Analysis
-
max time kernel
53s -
max time network
48s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 12:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/NtKernelMC/NeutrinoInjector/releases/download/Bin/Neutrino.zip
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://github.com/NtKernelMC/NeutrinoInjector/releases/download/Bin/Neutrino.zip
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
https://github.com/NtKernelMC/NeutrinoInjector/releases/download/Bin/Neutrino.zip
Resource
win11-20240611-en
General
-
Target
https://github.com/NtKernelMC/NeutrinoInjector/releases/download/Bin/Neutrino.zip
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings msedge.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4404 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2024 msedge.exe 2024 msedge.exe 3140 msedge.exe 3140 msedge.exe 1620 identity_helper.exe 1620 identity_helper.exe 2388 msedge.exe 2388 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3140 wrote to memory of 1708 3140 msedge.exe 82 PID 3140 wrote to memory of 1708 3140 msedge.exe 82 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 3240 3140 msedge.exe 83 PID 3140 wrote to memory of 2024 3140 msedge.exe 84 PID 3140 wrote to memory of 2024 3140 msedge.exe 84 PID 3140 wrote to memory of 2352 3140 msedge.exe 85 PID 3140 wrote to memory of 2352 3140 msedge.exe 85 PID 3140 wrote to memory of 2352 3140 msedge.exe 85 PID 3140 wrote to memory of 2352 3140 msedge.exe 85 PID 3140 wrote to memory of 2352 3140 msedge.exe 85 PID 3140 wrote to memory of 2352 3140 msedge.exe 85 PID 3140 wrote to memory of 2352 3140 msedge.exe 85 PID 3140 wrote to memory of 2352 3140 msedge.exe 85 PID 3140 wrote to memory of 2352 3140 msedge.exe 85 PID 3140 wrote to memory of 2352 3140 msedge.exe 85 PID 3140 wrote to memory of 2352 3140 msedge.exe 85 PID 3140 wrote to memory of 2352 3140 msedge.exe 85 PID 3140 wrote to memory of 2352 3140 msedge.exe 85 PID 3140 wrote to memory of 2352 3140 msedge.exe 85 PID 3140 wrote to memory of 2352 3140 msedge.exe 85 PID 3140 wrote to memory of 2352 3140 msedge.exe 85 PID 3140 wrote to memory of 2352 3140 msedge.exe 85 PID 3140 wrote to memory of 2352 3140 msedge.exe 85 PID 3140 wrote to memory of 2352 3140 msedge.exe 85 PID 3140 wrote to memory of 2352 3140 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/NtKernelMC/NeutrinoInjector/releases/download/Bin/Neutrino.zip1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffbdf746f8,0x7fffbdf74708,0x7fffbdf747182⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16040048275745068340,8705771365775703050,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,16040048275745068340,8705771365775703050,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,16040048275745068340,8705771365775703050,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16040048275745068340,8705771365775703050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16040048275745068340,8705771365775703050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,16040048275745068340,8705771365775703050,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,16040048275745068340,8705771365775703050,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16040048275745068340,8705771365775703050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16040048275745068340,8705771365775703050,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2124,16040048275745068340,8705771365775703050,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5024 /prefetch:82⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16040048275745068340,8705771365775703050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2124,16040048275745068340,8705771365775703050,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5936 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16040048275745068340,8705771365775703050,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16040048275745068340,8705771365775703050,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6260 /prefetch:12⤵PID:2256
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1020
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2336
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5008
-
C:\Users\Admin\Desktop\Neutrino\NeutrinoInjector.exe"C:\Users\Admin\Desktop\Neutrino\NeutrinoInjector.exe"1⤵PID:1204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c color 5F2⤵PID:3404
-
-
C:\Users\Admin\Desktop\Neutrino\NeutrinoInjector.exe"C:\Users\Admin\Desktop\Neutrino\NeutrinoInjector.exe"1⤵PID:2692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c color 5F2⤵PID:3060
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Neutrino\Tutorial.txt1⤵
- Opens file in notepad (likely ransom note)
PID:4404
-
C:\Users\Admin\Desktop\Neutrino\NeutrinoInjector.exe"C:\Users\Admin\Desktop\Neutrino\NeutrinoInjector.exe"1⤵PID:2404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c color 5F2⤵PID:4264
-
-
C:\Users\Admin\Desktop\Neutrino\NeutrinoInjector.exe"C:\Users\Admin\Desktop\Neutrino\NeutrinoInjector.exe"1⤵PID:2156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c color 5F2⤵PID:4512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
Filesize
6KB
MD5bc1cfc28ecc43e83ec205b8d25d9eec5
SHA12ee8727efd4e87de69ef4a719ef49ffc3cce885d
SHA2566506835c0139722d77a26b46be7e8c298ecc0a504a96ef36b695c3bc6ec2a035
SHA512459bd3119155fad221b36fa6ffb7d3868c12791321e66508bbcd3129b8115720933213cb9beeca9b3931e74706d3c5bee6468e9e1fba2f372929fd1f125de872
-
Filesize
6KB
MD5e17e43b22a314b2f2f6682963a5e6db0
SHA13781b2cf734343639d4408d901057605d4b442f5
SHA256e78f40116ec5d673a8752fb07adb464539e309d0476637300b62a9ba315ba6d0
SHA512ec95846029ad752d14f84bd9f53b867470f4040a38c0acda94cd70386d2f1f4a38555b08d94bcfbcfa044bac0daeca102efe2f20bf74709e6e5275b955b78927
-
Filesize
6KB
MD5281e01db8f0261b5fc95469bb7003d1d
SHA1354971a966a19859b8b1254900e1fd4d33a22f34
SHA256bc425046c10b27b0938526065c7b4b2a2ae4e9961a365b7d10340890860b0fa6
SHA5122a750f4b0ac695e611c14c014bb41ce28177bc03705d68730ec9345135a627742e8c1ee22f101f592aea9490336f9bf72cc9893054a09854162c7091f1f6ad9a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD513b553a2feff7eccf9c538f82a42555a
SHA1b58c04ad370c37f63ba0cf27a8fef4611f721c1f
SHA256cbb2172083559961a40b3b3c032be4c04e4c92259728928c3c815a03fb64bf6c
SHA5123d5c2fb245a881eab6ec2f907f46dd7a9a1b90ebc2c158a64780fa42262f20e99ee597c1bbb1b1114dbcb38d184a21a8aa05fda8d6ced705be588554f631f155
-
Filesize
11KB
MD5e5ef5f3498a8cf0c5a1fb2c8ec0007c1
SHA12b6f9fe317cc66ab7a09924a0ae0c40e29ef6d17
SHA256e9b43cdf5f29f32eb0adead4d28c87617030fa85bd69a2d3bf658234e63b44be
SHA512c8444fc1a75508860c7e56a10cf034f612017a9eb8da158e9802f96358199057d48f39a0ba02133ddeb99d458d7dd50e98a23ae96b542c8dbf4ffb678a430a09
-
Filesize
11KB
MD53b3ec202e3662c509b9087cb5ec93cbc
SHA116edd6553e06888581a0ff2cb1702c1fa64bcfd0
SHA2567522cf3bc9e5d6ce760a5e39c8479623b5a97e031b65a08274ae2218252c52ca
SHA5129d53643c4e60640ca649955a14dd1ad3f992d152baee35c5cdfebbcedb5857d86401473e516ae11a4951f57866126733cd9bae6f0ff2703bef11c790daaa30a6
-
Filesize
113KB
MD50ef8cf3a7e137c0d49f30126a10719ea
SHA1a9f44ec427e150a0dc60f30e6c75a830ab40d857
SHA256186e46bb9c1073184d282f7851f701d10729411583b0cc78641e079f656a6b85
SHA512473983fcedd942e0bf12df4d8e98fd504da0949ed744bb027b6e656fb002664cd97ef0bf6723c4f2f68ec1da20761d61affe8a0cd020ea1e5ee502b805987073