Analysis
-
max time kernel
128s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2023 23:05
Static task
static1
Behavioral task
behavioral1
Sample
0e95079a5aaa90c4c2cf69274ef3447317b3c303a574eee4d72251d394a6de4f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0e95079a5aaa90c4c2cf69274ef3447317b3c303a574eee4d72251d394a6de4f.exe
Resource
win10v2004-20230221-en
General
-
Target
0e95079a5aaa90c4c2cf69274ef3447317b3c303a574eee4d72251d394a6de4f.exe
-
Size
1.2MB
-
MD5
dc3ca255b2f5285f80edd4f675bfe4f0
-
SHA1
98f14e49c5b4fdc6a805bd551516e4f1c58eb6aa
-
SHA256
0e95079a5aaa90c4c2cf69274ef3447317b3c303a574eee4d72251d394a6de4f
-
SHA512
a550887fa1d4d884e0885fa12da1602f58595cd220033d6a7425c115d57561cdd57d6ca2f764e4d37f6df92bcc17539250f218bb4e1ec9ad0e150bbc5599041f
-
SSDEEP
24576:hy5ZS52i5RwpizJPS4PapKDlO/HFgfyJJ4Qs6hlXs4a8V17Aer7jnc:UnSH5OmJPS+akAf6fynL84n17A
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
z56259721.exez46272767.exez68293174.exes34275457.exe1.exet43743514.exepid process 1176 z56259721.exe 1208 z46272767.exe 580 z68293174.exe 848 s34275457.exe 1552 1.exe 1192 t43743514.exe -
Loads dropped DLL 13 IoCs
Processes:
0e95079a5aaa90c4c2cf69274ef3447317b3c303a574eee4d72251d394a6de4f.exez56259721.exez46272767.exez68293174.exes34275457.exe1.exet43743514.exepid process 2028 0e95079a5aaa90c4c2cf69274ef3447317b3c303a574eee4d72251d394a6de4f.exe 1176 z56259721.exe 1176 z56259721.exe 1208 z46272767.exe 1208 z46272767.exe 580 z68293174.exe 580 z68293174.exe 580 z68293174.exe 848 s34275457.exe 848 s34275457.exe 1552 1.exe 580 z68293174.exe 1192 t43743514.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
0e95079a5aaa90c4c2cf69274ef3447317b3c303a574eee4d72251d394a6de4f.exez56259721.exez46272767.exez68293174.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0e95079a5aaa90c4c2cf69274ef3447317b3c303a574eee4d72251d394a6de4f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0e95079a5aaa90c4c2cf69274ef3447317b3c303a574eee4d72251d394a6de4f.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z56259721.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z56259721.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z46272767.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z46272767.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z68293174.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z68293174.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s34275457.exedescription pid process Token: SeDebugPrivilege 848 s34275457.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
0e95079a5aaa90c4c2cf69274ef3447317b3c303a574eee4d72251d394a6de4f.exez56259721.exez46272767.exez68293174.exes34275457.exedescription pid process target process PID 2028 wrote to memory of 1176 2028 0e95079a5aaa90c4c2cf69274ef3447317b3c303a574eee4d72251d394a6de4f.exe z56259721.exe PID 2028 wrote to memory of 1176 2028 0e95079a5aaa90c4c2cf69274ef3447317b3c303a574eee4d72251d394a6de4f.exe z56259721.exe PID 2028 wrote to memory of 1176 2028 0e95079a5aaa90c4c2cf69274ef3447317b3c303a574eee4d72251d394a6de4f.exe z56259721.exe PID 2028 wrote to memory of 1176 2028 0e95079a5aaa90c4c2cf69274ef3447317b3c303a574eee4d72251d394a6de4f.exe z56259721.exe PID 2028 wrote to memory of 1176 2028 0e95079a5aaa90c4c2cf69274ef3447317b3c303a574eee4d72251d394a6de4f.exe z56259721.exe PID 2028 wrote to memory of 1176 2028 0e95079a5aaa90c4c2cf69274ef3447317b3c303a574eee4d72251d394a6de4f.exe z56259721.exe PID 2028 wrote to memory of 1176 2028 0e95079a5aaa90c4c2cf69274ef3447317b3c303a574eee4d72251d394a6de4f.exe z56259721.exe PID 1176 wrote to memory of 1208 1176 z56259721.exe z46272767.exe PID 1176 wrote to memory of 1208 1176 z56259721.exe z46272767.exe PID 1176 wrote to memory of 1208 1176 z56259721.exe z46272767.exe PID 1176 wrote to memory of 1208 1176 z56259721.exe z46272767.exe PID 1176 wrote to memory of 1208 1176 z56259721.exe z46272767.exe PID 1176 wrote to memory of 1208 1176 z56259721.exe z46272767.exe PID 1176 wrote to memory of 1208 1176 z56259721.exe z46272767.exe PID 1208 wrote to memory of 580 1208 z46272767.exe z68293174.exe PID 1208 wrote to memory of 580 1208 z46272767.exe z68293174.exe PID 1208 wrote to memory of 580 1208 z46272767.exe z68293174.exe PID 1208 wrote to memory of 580 1208 z46272767.exe z68293174.exe PID 1208 wrote to memory of 580 1208 z46272767.exe z68293174.exe PID 1208 wrote to memory of 580 1208 z46272767.exe z68293174.exe PID 1208 wrote to memory of 580 1208 z46272767.exe z68293174.exe PID 580 wrote to memory of 848 580 z68293174.exe s34275457.exe PID 580 wrote to memory of 848 580 z68293174.exe s34275457.exe PID 580 wrote to memory of 848 580 z68293174.exe s34275457.exe PID 580 wrote to memory of 848 580 z68293174.exe s34275457.exe PID 580 wrote to memory of 848 580 z68293174.exe s34275457.exe PID 580 wrote to memory of 848 580 z68293174.exe s34275457.exe PID 580 wrote to memory of 848 580 z68293174.exe s34275457.exe PID 848 wrote to memory of 1552 848 s34275457.exe 1.exe PID 848 wrote to memory of 1552 848 s34275457.exe 1.exe PID 848 wrote to memory of 1552 848 s34275457.exe 1.exe PID 848 wrote to memory of 1552 848 s34275457.exe 1.exe PID 848 wrote to memory of 1552 848 s34275457.exe 1.exe PID 848 wrote to memory of 1552 848 s34275457.exe 1.exe PID 848 wrote to memory of 1552 848 s34275457.exe 1.exe PID 580 wrote to memory of 1192 580 z68293174.exe t43743514.exe PID 580 wrote to memory of 1192 580 z68293174.exe t43743514.exe PID 580 wrote to memory of 1192 580 z68293174.exe t43743514.exe PID 580 wrote to memory of 1192 580 z68293174.exe t43743514.exe PID 580 wrote to memory of 1192 580 z68293174.exe t43743514.exe PID 580 wrote to memory of 1192 580 z68293174.exe t43743514.exe PID 580 wrote to memory of 1192 580 z68293174.exe t43743514.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e95079a5aaa90c4c2cf69274ef3447317b3c303a574eee4d72251d394a6de4f.exe"C:\Users\Admin\AppData\Local\Temp\0e95079a5aaa90c4c2cf69274ef3447317b3c303a574eee4d72251d394a6de4f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z56259721.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z56259721.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z46272767.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z46272767.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1208
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z68293174.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z68293174.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s34275457.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s34275457.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1552
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t43743514.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t43743514.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1192
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5b8b26a091f69ca2290a6461fcb9d62bb
SHA17bcc322f176c510f3727c90dbec03eb8ffe678c1
SHA256edb6914e15fd23b8da7e8f285c6da340b2f50e3790aa998db60c7db7ef72962b
SHA51207922e270701557fafea5133de24f48bd97682a654c91932bf17bc418ff030adbddfdd39c1e601dd99927f433d73ab951aac21c9cea5e9381b0c0ad236b5f8db
-
Filesize
1.0MB
MD5b8b26a091f69ca2290a6461fcb9d62bb
SHA17bcc322f176c510f3727c90dbec03eb8ffe678c1
SHA256edb6914e15fd23b8da7e8f285c6da340b2f50e3790aa998db60c7db7ef72962b
SHA51207922e270701557fafea5133de24f48bd97682a654c91932bf17bc418ff030adbddfdd39c1e601dd99927f433d73ab951aac21c9cea5e9381b0c0ad236b5f8db
-
Filesize
759KB
MD5ead8209ead21c1daf21824d103601b40
SHA148464acb634a3ab6a2bdccc9ac422039efd97ca7
SHA256e97bfa0c3a1a292f4532a1e71fb08860ce47ac65955ca6bb3637f490ed770a71
SHA5129d689501bb0e6ba0a96833a839ee4ef4c9a615767f1ceb551e5bc6a895e1d7913f79ea8bca7be37ac5baa92cfc81da6db77b13f9f0eb56250f84f37316556553
-
Filesize
759KB
MD5ead8209ead21c1daf21824d103601b40
SHA148464acb634a3ab6a2bdccc9ac422039efd97ca7
SHA256e97bfa0c3a1a292f4532a1e71fb08860ce47ac65955ca6bb3637f490ed770a71
SHA5129d689501bb0e6ba0a96833a839ee4ef4c9a615767f1ceb551e5bc6a895e1d7913f79ea8bca7be37ac5baa92cfc81da6db77b13f9f0eb56250f84f37316556553
-
Filesize
577KB
MD50fa3041379425cee979d461e1283d0bd
SHA1d4a70ae1d83d63b5de35a68855505ce65d791301
SHA2566b9e27edd282cd81b1277289b4be69d74d41e4fa28c9a122bf37214ee51d0b84
SHA512b304ae8b54b6e824d94ac73fe8914339e0d01e0b226cc7a490f2e005eb7ee29e3d85326c36eba5476fdc21264f9a320c6a9591a614e76ceedcdf0e858197674a
-
Filesize
577KB
MD50fa3041379425cee979d461e1283d0bd
SHA1d4a70ae1d83d63b5de35a68855505ce65d791301
SHA2566b9e27edd282cd81b1277289b4be69d74d41e4fa28c9a122bf37214ee51d0b84
SHA512b304ae8b54b6e824d94ac73fe8914339e0d01e0b226cc7a490f2e005eb7ee29e3d85326c36eba5476fdc21264f9a320c6a9591a614e76ceedcdf0e858197674a
-
Filesize
574KB
MD5815c32068487e1107e9f0d9f51422cd3
SHA1f4261f7f4934ca643adb0429a2f6b349204b9454
SHA2565bac0e01014f33711c2eac3483c19c3014c4b1fbf844ad22363728dfa0df9d9a
SHA512d4aac34c236879b0560341e8c38dee7e65a25b5a484c85b73bb14258203eefe5be530d20b5a7e0055789d75842c04a0a4e0a97a591dc4bd403d8ab3c88aab305
-
Filesize
574KB
MD5815c32068487e1107e9f0d9f51422cd3
SHA1f4261f7f4934ca643adb0429a2f6b349204b9454
SHA2565bac0e01014f33711c2eac3483c19c3014c4b1fbf844ad22363728dfa0df9d9a
SHA512d4aac34c236879b0560341e8c38dee7e65a25b5a484c85b73bb14258203eefe5be530d20b5a7e0055789d75842c04a0a4e0a97a591dc4bd403d8ab3c88aab305
-
Filesize
574KB
MD5815c32068487e1107e9f0d9f51422cd3
SHA1f4261f7f4934ca643adb0429a2f6b349204b9454
SHA2565bac0e01014f33711c2eac3483c19c3014c4b1fbf844ad22363728dfa0df9d9a
SHA512d4aac34c236879b0560341e8c38dee7e65a25b5a484c85b73bb14258203eefe5be530d20b5a7e0055789d75842c04a0a4e0a97a591dc4bd403d8ab3c88aab305
-
Filesize
169KB
MD547e5d0a5517c5b6f1104f4d5d20fa664
SHA1091a873cacedf0b0f39e2d751f78bcd1d08ecd5c
SHA256a08f38e9e3638749ecb32833a16e7ea26f102ba98189b5baf17f3d480ed71fcb
SHA512620af7f7c24a9b5faa313087c638be794ea0ca6a96aecf7c106d967188067a9c050900887e997d438328ceb30db852e3019b7e7f197c8ac19e18e49da9feb192
-
Filesize
169KB
MD547e5d0a5517c5b6f1104f4d5d20fa664
SHA1091a873cacedf0b0f39e2d751f78bcd1d08ecd5c
SHA256a08f38e9e3638749ecb32833a16e7ea26f102ba98189b5baf17f3d480ed71fcb
SHA512620af7f7c24a9b5faa313087c638be794ea0ca6a96aecf7c106d967188067a9c050900887e997d438328ceb30db852e3019b7e7f197c8ac19e18e49da9feb192
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
1.0MB
MD5b8b26a091f69ca2290a6461fcb9d62bb
SHA17bcc322f176c510f3727c90dbec03eb8ffe678c1
SHA256edb6914e15fd23b8da7e8f285c6da340b2f50e3790aa998db60c7db7ef72962b
SHA51207922e270701557fafea5133de24f48bd97682a654c91932bf17bc418ff030adbddfdd39c1e601dd99927f433d73ab951aac21c9cea5e9381b0c0ad236b5f8db
-
Filesize
1.0MB
MD5b8b26a091f69ca2290a6461fcb9d62bb
SHA17bcc322f176c510f3727c90dbec03eb8ffe678c1
SHA256edb6914e15fd23b8da7e8f285c6da340b2f50e3790aa998db60c7db7ef72962b
SHA51207922e270701557fafea5133de24f48bd97682a654c91932bf17bc418ff030adbddfdd39c1e601dd99927f433d73ab951aac21c9cea5e9381b0c0ad236b5f8db
-
Filesize
759KB
MD5ead8209ead21c1daf21824d103601b40
SHA148464acb634a3ab6a2bdccc9ac422039efd97ca7
SHA256e97bfa0c3a1a292f4532a1e71fb08860ce47ac65955ca6bb3637f490ed770a71
SHA5129d689501bb0e6ba0a96833a839ee4ef4c9a615767f1ceb551e5bc6a895e1d7913f79ea8bca7be37ac5baa92cfc81da6db77b13f9f0eb56250f84f37316556553
-
Filesize
759KB
MD5ead8209ead21c1daf21824d103601b40
SHA148464acb634a3ab6a2bdccc9ac422039efd97ca7
SHA256e97bfa0c3a1a292f4532a1e71fb08860ce47ac65955ca6bb3637f490ed770a71
SHA5129d689501bb0e6ba0a96833a839ee4ef4c9a615767f1ceb551e5bc6a895e1d7913f79ea8bca7be37ac5baa92cfc81da6db77b13f9f0eb56250f84f37316556553
-
Filesize
577KB
MD50fa3041379425cee979d461e1283d0bd
SHA1d4a70ae1d83d63b5de35a68855505ce65d791301
SHA2566b9e27edd282cd81b1277289b4be69d74d41e4fa28c9a122bf37214ee51d0b84
SHA512b304ae8b54b6e824d94ac73fe8914339e0d01e0b226cc7a490f2e005eb7ee29e3d85326c36eba5476fdc21264f9a320c6a9591a614e76ceedcdf0e858197674a
-
Filesize
577KB
MD50fa3041379425cee979d461e1283d0bd
SHA1d4a70ae1d83d63b5de35a68855505ce65d791301
SHA2566b9e27edd282cd81b1277289b4be69d74d41e4fa28c9a122bf37214ee51d0b84
SHA512b304ae8b54b6e824d94ac73fe8914339e0d01e0b226cc7a490f2e005eb7ee29e3d85326c36eba5476fdc21264f9a320c6a9591a614e76ceedcdf0e858197674a
-
Filesize
574KB
MD5815c32068487e1107e9f0d9f51422cd3
SHA1f4261f7f4934ca643adb0429a2f6b349204b9454
SHA2565bac0e01014f33711c2eac3483c19c3014c4b1fbf844ad22363728dfa0df9d9a
SHA512d4aac34c236879b0560341e8c38dee7e65a25b5a484c85b73bb14258203eefe5be530d20b5a7e0055789d75842c04a0a4e0a97a591dc4bd403d8ab3c88aab305
-
Filesize
574KB
MD5815c32068487e1107e9f0d9f51422cd3
SHA1f4261f7f4934ca643adb0429a2f6b349204b9454
SHA2565bac0e01014f33711c2eac3483c19c3014c4b1fbf844ad22363728dfa0df9d9a
SHA512d4aac34c236879b0560341e8c38dee7e65a25b5a484c85b73bb14258203eefe5be530d20b5a7e0055789d75842c04a0a4e0a97a591dc4bd403d8ab3c88aab305
-
Filesize
574KB
MD5815c32068487e1107e9f0d9f51422cd3
SHA1f4261f7f4934ca643adb0429a2f6b349204b9454
SHA2565bac0e01014f33711c2eac3483c19c3014c4b1fbf844ad22363728dfa0df9d9a
SHA512d4aac34c236879b0560341e8c38dee7e65a25b5a484c85b73bb14258203eefe5be530d20b5a7e0055789d75842c04a0a4e0a97a591dc4bd403d8ab3c88aab305
-
Filesize
169KB
MD547e5d0a5517c5b6f1104f4d5d20fa664
SHA1091a873cacedf0b0f39e2d751f78bcd1d08ecd5c
SHA256a08f38e9e3638749ecb32833a16e7ea26f102ba98189b5baf17f3d480ed71fcb
SHA512620af7f7c24a9b5faa313087c638be794ea0ca6a96aecf7c106d967188067a9c050900887e997d438328ceb30db852e3019b7e7f197c8ac19e18e49da9feb192
-
Filesize
169KB
MD547e5d0a5517c5b6f1104f4d5d20fa664
SHA1091a873cacedf0b0f39e2d751f78bcd1d08ecd5c
SHA256a08f38e9e3638749ecb32833a16e7ea26f102ba98189b5baf17f3d480ed71fcb
SHA512620af7f7c24a9b5faa313087c638be794ea0ca6a96aecf7c106d967188067a9c050900887e997d438328ceb30db852e3019b7e7f197c8ac19e18e49da9feb192
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf