Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
20/05/2023, 14:12
Static task
static1
Behavioral task
behavioral1
Sample
820aa2d8278af28e5533ea9842ce2a78419a864878a0fc48e2c9eaf9b43b6cdf.exe
Resource
win10v2004-20230221-en
General
-
Target
820aa2d8278af28e5533ea9842ce2a78419a864878a0fc48e2c9eaf9b43b6cdf.exe
-
Size
1.0MB
-
MD5
74cf4e669132502821d674b556bdd033
-
SHA1
4973bdb9335fd4f63f9caca3beb595c280e7f96d
-
SHA256
820aa2d8278af28e5533ea9842ce2a78419a864878a0fc48e2c9eaf9b43b6cdf
-
SHA512
9a7be627f6c5861d050cca42b9fdb1e2b51fd3b597db1395e3d7fa912171128cbf6fda2a372e12e77a1478bb0ee05a5132f76d2e088147b98a11a3bb5ba8afa5
-
SSDEEP
24576:Zy1HF9uoiF13jMBhKhX7cYxzopap9uHIAg0meQp:M1HFHiX8kNQYxzXP0
Malware Config
Extracted
redline
deren
77.91.68.253:19065
-
auth_value
04a169f1fb198bfbeca74d0e06ea2d54
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection g5591028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g5591028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g5591028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g5591028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g5591028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g5591028.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 17 IoCs
resource yara_rule behavioral1/memory/2448-222-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/2448-223-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/2448-225-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/2448-227-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/2448-229-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/2448-231-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/2448-233-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/2448-235-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/2448-237-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/2448-239-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/2448-241-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/2448-243-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/2448-245-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/2448-247-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/2448-249-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/2448-251-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline behavioral1/memory/2448-253-0x0000000004990000-0x00000000049CC000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation h7256684.exe -
Executes dropped EXE 9 IoCs
pid Process 1764 x8296304.exe 4792 x8682022.exe 3648 f9725421.exe 1752 g5591028.exe 4236 h7256684.exe 3556 h7256684.exe 2448 i5585079.exe 2872 oneetx.exe 4552 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features g5591028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" g5591028.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8682022.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 820aa2d8278af28e5533ea9842ce2a78419a864878a0fc48e2c9eaf9b43b6cdf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 820aa2d8278af28e5533ea9842ce2a78419a864878a0fc48e2c9eaf9b43b6cdf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x8296304.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8296304.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x8682022.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4236 set thread context of 3556 4236 h7256684.exe 94 PID 2872 set thread context of 4552 2872 oneetx.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1644 4552 WerFault.exe 97 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3648 f9725421.exe 3648 f9725421.exe 1752 g5591028.exe 1752 g5591028.exe 2448 i5585079.exe 2448 i5585079.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3648 f9725421.exe Token: SeDebugPrivilege 1752 g5591028.exe Token: SeDebugPrivilege 4236 h7256684.exe Token: SeDebugPrivilege 2448 i5585079.exe Token: SeDebugPrivilege 2872 oneetx.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3556 h7256684.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4552 oneetx.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2636 wrote to memory of 1764 2636 820aa2d8278af28e5533ea9842ce2a78419a864878a0fc48e2c9eaf9b43b6cdf.exe 82 PID 2636 wrote to memory of 1764 2636 820aa2d8278af28e5533ea9842ce2a78419a864878a0fc48e2c9eaf9b43b6cdf.exe 82 PID 2636 wrote to memory of 1764 2636 820aa2d8278af28e5533ea9842ce2a78419a864878a0fc48e2c9eaf9b43b6cdf.exe 82 PID 1764 wrote to memory of 4792 1764 x8296304.exe 83 PID 1764 wrote to memory of 4792 1764 x8296304.exe 83 PID 1764 wrote to memory of 4792 1764 x8296304.exe 83 PID 4792 wrote to memory of 3648 4792 x8682022.exe 84 PID 4792 wrote to memory of 3648 4792 x8682022.exe 84 PID 4792 wrote to memory of 3648 4792 x8682022.exe 84 PID 4792 wrote to memory of 1752 4792 x8682022.exe 92 PID 4792 wrote to memory of 1752 4792 x8682022.exe 92 PID 4792 wrote to memory of 1752 4792 x8682022.exe 92 PID 1764 wrote to memory of 4236 1764 x8296304.exe 93 PID 1764 wrote to memory of 4236 1764 x8296304.exe 93 PID 1764 wrote to memory of 4236 1764 x8296304.exe 93 PID 4236 wrote to memory of 3556 4236 h7256684.exe 94 PID 4236 wrote to memory of 3556 4236 h7256684.exe 94 PID 4236 wrote to memory of 3556 4236 h7256684.exe 94 PID 4236 wrote to memory of 3556 4236 h7256684.exe 94 PID 4236 wrote to memory of 3556 4236 h7256684.exe 94 PID 4236 wrote to memory of 3556 4236 h7256684.exe 94 PID 4236 wrote to memory of 3556 4236 h7256684.exe 94 PID 4236 wrote to memory of 3556 4236 h7256684.exe 94 PID 4236 wrote to memory of 3556 4236 h7256684.exe 94 PID 4236 wrote to memory of 3556 4236 h7256684.exe 94 PID 2636 wrote to memory of 2448 2636 820aa2d8278af28e5533ea9842ce2a78419a864878a0fc48e2c9eaf9b43b6cdf.exe 95 PID 2636 wrote to memory of 2448 2636 820aa2d8278af28e5533ea9842ce2a78419a864878a0fc48e2c9eaf9b43b6cdf.exe 95 PID 2636 wrote to memory of 2448 2636 820aa2d8278af28e5533ea9842ce2a78419a864878a0fc48e2c9eaf9b43b6cdf.exe 95 PID 3556 wrote to memory of 2872 3556 h7256684.exe 96 PID 3556 wrote to memory of 2872 3556 h7256684.exe 96 PID 3556 wrote to memory of 2872 3556 h7256684.exe 96 PID 2872 wrote to memory of 4552 2872 oneetx.exe 97 PID 2872 wrote to memory of 4552 2872 oneetx.exe 97 PID 2872 wrote to memory of 4552 2872 oneetx.exe 97 PID 2872 wrote to memory of 4552 2872 oneetx.exe 97 PID 2872 wrote to memory of 4552 2872 oneetx.exe 97 PID 2872 wrote to memory of 4552 2872 oneetx.exe 97 PID 2872 wrote to memory of 4552 2872 oneetx.exe 97 PID 2872 wrote to memory of 4552 2872 oneetx.exe 97 PID 2872 wrote to memory of 4552 2872 oneetx.exe 97 PID 2872 wrote to memory of 4552 2872 oneetx.