Analysis
-
max time kernel
139s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2023 14:50
Static task
static1
Behavioral task
behavioral1
Sample
gateway166.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
gateway166.exe
Resource
win10v2004-20230220-en
General
-
Target
gateway166.exe
-
Size
1.0MB
-
MD5
d22841fedec1f27ba00a8e80e2c8fa24
-
SHA1
ff1b0ae641acc647c12c5bb10bc60e758ff0faa7
-
SHA256
adfec237806020d3d9a56a686c502f0122104eea5dc25e76fe00f7b576adc9fc
-
SHA512
91a661299bb222450c4cf164ebf3788e1689f81b202d32f4d4b302fdd0b0f807a532309bdc4085db12b54df9676a30465ec98c5e0072d1fabe6cb310c675f4e8
-
SSDEEP
12288:YMrhy90J2Fe4V6QkKSBbBeAB0202eDY6m+de1OmN6QbcMHr2epEw/Uvx8HhOlqND:ZyMGkK8wA026vsOQHDKPyBOMe3+
Malware Config
Extracted
redline
diza
185.161.248.37:4138
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g6479982.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g6479982.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g6479982.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection g6479982.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g6479982.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g6479982.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral2/memory/3860-221-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/3860-222-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/3860-224-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/3860-226-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/3860-229-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/3860-234-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/3860-238-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/3860-241-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/3860-243-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/3860-252-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/3860-254-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/3860-257-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/3860-261-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/3860-264-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/3860-266-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/3860-268-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/3860-270-0x00000000049A0000-0x00000000049DC000-memory.dmp family_redline behavioral2/memory/1600-344-0x0000000007600000-0x0000000007610000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation h1208658.exe -
Executes dropped EXE 10 IoCs
pid Process 1916 x8004042.exe 3128 x1865287.exe 3640 f6367725.exe 4472 g6479982.exe 1992 h1208658.exe 2640 h1208658.exe 3860 i5528674.exe 1600 oneetx.exe 2088 oneetx.exe 1608 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features g6479982.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" g6479982.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x8004042.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8004042.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x1865287.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1865287.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce gateway166.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" gateway166.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1992 set thread context of 2640 1992 h1208658.exe 96 PID 1600 set thread context of 1608 1600 oneetx.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1048 1608 WerFault.exe 100 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3640 f6367725.exe 3640 f6367725.exe 4472 g6479982.exe 4472 g6479982.exe 3860 i5528674.exe 3860 i5528674.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3640 f6367725.exe Token: SeDebugPrivilege 4472 g6479982.exe Token: SeDebugPrivilege 1992 h1208658.exe Token: SeDebugPrivilege 3860 i5528674.exe Token: SeDebugPrivilege 1600 oneetx.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2640 h1208658.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1608 oneetx.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 5108 wrote to memory of 1916 5108 gateway166.exe 84 PID 5108 wrote to memory of 1916 5108 gateway166.exe 84 PID 5108 wrote to memory of 1916 5108 gateway166.exe 84 PID 1916 wrote to memory of 3128 1916 x8004042.exe 85 PID 1916 wrote to memory of 3128 1916 x8004042.exe 85 PID 1916 wrote to memory of 3128 1916 x8004042.exe 85 PID 3128 wrote to memory of 3640 3128 x1865287.exe 86 PID 3128 wrote to memory of 3640 3128 x1865287.exe 86 PID 3128 wrote to memory of 3640 3128 x1865287.exe 86 PID 3128 wrote to memory of 4472 3128 x1865287.exe 92 PID 3128 wrote to memory of 4472 3128 x1865287.exe 92 PID 3128 wrote to memory of 4472 3128 x1865287.exe 92 PID 1916 wrote to memory of 1992 1916 x8004042.exe 95 PID 1916 wrote to memory of 1992 1916 x8004042.exe 95 PID 1916 wrote to memory of 1992 1916 x8004042.exe 95 PID 1992 wrote to memory of 2640 1992 h1208658.exe 96 PID 1992 wrote to memory of 2640 1992 h1208658.exe 96 PID 1992 wrote to memory of 2640 1992 h1208658.exe 96 PID 1992 wrote to memory of 2640 1992 h1208658.exe 96 PID 1992 wrote to memory of 2640 1992 h1208658.exe 96 PID 1992 wrote to memory of 2640 1992 h1208658.exe 96 PID 1992 wrote to memory of 2640 1992 h1208658.exe 96 PID 1992 wrote to memory of 2640 1992 h1208658.exe 96 PID 1992 wrote to memory of 2640 1992 h1208658.exe 96 PID 1992 wrote to memory of 2640 1992 h1208658.exe 96 PID 5108 wrote to memory of 3860 5108 gateway166.exe 97 PID 5108 wrote to memory of 3860 5108 gateway166.exe 97 PID 5108 wrote to memory of 3860 5108 gateway166.exe 97 PID 2640 wrote to memory of 1600 2640 h1208658.exe 98 PID 2640 wrote to memory of 1600 2640 h1208658.exe 98 PID 2640 wrote to memory of 1600 2640 h1208658.exe 98 PID 1600 wrote to memory of 2088 1600 oneetx.exe 99 PID 1600 wrote to memory of 2088 1600 oneetx.exe 99 PID 1600 wrote to memory of 2088 1600 oneetx.exe 99 PID 1600 wrote to memory of 2088 1600 oneetx.exe 99 PID 1600 wrote to memory of 1608 1600 oneetx.exe 100 PID 1600 wrote to memory of 1608 1600 oneetx.exe 100 PID 1600 wrote to memory of 1608 1600 oneetx.exe 100 PID 1600 wrote to memory of 1608 1600 oneetx.exe 100 PID 1600 wrote to memory of 1608 1600 oneetx.exe 100 PID 1600 wrote to memory of 1608 1600 oneetx.exe 100 PID 1600 wrote to memory of 1608 1600 oneetx.exe 100 PID 1600 wrote to memory of 1608 1600 oneetx.exe 100 PID 1600 wrote to memory of 1608 1600 oneetx.exe 100 PID 1600 wrote to memory of 1608 1600 oneetx.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\gateway166.exe"C:\Users\Admin\AppData\Local\Temp\gateway166.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8004042.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8004042.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1865287.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1865287.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6367725.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6367725.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6479982.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6479982.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1208658.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1208658.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1208658.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1208658.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe6⤵
- Executes dropped EXE
PID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe6⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 127⤵
- Program crash
PID:1048
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5528674.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5528674.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1608 -ip 16081⤵PID:848
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285KB
MD5cafafaf5c3cb51c62856d9b82701327b
SHA1574e69ea34b6c46d1a9d1cb6b3f114d35dd2dd52
SHA2565008d44e7e83beeef1473ddba3ad4684880b55fe403f6c3d5906a6769b892a94
SHA51251a0bac14f96698715ee4bcf1022e51f031d055867d5ff11dab37d417f3eb1e29ec23aed1d7aeac7fca06f82e27c874ac1e8d205c5617bc979b327c4ec219c48
-
Filesize
285KB
MD5cafafaf5c3cb51c62856d9b82701327b
SHA1574e69ea34b6c46d1a9d1cb6b3f114d35dd2dd52
SHA2565008d44e7e83beeef1473ddba3ad4684880b55fe403f6c3d5906a6769b892a94
SHA51251a0bac14f96698715ee4bcf1022e51f031d055867d5ff11dab37d417f3eb1e29ec23aed1d7aeac7fca06f82e27c874ac1e8d205c5617bc979b327c4ec219c48
-
Filesize
750KB
MD5d68a82c4ba4f5ae38baf68987e527793
SHA1c161990a5d6b99fcf83b149587a5823f6bfad7af
SHA256f0e9484062bcb27ee62ad907745e16ab4de37213ddd397a03d3511688da0307d
SHA512542abbea4d11923d75b5e38f3d6f56d071c6e0a77a99c02f3f037a17660d9c2b7a3e31be6a18dbccbf497e1c18357a2578c1b79b2780f07d76a68e6bbd153f86
-
Filesize
750KB
MD5d68a82c4ba4f5ae38baf68987e527793
SHA1c161990a5d6b99fcf83b149587a5823f6bfad7af
SHA256f0e9484062bcb27ee62ad907745e16ab4de37213ddd397a03d3511688da0307d
SHA512542abbea4d11923d75b5e38f3d6f56d071c6e0a77a99c02f3f037a17660d9c2b7a3e31be6a18dbccbf497e1c18357a2578c1b79b2780f07d76a68e6bbd153f86
-
Filesize
965KB
MD5c00bec783ed6c812f5dd8196b26b6fec
SHA1f640065b017a622968ebd11112d9c8ff532d09f8
SHA2563fdade21930bc901eea96af9356a70d50213b4c34a227bbb8d206545e2bfb90c
SHA512e0f4de67fdc8741db33044497d526960cdc8fe49574eae480addfbb5d00b294bbb6fa7e1e50745bf5e80de447a10f075e57757d10551aa8bdacf9f7cc1b321de
-
Filesize
965KB
MD5c00bec783ed6c812f5dd8196b26b6fec
SHA1f640065b017a622968ebd11112d9c8ff532d09f8
SHA2563fdade21930bc901eea96af9356a70d50213b4c34a227bbb8d206545e2bfb90c
SHA512e0f4de67fdc8741db33044497d526960cdc8fe49574eae480addfbb5d00b294bbb6fa7e1e50745bf5e80de447a10f075e57757d10551aa8bdacf9f7cc1b321de
-
Filesize
965KB
MD5c00bec783ed6c812f5dd8196b26b6fec
SHA1f640065b017a622968ebd11112d9c8ff532d09f8
SHA2563fdade21930bc901eea96af9356a70d50213b4c34a227bbb8d206545e2bfb90c
SHA512e0f4de67fdc8741db33044497d526960cdc8fe49574eae480addfbb5d00b294bbb6fa7e1e50745bf5e80de447a10f075e57757d10551aa8bdacf9f7cc1b321de
-
Filesize
306KB
MD52c178f3c2c112e835f6ab4a7747b2550
SHA1062d7c8dfae7b935105e5fe7ceeb57444691aff0
SHA2560317b0497e44c16c6642a30c28cfd8f6cb240a82889474b39028079b7f6f373e
SHA51208618235f24f486a5ec581e8e0fac9f65e2b28844e5ff18065e427f0f6f4cbddda7dfaa944eb23b7eab5d067e2ac69467284456f31fca18c4380237e6dc92221
-
Filesize
306KB
MD52c178f3c2c112e835f6ab4a7747b2550
SHA1062d7c8dfae7b935105e5fe7ceeb57444691aff0
SHA2560317b0497e44c16c6642a30c28cfd8f6cb240a82889474b39028079b7f6f373e
SHA51208618235f24f486a5ec581e8e0fac9f65e2b28844e5ff18065e427f0f6f4cbddda7dfaa944eb23b7eab5d067e2ac69467284456f31fca18c4380237e6dc92221
-
Filesize
145KB
MD54b68dc98899da2228184483f78f22830
SHA1eab691e8a850c7c8c781ff9b5d90f0bd06b15caa
SHA256d33616f9a84b002aa13c19e95d8b1f8725b31885185301c4bce33ef20872ed2d
SHA512f4e3d81ea2755a9cf6f8d90b21d264f9893ce9910d1446346ad899822a0075234f82e76ab106a716e75fce6a7c419796c253e33507dc669aac2152f8f54094b1
-
Filesize
145KB
MD54b68dc98899da2228184483f78f22830
SHA1eab691e8a850c7c8c781ff9b5d90f0bd06b15caa
SHA256d33616f9a84b002aa13c19e95d8b1f8725b31885185301c4bce33ef20872ed2d
SHA512f4e3d81ea2755a9cf6f8d90b21d264f9893ce9910d1446346ad899822a0075234f82e76ab106a716e75fce6a7c419796c253e33507dc669aac2152f8f54094b1
-
Filesize
185KB
MD5408b2f1ee8c09cde45e22f2c0838ffb5
SHA1812a94dd1c6414749ea68ee24a91bc38e3982371
SHA2566c67ba7a0655a9024e61ef6996d715e5d3727af030305eaeed1ca4f945d40229
SHA512a93d00395b2f37c339b3b7654320f654423b9762ac9b5786e774adfef09917b1a66c4ab49e8f4486daa05b512d00625d814d34ef3d2921747ee2e1b541d5993c
-
Filesize
185KB
MD5408b2f1ee8c09cde45e22f2c0838ffb5
SHA1812a94dd1c6414749ea68ee24a91bc38e3982371
SHA2566c67ba7a0655a9024e61ef6996d715e5d3727af030305eaeed1ca4f945d40229
SHA512a93d00395b2f37c339b3b7654320f654423b9762ac9b5786e774adfef09917b1a66c4ab49e8f4486daa05b512d00625d814d34ef3d2921747ee2e1b541d5993c
-
Filesize
965KB
MD5c00bec783ed6c812f5dd8196b26b6fec
SHA1f640065b017a622968ebd11112d9c8ff532d09f8
SHA2563fdade21930bc901eea96af9356a70d50213b4c34a227bbb8d206545e2bfb90c
SHA512e0f4de67fdc8741db33044497d526960cdc8fe49574eae480addfbb5d00b294bbb6fa7e1e50745bf5e80de447a10f075e57757d10551aa8bdacf9f7cc1b321de
-
Filesize
965KB
MD5c00bec783ed6c812f5dd8196b26b6fec
SHA1f640065b017a622968ebd11112d9c8ff532d09f8
SHA2563fdade21930bc901eea96af9356a70d50213b4c34a227bbb8d206545e2bfb90c
SHA512e0f4de67fdc8741db33044497d526960cdc8fe49574eae480addfbb5d00b294bbb6fa7e1e50745bf5e80de447a10f075e57757d10551aa8bdacf9f7cc1b321de
-
Filesize
965KB
MD5c00bec783ed6c812f5dd8196b26b6fec
SHA1f640065b017a622968ebd11112d9c8ff532d09f8
SHA2563fdade21930bc901eea96af9356a70d50213b4c34a227bbb8d206545e2bfb90c
SHA512e0f4de67fdc8741db33044497d526960cdc8fe49574eae480addfbb5d00b294bbb6fa7e1e50745bf5e80de447a10f075e57757d10551aa8bdacf9f7cc1b321de
-
Filesize
965KB
MD5c00bec783ed6c812f5dd8196b26b6fec
SHA1f640065b017a622968ebd11112d9c8ff532d09f8
SHA2563fdade21930bc901eea96af9356a70d50213b4c34a227bbb8d206545e2bfb90c
SHA512e0f4de67fdc8741db33044497d526960cdc8fe49574eae480addfbb5d00b294bbb6fa7e1e50745bf5e80de447a10f075e57757d10551aa8bdacf9f7cc1b321de
-
Filesize
965KB
MD5c00bec783ed6c812f5dd8196b26b6fec
SHA1f640065b017a622968ebd11112d9c8ff532d09f8
SHA2563fdade21930bc901eea96af9356a70d50213b4c34a227bbb8d206545e2bfb90c
SHA512e0f4de67fdc8741db33044497d526960cdc8fe49574eae480addfbb5d00b294bbb6fa7e1e50745bf5e80de447a10f075e57757d10551aa8bdacf9f7cc1b321de