Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
26/01/2024, 04:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://www.hrizolitofficialru
Resource
win10-20231215-en
General
-
Target
http://www.hrizolitofficialru
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133507162315647429" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4324 chrome.exe 4324 chrome.exe 4996 chrome.exe 4996 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe Token: SeShutdownPrivilege 4324 chrome.exe Token: SeCreatePagefilePrivilege 4324 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe 4324 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4324 wrote to memory of 4888 4324 chrome.exe 73 PID 4324 wrote to memory of 4888 4324 chrome.exe 73 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 4372 4324 chrome.exe 78 PID 4324 wrote to memory of 1740 4324 chrome.exe 74 PID 4324 wrote to memory of 1740 4324 chrome.exe 74 PID 4324 wrote to memory of 2764 4324 chrome.exe 77 PID 4324 wrote to memory of 2764 4324 chrome.exe 77 PID 4324 wrote to memory of 2764 4324 chrome.exe 77 PID 4324 wrote to memory of 2764 4324 chrome.exe 77 PID 4324 wrote to memory of 2764 4324 chrome.exe 77 PID 4324 wrote to memory of 2764 4324 chrome.exe 77 PID 4324 wrote to memory of 2764 4324 chrome.exe 77 PID 4324 wrote to memory of 2764 4324 chrome.exe 77 PID 4324 wrote to memory of 2764 4324 chrome.exe 77 PID 4324 wrote to memory of 2764 4324 chrome.exe 77 PID 4324 wrote to memory of 2764 4324 chrome.exe 77 PID 4324 wrote to memory of 2764 4324 chrome.exe 77 PID 4324 wrote to memory of 2764 4324 chrome.exe 77 PID 4324 wrote to memory of 2764 4324 chrome.exe 77 PID 4324 wrote to memory of 2764 4324 chrome.exe 77 PID 4324 wrote to memory of 2764 4324 chrome.exe 77 PID 4324 wrote to memory of 2764 4324 chrome.exe 77 PID 4324 wrote to memory of 2764 4324 chrome.exe 77 PID 4324 wrote to memory of 2764 4324 chrome.exe 77 PID 4324 wrote to memory of 2764 4324 chrome.exe 77 PID 4324 wrote to memory of 2764 4324 chrome.exe 77 PID 4324 wrote to memory of 2764 4324 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.hrizolitofficialru1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0x88,0xd8,0x7ffc460c9758,0x7ffc460c9768,0x7ffc460c97782⤵PID:4888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1784 --field-trial-handle=1840,i,11346055708453062194,6486296502167888337,131072 /prefetch:82⤵PID:1740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2656 --field-trial-handle=1840,i,11346055708453062194,6486296502167888337,131072 /prefetch:12⤵PID:1372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2648 --field-trial-handle=1840,i,11346055708453062194,6486296502167888337,131072 /prefetch:12⤵PID:1224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2076 --field-trial-handle=1840,i,11346055708453062194,6486296502167888337,131072 /prefetch:82⤵PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1520 --field-trial-handle=1840,i,11346055708453062194,6486296502167888337,131072 /prefetch:22⤵PID:4372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3924 --field-trial-handle=1840,i,11346055708453062194,6486296502167888337,131072 /prefetch:12⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2656 --field-trial-handle=1840,i,11346055708453062194,6486296502167888337,131072 /prefetch:12⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4256 --field-trial-handle=1840,i,11346055708453062194,6486296502167888337,131072 /prefetch:82⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3948 --field-trial-handle=1840,i,11346055708453062194,6486296502167888337,131072 /prefetch:82⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4320 --field-trial-handle=1840,i,11346055708453062194,6486296502167888337,131072 /prefetch:12⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3060 --field-trial-handle=1840,i,11346055708453062194,6486296502167888337,131072 /prefetch:12⤵PID:528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3940 --field-trial-handle=1840,i,11346055708453062194,6486296502167888337,131072 /prefetch:12⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4348 --field-trial-handle=1840,i,11346055708453062194,6486296502167888337,131072 /prefetch:12⤵PID:372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4020 --field-trial-handle=1840,i,11346055708453062194,6486296502167888337,131072 /prefetch:12⤵PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=2912 --field-trial-handle=1840,i,11346055708453062194,6486296502167888337,131072 /prefetch:12⤵PID:4680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2160 --field-trial-handle=1840,i,11346055708453062194,6486296502167888337,131072 /prefetch:12⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=924 --field-trial-handle=1840,i,11346055708453062194,6486296502167888337,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4996
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD580e24c69599c32322e92f7cb98ea2df9
SHA1d9188568192856f5d6c33caf20eba04779cbc6c3
SHA2562558dc0d9d073c3c09abef6c2b8f17acbf5a3271e2a5d5fac40154e17ead0b11
SHA5124198541609b21d95ce9c6eed2b2f9642568ed4fca1f44a433a4159f6f15d6df9c3ee3ed61a00d0d44157041b598c79222a7b44ebfd25b439d26152cc542e86ca
-
Filesize
5KB
MD5e80824637e95bb0f50364bd1101428ea
SHA1e70f2cfd10aa14cdfcd90d36fadd122227346882
SHA25601462451ee977bd6fcb15a602987f0a4c7b08965de62ce21846e701d27cdd0a1
SHA512f91a46eb4bd7616295bb72539f67277441110e80b4989c87e83415396f5ab01617763270eb24a9e08c67f3788030d160d5fd718560795da2f6429083f8c47ccd
-
Filesize
5KB
MD543fa618705b41954dde683bf2262765b
SHA1d2de71644aaf9b83545e64f4d069fcdabef4db67
SHA25609ea4f46c1b432c2781ad436b029d92f6380b912997c867d16fbcdad64570fc0
SHA51281367dc7745d1ba8ee5f6726cd65d8310f3f4df196a1fa7032b9b11b75f8c098d66056f653fce1cf773b017e9d2ee566610d8562d3ac9e09b9f362a2a28b4a19
-
Filesize
114KB
MD5ff30883d4acde1d2d98f1dfc4c1748e0
SHA19cd869dce50a725e7c064a463746ca37572629d3
SHA256cb734a208d8d19c46e2a07d2a958b0935e6ee066aa738cdb200b253c8d58b5cf
SHA512d599dd60fa3c771daca4e718b41fab6bae566bb06f2c6024a390fe8ff25e9cc190ca83d95620d67a4c467fe752ee5fc6d6bd1679155182e78176f5402da7d594
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd