Analysis
-
max time kernel
226s -
max time network
322s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2023 21:42
Static task
static1
Behavioral task
behavioral1
Sample
486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe
Resource
win10v2004-20230220-en
General
-
Target
486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe
-
Size
1.2MB
-
MD5
c71ad9455a40262ca2c86afaead5bb08
-
SHA1
96ce52a4e69a71621b53db6214a7c7f7b9cad5ee
-
SHA256
486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429
-
SHA512
d8af58f68252dd01233bdbfabe8d1a799e585e59e45ae9f25bbf7ff1670238be714bf736e80b3da557b8dffd8cfb5cfeda04c54daa266380e7665061e171f7cc
-
SSDEEP
24576:qye9rGoxD+8YdIjsXtAyXstcz9uDtpdY3ghHg5A6q4IUtFjjAG:xIY8YdIknecz9uxT7A5tqdUTA
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
z32113204.exez35111002.exez64789443.exes57594641.exe1.exet87479749.exepid process 1476 z32113204.exe 1752 z35111002.exe 1040 z64789443.exe 1352 s57594641.exe 1140 1.exe 1116 t87479749.exe -
Loads dropped DLL 13 IoCs
Processes:
486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exez32113204.exez35111002.exez64789443.exes57594641.exe1.exet87479749.exepid process 856 486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe 1476 z32113204.exe 1476 z32113204.exe 1752 z35111002.exe 1752 z35111002.exe 1040 z64789443.exe 1040 z64789443.exe 1040 z64789443.exe 1352 s57594641.exe 1352 s57594641.exe 1140 1.exe 1040 z64789443.exe 1116 t87479749.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z35111002.exez64789443.exe486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exez32113204.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z35111002.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z64789443.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z64789443.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z32113204.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z32113204.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z35111002.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s57594641.exedescription pid process Token: SeDebugPrivilege 1352 s57594641.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exez32113204.exez35111002.exez64789443.exes57594641.exedescription pid process target process PID 856 wrote to memory of 1476 856 486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe z32113204.exe PID 856 wrote to memory of 1476 856 486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe z32113204.exe PID 856 wrote to memory of 1476 856 486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe z32113204.exe PID 856 wrote to memory of 1476 856 486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe z32113204.exe PID 856 wrote to memory of 1476 856 486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe z32113204.exe PID 856 wrote to memory of 1476 856 486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe z32113204.exe PID 856 wrote to memory of 1476 856 486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe z32113204.exe PID 1476 wrote to memory of 1752 1476 z32113204.exe z35111002.exe PID 1476 wrote to memory of 1752 1476 z32113204.exe z35111002.exe PID 1476 wrote to memory of 1752 1476 z32113204.exe z35111002.exe PID 1476 wrote to memory of 1752 1476 z32113204.exe z35111002.exe PID 1476 wrote to memory of 1752 1476 z32113204.exe z35111002.exe PID 1476 wrote to memory of 1752 1476 z32113204.exe z35111002.exe PID 1476 wrote to memory of 1752 1476 z32113204.exe z35111002.exe PID 1752 wrote to memory of 1040 1752 z35111002.exe z64789443.exe PID 1752 wrote to memory of 1040 1752 z35111002.exe z64789443.exe PID 1752 wrote to memory of 1040 1752 z35111002.exe z64789443.exe PID 1752 wrote to memory of 1040 1752 z35111002.exe z64789443.exe PID 1752 wrote to memory of 1040 1752 z35111002.exe z64789443.exe PID 1752 wrote to memory of 1040 1752 z35111002.exe z64789443.exe PID 1752 wrote to memory of 1040 1752 z35111002.exe z64789443.exe PID 1040 wrote to memory of 1352 1040 z64789443.exe s57594641.exe PID 1040 wrote to memory of 1352 1040 z64789443.exe s57594641.exe PID 1040 wrote to memory of 1352 1040 z64789443.exe s57594641.exe PID 1040 wrote to memory of 1352 1040 z64789443.exe s57594641.exe PID 1040 wrote to memory of 1352 1040 z64789443.exe s57594641.exe PID 1040 wrote to memory of 1352 1040 z64789443.exe s57594641.exe PID 1040 wrote to memory of 1352 1040 z64789443.exe s57594641.exe PID 1352 wrote to memory of 1140 1352 s57594641.exe 1.exe PID 1352 wrote to memory of 1140 1352 s57594641.exe 1.exe PID 1352 wrote to memory of 1140 1352 s57594641.exe 1.exe PID 1352 wrote to memory of 1140 1352 s57594641.exe 1.exe PID 1352 wrote to memory of 1140 1352 s57594641.exe 1.exe PID 1352 wrote to memory of 1140 1352 s57594641.exe 1.exe PID 1352 wrote to memory of 1140 1352 s57594641.exe 1.exe PID 1040 wrote to memory of 1116 1040 z64789443.exe t87479749.exe PID 1040 wrote to memory of 1116 1040 z64789443.exe t87479749.exe PID 1040 wrote to memory of 1116 1040 z64789443.exe t87479749.exe PID 1040 wrote to memory of 1116 1040 z64789443.exe t87479749.exe PID 1040 wrote to memory of 1116 1040 z64789443.exe t87479749.exe PID 1040 wrote to memory of 1116 1040 z64789443.exe t87479749.exe PID 1040 wrote to memory of 1116 1040 z64789443.exe t87479749.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe"C:\Users\Admin\AppData\Local\Temp\486392593c5d1a269f5408c180f4ee9b5e54e1810ef993d3681766632b0a8429.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z32113204.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z32113204.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z35111002.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z35111002.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z64789443.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z64789443.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s57594641.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s57594641.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1140
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t87479749.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t87479749.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1116
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD56bfb7ee3c2a436e31e52a538d6497a06
SHA1c8ac0f9839464ca0130b0e10fe33b4dd0cf5783d
SHA256077fb401be9cd7bd82256c57c5f5f7bd4a03d056a1a2c3fcda57118dd126ea06
SHA5126934b8d625ff50a7a018306513e0f0e0b1bb1f26ebe45eab4a9051f4949b2232c9914cea05f18a5490494b2b5194bf10f101d3d834cc43653e7925bdbe9921dd
-
Filesize
1.0MB
MD56bfb7ee3c2a436e31e52a538d6497a06
SHA1c8ac0f9839464ca0130b0e10fe33b4dd0cf5783d
SHA256077fb401be9cd7bd82256c57c5f5f7bd4a03d056a1a2c3fcda57118dd126ea06
SHA5126934b8d625ff50a7a018306513e0f0e0b1bb1f26ebe45eab4a9051f4949b2232c9914cea05f18a5490494b2b5194bf10f101d3d834cc43653e7925bdbe9921dd
-
Filesize
760KB
MD59a23938da86f8d884e27b0b22c0031d9
SHA1c7f496b472285d44bbae72e01a57c5545cdcc64b
SHA256eb5ffc5cc7334b6ed26e446086b5e462bc32ca6dbb8478e9f9ad5d26516c007c
SHA512a1d49edc8bb12465d3010ee13b12cfd8efd08277fce8ac7a22ecfef41c6b9f998e45806432032cec4815a065f125905d4206b896d128a44b1b9847eede1b02ce
-
Filesize
760KB
MD59a23938da86f8d884e27b0b22c0031d9
SHA1c7f496b472285d44bbae72e01a57c5545cdcc64b
SHA256eb5ffc5cc7334b6ed26e446086b5e462bc32ca6dbb8478e9f9ad5d26516c007c
SHA512a1d49edc8bb12465d3010ee13b12cfd8efd08277fce8ac7a22ecfef41c6b9f998e45806432032cec4815a065f125905d4206b896d128a44b1b9847eede1b02ce
-
Filesize
578KB
MD527e17304e5007ad914ccd99bc3aef2df
SHA1136794da62a3b9e0526d434068003ab0f2d1fd2f
SHA256921f883609928774e395207ec56f52cbabc04b919f4f42b3e41ddf5d1a71d402
SHA51205df449c6e16fc4698000d92cedfb762125daf5e254bb1a28ce2adb53d3ff2b45c73b202c9f4f699b261930b422bd996e5231936eb1289d9c6ac4cadcd9b1d3b
-
Filesize
578KB
MD527e17304e5007ad914ccd99bc3aef2df
SHA1136794da62a3b9e0526d434068003ab0f2d1fd2f
SHA256921f883609928774e395207ec56f52cbabc04b919f4f42b3e41ddf5d1a71d402
SHA51205df449c6e16fc4698000d92cedfb762125daf5e254bb1a28ce2adb53d3ff2b45c73b202c9f4f699b261930b422bd996e5231936eb1289d9c6ac4cadcd9b1d3b
-
Filesize
580KB
MD519174e3370a22a2bb53b3b397586a020
SHA1336d09fb76bb98d7591888f0781ace269e40c320
SHA2560f7d97ae3875016f5843a28b7a43de5ed87de7d7b743927360a9796fd98f6a4d
SHA512b4393aecdef8266b6cb79180bd1b433fbeda16f24b928174156fca3ac0b49dcc3f3d425911e7a847e103435420c1dafdf6e7f5e52bf309aeda4653f8646c5853
-
Filesize
580KB
MD519174e3370a22a2bb53b3b397586a020
SHA1336d09fb76bb98d7591888f0781ace269e40c320
SHA2560f7d97ae3875016f5843a28b7a43de5ed87de7d7b743927360a9796fd98f6a4d
SHA512b4393aecdef8266b6cb79180bd1b433fbeda16f24b928174156fca3ac0b49dcc3f3d425911e7a847e103435420c1dafdf6e7f5e52bf309aeda4653f8646c5853
-
Filesize
580KB
MD519174e3370a22a2bb53b3b397586a020
SHA1336d09fb76bb98d7591888f0781ace269e40c320
SHA2560f7d97ae3875016f5843a28b7a43de5ed87de7d7b743927360a9796fd98f6a4d
SHA512b4393aecdef8266b6cb79180bd1b433fbeda16f24b928174156fca3ac0b49dcc3f3d425911e7a847e103435420c1dafdf6e7f5e52bf309aeda4653f8646c5853
-
Filesize
169KB
MD5bd3447593725a759f2998e97c8b4aad1
SHA1877b3b4f37ae98b2e9ae1674d5d99d47472ebacd
SHA2569229f04238b65f3daf53f8d723deb65f333b49e286ad86d8afffb81e916f274b
SHA51265c7460094611d33d79f08bbe52481cc016e4dc3bfac2682fd9cb6e49999120dde1ac03a0aa5f5ab1a51c44deaab9fbf7970c9955c5ae4ab939524015961d0e3
-
Filesize
169KB
MD5bd3447593725a759f2998e97c8b4aad1
SHA1877b3b4f37ae98b2e9ae1674d5d99d47472ebacd
SHA2569229f04238b65f3daf53f8d723deb65f333b49e286ad86d8afffb81e916f274b
SHA51265c7460094611d33d79f08bbe52481cc016e4dc3bfac2682fd9cb6e49999120dde1ac03a0aa5f5ab1a51c44deaab9fbf7970c9955c5ae4ab939524015961d0e3
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
1.0MB
MD56bfb7ee3c2a436e31e52a538d6497a06
SHA1c8ac0f9839464ca0130b0e10fe33b4dd0cf5783d
SHA256077fb401be9cd7bd82256c57c5f5f7bd4a03d056a1a2c3fcda57118dd126ea06
SHA5126934b8d625ff50a7a018306513e0f0e0b1bb1f26ebe45eab4a9051f4949b2232c9914cea05f18a5490494b2b5194bf10f101d3d834cc43653e7925bdbe9921dd
-
Filesize
1.0MB
MD56bfb7ee3c2a436e31e52a538d6497a06
SHA1c8ac0f9839464ca0130b0e10fe33b4dd0cf5783d
SHA256077fb401be9cd7bd82256c57c5f5f7bd4a03d056a1a2c3fcda57118dd126ea06
SHA5126934b8d625ff50a7a018306513e0f0e0b1bb1f26ebe45eab4a9051f4949b2232c9914cea05f18a5490494b2b5194bf10f101d3d834cc43653e7925bdbe9921dd
-
Filesize
760KB
MD59a23938da86f8d884e27b0b22c0031d9
SHA1c7f496b472285d44bbae72e01a57c5545cdcc64b
SHA256eb5ffc5cc7334b6ed26e446086b5e462bc32ca6dbb8478e9f9ad5d26516c007c
SHA512a1d49edc8bb12465d3010ee13b12cfd8efd08277fce8ac7a22ecfef41c6b9f998e45806432032cec4815a065f125905d4206b896d128a44b1b9847eede1b02ce
-
Filesize
760KB
MD59a23938da86f8d884e27b0b22c0031d9
SHA1c7f496b472285d44bbae72e01a57c5545cdcc64b
SHA256eb5ffc5cc7334b6ed26e446086b5e462bc32ca6dbb8478e9f9ad5d26516c007c
SHA512a1d49edc8bb12465d3010ee13b12cfd8efd08277fce8ac7a22ecfef41c6b9f998e45806432032cec4815a065f125905d4206b896d128a44b1b9847eede1b02ce
-
Filesize
578KB
MD527e17304e5007ad914ccd99bc3aef2df
SHA1136794da62a3b9e0526d434068003ab0f2d1fd2f
SHA256921f883609928774e395207ec56f52cbabc04b919f4f42b3e41ddf5d1a71d402
SHA51205df449c6e16fc4698000d92cedfb762125daf5e254bb1a28ce2adb53d3ff2b45c73b202c9f4f699b261930b422bd996e5231936eb1289d9c6ac4cadcd9b1d3b
-
Filesize
578KB
MD527e17304e5007ad914ccd99bc3aef2df
SHA1136794da62a3b9e0526d434068003ab0f2d1fd2f
SHA256921f883609928774e395207ec56f52cbabc04b919f4f42b3e41ddf5d1a71d402
SHA51205df449c6e16fc4698000d92cedfb762125daf5e254bb1a28ce2adb53d3ff2b45c73b202c9f4f699b261930b422bd996e5231936eb1289d9c6ac4cadcd9b1d3b
-
Filesize
580KB
MD519174e3370a22a2bb53b3b397586a020
SHA1336d09fb76bb98d7591888f0781ace269e40c320
SHA2560f7d97ae3875016f5843a28b7a43de5ed87de7d7b743927360a9796fd98f6a4d
SHA512b4393aecdef8266b6cb79180bd1b433fbeda16f24b928174156fca3ac0b49dcc3f3d425911e7a847e103435420c1dafdf6e7f5e52bf309aeda4653f8646c5853
-
Filesize
580KB
MD519174e3370a22a2bb53b3b397586a020
SHA1336d09fb76bb98d7591888f0781ace269e40c320
SHA2560f7d97ae3875016f5843a28b7a43de5ed87de7d7b743927360a9796fd98f6a4d
SHA512b4393aecdef8266b6cb79180bd1b433fbeda16f24b928174156fca3ac0b49dcc3f3d425911e7a847e103435420c1dafdf6e7f5e52bf309aeda4653f8646c5853
-
Filesize
580KB
MD519174e3370a22a2bb53b3b397586a020
SHA1336d09fb76bb98d7591888f0781ace269e40c320
SHA2560f7d97ae3875016f5843a28b7a43de5ed87de7d7b743927360a9796fd98f6a4d
SHA512b4393aecdef8266b6cb79180bd1b433fbeda16f24b928174156fca3ac0b49dcc3f3d425911e7a847e103435420c1dafdf6e7f5e52bf309aeda4653f8646c5853
-
Filesize
169KB
MD5bd3447593725a759f2998e97c8b4aad1
SHA1877b3b4f37ae98b2e9ae1674d5d99d47472ebacd
SHA2569229f04238b65f3daf53f8d723deb65f333b49e286ad86d8afffb81e916f274b
SHA51265c7460094611d33d79f08bbe52481cc016e4dc3bfac2682fd9cb6e49999120dde1ac03a0aa5f5ab1a51c44deaab9fbf7970c9955c5ae4ab939524015961d0e3
-
Filesize
169KB
MD5bd3447593725a759f2998e97c8b4aad1
SHA1877b3b4f37ae98b2e9ae1674d5d99d47472ebacd
SHA2569229f04238b65f3daf53f8d723deb65f333b49e286ad86d8afffb81e916f274b
SHA51265c7460094611d33d79f08bbe52481cc016e4dc3bfac2682fd9cb6e49999120dde1ac03a0aa5f5ab1a51c44deaab9fbf7970c9955c5ae4ab939524015961d0e3
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf