Analysis
-
max time kernel
300s -
max time network
277s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
12-07-2023 19:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www2.spcc.net/pg_Cookie.aspx?Action=Read&Page=https://ipfs.io/ipfs/QmThDAhZEiXo1EBg858SyAogLvH8MnqRqetArhKg3oudbn
Resource
win10-20230703-en
General
-
Target
https://www2.spcc.net/pg_Cookie.aspx?Action=Read&Page=https://ipfs.io/ipfs/QmThDAhZEiXo1EBg858SyAogLvH8MnqRqetArhKg3oudbn
Malware Config
Signatures
-
Detected phishing page
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133336645833214079" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 3384 chrome.exe 3384 chrome.exe 4152 chrome.exe 4152 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe Token: SeShutdownPrivilege 3384 chrome.exe Token: SeCreatePagefilePrivilege 3384 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe 3384 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3384 wrote to memory of 2636 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 2636 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 3436 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 2196 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 2196 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 4848 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 4848 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 4848 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 4848 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 4848 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 4848 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 4848 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 4848 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 4848 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 4848 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 4848 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 4848 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 4848 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 4848 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 4848 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 4848 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 4848 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 4848 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 4848 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 4848 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 4848 3384 chrome.exe chrome.exe PID 3384 wrote to memory of 4848 3384 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" https://www2.spcc.net/pg_Cookie.aspx?Action=Read&Page=https://ipfs.io/ipfs/QmThDAhZEiXo1EBg858SyAogLvH8MnqRqetArhKg3oudbn1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffe80d39758,0x7ffe80d39768,0x7ffe80d397782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2016 --field-trial-handle=1844,i,9838322924620742592,3103706409922514268,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2872 --field-trial-handle=1844,i,9838322924620742592,3103706409922514268,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2864 --field-trial-handle=1844,i,9838322924620742592,3103706409922514268,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1812 --field-trial-handle=1844,i,9838322924620742592,3103706409922514268,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 --field-trial-handle=1844,i,9838322924620742592,3103706409922514268,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4640 --field-trial-handle=1844,i,9838322924620742592,3103706409922514268,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 --field-trial-handle=1844,i,9838322924620742592,3103706409922514268,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 --field-trial-handle=1844,i,9838322924620742592,3103706409922514268,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 --field-trial-handle=1844,i,9838322924620742592,3103706409922514268,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
216B
MD54b8b3a0174fd1c82d791d8c47d2b7a1e
SHA18cc8ee43f74162cbe60433a3b664184b800e8676
SHA256220067e691dbfb8f138d606a6eee8603b269627724b60338cb16343c93aa193d
SHA512ab450bb8c582d9ce48dcd1a151eafd7dc181f72285fbf252a348ac13ab556b1725f01d93b02f25e0f8e7c0ff1e8e52520b409fad69ec31d50a99b335dd5b2ddf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
3KB
MD50c8898acb4b1e99a9effbb2e4c9478e0
SHA10061e3b1148a05ff7e69135c5f6404c41bd461cd
SHA2566da5be1ffeb9c87431daa01f638a8a81fafea21899057dd5cda8d00a494b4502
SHA51254126d37da1873c657a63069800db491fcab6277ed10b19ebe9c3f660571fa3b209af6eaf240ed7161459941e82d50fc7c599e44f7f65be89a17bcfec5d5e186
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD572c5a9a4d081a8fc2413dfd3e349d4ff
SHA1384a1127d60829a160e360a582d1cb93010f9b4b
SHA256aa6f0581d20da488add0b2409b78380680fe520cb754081b83862db2da16f757
SHA512ecb00df4d03f7cb5035c25ed8fc3c58f9009d2e290e5286cbaf5c0670854b97a91bf2c3556f899562c3176976535399b9e481d8200d2959bc14cff3202161c4a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD536ffdb7cf0c864d22a72ff8f73363374
SHA122fac88bfba39935172f20ed700a47fe1e19097c
SHA256ff5848c55c7f9b5a8dc7125112d409eb305ed6163e654c8eb5b6784a4d5f1917
SHA512ae5e47a55f78cab1ff51dcfcba21bf488c1779e0d0654f69bb9dd01e12aaaaac0312567ce02bc3ea9ebbdcd861574d997617e8a7899e44224146b4ce7e8b8b0b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5a57e78c2691be62ae05f3a3265bcfda0
SHA17b6bd0caaf625b53905768a37b46707015f0f176
SHA256711c5f89bda9a94793c6f28514df713e48e9b6b67d66de29f96e871a08308a18
SHA512f19562f2fee8c1789ed5ca8ca2036360bbdc602e86f63ff81557808a71b98d96aed2a33bfa068faab8301ee907fb9ff4b42feddeb07f7afea15d0307754c4d48
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD50c1e06858c4dab6347abd458f27bd67d
SHA1d87ccbbb47e4db0c6a120856d1b8aa7c6fee3e14
SHA256a180c860032f122089d2e2586542c25c16dce7b3b8dbf5324f7c43b2d9be6f15
SHA512cf2f57b5002934cc9a5bec64a6653ff9f2d46b807f69822e0a1f33531531568649fe2623de29a4811ed5822435e8b368cfe0f606dbf0b2b93b3a720b6a0144d3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
173KB
MD5f00ee404ca5ae2fd29adc7f3d767ac58
SHA1788eda148590f4a375808fe2c7e7d35ba49dd115
SHA256ac54cd5eb1d68362a5887b0e1b8970b086ab8022a841665a6d7725943a469ab6
SHA5120bd5da2539382d0774696c5e7fe6d51ed13355972daf0330c41c7969a7c52433155a7049876af7805fa4cadcd17ca2609978d81520018d899ef757278fccce48
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_3384_BGQJGDWNOZHZGTPFMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e