Analysis
-
max time kernel
160s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2023, 18:36
Static task
static1
Behavioral task
behavioral1
Sample
5841dd085be442a85d76de0b91044826ad00cb586e2cab646f638c3460c77bfb.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5841dd085be442a85d76de0b91044826ad00cb586e2cab646f638c3460c77bfb.exe
Resource
win10v2004-20230220-en
General
-
Target
5841dd085be442a85d76de0b91044826ad00cb586e2cab646f638c3460c77bfb.exe
-
Size
885KB
-
MD5
bf32ddde84500046bf1d33923fe9e15e
-
SHA1
9b2132e500a341d19ba1463e04de04c0fb2750c9
-
SHA256
5841dd085be442a85d76de0b91044826ad00cb586e2cab646f638c3460c77bfb
-
SHA512
4195fe6ca5db25868a3be04e913ec0a8e0f85b47c50ff9717e9b294e3f3a088455bd1021c6a49050ae2522de43b3231c57972a4c3bab845c4042b3759ed0791b
-
SSDEEP
24576:jyQ/PsUHGXwdr3d5IBuWwe6tBaweU/Q8amo+Z:2QsUfWZ63awewamo
Malware Config
Extracted
redline
debro
185.161.248.75:4132
-
auth_value
18c2c191aebfde5d1787ec8d805a01a8
Extracted
redline
gogen
185.161.248.75:4132
-
auth_value
dfb27ce11afd52277523c8e405853d53
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g7542867.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g7542867.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection g7542867.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g7542867.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g7542867.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g7542867.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation h4023274.exe -
Executes dropped EXE 8 IoCs
pid Process 2252 x8301883.exe 648 x3351458.exe 2080 f4048894.exe 1856 g7542867.exe 1584 h4023274.exe 2304 oneetx.exe 3712 i2922068.exe 4988 i2922068.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features g7542867.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" g7542867.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3351458.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5841dd085be442a85d76de0b91044826ad00cb586e2cab646f638c3460c77bfb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5841dd085be442a85d76de0b91044826ad00cb586e2cab646f638c3460c77bfb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x8301883.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8301883.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x3351458.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3712 set thread context of 4988 3712 i2922068.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4492 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2080 f4048894.exe 2080 f4048894.exe 1856 g7542867.exe 1856 g7542867.exe 4988 i2922068.exe 4988 i2922068.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2080 f4048894.exe Token: SeDebugPrivilege 1856 g7542867.exe Token: SeDebugPrivilege 3712 i2922068.exe Token: SeDebugPrivilege 4988 i2922068.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1584 h4023274.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 1264 wrote to memory of 2252 1264 5841dd085be442a85d76de0b91044826ad00cb586e2cab646f638c3460c77bfb.exe 80 PID 1264 wrote to memory of 2252 1264 5841dd085be442a85d76de0b91044826ad00cb586e2cab646f638c3460c77bfb.exe 80 PID 1264 wrote to memory of 2252 1264 5841dd085be442a85d76de0b91044826ad00cb586e2cab646f638c3460c77bfb.exe 80 PID 2252 wrote to memory of 648 2252 x8301883.exe 81 PID 2252 wrote to memory of 648 2252 x8301883.exe 81 PID 2252 wrote to memory of 648 2252 x8301883.exe 81 PID 648 wrote to memory of 2080 648 x3351458.exe 82 PID 648 wrote to memory of 2080 648 x3351458.exe 82 PID 648 wrote to memory of 2080 648 x3351458.exe 82 PID 648 wrote to memory of 1856 648 x3351458.exe 83 PID 648 wrote to memory of 1856 648 x3351458.exe 83 PID 648 wrote to memory of 1856 648 x3351458.exe 83 PID 2252 wrote to memory of 1584 2252 x8301883.exe 84 PID 2252 wrote to memory of 1584 2252 x8301883.exe 84 PID 2252 wrote to memory of 1584 2252 x8301883.exe 84 PID 1584 wrote to memory of 2304 1584 h4023274.exe 85 PID 1584 wrote to memory of 2304 1584 h4023274.exe 85 PID 1584 wrote to memory of 2304 1584 h4023274.exe 85 PID 1264 wrote to memory of 3712 1264 5841dd085be442a85d76de0b91044826ad00cb586e2cab646f638c3460c77bfb.exe 