Analysis
-
max time kernel
184s -
max time network
191s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2023 21:31
Static task
static1
Behavioral task
behavioral1
Sample
3fe27a9b9901477e4610711538be31a4aa9e84aab3cb063c5180c6c9bfa1d757.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3fe27a9b9901477e4610711538be31a4aa9e84aab3cb063c5180c6c9bfa1d757.exe
Resource
win10v2004-20230220-en
General
-
Target
3fe27a9b9901477e4610711538be31a4aa9e84aab3cb063c5180c6c9bfa1d757.exe
-
Size
1.2MB
-
MD5
a07e73daae433dd6b77951e9ea872147
-
SHA1
1a1eb5d52ca7154080b196b1288256565a9ddb5b
-
SHA256
3fe27a9b9901477e4610711538be31a4aa9e84aab3cb063c5180c6c9bfa1d757
-
SHA512
1b898e8a62637226fcfda407d62d96988ab74c7326596a91d5402c27925c0462d448156908b448e02846dceb937fc25784ef212f5312e9e0e3f46548db391ba2
-
SSDEEP
24576:1yryGAuG5URsg474tJzZlVTG5YX2/Q1iv0/7H92OnuG+RF:Qr/AuOatJzdTG5YX0Q1i82+
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
z92012145.exez29574256.exez64904842.exes40635890.exe1.exet65161806.exepid process 1048 z92012145.exe 1692 z29574256.exe 1456 z64904842.exe 1748 s40635890.exe 1616 1.exe 1944 t65161806.exe -
Loads dropped DLL 13 IoCs
Processes:
3fe27a9b9901477e4610711538be31a4aa9e84aab3cb063c5180c6c9bfa1d757.exez92012145.exez29574256.exez64904842.exes40635890.exe1.exet65161806.exepid process 1340 3fe27a9b9901477e4610711538be31a4aa9e84aab3cb063c5180c6c9bfa1d757.exe 1048 z92012145.exe 1048 z92012145.exe 1692 z29574256.exe 1692 z29574256.exe 1456 z64904842.exe 1456 z64904842.exe 1456 z64904842.exe 1748 s40635890.exe 1748 s40635890.exe 1616 1.exe 1456 z64904842.exe 1944 t65161806.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z92012145.exez29574256.exez64904842.exe3fe27a9b9901477e4610711538be31a4aa9e84aab3cb063c5180c6c9bfa1d757.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z92012145.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z29574256.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z29574256.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z64904842.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z64904842.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3fe27a9b9901477e4610711538be31a4aa9e84aab3cb063c5180c6c9bfa1d757.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3fe27a9b9901477e4610711538be31a4aa9e84aab3cb063c5180c6c9bfa1d757.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z92012145.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s40635890.exedescription pid process Token: SeDebugPrivilege 1748 s40635890.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
3fe27a9b9901477e4610711538be31a4aa9e84aab3cb063c5180c6c9bfa1d757.exez92012145.exez29574256.exez64904842.exes40635890.exedescription pid process target process PID 1340 wrote to memory of 1048 1340 3fe27a9b9901477e4610711538be31a4aa9e84aab3cb063c5180c6c9bfa1d757.exe z92012145.exe PID 1340 wrote to memory of 1048 1340 3fe27a9b9901477e4610711538be31a4aa9e84aab3cb063c5180c6c9bfa1d757.exe z92012145.exe PID 1340 wrote to memory of 1048 1340 3fe27a9b9901477e4610711538be31a4aa9e84aab3cb063c5180c6c9bfa1d757.exe z92012145.exe PID 1340 wrote to memory of 1048 1340 3fe27a9b9901477e4610711538be31a4aa9e84aab3cb063c5180c6c9bfa1d757.exe z92012145.exe PID 1340 wrote to memory of 1048 1340 3fe27a9b9901477e4610711538be31a4aa9e84aab3cb063c5180c6c9bfa1d757.exe z92012145.exe PID 1340 wrote to memory of 1048 1340 3fe27a9b9901477e4610711538be31a4aa9e84aab3cb063c5180c6c9bfa1d757.exe z92012145.exe PID 1340 wrote to memory of 1048 1340 3fe27a9b9901477e4610711538be31a4aa9e84aab3cb063c5180c6c9bfa1d757.exe z92012145.exe PID 1048 wrote to memory of 1692 1048 z92012145.exe z29574256.exe PID 1048 wrote to memory of 1692 1048 z92012145.exe z29574256.exe PID 1048 wrote to memory of 1692 1048 z92012145.exe z29574256.exe PID 1048 wrote to memory of 1692 1048 z92012145.exe z29574256.exe PID 1048 wrote to memory of 1692 1048 z92012145.exe z29574256.exe PID 1048 wrote to memory of 1692 1048 z92012145.exe z29574256.exe PID 1048 wrote to memory of 1692 1048 z92012145.exe z29574256.exe PID 1692 wrote to memory of 1456 1692 z29574256.exe z64904842.exe PID 1692 wrote to memory of 1456 1692 z29574256.exe z64904842.exe PID 1692 wrote to memory of 1456 1692 z29574256.exe z64904842.exe PID 1692 wrote to memory of 1456 1692 z29574256.exe z64904842.exe PID 1692 wrote to memory of 1456 1692 z29574256.exe z64904842.exe PID 1692 wrote to memory of 1456 1692 z29574256.exe z64904842.exe PID 1692 wrote to memory of 1456 1692 z29574256.exe z64904842.exe PID 1456 wrote to memory of 1748 1456 z64904842.exe s40635890.exe PID 1456 wrote to memory of 1748 1456 z64904842.exe s40635890.exe PID 1456 wrote to memory of 1748 1456 z64904842.exe s40635890.exe PID 1456 wrote to memory of 1748 1456 z64904842.exe s40635890.exe PID 1456 wrote to memory of 1748 1456 z64904842.exe s40635890.exe PID 1456 wrote to memory of 1748 1456 z64904842.exe s40635890.exe PID 1456 wrote to memory of 1748 1456 z64904842.exe s40635890.exe PID 1748 wrote to memory of 1616 1748 s40635890.exe 1.exe PID 1748 wrote to memory of 1616 1748 s40635890.exe 1.exe PID 1748 wrote to memory of 1616 1748 s40635890.exe 1.exe PID 1748 wrote to memory of 1616 1748 s40635890.exe 1.exe PID 1748 wrote to memory of 1616 1748 s40635890.exe 1.exe PID 1748 wrote to memory of 1616 1748 s40635890.exe 1.exe PID 1748 wrote to memory of 1616 1748 s40635890.exe 1.exe PID 1456 wrote to memory of 1944 1456 z64904842.exe t65161806.exe PID 1456 wrote to memory of 1944 1456 z64904842.exe t65161806.exe PID 1456 wrote to memory of 1944 1456 z64904842.exe t65161806.exe PID 1456 wrote to memory of 1944 1456 z64904842.exe t65161806.exe PID 1456 wrote to memory of 1944 1456 z64904842.exe t65161806.exe PID 1456 wrote to memory of 1944 1456 z64904842.exe t65161806.exe PID 1456 wrote to memory of 1944 1456 z64904842.exe t65161806.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fe27a9b9901477e4610711538be31a4aa9e84aab3cb063c5180c6c9bfa1d757.exe"C:\Users\Admin\AppData\Local\Temp\3fe27a9b9901477e4610711538be31a4aa9e84aab3cb063c5180c6c9bfa1d757.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z92012145.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z92012145.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z29574256.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z29574256.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z64904842.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z64904842.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s40635890.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s40635890.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1616
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t65161806.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t65161806.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1944
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD517ac1febfadbdf0f7ba8311edc1d9f03
SHA1464a618f410e8bb7da8f3bc37d4d7c84317a6a3f
SHA256f200586e6e187ef6bc9f41c42fafb6acd2f21e7701ef76e36f59c035ab601a90
SHA5122408d2ef3810aad10507858cf0cb1f75f8ee84038069fb0d88c67db235f700e8a0539f1c3f264c735a77de2f0a7191efec20a7ec59aae2d06a55d692d48d0667
-
Filesize
1.0MB
MD517ac1febfadbdf0f7ba8311edc1d9f03
SHA1464a618f410e8bb7da8f3bc37d4d7c84317a6a3f
SHA256f200586e6e187ef6bc9f41c42fafb6acd2f21e7701ef76e36f59c035ab601a90
SHA5122408d2ef3810aad10507858cf0cb1f75f8ee84038069fb0d88c67db235f700e8a0539f1c3f264c735a77de2f0a7191efec20a7ec59aae2d06a55d692d48d0667
-
Filesize
752KB
MD5dbb7f3a0f38effbe945b751c7b13b223
SHA14ddd0df9aab4526fd377e032ddb284666f2444f5
SHA25666a3bde7f1d9333cc3ded425f1a973b087e3391c8fadbe6f18a66f652007090d
SHA5129f8e2a8862d631fec140b4f4623956c7ba54e2c4a2c2fd650370360f5560c9f34cc4c471608086b94d7f7edf13d1d5cb76aecd51555b363e6eff3e6c18461bc4
-
Filesize
752KB
MD5dbb7f3a0f38effbe945b751c7b13b223
SHA14ddd0df9aab4526fd377e032ddb284666f2444f5
SHA25666a3bde7f1d9333cc3ded425f1a973b087e3391c8fadbe6f18a66f652007090d
SHA5129f8e2a8862d631fec140b4f4623956c7ba54e2c4a2c2fd650370360f5560c9f34cc4c471608086b94d7f7edf13d1d5cb76aecd51555b363e6eff3e6c18461bc4
-
Filesize
569KB
MD5c92c48f32ea95d1cc1e31563bbde59bc
SHA16c3da851d84a813079c04db1613adfa39309f615
SHA25658aa23933ec2c68eed592aab89d6826cdd517e46733f46f586f51c8065da38de
SHA5128cd51364c23570d113ea6e63e66d23c34c83c1fd0783e576ea3462401d4df1e57f680ce8a190079654aa0cb2875c9a0f8f1e737e2b06458775e2756992f58dc7
-
Filesize
569KB
MD5c92c48f32ea95d1cc1e31563bbde59bc
SHA16c3da851d84a813079c04db1613adfa39309f615
SHA25658aa23933ec2c68eed592aab89d6826cdd517e46733f46f586f51c8065da38de
SHA5128cd51364c23570d113ea6e63e66d23c34c83c1fd0783e576ea3462401d4df1e57f680ce8a190079654aa0cb2875c9a0f8f1e737e2b06458775e2756992f58dc7
-
Filesize
488KB
MD53fef9c593e7defde6b5ef4e6d90c528d
SHA157cf56369152881014f899206255668f5c4c550d
SHA256406b8bf38dd7dadb2c391348bbd0b1dd8e3800b50b0c65272b530b9d03bcf56c
SHA512273607bc98d15ba878d9522008498107a093284cbfc35bbd4fce6a5b8e96262917b6981115f9c3634952d4bea8cef3186527ae5aef805c6d3dd028c5b845d084
-
Filesize
488KB
MD53fef9c593e7defde6b5ef4e6d90c528d
SHA157cf56369152881014f899206255668f5c4c550d
SHA256406b8bf38dd7dadb2c391348bbd0b1dd8e3800b50b0c65272b530b9d03bcf56c
SHA512273607bc98d15ba878d9522008498107a093284cbfc35bbd4fce6a5b8e96262917b6981115f9c3634952d4bea8cef3186527ae5aef805c6d3dd028c5b845d084
-
Filesize
488KB
MD53fef9c593e7defde6b5ef4e6d90c528d
SHA157cf56369152881014f899206255668f5c4c550d
SHA256406b8bf38dd7dadb2c391348bbd0b1dd8e3800b50b0c65272b530b9d03bcf56c
SHA512273607bc98d15ba878d9522008498107a093284cbfc35bbd4fce6a5b8e96262917b6981115f9c3634952d4bea8cef3186527ae5aef805c6d3dd028c5b845d084
-
Filesize
169KB
MD5317424e188d94b9b8125ceefb77da431
SHA148a08d68daaafff21c6e3863061a4a3e907be5c8
SHA256d77723ce34709b4cae0155df6cf2a0688216d4a05c1281c31fd26f0420e60cd2
SHA512c79b76c9f7bd3dce9e88581991a1f80046d0ed24b4d1f184ab9d75d470fe3ec7018889ba8620321a03ed629f8f291f45f657ead32a3732112c54a761a8a9c16d
-
Filesize
169KB
MD5317424e188d94b9b8125ceefb77da431
SHA148a08d68daaafff21c6e3863061a4a3e907be5c8
SHA256d77723ce34709b4cae0155df6cf2a0688216d4a05c1281c31fd26f0420e60cd2
SHA512c79b76c9f7bd3dce9e88581991a1f80046d0ed24b4d1f184ab9d75d470fe3ec7018889ba8620321a03ed629f8f291f45f657ead32a3732112c54a761a8a9c16d
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
1.0MB
MD517ac1febfadbdf0f7ba8311edc1d9f03
SHA1464a618f410e8bb7da8f3bc37d4d7c84317a6a3f
SHA256f200586e6e187ef6bc9f41c42fafb6acd2f21e7701ef76e36f59c035ab601a90
SHA5122408d2ef3810aad10507858cf0cb1f75f8ee84038069fb0d88c67db235f700e8a0539f1c3f264c735a77de2f0a7191efec20a7ec59aae2d06a55d692d48d0667
-
Filesize
1.0MB
MD517ac1febfadbdf0f7ba8311edc1d9f03
SHA1464a618f410e8bb7da8f3bc37d4d7c84317a6a3f
SHA256f200586e6e187ef6bc9f41c42fafb6acd2f21e7701ef76e36f59c035ab601a90
SHA5122408d2ef3810aad10507858cf0cb1f75f8ee84038069fb0d88c67db235f700e8a0539f1c3f264c735a77de2f0a7191efec20a7ec59aae2d06a55d692d48d0667
-
Filesize
752KB
MD5dbb7f3a0f38effbe945b751c7b13b223
SHA14ddd0df9aab4526fd377e032ddb284666f2444f5
SHA25666a3bde7f1d9333cc3ded425f1a973b087e3391c8fadbe6f18a66f652007090d
SHA5129f8e2a8862d631fec140b4f4623956c7ba54e2c4a2c2fd650370360f5560c9f34cc4c471608086b94d7f7edf13d1d5cb76aecd51555b363e6eff3e6c18461bc4
-
Filesize
752KB
MD5dbb7f3a0f38effbe945b751c7b13b223
SHA14ddd0df9aab4526fd377e032ddb284666f2444f5
SHA25666a3bde7f1d9333cc3ded425f1a973b087e3391c8fadbe6f18a66f652007090d
SHA5129f8e2a8862d631fec140b4f4623956c7ba54e2c4a2c2fd650370360f5560c9f34cc4c471608086b94d7f7edf13d1d5cb76aecd51555b363e6eff3e6c18461bc4
-
Filesize
569KB
MD5c92c48f32ea95d1cc1e31563bbde59bc
SHA16c3da851d84a813079c04db1613adfa39309f615
SHA25658aa23933ec2c68eed592aab89d6826cdd517e46733f46f586f51c8065da38de
SHA5128cd51364c23570d113ea6e63e66d23c34c83c1fd0783e576ea3462401d4df1e57f680ce8a190079654aa0cb2875c9a0f8f1e737e2b06458775e2756992f58dc7
-
Filesize
569KB
MD5c92c48f32ea95d1cc1e31563bbde59bc
SHA16c3da851d84a813079c04db1613adfa39309f615
SHA25658aa23933ec2c68eed592aab89d6826cdd517e46733f46f586f51c8065da38de
SHA5128cd51364c23570d113ea6e63e66d23c34c83c1fd0783e576ea3462401d4df1e57f680ce8a190079654aa0cb2875c9a0f8f1e737e2b06458775e2756992f58dc7
-
Filesize
488KB
MD53fef9c593e7defde6b5ef4e6d90c528d
SHA157cf56369152881014f899206255668f5c4c550d
SHA256406b8bf38dd7dadb2c391348bbd0b1dd8e3800b50b0c65272b530b9d03bcf56c
SHA512273607bc98d15ba878d9522008498107a093284cbfc35bbd4fce6a5b8e96262917b6981115f9c3634952d4bea8cef3186527ae5aef805c6d3dd028c5b845d084
-
Filesize
488KB
MD53fef9c593e7defde6b5ef4e6d90c528d
SHA157cf56369152881014f899206255668f5c4c550d
SHA256406b8bf38dd7dadb2c391348bbd0b1dd8e3800b50b0c65272b530b9d03bcf56c
SHA512273607bc98d15ba878d9522008498107a093284cbfc35bbd4fce6a5b8e96262917b6981115f9c3634952d4bea8cef3186527ae5aef805c6d3dd028c5b845d084
-
Filesize
488KB
MD53fef9c593e7defde6b5ef4e6d90c528d
SHA157cf56369152881014f899206255668f5c4c550d
SHA256406b8bf38dd7dadb2c391348bbd0b1dd8e3800b50b0c65272b530b9d03bcf56c
SHA512273607bc98d15ba878d9522008498107a093284cbfc35bbd4fce6a5b8e96262917b6981115f9c3634952d4bea8cef3186527ae5aef805c6d3dd028c5b845d084
-
Filesize
169KB
MD5317424e188d94b9b8125ceefb77da431
SHA148a08d68daaafff21c6e3863061a4a3e907be5c8
SHA256d77723ce34709b4cae0155df6cf2a0688216d4a05c1281c31fd26f0420e60cd2
SHA512c79b76c9f7bd3dce9e88581991a1f80046d0ed24b4d1f184ab9d75d470fe3ec7018889ba8620321a03ed629f8f291f45f657ead32a3732112c54a761a8a9c16d
-
Filesize
169KB
MD5317424e188d94b9b8125ceefb77da431
SHA148a08d68daaafff21c6e3863061a4a3e907be5c8
SHA256d77723ce34709b4cae0155df6cf2a0688216d4a05c1281c31fd26f0420e60cd2
SHA512c79b76c9f7bd3dce9e88581991a1f80046d0ed24b4d1f184ab9d75d470fe3ec7018889ba8620321a03ed629f8f291f45f657ead32a3732112c54a761a8a9c16d
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf