Resubmissions
25-04-2024 08:19
240425-j7x72sha57 1025-04-2024 08:14
240425-j493faha38 125-04-2024 08:09
240425-j2jgpsha34 10Analysis
-
max time kernel
72s -
max time network
75s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
25-04-2024 08:19
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://csgo-dallas.com/discord/freenltro
Resource
win11-20240412-en
General
-
Target
https://csgo-dallas.com/discord/freenltro
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 1460 msedge.exe 1460 msedge.exe 2252 msedge.exe 2252 msedge.exe 1484 identity_helper.exe 1484 identity_helper.exe 3640 msedge.exe 3640 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
msedge.exepid process 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
msedge.exepid process 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2252 wrote to memory of 744 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 744 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4504 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 1460 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 1460 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4744 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4744 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4744 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4744 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4744 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4744 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4744 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4744 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4744 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4744 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4744 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4744 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4744 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4744 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4744 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4744 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4744 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4744 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4744 2252 msedge.exe msedge.exe PID 2252 wrote to memory of 4744 2252 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://csgo-dallas.com/discord/freenltro1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff9a5443cb8,0x7ff9a5443cc8,0x7ff9a5443cd82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,10420728770707700123,7798007520259268982,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2116 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,10420728770707700123,7798007520259268982,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,10420728770707700123,7798007520259268982,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10420728770707700123,7798007520259268982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10420728770707700123,7798007520259268982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10420728770707700123,7798007520259268982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4592 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10420728770707700123,7798007520259268982,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,10420728770707700123,7798007520259268982,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2108,10420728770707700123,7798007520259268982,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5600 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10420728770707700123,7798007520259268982,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10420728770707700123,7798007520259268982,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506Filesize
330B
MD5ba7b3d97e6c285237cd9f63f6c2f89cc
SHA17fe02297b8e647d2c41b8429c8b05f48ed56609c
SHA256c32648804907b9631609077100b59095d206eebdc7d3d8b2b4233fcc98304301
SHA512d6e0f254a966ff7cd94eb52f2f4e06b0e0fa8e295b6c634578ca063a1dd49abd179cd6a01c7f99407a08f53bd41eb3aefbe721e3b22de663dfa4b1e418570c9d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5f1a9c7fa806c60a3c2ed8a7829b1461f
SHA1376cafc1b1b6b2a70cd56455124554c21b25c683
SHA2561eb39b1409ce78188c133089bf3660393ac043b5baade7ff322df5a0ca95380b
SHA512e1cb2f84b5cbd86b107c0a9ec0356ab65a54c91208f9f8e83fec64bf17ae89356a09b0cd39d2726424f4041d7b25b962c23672b8645c2e10f11ff4d2075f4afd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5f3f6e86c8b7bdc605f5559df800bfd34
SHA1862d05bfba760ae8adcbb509216dc18ead59a6b2
SHA2565dfe9be21d4916615025055f1a70151362bdb404b40f074685e39b33ad545a78
SHA512de576ebf0cbe1c5e7639c42517253796cf4b5770298271ac2e6958404998f2d6b8e3378a535f2f316f4020fd8e60b5cc9c1b6b5171d307ca3215afe8ac47a7c3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
216B
MD53c2996b4064837e7cc1b06d49410511c
SHA1bb8eea9d396705dac19aa2d2847b0d298fdd55d3
SHA2560775f5766e28c54ce618aec86a7edf5e7de301ef3c4e32616928024fa7fe2760
SHA5126b6e97052c4b3eedf28d1b5a0caf5cd4c41aac165e7549eee059809abf1c59abf667285fb2a6595f2d466324faf1de0988158772ad2ca3f6f9496516ee7374e7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
192B
MD54f9c14d32ba7e2f23b40fa0d0d9e6052
SHA1aacbd629650b44a9fb44d6db1dca7c7785f2a316
SHA256ae9b24bdf338ed906e1e9681c14b8e80f36cf71273adec638960ccad79115893
SHA512af28464a156a12294618fee6b1c5a239482a89499fe26c5a6b55cfcd15d310021d9290fde4315f77af8956c60f8db77ea57fd12562f9e5e7ddf37738c3ecdc66
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
1KB
MD51bcf1f5cdf8a00a8a48fd280534eef93
SHA1432c5e7c01ad9c33672bb09ec41884c1bc174970
SHA256ed8ec14a0c242af692622307ea2d12afb272f79629ca4b5eabdfa9eed75f1ece
SHA512f46d94966674d3cf458aef300216a2d9e4481e27a636d7f22a71053055548b9fb5ce3cc3e2b8f9ee2c756a9feb96ea0bbf9c90da2fd6ac81d738bc73f4124c86
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
1KB
MD53e6f59c8c5868b74d94bfda889b4145b
SHA1c9ff3b009ed1c6331aad972583833d2677c81d4a
SHA2564ed78479dbe028b7f3f82bab3518c20f7bf0da87086b23897b2df72419f9c8c7
SHA5127fc8b2e154bc261cb0e2ce4162272958eb44eaff0cd1a3bec164796d42db46d243537b40cba3cd175c0b637ab5bc7d8fa30b001560aacdb4fdf227c867afcaa1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD57f5b40478cf0920cc99b587742a53d5f
SHA1e14f34f2aa2e34fa1ef35f0acce30e367ce720d8
SHA2567d7fde2bdf3c6a043ee5eed8bccbc9523afbf5020b2d729af0968980db5daa2d
SHA512be7e5bc9e90abb6aff5d36df090eb0bf470003169173c69b37d48e5b4d29501bf2dfcfc6eb110b0771f9765bfe04634801529d54982ef217cabb2ceb0bf791c7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5495c266f9c04feda81577d711dbfd0de
SHA163fb3193a24597c4ebd10753d1466cd8e9872bb9
SHA256a84a25834b08bb396672ea74c560c7bdb13cbadc520dd24a9a170a3ff3e97e94
SHA512b571936052502f07b9875d1f31926cd8d368ab22fbf3a7e1ed32b7e83fb25310d50c9be551e4b04191b9bd3fc2d918c0895c7a844240c8910d69fc699de069c0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD570352014be0dc84c498848480b0bd6f3
SHA1507485deff951d3f332901e66fea429b1ce1288e
SHA25695031ced2509cec4a71b241df6c639627019ed407ed65f71c33d7082301b1553
SHA512bbb2423f931e03997ec89b6d4d5cf7e6e993a2b304fe709ea81c9292f69dd418376c761a4156873de1903817d489ee40eb4e47772423c841d36181c9b8eecf32
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD504545295eadf048b82f1098d39d1868b
SHA148cd6064896cc207430177eda359fcd2ce590f72
SHA256a50fdb366c23bd8a665646b75106fa7d52f26221eec930b27a0b5c3ce5e697d5
SHA51208fac5e18d0bb8641dec0eb7c40f4dc7cdfb684be5a73e8eb8c01091cdb51669814adaf8ba7a6deb6f3006c7ce30dbf017bba5c9dc830c0454c07a867def264e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5c3be915541a026c2e7125cea67831cdc
SHA197ba6e23120209873c116ead0ee1253d4504d638
SHA2569b547f6b54371e4e62445bae181dea59e26bb3b383e7748b6cd3e9ad28e86773
SHA512a9f7fd4b3b2ff7b6088be09d6051fe126bcc2d8eb7dbe4dab9660e0bf89cadd9b3e0f07434f03de94d6f47b702cdd3e661e0a353c5bf0b57c34299a5f490e6e6
-
\??\pipe\LOCAL\crashpad_2252_CQHHCHJQEAXZRDBYMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e