86 PID 1264 wrote to memory of 3712 1264 5841dd085be442a85d76de0b91044826ad00cb586e2cab646f638c3460c77bfb.exe 86 PID 1264 wrote to memory of 3712 1264 5841dd085be442a85d76de0b91044826ad00cb586e2cab646f638c3460c77bfb.exe 86 PID 3712 wrote to memory of 4988 3712 i2922068.exe 88 PID 3712 wrote to memory of 4988 3712 i2922068.exe 88 PID 3712 wrote to memory of 4988 3712 i2922068.exe 88 PID 2304 wrote to memory of 4492 2304 oneetx.exe 87 PID 2304 wrote to memory of 4492 2304 oneetx.exe 87 PID 2304 wrote to memory of 4492 2304 oneetx.exe 87 PID 2304 wrote to memory of 2512 2304 oneetx.exe 90 PID 2304 wrote to memory of 2512 2304 oneetx.exe 90 PID 2304 wrote to memory of 2512 2304 oneetx.exe 90 PID 2512 wrote to memory of 5032 2512 cmd.exe 92 PID 2512 wrote to memory of 5032 2512 cmd.exe 92 PID 2512 wrote to memory of 5032 2512 cmd.exe 92 PID 2512 wrote to memory of 3032 2512 cmd.exe 93 PID 2512 wrote to memory of 3032 2512 cmd.exe 93 PID 2512 wrote to memory of 3032 2512 cmd.exe 93 PID 2512 wrote to memory of 4644 2512 cmd.exe 94 PID 2512 wrote to memory of 4644 2512 cmd.exe 94 PID 2512 wrote to memory of 4644 2512 cmd.exe 94 PID 2512 wrote to memory of 5036 2512 cmd.exe 95 PID 2512 wrote to memory of 5036 2512 cmd.exe 95 PID 2512 wrote to memory of 5036 2512 cmd.exe 95 PID 2512 wrote to memory of 4472 2512 cmd.exe 96 PID 2512 wrote to memory of 4472 2512 cmd.exe 96 PID 2512 wrote to memory of 4472 2512 cmd.exe 96 PID 2512 wrote to memory of 764 2512 cmd.exe 97 PID 2512 wrote to memory of 764 2512 cmd.exe 97 PID 2512 wrote to memory of 764 2512 cmd.exe 97 PID 3712 wrote to memory of 4988 3712 i2922068.exe 88 PID 3712 wrote to memory of 4988 3712 i2922068.exe 88 PID 3712 wrote to memory of 4988 3712 i2922068.exe 88 PID 3712 wrote to memory of 4988 3712 i2922068.exe 88 PID 3712 wrote to memory of 4988 3712 i2922068.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\5841dd085be442a85d76de0b91044826ad00cb586e2cab646f638c3460c77bfb.exe"C:\Users\Admin\AppData\Local\Temp\5841dd085be442a85d76de0b91044826ad00cb586e2cab646f638c3460c77bfb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8301883.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8301883.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3351458.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3351458.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4048894.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4048894.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7542867.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7542867.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1856
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4023274.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4023274.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F5⤵
- Creates scheduled task(s)
PID:4492
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:5032
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"6⤵PID:3032
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E6⤵PID:4644
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:5036
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"6⤵PID:4472
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E6⤵PID:764
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2922068.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2922068.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2922068.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2922068.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4988
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
904KB
MD5da1392ce8a745ff84066b4b89891c820
SHA1da95517cc9fd2904df61fbada3268ba8b074c5f1
SHA25652b27910ae22c29f0bd38aee2637554d48a65862315628dd6a27ed621a216207
SHA512bca02f85a25239e1171847ab71bf1bcbe8e1d6b54892d56c4259117db2dbf31305f9e11b8dd9f5aff1ece96830534f33e92b01e6d80f0b03022f1972b8b66570
-
Filesize
904KB
MD5da1392ce8a745ff84066b4b89891c820
SHA1da95517cc9fd2904df61fbada3268ba8b074c5f1
SHA25652b27910ae22c29f0bd38aee2637554d48a65862315628dd6a27ed621a216207
SHA512bca02f85a25239e1171847ab71bf1bcbe8e1d6b54892d56c4259117db2dbf31305f9e11b8dd9f5aff1ece96830534f33e92b01e6d80f0b03022f1972b8b66570
-
Filesize
904KB
MD5da1392ce8a745ff84066b4b89891c820
SHA1da95517cc9fd2904df61fbada3268ba8b074c5f1
SHA25652b27910ae22c29f0bd38aee2637554d48a65862315628dd6a27ed621a216207
SHA512bca02f85a25239e1171847ab71bf1bcbe8e1d6b54892d56c4259117db2dbf31305f9e11b8dd9f5aff1ece96830534f33e92b01e6d80f0b03022f1972b8b66570
-
Filesize
488KB
MD5fb81a359d7f2f37a1f70b794f0c036d1
SHA130bff5165427749020e88d04b1e53bdbb788330f
SHA25662283d8dd24cc19580300df3c7b2b5e309959eef8ad2fb1389a5222559ec2b85
SHA51226df55695178ae9bd9d3cc49742051890fca372b3f9eab2965d17cb2b6a1297cc8af538bc6905befab4f542de326bd1566439ee8bf32fe3479d13d2b6b52aa72
-
Filesize
488KB
MD5fb81a359d7f2f37a1f70b794f0c036d1
SHA130bff5165427749020e88d04b1e53bdbb788330f
SHA25662283d8dd24cc19580300df3c7b2b5e309959eef8ad2fb1389a5222559ec2b85
SHA51226df55695178ae9bd9d3cc49742051890fca372b3f9eab2965d17cb2b6a1297cc8af538bc6905befab4f542de326bd1566439ee8bf32fe3479d13d2b6b52aa72
-
Filesize
214KB
MD5e74be1d32c6eee5ac0d92552ff0b10d9
SHA1861eb752554d0b4241dece0b9e36e1ced25ff9b4
SHA2560fb40ee76570694713717fba393ed809e46ea30615b8b1ba20e8a9ee61917b5f
SHA5120f4d9b4ec3d3285b698c797415e3fc0f26c3580adb285eb61455ad18ef271b70b8cbf3a9bf98ba2383ee5bc480ccdbff994942f0a87e2b2dfe592cbbe499b897
-
Filesize
214KB
MD5e74be1d32c6eee5ac0d92552ff0b10d9
SHA1861eb752554d0b4241dece0b9e36e1ced25ff9b4
SHA2560fb40ee76570694713717fba393ed809e46ea30615b8b1ba20e8a9ee61917b5f
SHA5120f4d9b4ec3d3285b698c797415e3fc0f26c3580adb285eb61455ad18ef271b70b8cbf3a9bf98ba2383ee5bc480ccdbff994942f0a87e2b2dfe592cbbe499b897
-
Filesize
316KB
MD59280e6fc3f7c70ec21830b818139db82
SHA1b2e8dada3fa9aac3c1e0a17c4d1c64d254825296
SHA25604d3b601467eed597fea59fb92e2de6ef18daa357739b0d74d19c0554bb8f4d9
SHA512e29a86b5638ca2a57e45add922a910b0985f56ddd428afea4d7c4590f381c26120b441f6ddcab8f62c806004bf9b291c354a6528d70decf0e85e5fa31c4af76d
-
Filesize
316KB
MD59280e6fc3f7c70ec21830b818139db82
SHA1b2e8dada3fa9aac3c1e0a17c4d1c64d254825296
SHA25604d3b601467eed597fea59fb92e2de6ef18daa357739b0d74d19c0554bb8f4d9
SHA512e29a86b5638ca2a57e45add922a910b0985f56ddd428afea4d7c4590f381c26120b441f6ddcab8f62c806004bf9b291c354a6528d70decf0e85e5fa31c4af76d
-
Filesize
168KB
MD5bb47df9ce439dc03ee5bdc9ea059d14d
SHA1d6bc53bf3248c8457ed130b404df99173516f938
SHA256f3f05856d7a7683e50f67a9bb13d5313b1a34c804396573ecab3ec052359ad23
SHA512e09d3d47e9eabdd3290e0d5bbb408d63992ff874612a39d3b8a2e051e6f4431c4eabf9af7d113e83f1e5220fb1a72362a21f978998fdcd11e6409530d4d052c5
-
Filesize
168KB
MD5bb47df9ce439dc03ee5bdc9ea059d14d
SHA1d6bc53bf3248c8457ed130b404df99173516f938
SHA256f3f05856d7a7683e50f67a9bb13d5313b1a34c804396573ecab3ec052359ad23
SHA512e09d3d47e9eabdd3290e0d5bbb408d63992ff874612a39d3b8a2e051e6f4431c4eabf9af7d113e83f1e5220fb1a72362a21f978998fdcd11e6409530d4d052c5
-
Filesize
184KB
MD5d4c640fb500618ad6c9fc5fe7d3e784d
SHA1850df0880e1685ce709b44afbbb365cab4f0fec4
SHA256a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b
SHA512a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd
-
Filesize
184KB
MD5d4c640fb500618ad6c9fc5fe7d3e784d
SHA1850df0880e1685ce709b44afbbb365cab4f0fec4
SHA256a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b
SHA512a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd
-
Filesize
214KB
MD5e74be1d32c6eee5ac0d92552ff0b10d9
SHA1861eb752554d0b4241dece0b9e36e1ced25ff9b4
SHA2560fb40ee76570694713717fba393ed809e46ea30615b8b1ba20e8a9ee61917b5f
SHA5120f4d9b4ec3d3285b698c797415e3fc0f26c3580adb285eb61455ad18ef271b70b8cbf3a9bf98ba2383ee5bc480ccdbff994942f0a87e2b2dfe592cbbe499b897
-
Filesize
214KB
MD5e74be1d32c6eee5ac0d92552ff0b10d9
SHA1861eb752554d0b4241dece0b9e36e1ced25ff9b4
SHA2560fb40ee76570694713717fba393ed809e46ea30615b8b1ba20e8a9ee61917b5f
SHA5120f4d9b4ec3d3285b698c797415e3fc0f26c3580adb285eb61455ad18ef271b70b8cbf3a9bf98ba2383ee5bc480ccdbff994942f0a87e2b2dfe592cbbe499b897
-
Filesize
214KB
MD5e74be1d32c6eee5ac0d92552ff0b10d9
SHA1861eb752554d0b4241dece0b9e36e1ced25ff9b4
SHA2560fb40ee76570694713717fba393ed809e46ea30615b8b1ba20e8a9ee61917b5f
SHA5120f4d9b4ec3d3285b698c797415e3fc0f26c3580adb285eb61455ad18ef271b70b8cbf3a9bf98ba2383ee5bc480ccdbff994942f0a87e2b2dfe592cbbe499b897