Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 19:41
Behavioral task
behavioral1
Sample
456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe
Resource
win7-20241010-en
General
-
Target
456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe
-
Size
2.3MB
-
MD5
ad899b402ed0b7312a06655e39cad09d
-
SHA1
0dceb8f1743f3d4d927bda6ac389379dd589561c
-
SHA256
456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700
-
SHA512
026f77794c95c8f6b1fb74035f98848aab6e07c9157462c260b711ca6ebd67c0a3b1e99a917f534ad35a21d130bbe45d36f21d14ab46225ce310d408696e2861
-
SSDEEP
49152:M09XJt4HIN2H2tFvduySepEWoxvPnsHyjtk2MYC5GDW4:xZJt4HINy2LkeKZx3nsmtk2aF4
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
resource yara_rule behavioral1/memory/2832-9-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2832-8-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2832-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2736-18-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/1736-29-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2736-28-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/1736-37-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/1736-40-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/1736-77-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 9 IoCs
resource yara_rule behavioral1/memory/2832-9-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2832-8-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2832-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2736-18-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/1736-29-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2736-28-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/1736-37-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/1736-40-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/1736-77-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Xred family
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Executes dropped EXE 7 IoCs
pid Process 2832 RVN.exe 2736 TXPlatforn.exe 1736 TXPlatforn.exe 2668 HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 2996 ._cache_HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 2892 Synaptics.exe 1668 ._cache_Synaptics.exe -
Loads dropped DLL 10 IoCs
pid Process 2492 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 2736 TXPlatforn.exe 2492 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 2492 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 2668 HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 2668 HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 2668 HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 2668 HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 2892 Synaptics.exe 2892 Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe -
resource yara_rule behavioral1/memory/2832-5-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2832-9-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2832-8-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2832-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2736-18-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1736-29-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2736-28-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1736-37-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1736-40-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/1736-77-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RVN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TXPlatforn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2960 cmd.exe 2616 PING.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2616 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2268 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2492 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1736 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2832 RVN.exe Token: SeLoadDriverPrivilege 1736 TXPlatforn.exe Token: 33 1736 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 1736 TXPlatforn.exe Token: 33 1736 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 1736 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2492 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 2492 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 2268 EXCEL.EXE -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2832 2492 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 30 PID 2492 wrote to memory of 2832 2492 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 30 PID 2492 wrote to memory of 2832 2492 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 30 PID 2492 wrote to memory of 2832 2492 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 30 PID 2492 wrote to memory of 2832 2492 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 30 PID 2492 wrote to memory of 2832 2492 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 30 PID 2492 wrote to memory of 2832 2492 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 30 PID 2832 wrote to memory of 2960 2832 RVN.exe 32 PID 2832 wrote to memory of 2960 2832 RVN.exe 32 PID 2832 wrote to memory of 2960 2832 RVN.exe 32 PID 2832 wrote to memory of 2960 2832 RVN.exe 32 PID 2736 wrote to memory of 1736 2736 TXPlatforn.exe 33 PID 2736 wrote to memory of 1736 2736 TXPlatforn.exe 33 PID 2736 wrote to memory of 1736 2736 TXPlatforn.exe 33 PID 2736 wrote to memory of 1736 2736 TXPlatforn.exe 33 PID 2736 wrote to memory of 1736 2736 TXPlatforn.exe 33 PID 2736 wrote to memory of 1736 2736 TXPlatforn.exe 33 PID 2736 wrote to memory of 1736 2736 TXPlatforn.exe 33 PID 2492 wrote to memory of 2668 2492 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 35 PID 2492 wrote to memory of 2668 2492 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 35 PID 2492 wrote to memory of 2668 2492 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 35 PID 2492 wrote to memory of 2668 2492 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 35 PID 2960 wrote to memory of 2616 2960 cmd.exe 36 PID 2960 wrote to memory of 2616 2960 cmd.exe 36 PID 2960 wrote to memory of 2616 2960 cmd.exe 36 PID 2960 wrote to memory of 2616 2960 cmd.exe 36 PID 2668 wrote to memory of 2996 2668 HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 37 PID 2668 wrote to memory of 2996 2668 HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 37 PID 2668 wrote to memory of 2996 2668 HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 37 PID 2668 wrote to memory of 2996 2668 HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 37 PID 2668 wrote to memory of 2892 2668 HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 39 PID 2668 wrote to memory of 2892 2668 HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 39 PID 2668 wrote to memory of 2892 2668 HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 39 PID 2668 wrote to memory of 2892 2668 HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 39 PID 2892 wrote to memory of 1668 2892 Synaptics.exe 40 PID 2892 wrote to memory of 1668 2892 Synaptics.exe 40 PID 2892 wrote to memory of 1668 2892 Synaptics.exe 40 PID 2892 wrote to memory of 1668 2892 Synaptics.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe"C:\Users\Admin\AppData\Local\Temp\456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\RVN.exeC:\Users\Admin\AppData\Local\Temp\\RVN.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\RVN.exe > nul3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2616
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exeC:\Users\Admin\AppData\Local\Temp\HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\._cache_HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe"C:\Users\Admin\AppData\Local\Temp\._cache_HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe"3⤵
- Executes dropped EXE
PID:2996
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
PID:1668
-
-
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2268
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5d9d481674ffdea74865a6031479962b3
SHA107dbfbd87c719537e616f2347bd66efb3a9a5ae6
SHA25644e5331ce62c8de6480bf05b1c22f4c2ae0ebd7f546cb8f50d078756162f11e3
SHA51226ffff903de9f9f2e43d76648dbec786463759ff2fa5dd80a8ef47b58000682cc54e6b8c0abfce4ac22617a7a94b7fca958b0b770e1b7b5c14b53f936eac4e9a
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
20KB
MD590ff98d98fd95773aa30015a26ace80c
SHA14ddb4289837c26a50f7fa114ef9de62e4b6c298a
SHA2560afd7540e60d4b20cd66d3a705b6f0c1e050f0891e26e1e426cc564a51eb5bad
SHA51284fc48de4a0cc9eb7d0bee536d70d5726b1374783253aada0ed4d28b661d56d9590e57da389db0b81a0f37bd6c84b9880578e60bbfeb1dbb711f17376a637618
-
Filesize
24KB
MD52e0def613f538ce52a386be117bd7597
SHA12e3ff75cb13d310b31275daf98fc9f948cdff99e
SHA2561141a2ed90e98dc0221818e092abc467229c5480ddac762983127f8d70e790aa
SHA512ece7ab7cb58a466e08797f8f7ba5eb9421b37f02e84299fbc815c5805b016db2035d9dab24a2e8a867eceaecf0ee4cc54eff8f31f1e48d559358fba401b5cf39
-
\Users\Admin\AppData\Local\Temp\._cache_HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe
Filesize35KB
MD50e20bfff0e17b23201c1ee8859a4e12a
SHA15969b0363421280138c65320061048b6b7036dfe
SHA256075e7ac339e22a77101d227b139a2010b2e97126bb90a6c96cbdec887443da0c
SHA51251c1dd7f970e3a91f73680e4ba8e0036e793def2f4d54476858d17e81bd105d5fc44b620f02ac0a4c66874adf8ff54fa60035eac82ff8c70b7cb902acb88b58e
-
\Users\Admin\AppData\Local\Temp\HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe
Filesize789KB
MD5515dd523ebda43dc027987f5cb27cc3a
SHA1c93ab31c28c79f71ec13c58c20571461dec9b813
SHA2567a27c6f5da069c41cd3643ed98359b976f7f548ac0f70745906f15b84cffd0b5
SHA5124763f2df8de16931d7c15e28bcc76337e5f1a4686d4613bae9c9abf13617f5803574cd065b00012d9b5e6d0642d4b828b5adcc2604c117ef2102ef52d8ffb829
-
Filesize
377KB
MD580ade1893dec9cab7f2e63538a464fcc
SHA1c06614da33a65eddb506db00a124a3fc3f5be02e
SHA25657a920389c044e3f5cf93dabff67070b4511e79779b6f874e08f92d8b0d7afbd
SHA512fffd4f3fccb5301b3c7a5b3bd92747f31549fbd9d0803fe5d502d1bb0ef979140988718c2ee1406ed3e755790d275185e120a56cbcb5ed2eadf62b5cdbfc4cc4