Analysis
-
max time kernel
167s -
max time network
180s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 18:56
Static task
static1
Behavioral task
behavioral1
Sample
ac36777b33bf512fa2d620ffeaed26ad3e0f88e721498637f5363d9912180a4a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ac36777b33bf512fa2d620ffeaed26ad3e0f88e721498637f5363d9912180a4a.exe
Resource
win10v2004-20230220-en
General
-
Target
ac36777b33bf512fa2d620ffeaed26ad3e0f88e721498637f5363d9912180a4a.exe
-
Size
1.2MB
-
MD5
ca080eb3d0104b0c37add48a18ad3b96
-
SHA1
3fcc7d01e5db963ea6726302558f40d073fd34c3
-
SHA256
ac36777b33bf512fa2d620ffeaed26ad3e0f88e721498637f5363d9912180a4a
-
SHA512
3bf15bdc33a92f6d106583fd55ee8684c4c699844346d9801d227aec4ed5ae4921030ce1b0e09d25f0a417d37c302212f102567c477557583566f03c0525c439
-
SSDEEP
24576:8ydUJAt990AuQ9y4WPBLiwcHaAFI2li3nHh+YqZTy7zTVXN:rdjfSAuQALBL1cHh3li3Hh+VgHT
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
z72207527.exez46486239.exez40571477.exes51661605.exe1.exet21912321.exepid process 1312 z72207527.exe 276 z46486239.exe 1632 z40571477.exe 1780 s51661605.exe 1152 1.exe 1012 t21912321.exe -
Loads dropped DLL 13 IoCs
Processes:
ac36777b33bf512fa2d620ffeaed26ad3e0f88e721498637f5363d9912180a4a.exez72207527.exez46486239.exez40571477.exes51661605.exe1.exet21912321.exepid process 1744 ac36777b33bf512fa2d620ffeaed26ad3e0f88e721498637f5363d9912180a4a.exe 1312 z72207527.exe 1312 z72207527.exe 276 z46486239.exe 276 z46486239.exe 1632 z40571477.exe 1632 z40571477.exe 1632 z40571477.exe 1780 s51661605.exe 1780 s51661605.exe 1152 1.exe 1632 z40571477.exe 1012 t21912321.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z46486239.exez40571477.exeac36777b33bf512fa2d620ffeaed26ad3e0f88e721498637f5363d9912180a4a.exez72207527.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z46486239.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z40571477.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z40571477.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ac36777b33bf512fa2d620ffeaed26ad3e0f88e721498637f5363d9912180a4a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ac36777b33bf512fa2d620ffeaed26ad3e0f88e721498637f5363d9912180a4a.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z72207527.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z72207527.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z46486239.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s51661605.exedescription pid process Token: SeDebugPrivilege 1780 s51661605.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
ac36777b33bf512fa2d620ffeaed26ad3e0f88e721498637f5363d9912180a4a.exez72207527.exez46486239.exez40571477.exes51661605.exedescription pid process target process PID 1744 wrote to memory of 1312 1744 ac36777b33bf512fa2d620ffeaed26ad3e0f88e721498637f5363d9912180a4a.exe z72207527.exe PID 1744 wrote to memory of 1312 1744 ac36777b33bf512fa2d620ffeaed26ad3e0f88e721498637f5363d9912180a4a.exe z72207527.exe PID 1744 wrote to memory of 1312 1744 ac36777b33bf512fa2d620ffeaed26ad3e0f88e721498637f5363d9912180a4a.exe z72207527.exe PID 1744 wrote to memory of 1312 1744 ac36777b33bf512fa2d620ffeaed26ad3e0f88e721498637f5363d9912180a4a.exe z72207527.exe PID 1744 wrote to memory of 1312 1744 ac36777b33bf512fa2d620ffeaed26ad3e0f88e721498637f5363d9912180a4a.exe z72207527.exe PID 1744 wrote to memory of 1312 1744 ac36777b33bf512fa2d620ffeaed26ad3e0f88e721498637f5363d9912180a4a.exe z72207527.exe PID 1744 wrote to memory of 1312 1744 ac36777b33bf512fa2d620ffeaed26ad3e0f88e721498637f5363d9912180a4a.exe z72207527.exe PID 1312 wrote to memory of 276 1312 z72207527.exe z46486239.exe PID 1312 wrote to memory of 276 1312 z72207527.exe z46486239.exe PID 1312 wrote to memory of 276 1312 z72207527.exe z46486239.exe PID 1312 wrote to memory of 276 1312 z72207527.exe z46486239.exe PID 1312 wrote to memory of 276 1312 z72207527.exe z46486239.exe PID 1312 wrote to memory of 276 1312 z72207527.exe z46486239.exe PID 1312 wrote to memory of 276 1312 z72207527.exe z46486239.exe PID 276 wrote to memory of 1632 276 z46486239.exe z40571477.exe PID 276 wrote to memory of 1632 276 z46486239.exe z40571477.exe PID 276 wrote to memory of 1632 276 z46486239.exe z40571477.exe PID 276 wrote to memory of 1632 276 z46486239.exe z40571477.exe PID 276 wrote to memory of 1632 276 z46486239.exe z40571477.exe PID 276 wrote to memory of 1632 276 z46486239.exe z40571477.exe PID 276 wrote to memory of 1632 276 z46486239.exe z40571477.exe PID 1632 wrote to memory of 1780 1632 z40571477.exe s51661605.exe PID 1632 wrote to memory of 1780 1632 z40571477.exe s51661605.exe PID 1632 wrote to memory of 1780 1632 z40571477.exe s51661605.exe PID 1632 wrote to memory of 1780 1632 z40571477.exe s51661605.exe PID 1632 wrote to memory of 1780 1632 z40571477.exe s51661605.exe PID 1632 wrote to memory of 1780 1632 z40571477.exe s51661605.exe PID 1632 wrote to memory of 1780 1632 z40571477.exe s51661605.exe PID 1780 wrote to memory of 1152 1780 s51661605.exe 1.exe PID 1780 wrote to memory of 1152 1780 s51661605.exe 1.exe PID 1780 wrote to memory of 1152 1780 s51661605.exe 1.exe PID 1780 wrote to memory of 1152 1780 s51661605.exe 1.exe PID 1780 wrote to memory of 1152 1780 s51661605.exe 1.exe PID 1780 wrote to memory of 1152 1780 s51661605.exe 1.exe PID 1780 wrote to memory of 1152 1780 s51661605.exe 1.exe PID 1632 wrote to memory of 1012 1632 z40571477.exe t21912321.exe PID 1632 wrote to memory of 1012 1632 z40571477.exe t21912321.exe PID 1632 wrote to memory of 1012 1632 z40571477.exe t21912321.exe PID 1632 wrote to memory of 1012 1632 z40571477.exe t21912321.exe PID 1632 wrote to memory of 1012 1632 z40571477.exe t21912321.exe PID 1632 wrote to memory of 1012 1632 z40571477.exe t21912321.exe PID 1632 wrote to memory of 1012 1632 z40571477.exe t21912321.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac36777b33bf512fa2d620ffeaed26ad3e0f88e721498637f5363d9912180a4a.exe"C:\Users\Admin\AppData\Local\Temp\ac36777b33bf512fa2d620ffeaed26ad3e0f88e721498637f5363d9912180a4a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z72207527.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z72207527.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z46486239.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z46486239.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z40571477.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z40571477.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s51661605.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s51661605.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1152
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t21912321.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t21912321.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1012
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD58734f360f733ab73e1e30c64df84168c
SHA1add5fedf3e2f077fa83a4b955e4f6369b902077d
SHA256cb51381d93ff4a1c98d729820fdb0bfaef5c3b272700e9ff5be906191984addf
SHA512c3a2f5a0a886b6517773d203fd58cb3faab01cfa0ab540f43fa5e0dc7f980e6d146caff0915c06bb1ca244389013c1ed78fadd21c97720f4714803cefd0355ad
-
Filesize
1.0MB
MD58734f360f733ab73e1e30c64df84168c
SHA1add5fedf3e2f077fa83a4b955e4f6369b902077d
SHA256cb51381d93ff4a1c98d729820fdb0bfaef5c3b272700e9ff5be906191984addf
SHA512c3a2f5a0a886b6517773d203fd58cb3faab01cfa0ab540f43fa5e0dc7f980e6d146caff0915c06bb1ca244389013c1ed78fadd21c97720f4714803cefd0355ad
-
Filesize
761KB
MD58b2971f448a4b8000c4a8cdffa1f8b29
SHA1f3fda34bb48a2979efee6f781eccd2bbb8fd091c
SHA256de11f5dc408cebacee5b7979903d2b9a75782313accd1ffb144ea842f2446ddb
SHA512866a092ec4349071294a360c04b015a8cb21c95ca4c903618b7aa6e52e41a5ea74eff1989ccf9ddca1badb10a0e5d1697f2a33e52cc5164ce46c70c13114d85c
-
Filesize
761KB
MD58b2971f448a4b8000c4a8cdffa1f8b29
SHA1f3fda34bb48a2979efee6f781eccd2bbb8fd091c
SHA256de11f5dc408cebacee5b7979903d2b9a75782313accd1ffb144ea842f2446ddb
SHA512866a092ec4349071294a360c04b015a8cb21c95ca4c903618b7aa6e52e41a5ea74eff1989ccf9ddca1badb10a0e5d1697f2a33e52cc5164ce46c70c13114d85c
-
Filesize
578KB
MD5394fa46df2a0d58a2b8b368af2834d3c
SHA1cc995077b35a00ad4491ba2ba103aa58c3c9c7c5
SHA256c55d41598de775f216ec6b1e07e44557ec147eb0bc705653096cf4ec00335554
SHA5125447cc366e8d73ec6cf38784964cb84a5fd25793c44f6e447f03be154ed95838ed283d75264c3fb4e54bfe67f1a4adf72cfd00550faddbe8d106f8b2429086dd
-
Filesize
578KB
MD5394fa46df2a0d58a2b8b368af2834d3c
SHA1cc995077b35a00ad4491ba2ba103aa58c3c9c7c5
SHA256c55d41598de775f216ec6b1e07e44557ec147eb0bc705653096cf4ec00335554
SHA5125447cc366e8d73ec6cf38784964cb84a5fd25793c44f6e447f03be154ed95838ed283d75264c3fb4e54bfe67f1a4adf72cfd00550faddbe8d106f8b2429086dd
-
Filesize
575KB
MD5aa8d05a215a5a54577aedfe9dacd9909
SHA15d021fb45d653e7f33000a6c07882836e60410a3
SHA25615fe237276b9c2c6ceae405c0739479d165b406321891c8a31883023e7b15d54
SHA5122684a236465e4d5de1f4b3bbab87765b72a41ff82f73c8ec109c13300965eff3a5dbd6029a4be50c5d1d8192b3a04160003a703b28543a80ad7126f4f7c8b444
-
Filesize
575KB
MD5aa8d05a215a5a54577aedfe9dacd9909
SHA15d021fb45d653e7f33000a6c07882836e60410a3
SHA25615fe237276b9c2c6ceae405c0739479d165b406321891c8a31883023e7b15d54
SHA5122684a236465e4d5de1f4b3bbab87765b72a41ff82f73c8ec109c13300965eff3a5dbd6029a4be50c5d1d8192b3a04160003a703b28543a80ad7126f4f7c8b444
-
Filesize
575KB
MD5aa8d05a215a5a54577aedfe9dacd9909
SHA15d021fb45d653e7f33000a6c07882836e60410a3
SHA25615fe237276b9c2c6ceae405c0739479d165b406321891c8a31883023e7b15d54
SHA5122684a236465e4d5de1f4b3bbab87765b72a41ff82f73c8ec109c13300965eff3a5dbd6029a4be50c5d1d8192b3a04160003a703b28543a80ad7126f4f7c8b444
-
Filesize
169KB
MD5e554d541ea3cc75772788cadd5c2ed0f
SHA1e1a4f91a70a4993f4e9ed232a47f7ddc057a703b
SHA256c3452320d95f134f43897d97c90bae1db37da6922c3c674458fa48c05a0eef51
SHA5125907c9045769ea86dafad58abf9c2ecd6f1607012300b0162cce0f2785725283e895f6cccb0546859549873b286087fcb906f5ab320250ff1d779d852f591bc2
-
Filesize
169KB
MD5e554d541ea3cc75772788cadd5c2ed0f
SHA1e1a4f91a70a4993f4e9ed232a47f7ddc057a703b
SHA256c3452320d95f134f43897d97c90bae1db37da6922c3c674458fa48c05a0eef51
SHA5125907c9045769ea86dafad58abf9c2ecd6f1607012300b0162cce0f2785725283e895f6cccb0546859549873b286087fcb906f5ab320250ff1d779d852f591bc2
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
1.0MB
MD58734f360f733ab73e1e30c64df84168c
SHA1add5fedf3e2f077fa83a4b955e4f6369b902077d
SHA256cb51381d93ff4a1c98d729820fdb0bfaef5c3b272700e9ff5be906191984addf
SHA512c3a2f5a0a886b6517773d203fd58cb3faab01cfa0ab540f43fa5e0dc7f980e6d146caff0915c06bb1ca244389013c1ed78fadd21c97720f4714803cefd0355ad
-
Filesize
1.0MB
MD58734f360f733ab73e1e30c64df84168c
SHA1add5fedf3e2f077fa83a4b955e4f6369b902077d
SHA256cb51381d93ff4a1c98d729820fdb0bfaef5c3b272700e9ff5be906191984addf
SHA512c3a2f5a0a886b6517773d203fd58cb3faab01cfa0ab540f43fa5e0dc7f980e6d146caff0915c06bb1ca244389013c1ed78fadd21c97720f4714803cefd0355ad
-
Filesize
761KB
MD58b2971f448a4b8000c4a8cdffa1f8b29
SHA1f3fda34bb48a2979efee6f781eccd2bbb8fd091c
SHA256de11f5dc408cebacee5b7979903d2b9a75782313accd1ffb144ea842f2446ddb
SHA512866a092ec4349071294a360c04b015a8cb21c95ca4c903618b7aa6e52e41a5ea74eff1989ccf9ddca1badb10a0e5d1697f2a33e52cc5164ce46c70c13114d85c
-
Filesize
761KB
MD58b2971f448a4b8000c4a8cdffa1f8b29
SHA1f3fda34bb48a2979efee6f781eccd2bbb8fd091c
SHA256de11f5dc408cebacee5b7979903d2b9a75782313accd1ffb144ea842f2446ddb
SHA512866a092ec4349071294a360c04b015a8cb21c95ca4c903618b7aa6e52e41a5ea74eff1989ccf9ddca1badb10a0e5d1697f2a33e52cc5164ce46c70c13114d85c
-
Filesize
578KB
MD5394fa46df2a0d58a2b8b368af2834d3c
SHA1cc995077b35a00ad4491ba2ba103aa58c3c9c7c5
SHA256c55d41598de775f216ec6b1e07e44557ec147eb0bc705653096cf4ec00335554
SHA5125447cc366e8d73ec6cf38784964cb84a5fd25793c44f6e447f03be154ed95838ed283d75264c3fb4e54bfe67f1a4adf72cfd00550faddbe8d106f8b2429086dd
-
Filesize
578KB
MD5394fa46df2a0d58a2b8b368af2834d3c
SHA1cc995077b35a00ad4491ba2ba103aa58c3c9c7c5
SHA256c55d41598de775f216ec6b1e07e44557ec147eb0bc705653096cf4ec00335554
SHA5125447cc366e8d73ec6cf38784964cb84a5fd25793c44f6e447f03be154ed95838ed283d75264c3fb4e54bfe67f1a4adf72cfd00550faddbe8d106f8b2429086dd
-
Filesize
575KB
MD5aa8d05a215a5a54577aedfe9dacd9909
SHA15d021fb45d653e7f33000a6c07882836e60410a3
SHA25615fe237276b9c2c6ceae405c0739479d165b406321891c8a31883023e7b15d54
SHA5122684a236465e4d5de1f4b3bbab87765b72a41ff82f73c8ec109c13300965eff3a5dbd6029a4be50c5d1d8192b3a04160003a703b28543a80ad7126f4f7c8b444
-
Filesize
575KB
MD5aa8d05a215a5a54577aedfe9dacd9909
SHA15d021fb45d653e7f33000a6c07882836e60410a3
SHA25615fe237276b9c2c6ceae405c0739479d165b406321891c8a31883023e7b15d54
SHA5122684a236465e4d5de1f4b3bbab87765b72a41ff82f73c8ec109c13300965eff3a5dbd6029a4be50c5d1d8192b3a04160003a703b28543a80ad7126f4f7c8b444
-
Filesize
575KB
MD5aa8d05a215a5a54577aedfe9dacd9909
SHA15d021fb45d653e7f33000a6c07882836e60410a3
SHA25615fe237276b9c2c6ceae405c0739479d165b406321891c8a31883023e7b15d54
SHA5122684a236465e4d5de1f4b3bbab87765b72a41ff82f73c8ec109c13300965eff3a5dbd6029a4be50c5d1d8192b3a04160003a703b28543a80ad7126f4f7c8b444
-
Filesize
169KB
MD5e554d541ea3cc75772788cadd5c2ed0f
SHA1e1a4f91a70a4993f4e9ed232a47f7ddc057a703b
SHA256c3452320d95f134f43897d97c90bae1db37da6922c3c674458fa48c05a0eef51
SHA5125907c9045769ea86dafad58abf9c2ecd6f1607012300b0162cce0f2785725283e895f6cccb0546859549873b286087fcb906f5ab320250ff1d779d852f591bc2
-
Filesize
169KB
MD5e554d541ea3cc75772788cadd5c2ed0f
SHA1e1a4f91a70a4993f4e9ed232a47f7ddc057a703b
SHA256c3452320d95f134f43897d97c90bae1db37da6922c3c674458fa48c05a0eef51
SHA5125907c9045769ea86dafad58abf9c2ecd6f1607012300b0162cce0f2785725283e895f6cccb0546859549873b286087fcb906f5ab320250ff1d779d852f591bc2
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf