Analysis
-
max time kernel
129s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2023 22:07
Static task
static1
Behavioral task
behavioral1
Sample
5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exe
Resource
win10v2004-20230221-en
General
-
Target
5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exe
-
Size
1.2MB
-
MD5
d03f2c5d8e63bc44f4aca5b85156ba32
-
SHA1
36a27ef3eba6021e8d06b3867bc765bceebaf97c
-
SHA256
5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964
-
SHA512
0c82b43db664109bc4ad18ae28ce6ddd622ffb10b67cdb10e6b97ef8b6764f82ccfc382a7d5ceda6071155cdf7c3d37a04caf01b76b5b0a19214eef7be04561b
-
SSDEEP
24576:ty+KRPBT0L7DGpzH5h8kHw0xDVEM/YSQSZAnDl+yM2oKggRORWd:I+KRxmDGtH56kHlTEN/Dl+yMXK4
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
z44103710.exez70254716.exez26614370.exes06984792.exe1.exet25122379.exepid process 1756 z44103710.exe 1900 z70254716.exe 1316 z26614370.exe 524 s06984792.exe 1304 1.exe 864 t25122379.exe -
Loads dropped DLL 13 IoCs
Processes:
5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exez44103710.exez70254716.exez26614370.exes06984792.exe1.exet25122379.exepid process 1740 5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exe 1756 z44103710.exe 1756 z44103710.exe 1900 z70254716.exe 1900 z70254716.exe 1316 z26614370.exe 1316 z26614370.exe 1316 z26614370.exe 524 s06984792.exe 524 s06984792.exe 1304 1.exe 1316 z26614370.exe 864 t25122379.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z70254716.exez26614370.exe5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exez44103710.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z70254716.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z70254716.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z26614370.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z26614370.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z44103710.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z44103710.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s06984792.exedescription pid process Token: SeDebugPrivilege 524 s06984792.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exez44103710.exez70254716.exez26614370.exes06984792.exedescription pid process target process PID 1740 wrote to memory of 1756 1740 5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exe z44103710.exe PID 1740 wrote to memory of 1756 1740 5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exe z44103710.exe PID 1740 wrote to memory of 1756 1740 5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exe z44103710.exe PID 1740 wrote to memory of 1756 1740 5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exe z44103710.exe PID 1740 wrote to memory of 1756 1740 5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exe z44103710.exe PID 1740 wrote to memory of 1756 1740 5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exe z44103710.exe PID 1740 wrote to memory of 1756 1740 5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exe z44103710.exe PID 1756 wrote to memory of 1900 1756 z44103710.exe z70254716.exe PID 1756 wrote to memory of 1900 1756 z44103710.exe z70254716.exe PID 1756 wrote to memory of 1900 1756 z44103710.exe z70254716.exe PID 1756 wrote to memory of 1900 1756 z44103710.exe