Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2023, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
771cf8459a4c819f7f3eec8544a608ff98415cd643a342d95e3ee700df4bc61f.exe
Resource
win10v2004-20230220-en
General
-
Target
771cf8459a4c819f7f3eec8544a608ff98415cd643a342d95e3ee700df4bc61f.exe
-
Size
1.1MB
-
MD5
d1834d94a02f34e550cf601e1ca51a77
-
SHA1
cdc7b65353f18a072a89bea1cb47a323bdb347e8
-
SHA256
771cf8459a4c819f7f3eec8544a608ff98415cd643a342d95e3ee700df4bc61f
-
SHA512
1bf97325f22ae962735aff48a7e4a4210455fb27d4613cdf555029051955781ceaf5586d2c23442db224074519a15d9c350d95975f0c31e516a0018451d48bea
-
SSDEEP
24576:pyh0tlEnGxkkOyUBIfNzJCosC19R4gArm7nmb6Erf0124GzK0:cWtlTmtyzVJCwR4gIYc6S811W
Malware Config
Extracted
redline
muza
185.161.248.75:4132
-
auth_value
99f39e1ac98e0c0a729ab27594e72bc3
Extracted
redline
horor
185.161.248.75:4132
-
auth_value
b8d506fe48db15c38fb031d07f42d529
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a0353688.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a0353688.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a0353688.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a0353688.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a0353688.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a0353688.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation c2150125.exe -
Executes dropped EXE 10 IoCs
pid Process 3240 v5918857.exe 1256 v1430105.exe 1660 a0353688.exe 1648 b1903432.exe 692 c2150125.exe 1696 c2150125.exe 996 d5202940.exe 4640 oneetx.exe 4404 d5202940.exe 2204 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a0353688.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a0353688.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 771cf8459a4c819f7f3eec8544a608ff98415cd643a342d95e3ee700df4bc61f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5918857.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5918857.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1430105.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v1430105.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 771cf8459a4c819f7f3eec8544a608ff98415cd643a342d95e3ee700df4bc61f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 692 set thread context of 1696 692 c2150125.exe 91 PID 996 set thread context of 4404 996 d5202940.exe 93 PID 4640 set thread context of 2204 4640 oneetx.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2584 2204 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1660 a0353688.exe 1660 a0353688.exe 1648 b1903432.exe 1648 b1903432.exe 4404 d5202940.exe 4404 d5202940.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1660 a0353688.exe Token: SeDebugPrivilege 1648 b1903432.exe Token: SeDebugPrivilege 692 c2150125.exe Token: SeDebugPrivilege 996 d5202940.exe Token: SeDebugPrivilege 4640 oneetx.exe Token: SeDebugPrivilege 4404 d5202940.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1696 c2150125.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2204 oneetx.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 4660 wrote to memory of 3240 4660 771cf8459a4c819f7f3eec8544a608ff98415cd643a342d95e3ee700df4bc61f.exe 83 PID 4660 wrote to memory of 3240 4660 771cf8459a4c819f7f3eec8544a608ff98415cd643a342d95e3ee700df4bc61f.exe 83 PID 4660 wrote to memory of 3240 4660 771cf8459a4c819f7f3eec8544a608ff98415cd643a342d95e3ee700df4bc61f.exe 83 PID 3240 wrote to memory of 1256 3240 v5918857.exe 84 PID 3240 wrote to memory of 1256 3240 v5918857.exe 84 PID 3240 wrote to memory of 1256 3240 v5918857.exe 84 PID 1256 wrote to memory of 1660 1256 v1430105.exe 85 PID 1256 wrote to memory of 1660 1256 v1430105.exe 85 PID 1256 wrote to memory of 1660 1256 v1430105.exe 85 PID 1256 wrote to memory of 1648 1256 v1430105.exe 89 PID 1256 wrote to memory of 1648 1256 v1430105.exe 89 PID 1256 wrote to memory of 1648 1256 v1430105.exe 89 PID 3240 wrote to memory of 692 3240 v5918857.exe 90 PID 3240 wrote to memory of 692 3240 v5918857.exe 90 PID 3240 wrote to memory of 692 3240 v5918857.exe 90 PID 692 wrote to memory of 1696 692 c2150125.exe 91 PID 692 wrote to memory of 1696 692 c2150125.exe 91 PID 692 wrote to memory of 1696 692 c2150125.exe 91 PID 692 wrote to memory of 1696 692 c2150125.exe 91 PID 692 wrote to memory of 1696 692 c2150125.exe 91 PID 692 wrote to memory of 1696 692 c2150125.exe 91 PID 692 wrote to memory of 1696 692 c2150125.exe 91 PID 692 wrote to memory of 1696 692 c2150125.exe 91 PID 692 wrote to memory of 1696 692 c2150125.exe 91 PID 692 wrote to memory of 1696 692 c2150125.exe 91 PID 4660 wrote to memory of 996 4660 771cf8459a4c819f7f3eec8544a608ff98415cd643a342d95e3ee700df4bc61f.exe 92 PID 4660 wrote to memory of 996 4660 771cf8459a4c819f7f3eec8544a608ff98415cd643a342d95e3ee700df4bc61f.exe 92 PID 4660 wrote to memory of 996 4660 771cf8459a4c819f7f3eec8544a608ff98415cd643a342d95e3ee700df4bc61f.exe 92 PID 996 wrote to memory of 4404 996 d5202940.exe 93 PID 996 wrote to memory of 4404 996 d5202940.exe 93 PID 996 wrote to memory of 4404 996 d5202940.exe 93 PID 1696 wrote to memory of 4640 1696 c2150125.exe 95 PID 1696 wrote to memory of 4640 1696 c2150125.exe 95 PID 1696 wrote to memory of 4640 1696 c2150125.exe 95 PID 4640 wrote to memory of 2204 4640 oneetx.exe 96 PID 4640 wrote to memory of 2204 4640 oneetx.exe 96 PID 4640 wrote to memory of 2204 4640 oneetx.exe 96 PID 996 wrote to memory of 4404 996 d5202940.exe 93 PID 996 wrote to memory of 4404 996 d5202940.exe 93 PID 996 wrote to memory of 4404 996 d5202940.exe 93 PID 996 wrote to memory of 4404 996 d5202940.exe 93 PID 996 wrote to memory of 4404 996 d5202940.exe 93 PID 4640 wrote to memory of 2204 4640 oneetx.exe 96 PID 4640 wrote to memory of 2204 4640 oneetx.exe 96 PID 4640 wrote to memory of 2204 4640 oneetx.exe 96 PID 4640 wrote to memory of 2204 4640 oneetx.exe 96 PID 4640 wrote to memory of 2204 4640 oneetx.exe 96 PID 4640 wrote to memory of 2204 4640 oneetx.exe 96 PID 4640 wrote to memory of 2204 4640 oneetx.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\771cf8459a4c819f7f3eec8544a608ff98415cd643a342d95e3ee700df4bc61f.exe"C:\Users\Admin\AppData\Local\Temp\771cf8459a4c819f7f3eec8544a608ff98415cd643a342d95e3ee700df4bc61f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5918857.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5918857.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1430105.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1430105.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0353688.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0353688.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1903432.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1903432.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2150125.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2150125.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2150125.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2150125.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe6⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 127⤵
- Program crash
PID:2584
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5202940.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5202940.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5202940.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5202940.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4404
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2204 -ip 22041⤵PID:5068
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
903KB
MD556b3ccd53b4acb8aedc802f96b4be602
SHA14afc9af2c5b9340e334259071acf16af61886e03
SHA2562e583ef6b76c63deac9dbe64b7cde1dfde2b14fc625b52d7d932c7a035ae66fd
SHA512385126b75cb3615e0a253122b4597932ebc809f6a7470525d161450f394b95baebb6970514d93d93e0902ab7fee0a8e7de99e5cf2a0544d7d29a632d7631f6e6
-
Filesize
903KB
MD556b3ccd53b4acb8aedc802f96b4be602
SHA14afc9af2c5b9340e334259071acf16af61886e03
SHA2562e583ef6b76c63deac9dbe64b7cde1dfde2b14fc625b52d7d932c7a035ae66fd
SHA512385126b75cb3615e0a253122b4597932ebc809f6a7470525d161450f394b95baebb6970514d93d93e0902ab7fee0a8e7de99e5cf2a0544d7d29a632d7631f6e6
-
Filesize
903KB
MD556b3ccd53b4acb8aedc802f96b4be602
SHA14afc9af2c5b9340e334259071acf16af61886e03
SHA2562e583ef6b76c63deac9dbe64b7cde1dfde2b14fc625b52d7d932c7a035ae66fd
SHA512385126b75cb3615e0a253122b4597932ebc809f6a7470525d161450f394b95baebb6970514d93d93e0902ab7fee0a8e7de99e5cf2a0544d7d29a632d7631f6e6
-
Filesize
750KB
MD5193f4866f59a78e2db8589fda63f57b8
SHA1835b6488b4b86d7da64bd6a064283838ee1ed797
SHA2567a471714d150281517cd010fbd331b6ad8bf326c44f96236b087103ecb928e69
SHA5122f3d3634d7f938e9ce44621760746b1a96045ed307b01d483655eb8d95a26a6c228c86cd4319d3ba624a73cb71996ab6ab0ca9e8614ff82894c7a5b8d92eebcd
-
Filesize
750KB
MD5193f4866f59a78e2db8589fda63f57b8
SHA1835b6488b4b86d7da64bd6a064283838ee1ed797
SHA2567a471714d150281517cd010fbd331b6ad8bf326c44f96236b087103ecb928e69
SHA5122f3d3634d7f938e9ce44621760746b1a96045ed307b01d483655eb8d95a26a6c228c86cd4319d3ba624a73cb71996ab6ab0ca9e8614ff82894c7a5b8d92eebcd
-
Filesize
963KB
MD546886fd29355e70b1f886463baf50864
SHA103a90f1e76078e612f0cb1c1253bc0a4ad36d837
SHA256eb28a111f7668f99115e3f053887e1569171f76b1649a65b673a86d2f493b3f2
SHA5122786a98e559ad02c1429e5acb9039e85b1d9237755c9f36ac23d6e17d71f346b6ce713431abce1173d9886b85f097355a27b4c9754b8ba7b36f84b31dd7018b4
-
Filesize
963KB
MD546886fd29355e70b1f886463baf50864
SHA103a90f1e76078e612f0cb1c1253bc0a4ad36d837
SHA256eb28a111f7668f99115e3f053887e1569171f76b1649a65b673a86d2f493b3f2
SHA5122786a98e559ad02c1429e5acb9039e85b1d9237755c9f36ac23d6e17d71f346b6ce713431abce1173d9886b85f097355a27b4c9754b8ba7b36f84b31dd7018b4
-
Filesize
963KB
MD546886fd29355e70b1f886463baf50864
SHA103a90f1e76078e612f0cb1c1253bc0a4ad36d837