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\820aa2d8278af28e5533ea9842ce2a78419a864878a0fc48e2c9eaf9b43b6cdf.exe"C:\Users\Admin\AppData\Local\Temp\820aa2d8278af28e5533ea9842ce2a78419a864878a0fc48e2c9eaf9b43b6cdf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8296304.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8296304.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8682022.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8682022.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9725421.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9725421.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3648
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5591028.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5591028.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7256684.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7256684.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7256684.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7256684.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe6⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 127⤵
- Program crash
PID:1644
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5585079.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5585079.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4552 -ip 45521⤵PID:4532
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD58d2dfa8cdb6a288df95d2392eae97fe5
SHA1180081526287bf3ac35acc0dc259066c124d528e
SHA25603b4fac3dc43eebc0268a4774beca326e3cb686c252fedd58ae1d7e7cbed27e8
SHA512d26a75aec4b7c40f16adba5c0888a84d60c1eb446893893e5bdd814dccbf420499be3967952c742d0c9cb5e67b3dea41af223d7dcc329257e267675af8a51b89
-
Filesize
284KB
MD58d2dfa8cdb6a288df95d2392eae97fe5
SHA1180081526287bf3ac35acc0dc259066c124d528e
SHA25603b4fac3dc43eebc0268a4774beca326e3cb686c252fedd58ae1d7e7cbed27e8
SHA512d26a75aec4b7c40f16adba5c0888a84d60c1eb446893893e5bdd814dccbf420499be3967952c742d0c9cb5e67b3dea41af223d7dcc329257e267675af8a51b89
-
Filesize
751KB
MD53b72ee51a0c63d46f987e7ec4ae56577
SHA14bba20a0e6c8061d6955600e7fa10f02032156cc
SHA25618fb2442b2f932df1a60bed1a50ff5c42ada00afcbc4b7e547ae5dc75a3bd85d
SHA512dfdf999db95829e9d17443150f32d09c16e0933c354cd391f94cc99353235e642a8055bcde4988b80c455a434abc69524fcbde15ac1a01302f08132e0dd2a8bd
-
Filesize
751KB
MD53b72ee51a0c63d46f987e7ec4ae56577
SHA14bba20a0e6c8061d6955600e7fa10f02032156cc
SHA25618fb2442b2f932df1a60bed1a50ff5c42ada00afcbc4b7e547ae5dc75a3bd85d
SHA512dfdf999db95829e9d17443150f32d09c16e0933c354cd391f94cc99353235e642a8055bcde4988b80c455a434abc69524fcbde15ac1a01302f08132e0dd2a8bd
-
Filesize
964KB
MD5e0bbcbe21524789531031d537a9cf7c0
SHA16017785deb0b9813da0ff6ac1bf6e91f25c0c5bd
SHA256530065155ce299fa209efdf4488bf93ce8adba347e3dbfe6cab739ec04b89f98
SHA5122550b3d2295a1b1bd2df2fbb3b94c55adb1da1edf77d8dfac27959d1f148929aba9e4c785876e714e798c9b197dad7207e51a9aa07eb90df8816e5398c858ffc
-
Filesize
964KB
MD5e0bbcbe21524789531031d537a9cf7c0
SHA16017785deb0b9813da0ff6ac1bf6e91f25c0c5bd
SHA256530065155ce299fa209efdf4488bf93ce8adba347e3dbfe6cab739ec04b89f98
SHA5122550b3d2295a1b1bd2df2fbb3b94c55adb1da1edf77d8dfac27959d1f148929aba9e4c785876e714e798c9b197dad7207e51a9aa07eb90df8816e5398c858ffc
-
Filesize
964KB
MD5e0bbcbe21524789531031d537a9cf7c0
SHA16017785deb0b9813da0ff6ac1bf6e91f25c0c5bd
SHA256530065155ce299fa209efdf4488bf93ce8adba347e3dbfe6cab739ec04b89f98
SHA5122550b3d2295a1b1bd2df2fbb3b94c55adb1da1edf77d8dfac27959d1f148929aba9e4c785876e714e798c9b197dad7207e51a9aa07eb90df8816e5398c858ffc
-
Filesize
306KB
MD59e3c5d74195d131f79472b4bf53abf47
SHA170eb46f53843fafdb3ac5758ccafea62fdf57c09
SHA256ac8579711313e617c177fd6381b0a28a6f2ac1f60ec6a09d8ed46b0ced9639db
SHA512f706f301577ca93b4903799672693cdb2ae070381855614f80172fee098dbf959d9a259ea46d79dd546823bccc480e882a88d3ea0479b3e5bbd5d22cdb1b9d46
-
Filesize
306KB
MD59e3c5d74195d131f79472b4bf53abf47
SHA170eb46f53843fafdb3ac5758ccafea62fdf57c09
SHA256ac8579711313e617c177fd6381b0a28a6f2ac1f60ec6a09d8ed46b0ced9639db
SHA512f706f301577ca93b4903799672693cdb2ae070381855614f80172fee098dbf959d9a259ea46d79dd546823bccc480e882a88d3ea0479b3e5bbd5d22cdb1b9d46
-
Filesize
145KB
MD5fdb30a3ddac699b9f4917005c53d492f
SHA1976a11bfc9eaaecd61e92563ccb33918194c0fa9
SHA2569e5d0e245ffacb32d72441f718837695b31201bb73f6752691bbb6380c0f5982
SHA5120c76f7afa1dabb4113fab23a256d6e6c04506634eaba4b42cba65311e46cf395fe4d00c637e566e25e15266f236bc02a4386125be82f396fb1765aa1cb86b2ac
-
Filesize
145KB
MD5fdb30a3ddac699b9f4917005c53d492f
SHA1976a11bfc9eaaecd61e92563ccb33918194c0fa9
SHA2569e5d0e245ffacb32d72441f718837695b31201bb73f6752691bbb6380c0f5982
SHA5120c76f7afa1dabb4113fab23a256d6e6c04506634eaba4b42cba65311e46cf395fe4d00c637e566e25e15266f236bc02a4386125be82f396fb1765aa1cb86b2ac
-
Filesize
184KB
MD5e2ee14f443cdeaa57d8f193bea40934c
SHA1787a5279d1b7e803cf743572baeae9d9452c9972
SHA2564e0f95c95ba85a95fc5939ae70ba6a5582c8d4cdf04858fe8fd62db5096bf98b
SHA512fa0b3a00783fa4220e7dd74ee4cfd7a2f1af1771f85996544ac4ab1f2ce1724d34ca78e64c827a7e28dfc2d7308c37058ac0eba2348b93fa3d143092199b9428
-
Filesize
184KB
MD5e2ee14f443cdeaa57d8f193bea40934c
SHA1787a5279d1b7e803cf743572baeae9d9452c9972
SHA2564e0f95c95ba85a95fc5939ae70ba6a5582c8d4cdf04858fe8fd62db5096bf98b
SHA512fa0b3a00783fa4220e7dd74ee4cfd7a2f1af1771f85996544ac4ab1f2ce1724d34ca78e64c827a7e28dfc2d7308c37058ac0eba2348b93fa3d143092199b9428
-
Filesize
964KB
MD5e0bbcbe21524789531031d537a9cf7c0
SHA16017785deb0b9813da0ff6ac1bf6e91f25c0c5bd
SHA256530065155ce299fa209efdf4488bf93ce8adba347e3dbfe6cab739ec04b89f98
SHA5122550b3d2295a1b1bd2df2fbb3b94c55adb1da1edf77d8dfac27959d1f148929aba9e4c785876e714e798c9b197dad7207e51a9aa07eb90df8816e5398c858ffc
-
Filesize
964KB
MD5e0bbcbe21524789531031d537a9cf7c0
SHA16017785deb0b9813da0ff6ac1bf6e91f25c0c5bd
SHA256530065155ce299fa209efdf4488bf93ce8adba347e3dbfe6cab739ec04b89f98
SHA5122550b3d2295a1b1bd2df2fbb3b94c55adb1da1edf77d8dfac27959d1f148929aba9e4c785876e714e798c9b197dad7207e51a9aa07eb90df8816e5398c858ffc
-
Filesize
964KB
MD5e0bbcbe21524789531031d537a9cf7c0
SHA16017785deb0b9813da0ff6ac1bf6e91f25c0c5bd
SHA256530065155ce299fa209efdf4488bf93ce8adba347e3dbfe6cab739ec04b89f98
SHA5122550b3d2295a1b1bd2df2fbb3b94c55adb1da1edf77d8dfac27959d1f148929aba9e4c785876e714e798c9b197dad7207e51a9aa07eb90df8816e5398c858ffc
-
Filesize
964KB
MD5e0bbcbe21524789531031d537a9cf7c0
SHA16017785deb0b9813da0ff6ac1bf6e91f25c0c5bd
SHA256530065155ce299fa209efdf4488bf93ce8adba347e3dbfe6cab739ec04b89f98
SHA5122550b3d2295a1b1bd2df2fbb3b94c55adb1da1edf77d8dfac27959d1f148929aba9e4c785876e714e798c9b197dad7207e51a9aa07eb90df8816e5398c858ffc