z70254716.exe PID 1756 wrote to memory of 1900 1756 z44103710.exe z70254716.exe PID 1756 wrote to memory of 1900 1756 z44103710.exe z70254716.exe PID 1756 wrote to memory of 1900 1756 z44103710.exe z70254716.exe PID 1900 wrote to memory of 1316 1900 z70254716.exe z26614370.exe PID 1900 wrote to memory of 1316 1900 z70254716.exe z26614370.exe PID 1900 wrote to memory of 1316 1900 z70254716.exe z26614370.exe PID 1900 wrote to memory of 1316 1900 z70254716.exe z26614370.exe PID 1900 wrote to memory of 1316 1900 z70254716.exe z26614370.exe PID 1900 wrote to memory of 1316 1900 z70254716.exe z26614370.exe PID 1900 wrote to memory of 1316 1900 z70254716.exe z26614370.exe PID 1316 wrote to memory of 524 1316 z26614370.exe s06984792.exe PID 1316 wrote to memory of 524 1316 z26614370.exe s06984792.exe PID 1316 wrote to memory of 524 1316 z26614370.exe s06984792.exe PID 1316 wrote to memory of 524 1316 z26614370.exe s06984792.exe PID 1316 wrote to memory of 524 1316 z26614370.exe s06984792.exe PID 1316 wrote to memory of 524 1316 z26614370.exe s06984792.exe PID 1316 wrote to memory of 524 1316 z26614370.exe s06984792.exe PID 524 wrote to memory of 1304 524 s06984792.exe 1.exe PID 524 wrote to memory of 1304 524 s06984792.exe 1.exe PID 524 wrote to memory of 1304 524 s06984792.exe 1.exe PID 524 wrote to memory of 1304 524 s06984792.exe 1.exe PID 524 wrote to memory of 1304 524 s06984792.exe 1.exe PID 524 wrote to memory of 1304 524 s06984792.exe 1.exe PID 524 wrote to memory of 1304 524 s06984792.exe 1.exe PID 1316 wrote to memory of 864 1316 z26614370.exe t25122379.exe PID 1316 wrote to memory of 864 1316 z26614370.exe t25122379.exe PID 1316 wrote to memory of 864 1316 z26614370.exe t25122379.exe PID 1316 wrote to memory of 864 1316 z26614370.exe t25122379.exe PID 1316 wrote to memory of 864 1316 z26614370.exe t25122379.exe PID 1316 wrote to memory of 864 1316 z26614370.exe t25122379.exe PID 1316 wrote to memory of 864 1316 z26614370.exe t25122379.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exe"C:\Users\Admin\AppData\Local\Temp\5cee5194d3556d72c372b1789e379f3161887566ba046e2d7c22928bf80a1964.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z44103710.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z44103710.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z70254716.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z70254716.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z26614370.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z26614370.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s06984792.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s06984792.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1304
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t25122379.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t25122379.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:864
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD560628fe3f7e6c5859a7c154035fa8bed
SHA1029df2a9fca7eeff50ff9165002a48576de6c7a5
SHA256e35ecc6e4626814bb90c6d29eb4521cea98cadddc32c8d4fb3eb743561d439c9
SHA512a9d47a258436bb9f1ef1f433fffeafde13454b142c83e6a4c53f961ef208c7ab823fc015de0a9b5301273596ae815168c2f6489d8c627bc6c7e4163f48319884
-
Filesize
1.0MB
MD560628fe3f7e6c5859a7c154035fa8bed
SHA1029df2a9fca7eeff50ff9165002a48576de6c7a5
SHA256e35ecc6e4626814bb90c6d29eb4521cea98cadddc32c8d4fb3eb743561d439c9
SHA512a9d47a258436bb9f1ef1f433fffeafde13454b142c83e6a4c53f961ef208c7ab823fc015de0a9b5301273596ae815168c2f6489d8c627bc6c7e4163f48319884
-
Filesize
760KB
MD5994433386b3993b92a0b54f6fbc6733e
SHA12a451f0666e6c8144ac984f5d5c091fea3f5208a
SHA256db75e20f1835c61325c77bcb76690a06c2ef6d431ca7729a432a986cd3ef695b
SHA5126c5ddf5361bf4056ea646ee2212cd41a3a0ab971957dbec791a8722c1f34324f5957a5210d7a687ec342231413079c8b658ec79cce9c5f346a6089d1f8700701
-
Filesize
760KB
MD5994433386b3993b92a0b54f6fbc6733e
SHA12a451f0666e6c8144ac984f5d5c091fea3f5208a
SHA256db75e20f1835c61325c77bcb76690a06c2ef6d431ca7729a432a986cd3ef695b
SHA5126c5ddf5361bf4056ea646ee2212cd41a3a0ab971957dbec791a8722c1f34324f5957a5210d7a687ec342231413079c8b658ec79cce9c5f346a6089d1f8700701
-
Filesize
578KB
MD5bd0f3ddaeaef2b71aab63f5c985125db
SHA1cd6ac6ac60419da5468f458f720e89d7f8df3313
SHA256624ad2440ec4b486363da4c8183108e72683b0680c884ea19fdd8ea47a31bb3c
SHA512f3a70e1c06cb186adddfee72d138282b9c8079245b8f1f42104ba881aa871a821e6c91ec8af0f13d899d9c2188df9336a11d84728e2fcfcd0f14e6d6e4e5d7b8
-
Filesize
578KB
MD5bd0f3ddaeaef2b71aab63f5c985125db
SHA1cd6ac6ac60419da5468f458f720e89d7f8df3313
SHA256624ad2440ec4b486363da4c8183108e72683b0680c884ea19fdd8ea47a31bb3c
SHA512f3a70e1c06cb186adddfee72d138282b9c8079245b8f1f42104ba881aa871a821e6c91ec8af0f13d899d9c2188df9336a11d84728e2fcfcd0f14e6d6e4e5d7b8
-
Filesize
575KB
MD5aca2b185a03b08f5d6cf687e8d42cc7f
SHA15e46568d98a5c2838b9faff15843af8be94d9cea
SHA2562f20044b1f8b4f4d10c0d09d402164befa709e6b95c1cbbc04b46f34075d6eeb
SHA512dca24b858b8f46fc948f2f73c1fcb681a1953e393fb0f0b4201a1f3cb912bda348064d25b5f8263317f1ce8144539248dc79d8733b1d4e003601e38d598e11f7
-
Filesize
575KB
MD5aca2b185a03b08f5d6cf687e8d42cc7f
SHA15e46568d98a5c2838b9faff15843af8be94d9cea
SHA2562f20044b1f8b4f4d10c0d09d402164befa709e6b95c1cbbc04b46f34075d6eeb
SHA512dca24b858b8f46fc948f2f73c1fcb681a1953e393fb0f0b4201a1f3cb912bda348064d25b5f8263317f1ce8144539248dc79d8733b1d4e003601e38d598e11f7
-
Filesize
575KB
MD5aca2b185a03b08f5d6cf687e8d42cc7f
SHA15e46568d98a5c2838b9faff15843af8be94d9cea
SHA2562f20044b1f8b4f4d10c0d09d402164befa709e6b95c1cbbc04b46f34075d6eeb
SHA512dca24b858b8f46fc948f2f73c1fcb681a1953e393fb0f0b4201a1f3cb912bda348064d25b5f8263317f1ce8144539248dc79d8733b1d4e003601e38d598e11f7
-
Filesize
169KB
MD55e8f88a70d57537b217bdd9bc50a310c
SHA16fe05679d755befc9aa7f0e8dfa1bee53f8546f6
SHA256893e802a773e94a25e60f80b9e3fbcf67d7017e670685a88b1220336ff080c1b
SHA51288b75ee369d9fc1168313e46ee95c6ed2ec18ec7ab2a04ef80cc15cb86a168b75620d671592de988e87476016fd0debc2ec7286512fd2234087517984626d910
-
Filesize
169KB
MD55e8f88a70d57537b217bdd9bc50a310c
SHA16fe05679d755befc9aa7f0e8dfa1bee53f8546f6
SHA256893e802a773e94a25e60f80b9e3fbcf67d7017e670685a88b1220336ff080c1b
SHA51288b75ee369d9fc1168313e46ee95c6ed2ec18ec7ab2a04ef80cc15cb86a168b75620d671592de988e87476016fd0debc2ec7286512fd2234087517984626d910
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
1.0MB
MD560628fe3f7e6c5859a7c154035fa8bed
SHA1029df2a9fca7eeff50ff9165002a48576de6c7a5
SHA256e35ecc6e4626814bb90c6d29eb4521cea98cadddc32c8d4fb3eb743561d439c9
SHA512a9d47a258436bb9f1ef1f433fffeafde13454b142c83e6a4c53f961ef208c7ab823fc015de0a9b5301273596ae815168c2f6489d8c627bc6c7e4163f48319884
-
Filesize
1.0MB
MD560628fe3f7e6c5859a7c154035fa8bed
SHA1029df2a9fca7eeff50ff9165002a48576de6c7a5
SHA256e35ecc6e4626814bb90c6d29eb4521cea98cadddc32c8d4fb3eb743561d439c9
SHA512a9d47a258436bb9f1ef1f433fffeafde13454b142c83e6a4c53f961ef208c7ab823fc015de0a9b5301273596ae815168c2f6489d8c627bc6c7e4163f48319884
-
Filesize
760KB
MD5994433386b3993b92a0b54f6fbc6733e
SHA12a451f0666e6c8144ac984f5d5c091fea3f5208a
SHA256db75e20f1835c61325c77bcb76690a06c2ef6d431ca7729a432a986cd3ef695b
SHA5126c5ddf5361bf4056ea646ee2212cd41a3a0ab971957dbec791a8722c1f34324f5957a5210d7a687ec342231413079c8b658ec79cce9c5f346a6089d1f8700701
-
Filesize
760KB
MD5994433386b3993b92a0b54f6fbc6733e
SHA12a451f0666e6c8144ac984f5d5c091fea3f5208a
SHA256db75e20f1835c61325c77bcb76690a06c2ef6d431ca7729a432a986cd3ef695b
SHA5126c5ddf5361bf4056ea646ee2212cd41a3a0ab971957dbec791a8722c1f34324f5957a5210d7a687ec342231413079c8b658ec79cce9c5f346a6089d1f8700701
-
Filesize
578KB
MD5bd0f3ddaeaef2b71aab63f5c985125db
SHA1cd6ac6ac60419da5468f458f720e89d7f8df3313
SHA256624ad2440ec4b486363da4c8183108e72683b0680c884ea19fdd8ea47a31bb3c
SHA512f3a70e1c06cb186adddfee72d138282b9c8079245b8f1f42104ba881aa871a821e6c91ec8af0f13d899d9c2188df9336a11d84728e2fcfcd0f14e6d6e4e5d7b8
-
Filesize
578KB
MD5bd0f3ddaeaef2b71aab63f5c985125db
SHA1cd6ac6ac60419da5468f458f720e89d7f8df3313
SHA256624ad2440ec4b486363da4c8183108e72683b0680c884ea19fdd8ea47a31bb3c
SHA512f3a70e1c06cb186adddfee72d138282b9c8079245b8f1f42104ba881aa871a821e6c91ec8af0f13d899d9c2188df9336a11d84728e2fcfcd0f14e6d6e4e5d7b8
-
Filesize
575KB
MD5aca2b185a03b08f5d6cf687e8d42cc7f
SHA15e46568d98a5c2838b9faff15843af8be94d9cea
SHA2562f20044b1f8b4f4d10c0d09d402164befa709e6b95c1cbbc04b46f34075d6eeb
SHA512dca24b858b8f46fc948f2f73c1fcb681a1953e393fb0f0b4201a1f3cb912bda348064d25b5f8263317f1ce8144539248dc79d8733b1d4e003601e38d598e11f7
-
Filesize
575KB
MD5aca2b185a03b08f5d6cf687e8d42cc7f
SHA15e46568d98a5c2838b9faff15843af8be94d9cea
SHA2562f20044b1f8b4f4d10c0d09d402164befa709e6b95c1cbbc04b46f34075d6eeb
SHA512dca24b858b8f46fc948f2f73c1fcb681a1953e393fb0f0b4201a1f3cb912bda348064d25b5f8263317f1ce8144539248dc79d8733b1d4e003601e38d598e11f7
-
Filesize
575KB
MD5aca2b185a03b08f5d6cf687e8d42cc7f
SHA15e46568d98a5c2838b9faff15843af8be94d9cea
SHA2562f20044b1f8b4f4d10c0d09d402164befa709e6b95c1cbbc04b46f34075d6eeb
SHA512dca24b858b8f46fc948f2f73c1fcb681a1953e393fb0f0b4201a1f3cb912bda348064d25b5f8263317f1ce8144539248dc79d8733b1d4e003601e38d598e11f7
-
Filesize
169KB
MD55e8f88a70d57537b217bdd9bc50a310c
SHA16fe05679d755befc9aa7f0e8dfa1bee53f8546f6
SHA256893e802a773e94a25e60f80b9e3fbcf67d7017e670685a88b1220336ff080c1b
SHA51288b75ee369d9fc1168313e46ee95c6ed2ec18ec7ab2a04ef80cc15cb86a168b75620d671592de988e87476016fd0debc2ec7286512fd2234087517984626d910
-
Filesize
169KB
MD55e8f88a70d57537b217bdd9bc50a310c
SHA16fe05679d755befc9aa7f0e8dfa1bee53f8546f6
SHA256893e802a773e94a25e60f80b9e3fbcf67d7017e670685a88b1220336ff080c1b
SHA51288b75ee369d9fc1168313e46ee95c6ed2ec18ec7ab2a04ef80cc15cb86a168b75620d671592de988e87476016fd0debc2ec7286512fd2234087517984626d910
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf