Analysis
-
max time kernel
188s -
max time network
194s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 18:45
Static task
static1
Behavioral task
behavioral1
Sample
a22916bfb8ff0312bf33892018ed9e18c54e313f5102c58fec7d6c975a7c13de.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a22916bfb8ff0312bf33892018ed9e18c54e313f5102c58fec7d6c975a7c13de.exe
Resource
win10v2004-20230220-en
General
-
Target
a22916bfb8ff0312bf33892018ed9e18c54e313f5102c58fec7d6c975a7c13de.exe
-
Size
1.2MB
-
MD5
1a98a9538634ace8feca80a0e6b83352
-
SHA1
fdf7ae75defeadb01322609d2a5fe4fe495fe6d8
-
SHA256
a22916bfb8ff0312bf33892018ed9e18c54e313f5102c58fec7d6c975a7c13de
-
SHA512
2a4c64ad02f6261e8adb9025a9363bfe4c99564c1c8b09b54e97353c34b9633aaebe384dad1dc3cea84fd56583d4c356e0fd03440f19913a7ffcaeb9b0f74d6c
-
SSDEEP
24576:3y0lVX24m3CkxqZiI3r9IIX1gPNivRfiTRhRaBfUkE4fxyIUgmfoTWLQ:CuVmp3COsiuBVXUsuRaB/ESxyIFzTWL
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
z97338200.exez25609759.exez60717256.exes50658471.exe1.exet27269544.exepid process 900 z97338200.exe 684 z25609759.exe 1492 z60717256.exe 1748 s50658471.exe 588 1.exe 1984 t27269544.exe -
Loads dropped DLL 13 IoCs
Processes:
a22916bfb8ff0312bf33892018ed9e18c54e313f5102c58fec7d6c975a7c13de.exez97338200.exez25609759.exez60717256.exes50658471.exe1.exet27269544.exepid process 1228 a22916bfb8ff0312bf33892018ed9e18c54e313f5102c58fec7d6c975a7c13de.exe 900 z97338200.exe 900 z97338200.exe 684 z25609759.exe 684 z25609759.exe 1492 z60717256.exe 1492 z60717256.exe 1492 z60717256.exe 1748 s50658471.exe 1748 s50658471.exe 588 1.exe 1492 z60717256.exe 1984 t27269544.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z25609759.exez60717256.exea22916bfb8ff0312bf33892018ed9e18c54e313f5102c58fec7d6c975a7c13de.exez97338200.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z25609759.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z60717256.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z60717256.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce a22916bfb8ff0312bf33892018ed9e18c54e313f5102c58fec7d6c975a7c13de.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a22916bfb8ff0312bf33892018ed9e18c54e313f5102c58fec7d6c975a7c13de.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z97338200.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z97338200.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z25609759.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s50658471.exedescription pid process Token: SeDebugPrivilege 1748 s50658471.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
a22916bfb8ff0312bf33892018ed9e18c54e313f5102c58fec7d6c975a7c13de.exez97338200.exez25609759.exez60717256.exes50658471.exedescription pid process target process PID 1228 wrote to memory of 900 1228 a22916bfb8ff0312bf33892018ed9e18c54e313f5102c58fec7d6c975a7c13de.exe z97338200.exe PID 1228 wrote to memory of 900 1228 a22916bfb8ff0312bf33892018ed9e18c54e313f5102c58fec7d6c975a7c13de.exe z97338200.exe PID 1228 wrote to memory of 900 1228 a22916bfb8ff0312bf33892018ed9e18c54e313f5102c58fec7d6c975a7c13de.exe z97338200.exe PID 1228 wrote to memory of 900 1228 a22916bfb8ff0312bf33892018ed9e18c54e313f5102c58fec7d6c975a7c13de.exe z97338200.exe PID 1228 wrote to memory of 900 1228 a22916bfb8ff0312bf33892018ed9e18c54e313f5102c58fec7d6c975a7c13de.exe z97338200.exe PID 1228 wrote to memory of 900 1228 a22916bfb8ff0312bf33892018ed9e18c54e313f5102c58fec7d6c975a7c13de.exe z97338200.exe PID 1228 wrote to memory of 900 1228 a22916bfb8ff0312bf33892018ed9e18c54e313f5102c58fec7d6c975a7c13de.exe z97338200.exe PID 900 wrote to memory of 684 900 z97338200.exe z25609759.exe PID 900 wrote to memory of 684 900 z97338200.exe z25609759.exe PID 900 wrote to memory of 684 900 z97338200.exe z25609759.exe PID 900 wrote to memory of 684 900 z97338200.exe z25609759.exe PID 900 wrote to memory of 684 900 z97338200.exe z25609759.exe PID 900 wrote to memory of 684 900 z97338200.exe z25609759.exe PID 900 wrote to memory of 684 900 z97338200.exe z25609759.exe PID 684 wrote to memory of 1492 684 z25609759.exe z60717256.exe PID 684 wrote to memory of 1492 684 z25609759.exe z60717256.exe PID 684 wrote to memory of 1492 684 z25609759.exe z60717256.exe PID 684 wrote to memory of 1492 684 z25609759.exe z60717256.exe PID 684 wrote to memory of 1492 684 z25609759.exe z60717256.exe PID 684 wrote to memory of 1492 684 z25609759.exe z60717256.exe PID 684 wrote to memory of 1492 684 z25609759.exe z60717256.exe PID 1492 wrote to memory of 1748 1492 z60717256.exe s50658471.exe PID 1492 wrote to memory of 1748 1492 z60717256.exe s50658471.exe PID 1492 wrote to memory of 1748 1492 z60717256.exe s50658471.exe PID 1492 wrote to memory of 1748 1492 z60717256.exe s50658471.exe PID 1492 wrote to memory of 1748 1492 z60717256.exe s50658471.exe PID 1492 wrote to memory of 1748 1492 z60717256.exe s50658471.exe PID 1492 wrote to memory of 1748 1492 z60717256.exe s50658471.exe PID 1748 wrote to memory of 588 1748 s50658471.exe 1.exe PID 1748 wrote to memory of 588 1748 s50658471.exe 1.exe PID 1748 wrote to memory of 588 1748 s50658471.exe 1.exe PID 1748 wrote to memory of 588 1748 s50658471.exe 1.exe PID 1748 wrote to memory of 588 1748 s50658471.exe 1.exe PID 1748 wrote to memory of 588 1748 s50658471.exe 1.exe PID 1748 wrote to memory of 588 1748 s50658471.exe 1.exe PID 1492 wrote to memory of 1984 1492 z60717256.exe t27269544.exe PID 1492 wrote to memory of 1984 1492 z60717256.exe t27269544.exe PID 1492 wrote to memory of 1984 1492 z60717256.exe t27269544.exe PID 1492 wrote to memory of 1984 1492 z60717256.exe t27269544.exe PID 1492 wrote to memory of 1984 1492 z60717256.exe t27269544.exe PID 1492 wrote to memory of 1984 1492 z60717256.exe t27269544.exe PID 1492 wrote to memory of 1984 1492 z60717256.exe t27269544.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a22916bfb8ff0312bf33892018ed9e18c54e313f5102c58fec7d6c975a7c13de.exe"C:\Users\Admin\AppData\Local\Temp\a22916bfb8ff0312bf33892018ed9e18c54e313f5102c58fec7d6c975a7c13de.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z97338200.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z97338200.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z25609759.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z25609759.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z60717256.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z60717256.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s50658471.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s50658471.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:588
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t27269544.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t27269544.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1984
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD568227123f4cdc25bd55f676f20f6bf71
SHA10bec4a19fe5fef6c2f0409f17538db71b46588a8
SHA2561ea5bd4486723e5ffbe0818eb5107a8db2b6949e3907aa74748079e8f5f910a0
SHA512a8056dfd9fe011a17a5527e8dbc775d6c6ebf1720002c9e203eddad59551765d7f34526f7daa9caad863720156aef65fe81175c2f4193bc6ab6bade62cf20382
-
Filesize
1.0MB
MD568227123f4cdc25bd55f676f20f6bf71
SHA10bec4a19fe5fef6c2f0409f17538db71b46588a8
SHA2561ea5bd4486723e5ffbe0818eb5107a8db2b6949e3907aa74748079e8f5f910a0
SHA512a8056dfd9fe011a17a5527e8dbc775d6c6ebf1720002c9e203eddad59551765d7f34526f7daa9caad863720156aef65fe81175c2f4193bc6ab6bade62cf20382
-
Filesize
764KB
MD571b8967d3fec4774098f5b8375d71daa
SHA10333dbdc38bfdb46d689dc560de36def36689f6b
SHA2566e86e49aa3b16a2d846883bb047935a81e3ca5661a4567b2e861cbf85a3ff7b2
SHA512d5344df9affd03ff6a73df331e50407daf36bb7f32e4a9e0e0d6446c09ced4dc1e6a099a4f45af78a4dd9763a5783d40ea73bebe19ad8d5d8105351c87396740
-
Filesize
764KB
MD571b8967d3fec4774098f5b8375d71daa
SHA10333dbdc38bfdb46d689dc560de36def36689f6b
SHA2566e86e49aa3b16a2d846883bb047935a81e3ca5661a4567b2e861cbf85a3ff7b2
SHA512d5344df9affd03ff6a73df331e50407daf36bb7f32e4a9e0e0d6446c09ced4dc1e6a099a4f45af78a4dd9763a5783d40ea73bebe19ad8d5d8105351c87396740
-
Filesize
582KB
MD5bbdefe45b2a97a912871bf31381b7e05
SHA11bf7e6aab40dc504d2c16c91eee7039f290de650
SHA2568d3dc896606e20f1d948c2c340a196cea395257ae7cfe8eb529243a73530d0ab
SHA512ab9e752412cd7366e8c89643ae2b473e6a52ecc767821cb469b1b0d4a39c17d942e86292c021860e2d97c07b92f985e87c3765c65af9da9a059d4b1cfad4b258
-
Filesize
582KB
MD5bbdefe45b2a97a912871bf31381b7e05
SHA11bf7e6aab40dc504d2c16c91eee7039f290de650
SHA2568d3dc896606e20f1d948c2c340a196cea395257ae7cfe8eb529243a73530d0ab
SHA512ab9e752412cd7366e8c89643ae2b473e6a52ecc767821cb469b1b0d4a39c17d942e86292c021860e2d97c07b92f985e87c3765c65af9da9a059d4b1cfad4b258
-
Filesize
582KB
MD5f6acc76055e84aa405cc0fa848a72166
SHA14f24a101713bbbaa06a34a0f2193d9cbf308f359
SHA256babf9e31b02a0775251d32b5fcf61a1d5672ce2b768c73eadbf3faba05aff53d
SHA512fedac7dc198fff1780e6903abbf96dd472c8de069e3da717c59413fe4bfbfb8a30540197aee8e3a8ee745ba4ba47edf64a84119dca764ec07547ae9549feaf19
-
Filesize
582KB
MD5f6acc76055e84aa405cc0fa848a72166
SHA14f24a101713bbbaa06a34a0f2193d9cbf308f359
SHA256babf9e31b02a0775251d32b5fcf61a1d5672ce2b768c73eadbf3faba05aff53d
SHA512fedac7dc198fff1780e6903abbf96dd472c8de069e3da717c59413fe4bfbfb8a30540197aee8e3a8ee745ba4ba47edf64a84119dca764ec07547ae9549feaf19
-
Filesize
582KB
MD5f6acc76055e84aa405cc0fa848a72166
SHA14f24a101713bbbaa06a34a0f2193d9cbf308f359
SHA256babf9e31b02a0775251d32b5fcf61a1d5672ce2b768c73eadbf3faba05aff53d
SHA512fedac7dc198fff1780e6903abbf96dd472c8de069e3da717c59413fe4bfbfb8a30540197aee8e3a8ee745ba4ba47edf64a84119dca764ec07547ae9549feaf19
-
Filesize
169KB
MD52c936e938948fe64b03b3aa5671fe798
SHA1d761438df05e370c3f10ec8f0668c21b90dc9f82
SHA25660b1a659fc4bba452ed695ac658cbdef9365af26bc69f46403c52f98d99efcc3
SHA512cd2f57cb18e35fa4ba2f19c926bc6d2f31112dc58456e085fff22dd7bb7467f266262ad42ad742400b202712c0421fa0fd179ee2377f98b0f56432f766a652db
-
Filesize
169KB
MD52c936e938948fe64b03b3aa5671fe798
SHA1d761438df05e370c3f10ec8f0668c21b90dc9f82
SHA25660b1a659fc4bba452ed695ac658cbdef9365af26bc69f46403c52f98d99efcc3
SHA512cd2f57cb18e35fa4ba2f19c926bc6d2f31112dc58456e085fff22dd7bb7467f266262ad42ad742400b202712c0421fa0fd179ee2377f98b0f56432f766a652db
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
1.0MB
MD568227123f4cdc25bd55f676f20f6bf71
SHA10bec4a19fe5fef6c2f0409f17538db71b46588a8
SHA2561ea5bd4486723e5ffbe0818eb5107a8db2b6949e3907aa74748079e8f5f910a0
SHA512a8056dfd9fe011a17a5527e8dbc775d6c6ebf1720002c9e203eddad59551765d7f34526f7daa9caad863720156aef65fe81175c2f4193bc6ab6bade62cf20382
-
Filesize
1.0MB
MD568227123f4cdc25bd55f676f20f6bf71
SHA10bec4a19fe5fef6c2f0409f17538db71b46588a8
SHA2561ea5bd4486723e5ffbe0818eb5107a8db2b6949e3907aa74748079e8f5f910a0
SHA512a8056dfd9fe011a17a5527e8dbc775d6c6ebf1720002c9e203eddad59551765d7f34526f7daa9caad863720156aef65fe81175c2f4193bc6ab6bade62cf20382
-
Filesize
764KB
MD571b8967d3fec4774098f5b8375d71daa
SHA10333dbdc38bfdb46d689dc560de36def36689f6b
SHA2566e86e49aa3b16a2d846883bb047935a81e3ca5661a4567b2e861cbf85a3ff7b2
SHA512d5344df9affd03ff6a73df331e50407daf36bb7f32e4a9e0e0d6446c09ced4dc1e6a099a4f45af78a4dd9763a5783d40ea73bebe19ad8d5d8105351c87396740
-
Filesize
764KB
MD571b8967d3fec4774098f5b8375d71daa
SHA10333dbdc38bfdb46d689dc560de36def36689f6b
SHA2566e86e49aa3b16a2d846883bb047935a81e3ca5661a4567b2e861cbf85a3ff7b2
SHA512d5344df9affd03ff6a73df331e50407daf36bb7f32e4a9e0e0d6446c09ced4dc1e6a099a4f45af78a4dd9763a5783d40ea73bebe19ad8d5d8105351c87396740
-
Filesize
582KB
MD5bbdefe45b2a97a912871bf31381b7e05
SHA11bf7e6aab40dc504d2c16c91eee7039f290de650
SHA2568d3dc896606e20f1d948c2c340a196cea395257ae7cfe8eb529243a73530d0ab
SHA512ab9e752412cd7366e8c89643ae2b473e6a52ecc767821cb469b1b0d4a39c17d942e86292c021860e2d97c07b92f985e87c3765c65af9da9a059d4b1cfad4b258
-
Filesize
582KB
MD5bbdefe45b2a97a912871bf31381b7e05
SHA11bf7e6aab40dc504d2c16c91eee7039f290de650
SHA2568d3dc896606e20f1d948c2c340a196cea395257ae7cfe8eb529243a73530d0ab
SHA512ab9e752412cd7366e8c89643ae2b473e6a52ecc767821cb469b1b0d4a39c17d942e86292c021860e2d97c07b92f985e87c3765c65af9da9a059d4b1cfad4b258
-
Filesize
582KB
MD5f6acc76055e84aa405cc0fa848a72166
SHA14f24a101713bbbaa06a34a0f2193d9cbf308f359
SHA256babf9e31b02a0775251d32b5fcf61a1d5672ce2b768c73eadbf3faba05aff53d
SHA512fedac7dc198fff1780e6903abbf96dd472c8de069e3da717c59413fe4bfbfb8a30540197aee8e3a8ee745ba4ba47edf64a84119dca764ec07547ae9549feaf19
-
Filesize
582KB
MD5f6acc76055e84aa405cc0fa848a72166
SHA14f24a101713bbbaa06a34a0f2193d9cbf308f359
SHA256babf9e31b02a0775251d32b5fcf61a1d5672ce2b768c73eadbf3faba05aff53d
SHA512fedac7dc198fff1780e6903abbf96dd472c8de069e3da717c59413fe4bfbfb8a30540197aee8e3a8ee745ba4ba47edf64a84119dca764ec07547ae9549feaf19
-
Filesize
582KB
MD5f6acc76055e84aa405cc0fa848a72166
SHA14f24a101713bbbaa06a34a0f2193d9cbf308f359
SHA256babf9e31b02a0775251d32b5fcf61a1d5672ce2b768c73eadbf3faba05aff53d
SHA512fedac7dc198fff1780e6903abbf96dd472c8de069e3da717c59413fe4bfbfb8a30540197aee8e3a8ee745ba4ba47edf64a84119dca764ec07547ae9549feaf19
-
Filesize
169KB
MD52c936e938948fe64b03b3aa5671fe798
SHA1d761438df05e370c3f10ec8f0668c21b90dc9f82
SHA25660b1a659fc4bba452ed695ac658cbdef9365af26bc69f46403c52f98d99efcc3
SHA512cd2f57cb18e35fa4ba2f19c926bc6d2f31112dc58456e085fff22dd7bb7467f266262ad42ad742400b202712c0421fa0fd179ee2377f98b0f56432f766a652db
-
Filesize
169KB
MD52c936e938948fe64b03b3aa5671fe798
SHA1d761438df05e370c3f10ec8f0668c21b90dc9f82
SHA25660b1a659fc4bba452ed695ac658cbdef9365af26bc69f46403c52f98d99efcc3
SHA512cd2f57cb18e35fa4ba2f19c926bc6d2f31112dc58456e085fff22dd7bb7467f266262ad42ad742400b202712c0421fa0fd179ee2377f98b0f56432f766a652db
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf