Analysis
-
max time kernel
47s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01/03/2023, 01:06
Static task
static1
Behavioral task
behavioral1
Sample
dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe
Resource
win10v2004-20230220-en
General
-
Target
dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe
-
Size
532KB
-
MD5
1dec159951f1abc187f8291376f46231
-
SHA1
8eaf537891990be712cbe885981bac83cd86060b
-
SHA256
dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc
-
SHA512
5d0e7792a464718629981dbf260d537b3de895f62a4d94b35ace15ecd05120f5fef3eaf083e55898850634b6afe0ed82a0a2287d968ca8a422a5296c02a95e24
-
SSDEEP
12288:BMrvy90aIlS5z+Igau7b/d28uXxsA5OJsJg:Gysu+IRunFSXF5Xm
Malware Config
Extracted
redline
rumfa
193.233.20.24:4123
-
auth_value
749d02a6b4ef1fa2ad908e44ec2296dc
Extracted
redline
forma
193.233.20.24:4123
-
auth_value
50b8e065d7cb1e9e30786f7a370368f9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw73GK44fM03.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw73GK44fM03.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw73GK44fM03.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw73GK44fM03.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw73GK44fM03.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw73GK44fM03.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 38 IoCs
resource yara_rule behavioral1/memory/1128-84-0x0000000004AB0000-0x0000000004AF6000-memory.dmp family_redline behavioral1/memory/1128-85-0x0000000004AF0000-0x0000000004B34000-memory.dmp family_redline behavioral1/memory/1128-86-0x0000000004B70000-0x0000000004BB0000-memory.dmp family_redline behavioral1/memory/1128-88-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-89-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-91-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-93-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-95-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-97-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-99-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-101-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-103-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-105-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-107-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-109-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-113-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-115-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-111-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-117-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-119-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-121-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-123-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-125-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-127-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-129-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-131-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-133-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-135-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-139-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-137-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-143-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-141-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-145-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-147-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-149-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-151-0x0000000004AF0000-0x0000000004B2E000-memory.dmp family_redline behavioral1/memory/1128-994-0x0000000004B70000-0x0000000004BB0000-memory.dmp family_redline behavioral1/memory/1128-996-0x0000000004B70000-0x0000000004BB0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
pid Process 1968 vYa3136cF.exe 1916 sw73GK44fM03.exe 1128 toN18gl76.exe 1936 uvi59JN17.exe -
Loads dropped DLL 8 IoCs
pid Process 1924 dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe 1968 vYa3136cF.exe 1968 vYa3136cF.exe 1968 vYa3136cF.exe 1968 vYa3136cF.exe 1128 toN18gl76.exe 1924 dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe 1936 uvi59JN17.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features sw73GK44fM03.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw73GK44fM03.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce vYa3136cF.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vYa3136cF.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1916 sw73GK44fM03.exe 1916 sw73GK44fM03.exe 1128 toN18gl76.exe 1128 toN18gl76.exe 1936 uvi59JN17.exe 1936 uvi59JN17.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1916 sw73GK44fM03.exe Token: SeDebugPrivilege 1128 toN18gl76.exe Token: SeDebugPrivilege 1936 uvi59JN17.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1924 wrote to memory of 1968 1924 dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe 26 PID 1924 wrote to memory of 1968 1924 dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe 26 PID 1924 wrote to memory of 1968 1924 dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe 26 PID 1924 wrote to memory of 1968 1924 dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe 26 PID 1924 wrote to memory of 1968 1924 dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe 26 PID 1924 wrote to memory of 1968 1924 dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe 26 PID 1924 wrote to memory of 1968 1924 dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe 26 PID 1968 wrote to memory of 1916 1968 vYa3136cF.exe 27 PID 1968 wrote to memory of 1916 1968 vYa3136cF.exe 27 PID 1968 wrote to memory of 1916 1968 vYa3136cF.exe 27 PID 1968 wrote to memory of 1916 1968 vYa3136cF.exe 27 PID 1968 wrote to memory of 1916 1968 vYa3136cF.exe 27 PID 1968 wrote to memory of 1916 1968 vYa3136cF.exe 27 PID 1968 wrote to memory of 1916 1968 vYa3136cF.exe 27 PID 1968 wrote to memory of 1128 1968 vYa3136cF.exe 28 PID 1968 wrote to memory of 1128 1968 vYa3136cF.exe 28 PID 1968 wrote to memory of 1128 1968 vYa3136cF.exe 28 PID 1968 wrote to memory of 1128 1968 vYa3136cF.exe 28 PID 1968 wrote to memory of 1128 1968 vYa3136cF.exe 28 PID 1968 wrote to memory of 1128 1968 vYa3136cF.exe 28 PID 1968 wrote to memory of 1128 1968 vYa3136cF.exe 28 PID 1924 wrote to memory of 1936 1924 dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe 30 PID 1924 wrote to memory of 1936 1924 dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe 30 PID 1924 wrote to memory of 1936 1924 dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe 30 PID 1924 wrote to memory of 1936 1924 dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe 30 PID 1924 wrote to memory of 1936 1924 dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe 30 PID 1924 wrote to memory of 1936 1924 dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe 30 PID 1924 wrote to memory of 1936 1924 dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe"C:\Users\Admin\AppData\Local\Temp\dcef3080d712d9bbb746bb5cdb7e2c7927da5e3578d13cb2e0f9f0be9c99fbcc.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vYa3136cF.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vYa3136cF.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw73GK44fM03.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw73GK44fM03.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\toN18gl76.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\toN18gl76.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1128
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uvi59JN17.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uvi59JN17.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1936
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD560fdddf58cad8c98cee3bf7e5ced2a76
SHA1ffe34c32adcebe7177ff176474f40afeea9866aa
SHA2562222fd33b9174e63d1706b47a330c1042dc65deb6250c93ffb0ece9a3d4eea7f
SHA5125e71e88b67633c34e6804ab307e6d64580a6de762bc9416c43c25b2698c226043a7ff3a3ef6262a441142d519cc13b43a679422dd46589a49d7f2dc1edd41de6
-
Filesize
175KB
MD560fdddf58cad8c98cee3bf7e5ced2a76
SHA1ffe34c32adcebe7177ff176474f40afeea9866aa
SHA2562222fd33b9174e63d1706b47a330c1042dc65deb6250c93ffb0ece9a3d4eea7f
SHA5125e71e88b67633c34e6804ab307e6d64580a6de762bc9416c43c25b2698c226043a7ff3a3ef6262a441142d519cc13b43a679422dd46589a49d7f2dc1edd41de6
-
Filesize
388KB
MD510db956c88c355638c6f613b768cfbaa
SHA145343109e7a344f5d363ffd82d5f8f7864655f2a
SHA256b454430bd643751e4bfa2e8d0029f5b236d8d7f60c13a19421bd468baa7c50ad
SHA51262ff175d54203e3ce0521c9e4a85b6f3220e1b3cf2c0958205bf533fa7033fe125acdd24e52a18604e987dc4486d68c62d9c020abaaf2f9902698aa1d4dd55bc
-
Filesize
388KB
MD510db956c88c355638c6f613b768cfbaa
SHA145343109e7a344f5d363ffd82d5f8f7864655f2a
SHA256b454430bd643751e4bfa2e8d0029f5b236d8d7f60c13a19421bd468baa7c50ad
SHA51262ff175d54203e3ce0521c9e4a85b6f3220e1b3cf2c0958205bf533fa7033fe125acdd24e52a18604e987dc4486d68c62d9c020abaaf2f9902698aa1d4dd55bc
-
Filesize
11KB
MD5d8c5787eccdf1a982b642ddde7667899
SHA1a12d727bf992e0aceda76cd1d782dff89cb85fc1
SHA256c684fe61d26739acec9b186b1387f5e4a7b0a384d2716eefc6881d0387784409
SHA5127860d16712baae543e463c2305c99892c444f5755e03d407086d395adfdd2d11ac6567cf136b1e713f950b2b3ba02b9376d4abb4ccebbc845b2685ddeafe302b
-
Filesize
11KB
MD5d8c5787eccdf1a982b642ddde7667899
SHA1a12d727bf992e0aceda76cd1d782dff89cb85fc1
SHA256c684fe61d26739acec9b186b1387f5e4a7b0a384d2716eefc6881d0387784409
SHA5127860d16712baae543e463c2305c99892c444f5755e03d407086d395adfdd2d11ac6567cf136b1e713f950b2b3ba02b9376d4abb4ccebbc845b2685ddeafe302b
-
Filesize
305KB
MD5e11ed6fc64ebc2ac86e3a4e39aa0b6b6
SHA1ad61736c537f06c5eda7ae7064b55a37b514eea1
SHA2568b09887654b84d73fdaf0d421b2d5910529cbfcd5a4848a23111c2612d3a1695
SHA51243e07b129d1b0269027fca92c05cd28fcecd5c9469df0b414ad24ba1b3270f6e55c2e5b67bc4734ec43d72e0609d58c068c23560716db14cd468031cb7b6b880
-
Filesize
305KB
MD5e11ed6fc64ebc2ac86e3a4e39aa0b6b6
SHA1ad61736c537f06c5eda7ae7064b55a37b514eea1
SHA2568b09887654b84d73fdaf0d421b2d5910529cbfcd5a4848a23111c2612d3a1695
SHA51243e07b129d1b0269027fca92c05cd28fcecd5c9469df0b414ad24ba1b3270f6e55c2e5b67bc4734ec43d72e0609d58c068c23560716db14cd468031cb7b6b880
-
Filesize
305KB
MD5e11ed6fc64ebc2ac86e3a4e39aa0b6b6
SHA1ad61736c537f06c5eda7ae7064b55a37b514eea1
SHA2568b09887654b84d73fdaf0d421b2d5910529cbfcd5a4848a23111c2612d3a1695
SHA51243e07b129d1b0269027fca92c05cd28fcecd5c9469df0b414ad24ba1b3270f6e55c2e5b67bc4734ec43d72e0609d58c068c23560716db14cd468031cb7b6b880
-
Filesize
175KB
MD560fdddf58cad8c98cee3bf7e5ced2a76
SHA1ffe34c32adcebe7177ff176474f40afeea9866aa
SHA2562222fd33b9174e63d1706b47a330c1042dc65deb6250c93ffb0ece9a3d4eea7f
SHA5125e71e88b67633c34e6804ab307e6d64580a6de762bc9416c43c25b2698c226043a7ff3a3ef6262a441142d519cc13b43a679422dd46589a49d7f2dc1edd41de6
-
Filesize
175KB
MD560fdddf58cad8c98cee3bf7e5ced2a76
SHA1ffe34c32adcebe7177ff176474f40afeea9866aa
SHA2562222fd33b9174e63d1706b47a330c1042dc65deb6250c93ffb0ece9a3d4eea7f
SHA5125e71e88b67633c34e6804ab307e6d64580a6de762bc9416c43c25b2698c226043a7ff3a3ef6262a441142d519cc13b43a679422dd46589a49d7f2dc1edd41de6
-
Filesize
388KB
MD510db956c88c355638c6f613b768cfbaa
SHA145343109e7a344f5d363ffd82d5f8f7864655f2a
SHA256b454430bd643751e4bfa2e8d0029f5b236d8d7f60c13a19421bd468baa7c50ad
SHA51262ff175d54203e3ce0521c9e4a85b6f3220e1b3cf2c0958205bf533fa7033fe125acdd24e52a18604e987dc4486d68c62d9c020abaaf2f9902698aa1d4dd55bc
-
Filesize
388KB
MD510db956c88c355638c6f613b768cfbaa
SHA145343109e7a344f5d363ffd82d5f8f7864655f2a
SHA256b454430bd643751e4bfa2e8d0029f5b236d8d7f60c13a19421bd468baa7c50ad
SHA51262ff175d54203e3ce0521c9e4a85b6f3220e1b3cf2c0958205bf533fa7033fe125acdd24e52a18604e987dc4486d68c62d9c020abaaf2f9902698aa1d4dd55bc
-
Filesize
11KB
MD5d8c5787eccdf1a982b642ddde7667899
SHA1a12d727bf992e0aceda76cd1d782dff89cb85fc1
SHA256c684fe61d26739acec9b186b1387f5e4a7b0a384d2716eefc6881d0387784409
SHA5127860d16712baae543e463c2305c99892c444f5755e03d407086d395adfdd2d11ac6567cf136b1e713f950b2b3ba02b9376d4abb4ccebbc845b2685ddeafe302b
-
Filesize
305KB
MD5e11ed6fc64ebc2ac86e3a4e39aa0b6b6
SHA1ad61736c537f06c5eda7ae7064b55a37b514eea1
SHA2568b09887654b84d73fdaf0d421b2d5910529cbfcd5a4848a23111c2612d3a1695
SHA51243e07b129d1b0269027fca92c05cd28fcecd5c9469df0b414ad24ba1b3270f6e55c2e5b67bc4734ec43d72e0609d58c068c23560716db14cd468031cb7b6b880
-
Filesize
305KB
MD5e11ed6fc64ebc2ac86e3a4e39aa0b6b6
SHA1ad61736c537f06c5eda7ae7064b55a37b514eea1
SHA2568b09887654b84d73fdaf0d421b2d5910529cbfcd5a4848a23111c2612d3a1695
SHA51243e07b129d1b0269027fca92c05cd28fcecd5c9469df0b414ad24ba1b3270f6e55c2e5b67bc4734ec43d72e0609d58c068c23560716db14cd468031cb7b6b880
-
Filesize
305KB
MD5e11ed6fc64ebc2ac86e3a4e39aa0b6b6
SHA1ad61736c537f06c5eda7ae7064b55a37b514eea1
SHA2568b09887654b84d73fdaf0d421b2d5910529cbfcd5a4848a23111c2612d3a1695
SHA51243e07b129d1b0269027fca92c05cd28fcecd5c9469df0b414ad24ba1b3270f6e55c2e5b67bc4734ec43d72e0609d58c068c23560716db14cd468031cb7b6b880