Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2024 15:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mail.razzbearies.com/mw/index.php/campaigns/da080p30nx279/track-opening/ak235gzfbk08e
Resource
win10v2004-20240802-en
General
-
Target
https://mail.razzbearies.com/mw/index.php/campaigns/da080p30nx279/track-opening/ak235gzfbk08e
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133680364044318878" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 544 chrome.exe 544 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe 1396 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 544 chrome.exe 544 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe Token: SeShutdownPrivilege 544 chrome.exe Token: SeCreatePagefilePrivilege 544 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe 544 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 544 wrote to memory of 4488 544 chrome.exe 84 PID 544 wrote to memory of 4488 544 chrome.exe 84 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 4148 544 chrome.exe 85 PID 544 wrote to memory of 3996 544 chrome.exe 86 PID 544 wrote to memory of 3996 544 chrome.exe 86 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87 PID 544 wrote to memory of 1188 544 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mail.razzbearies.com/mw/index.php/campaigns/da080p30nx279/track-opening/ak235gzfbk08e1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe7fdbcc40,0x7ffe7fdbcc4c,0x7ffe7fdbcc582⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1796,i,11961121122374765415,4046400590900497367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1792 /prefetch:22⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2060,i,11961121122374765415,4046400590900497367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2188 /prefetch:32⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,11961121122374765415,4046400590900497367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2268 /prefetch:82⤵PID:1188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,11961121122374765415,4046400590900497367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:3116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3124,i,11961121122374765415,4046400590900497367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3676,i,11961121122374765415,4046400590900497367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4644 /prefetch:82⤵PID:1840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4344,i,11961121122374765415,4046400590900497367,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4808 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1396
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4576
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5ec2fa828fe397d2181893ea83efa150c
SHA14d64f52d8f2440a3e273ec45c94ef50f8a9d2d22
SHA2565579cba373f6d86d0a482f97e455441d40c68f18395dc3a39d5db8265f38c22a
SHA512fcf747937a79d4fee54aabba09ac55ee48d70e647fd3340c50aabfb3d107caf25d183dbdc95dbfaf2de5206ea140a837fbe3f5190ea4fff307593af3da412db1
-
Filesize
1KB
MD5810a1fdceba89428a9a6edab40f13869
SHA10becc7c2e4ab3ad60ed349c75e93b6b108573636
SHA2563ec8937fe71be6208379776ab8e7cf71da6830b1a8ea995a2ab21e069173ac40
SHA512093514e6d68a1c42ab286720c2b11bb26b0df1cf576d7ed718ebbe6e5f9cd70c3954f50b2adef4ecbff6e9a46e9e71e47406873b4d125d7b3c16e0999356371c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD59a9da1e90ed44f0ae66de0764bc94ac3
SHA13e218b37b750aaf2d369748f75ba358db6580f63
SHA25683abf84efe59eb1716da4770951f34b63a29a7f0bc2bef74a80fbad8d31ec98d
SHA51223288347be16e1cf5daadf7d5c0b9cf3e3e07d8935191ccc81b797cc2879ad4a9a0fab8491b70789753a4c779b23508b26dc52c53599780611a7e3ceb4e0b528
-
Filesize
9KB
MD5fa17be6ddb9d6b9842ca09cfe9542b36
SHA105fa9b7e6c2a137b16a1a68987a7c07cec9a8922
SHA256aaf72e50934557fca9045bd76136db164071df95beeb52b72bfc6f61200e3c30
SHA51265e3ee96daf812d82eec241001841949c6f6fc6e0b77c33def9ddd99dfa4bf71af5e4a59bdfd12083db77db255656a3a7053123c5e63a4e15308a83acdd5c886
-
Filesize
9KB
MD5c7dcceae1086298eb7847da37ec4e927
SHA18f8f46d052033d95100ccfeb86d75e83a5f9a5b6
SHA25642798e12d508b7d5ab1fc443e6493156d921a15278791344a0c406228e69daea
SHA5121532039bcfc5b78a49d2137884091b54fa973219f7802f91641794ff100a927606443040cf5c0bc20b182fc3651ef8bc517ff5a725ea40c0003ce375b3954de5
-
Filesize
9KB
MD52c8b7a205cd424770ad01cc4db14d6b5
SHA1658823ca1edbc787d77e85ee31be9d82962e3a53
SHA25692f1211897d0e54e4048d8716f428e1a36329e46aee00cc877494658ed1e1964
SHA512e1a78e90c276f49bf0ff337e7043c3cd16f8041616f3cca9d03d59156ad657fab1441c0547b85592d701e8ea8431009ee268a7bbcbc3ab5d162103fff0df47a4
-
Filesize
9KB
MD5c113c0d4c731749347b64c741d5bba42
SHA1c93d8a966304c4bf86d2332cf13e3dc644c44a14
SHA256ff3a04ba8e2c331a2766a402d6e4eea0228cdcdf223cb04970f89ce47a8d3f8b
SHA512da38b9ba3be8550bc55ec73aae4f1dbe4aae7c5f14a3d609746617b611edf50bd2e2161a104f0ca87f2f11b3b7a6ff45e8a84e5e7fff7b50f72dbe1788364b34
-
Filesize
9KB
MD5c2ec897b932efe0b9b9763e7cf8d7862
SHA1391a77cf64ce44638a222e9adb6ea2b31f227c72
SHA256245093b7cff93244c53c16837eb466324016a1b3785ac09d637beb2a6933374c
SHA512dbd7fcf5682d02066d4077f6573cc99456179f7d9e6304dee0f4ab801d4aea82edafae10734b400802137d496716eae1bbd5e998f933f8b5c5f6de1a71753d33
-
Filesize
9KB
MD5cc9ba79e3c294aa2bc8c241bf97ced97
SHA16c8b07cf94ae448f3f01fc9d42eb6c33d67e54d2
SHA256e2285091dae77f015b0bfffe9ab44381bcd50cfab010a29335ed920c3b6e3a21
SHA5122ca714c861a7e417c030da43951d6e126a80082782160400177bb64da654fdcc332405c5558300a7c91d40a249c52979b3ea3a9ec49288c5fccd18121629bc19
-
Filesize
9KB
MD5f696caedb577e9bb86d67f773e103e75
SHA1a5e5e7b9dbd2bf158855a175934f83c870bd6124
SHA2563e312399c7215cea7a238d44f5daed6632156a53b88a409ce0880a2568617889
SHA512e9a28b31fa356e32c9c9d27e5527cf07df4f828e99dac231bc7c9380a9c38d54a08c7b00ca96b441db0a6d493cfbb413adf73c5e59a8c784baf379e423ce99eb
-
Filesize
9KB
MD5a8f9f2da456d15d20ca0a0f29a45eefe
SHA1eb4e61b5f66d654cc273bc7d917788e93ac39a84
SHA256c96d5763a68a34816e57c0374b793c6a5984ad0c2d97d5bd61d45059e020e004
SHA51210d9f18c4c1b080bb6d1e3d6aa0623086444cef20015db6c25df80f233ef8ea45208add765bc0d338ec4bc22fdebcdb5103289ffb53fac4caf6d6d523b27d6ec
-
Filesize
99KB
MD5503319264252d40c3a74ec53bdd739ee
SHA15f9d48b368aeef96b1243f6e715659263570d51f
SHA256e7befadf3273da7187dedcd43c42e43e294887a83be3a886b495400f00e0ef91
SHA51232e467d9f5311474f85633c3e64a617192eeecfa66218053c4271c2fa27b698e57b8b77e1e1f1ddab78bef8b619d5ee94823a44f9a7ca12853f090123be9cf4e
-
Filesize
99KB
MD54a61f8ccfc463d2132b04571f5b17b02
SHA1b66d590bdd5f6139ff4dba056ba555a566dda269
SHA2568b16d832cd8347f9f620a380e6229b1b2642844e85f85c1de827753ff1191567
SHA5121a2d305ef47ddd24de8ef607c78f6153404c2180de88ce0659d51fffb7a3e424685ce949700eb80b74635f6c384b79d2bfb3ea869c5b56335e707ac9f486bffa