SHA256eb28a111f7668f99115e3f053887e1569171f76b1649a65b673a86d2f493b3f2
SHA5122786a98e559ad02c1429e5acb9039e85b1d9237755c9f36ac23d6e17d71f346b6ce713431abce1173d9886b85f097355a27b4c9754b8ba7b36f84b31dd7018b4
-
Filesize
305KB
MD567c4d9fcfaba58c8dd43caaedc728804
SHA1b1148f1ca2e9fe283d3f6be0570263dfb264ea73
SHA256b5ddb92b175e86198f4b76d757e86fd0418b348c7cf4e7a190181ec305635c25
SHA51277e66256da75d855ceebdb35cee109923181aa3e87e0646707cb956d25dfaf26826fa6e788a581030a1b9c7e44fd41e70597013dba10d525a19aa20955408662
-
Filesize
305KB
MD567c4d9fcfaba58c8dd43caaedc728804
SHA1b1148f1ca2e9fe283d3f6be0570263dfb264ea73
SHA256b5ddb92b175e86198f4b76d757e86fd0418b348c7cf4e7a190181ec305635c25
SHA51277e66256da75d855ceebdb35cee109923181aa3e87e0646707cb956d25dfaf26826fa6e788a581030a1b9c7e44fd41e70597013dba10d525a19aa20955408662
-
Filesize
184KB
MD5ae3689512b0b3f71d8358fc9b14417d2
SHA105801414f1bdfc8fde9d318a4c77d9fce7b0bf25
SHA2569cf8c21820b305566da5687d257ff04a587fcd325771099bf58587d4cc88fc1c
SHA512f81d1032b31b7a20fc83edab767eb6ea184b95f51d1275f799422bc4f4191193039cc229618e01aacacdf20ab3bd8114c91c44cea60dcf2812acf4d8b9238e83
-
Filesize
184KB
MD5ae3689512b0b3f71d8358fc9b14417d2
SHA105801414f1bdfc8fde9d318a4c77d9fce7b0bf25
SHA2569cf8c21820b305566da5687d257ff04a587fcd325771099bf58587d4cc88fc1c
SHA512f81d1032b31b7a20fc83edab767eb6ea184b95f51d1275f799422bc4f4191193039cc229618e01aacacdf20ab3bd8114c91c44cea60dcf2812acf4d8b9238e83
-
Filesize
145KB
MD5508742c592bc4cb2a6ee58e046cc9203
SHA1354c6d59faa3d7e82c9b6314ad0474a7004ee5f8
SHA2561034d0092d2e0ea6a678143707e293f19ec51f10fb17d4ce95671f4633c2c89a
SHA5128e60ee8806256d96751baa6376790f14a3c1624718e9f1d1d96c7d4270f5891d2a30d66e04e2ad0004cae97a8d8b9cea7e5f2a65348767a1ede14babe98ff2f4
-
Filesize
145KB
MD5508742c592bc4cb2a6ee58e046cc9203
SHA1354c6d59faa3d7e82c9b6314ad0474a7004ee5f8
SHA2561034d0092d2e0ea6a678143707e293f19ec51f10fb17d4ce95671f4633c2c89a
SHA5128e60ee8806256d96751baa6376790f14a3c1624718e9f1d1d96c7d4270f5891d2a30d66e04e2ad0004cae97a8d8b9cea7e5f2a65348767a1ede14babe98ff2f4
-
Filesize
963KB
MD546886fd29355e70b1f886463baf50864
SHA103a90f1e76078e612f0cb1c1253bc0a4ad36d837
SHA256eb28a111f7668f99115e3f053887e1569171f76b1649a65b673a86d2f493b3f2
SHA5122786a98e559ad02c1429e5acb9039e85b1d9237755c9f36ac23d6e17d71f346b6ce713431abce1173d9886b85f097355a27b4c9754b8ba7b36f84b31dd7018b4
-
Filesize
963KB
MD546886fd29355e70b1f886463baf50864
SHA103a90f1e76078e612f0cb1c1253bc0a4ad36d837
SHA256eb28a111f7668f99115e3f053887e1569171f76b1649a65b673a86d2f493b3f2
SHA5122786a98e559ad02c1429e5acb9039e85b1d9237755c9f36ac23d6e17d71f346b6ce713431abce1173d9886b85f097355a27b4c9754b8ba7b36f84b31dd7018b4
-
Filesize
963KB
MD546886fd29355e70b1f886463baf50864
SHA103a90f1e76078e612f0cb1c1253bc0a4ad36d837
SHA256eb28a111f7668f99115e3f053887e1569171f76b1649a65b673a86d2f493b3f2
SHA5122786a98e559ad02c1429e5acb9039e85b1d9237755c9f36ac23d6e17d71f346b6ce713431abce1173d9886b85f097355a27b4c9754b8ba7b36f84b31dd7018b4
-
Filesize
963KB
MD546886fd29355e70b1f886463baf50864
SHA103a90f1e76078e612f0cb1c1253bc0a4ad36d837
SHA256eb28a111f7668f99115e3f053887e1569171f76b1649a65b673a86d2f493b3f2
SHA5122786a98e559ad02c1429e5acb9039e85b1d9237755c9f36ac23d6e17d71f346b6ce713431abce1173d9886b85f097355a27b4c9754b8ba7b36f84b31dd7018b4