360 chrome.exe 4360 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe Token: SeShutdownPrivilege 2108 chrome.exe Token: SeCreatePagefilePrivilege 2108 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe 2108 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2108 wrote to memory of 4136 2108 chrome.exe 84 PID 2108 wrote to memory of 4136 2108 chrome.exe 84 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 1836 2108 chrome.exe 86 PID 2108 wrote to memory of 2448 2108 chrome.exe 87 PID 2108 wrote to memory of 2448 2108 chrome.exe 87 PID 2108 wrote to memory of 4044 2108 chrome.exe 88 PID 2108 wrote to memory of 4044 2108 chrome.exe 88 PID 2108 wrote to memory of 4044 2108 chrome.exe 88 PID 2108 wrote to memory of 4044 2108 chrome.exe 88 PID 2108 wrote to memory of 4044 2108 chrome.exe 88 PID 2108 wrote to memory of 4044 2108 chrome.exe 88 PID 2108 wrote to memory of 4044 2108 chrome.exe 88 PID 2108 wrote to memory of 4044 2108 chrome.exe 88 PID 2108 wrote to memory of 4044 2108 chrome.exe 88 PID 2108 wrote to memory of 4044 2108 chrome.exe 88 PID 2108 wrote to memory of 4044 2108 chrome.exe 88 PID 2108 wrote to memory of 4044 2108 chrome.exe 88 PID 2108 wrote to memory of 4044 2108 chrome.exe 88 PID 2108 wrote to memory of 4044 2108 chrome.exe 88 PID 2108 wrote to memory of 4044 2108 chrome.exe 88 PID 2108 wrote to memory of 4044 2108 chrome.exe 88 PID 2108 wrote to memory of 4044 2108 chrome.exe 88 PID 2108 wrote to memory of 4044 2108 chrome.exe 88 PID 2108 wrote to memory of 4044 2108 chrome.exe 88 PID 2108 wrote to memory of 4044 2108 chrome.exe 88 PID 2108 wrote to memory of 4044 2108 chrome.exe 88 PID 2108 wrote to memory of 4044 2108 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.google.de/amp/s/socorrocargas.com%2fwp-admin%2fcss%2fcolors%2fblue%2fdueon%[email protected]1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeeb8a9758,0x7ffeeb8a9768,0x7ffeeb8a97782⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 --field-trial-handle=1856,i,5980194103706745988,1961631099984307844,131072 /prefetch:22⤵PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 --field-trial-handle=1856,i,5980194103706745988,1961631099984307844,131072 /prefetch:82⤵PID:2448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1856,i,5980194103706745988,1961631099984307844,131072 /prefetch:82⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1856,i,5980194103706745988,1961631099984307844,131072 /prefetch:12⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3076 --field-trial-handle=1856,i,5980194103706745988,1961631099984307844,131072 /prefetch:12⤵PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4656 --field-trial-handle=1856,i,5980194103706745988,1961631099984307844,131072 /prefetch:12⤵PID:1804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4984 --field-trial-handle=1856,i,5980194103706745988,1961631099984307844,131072 /prefetch:12⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4876 --field-trial-handle=1856,i,5980194103706745988,1961631099984307844,131072 /prefetch:12⤵PID:260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5344 --field-trial-handle=1856,i,5980194103706745988,1961631099984307844,131072 /prefetch:12⤵PID:3024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 --field-trial-handle=1856,i,5980194103706745988,1961631099984307844,131072 /prefetch:82⤵PID:4692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 --field-trial-handle=1856,i,5980194103706745988,1961631099984307844,131072 /prefetch:82⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5136 --field-trial-handle=1856,i,5980194103706745988,1961631099984307844,131072 /prefetch:12⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3672 --field-trial-handle=1856,i,5980194103706745988,1961631099984307844,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3624
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD580c542ff6e5a26cab0bf53069556ee8e
SHA13bdfaf36147847ca33e1deacc74649f9aa7fd3b1
SHA2560042cfe66c4e167391ff37e8b58c75e08aab0a14cc31d339dfef9bdaef1535ea
SHA512e65a1c79196f99281009f8830c3aec03519297141cffe26f009b180d0fcb89eb6c77cd7f09a35530f48a71d7c49afd84400c24db2841af27b3752e18018bb9b8
-
Filesize
2KB
MD54dc624df9b248796e97c51cb1bcb963d
SHA1352eff9425e37d6721c0d0dabd360bea178c27c4
SHA2564dfe11877186b9bc0190d2bc90b76b80df4cbd8b22d7516d4eed7c1bbdb62d22
SHA5127fd12b1c96b68ff949f2cefd34e8746d4af5ffa1f89f011a5290c48cbad32dcf2f5ee416b083ec6294e5426e3cadee67aff82a9e0c318b198c2975bb2188cfcb
-
Filesize
539B
MD51d5c367884a0793f97484f84da33972a
SHA19c041cc810536f7ac0230be4335166b4d44b1428
SHA256be4c8dedf6ae2781910dd61e3b8239381f781063c311d6c33eec24f7ae331975
SHA512f91930ace65ba6866c501a318020261b92704776dfeb9151f54e94cf919fa7a8a63ba14d055b9a5cf8874acdd81afe7bc2ab84032f02f0d753eb6d3ed37bcfde
-
Filesize
706B
MD5fdaf9f0a27650c104e36ebc4fb8214b7
SHA115892d7b539d18420299d88321515d833261b3cb
SHA2569f55e5ef801180e6d4f738657fa4ba8023c1c029badd1643ddd761872c5fb914
SHA512f84856dacef8a4daca507e9f4896cafb52c21245e0b250f296876a51c59dc056d0f8800d12c815d3f510fc2782d4570b536aa45c9daa720d64345f3d5bed4515
-
Filesize
6KB
MD5f9109ebc2320da07072c36129dac8eb4
SHA12ede59a02f66637127ad85e09c6d9d9069fda44d
SHA256f956fcfd65baf6af3e7ac47bdb006610fe463050faf9ef5094727ce7d5be3b72
SHA512c9edfc6543b0ad7172cce2c3bfe35eb7bc677ec4613266a0aacc4a92e488de57394976ec9876a5abfd365b405253b2b8302bd30fdf185a02e5f812eaa55b55f4
-
Filesize
6KB
MD55910ede07f4e9f2dcf886719e6ed5b56
SHA120ea1f0fc1af9f237ac39c5f5b0245ba7ec91fd5
SHA256602da46eb68179ef4fbdb4142f4a8be2975f87a43ebcff32f831be21c7c50d5d
SHA5120d037658af502d6b2e785109b1bdc99a0170a018939048a23d86bc22bafcc5c4a205bf3d3fb1b500f6af37f70bf1ba42d5e1736698fbb8c7f795ed06329f3f74
-
Filesize
6KB
MD5e6c4cf1052ef0fff92d62df82f9d00f0
SHA1d1ad3c83d07b4b7fb302f0a0877c19f4bcdb71bc
SHA256f37a7da356b9c70f9c56fc887f55e80f31e7170e41e87d3b1a185727543d18e8
SHA51216f1a45f63a2ecb675c7ea62841bd95e6cf1a8f0aa48f9437317893e61d79412100c608fb750fa72a86bd19c9c760c145bfe1bbf0b44c0cd062a2835e918434e
-
Filesize
87KB
MD53feb70c89206d4364492748215726ae2
SHA1ebdf33df50da0bc9c3571f890cdeb89ac6eb11d0
SHA256b39fb593df678740f9542d918958189425fb0da32a11afb52116b3de01185dd3
SHA512c75226b772893d918cdedbe857721d7c5d3f9571d50f0cf32a9b9498e055919147c04420348233de3889c9b70cb853d4ed02c262debccd3c5baccf6dce3a9771
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd