Analysis
-
max time kernel
147s -
max time network
164s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2023 22:32
Static task
static1
Behavioral task
behavioral1
Sample
00062cb01088cea245cd5f3eb03f65a0e6b11a8126ce00034d87935a451cf99c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
00062cb01088cea245cd5f3eb03f65a0e6b11a8126ce00034d87935a451cf99c.exe
Resource
win10v2004-20230220-en
General
-
Target
00062cb01088cea245cd5f3eb03f65a0e6b11a8126ce00034d87935a451cf99c.exe
-
Size
1.2MB
-
MD5
49a6593cfe2f013b61c4d7e055972458
-
SHA1
80c5e70b664c3174f2bace8f07b9ec7d982ee90c
-
SHA256
00062cb01088cea245cd5f3eb03f65a0e6b11a8126ce00034d87935a451cf99c
-
SHA512
9fceedf6647e0bf48951805e61b074c0f24e823f3386774c63b2cc3c38ad742356476bbd16b9a4b3909725512be9919cfe5ed7e131f30c2249001cc69367cbaf
-
SSDEEP
24576:qy//GIXenWw63tQUi0hKT8S/0TUFB4dJAT6Pr8yCiF4Y59sX9:x//GIXeWwQQUi08hMIFBVQYWh59sX
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
z39521806.exez55683695.exez72400309.exes99437407.exe1.exet88094007.exepid process 2040 z39521806.exe 520 z55683695.exe 1492 z72400309.exe 1804 s99437407.exe 1356 1.exe 1808 t88094007.exe -
Loads dropped DLL 13 IoCs
Processes:
00062cb01088cea245cd5f3eb03f65a0e6b11a8126ce00034d87935a451cf99c.exez39521806.exez55683695.exez72400309.exes99437407.exe1.exet88094007.exepid process 628 00062cb01088cea245cd5f3eb03f65a0e6b11a8126ce00034d87935a451cf99c.exe 2040 z39521806.exe 2040 z39521806.exe 520 z55683695.exe 520 z55683695.exe 1492 z72400309.exe 1492 z72400309.exe 1492 z72400309.exe 1804 s99437407.exe 1804 s99437407.exe 1356 1.exe 1492 z72400309.exe 1808 t88094007.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z55683695.exez72400309.exe00062cb01088cea245cd5f3eb03f65a0e6b11a8126ce00034d87935a451cf99c.exez39521806.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z55683695.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z55683695.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z72400309.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z72400309.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 00062cb01088cea245cd5f3eb03f65a0e6b11a8126ce00034d87935a451cf99c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 00062cb01088cea245cd5f3eb03f65a0e6b11a8126ce00034d87935a451cf99c.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z39521806.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z39521806.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s99437407.exedescription pid process Token: SeDebugPrivilege 1804 s99437407.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
00062cb01088cea245cd5f3eb03f65a0e6b11a8126ce00034d87935a451cf99c.exez39521806.exez55683695.exez72400309.exes99437407.exedescription pid process target process PID 628 wrote to memory of 2040 628 00062cb01088cea245cd5f3eb03f65a0e6b11a8126ce00034d87935a451cf99c.exe z39521806.exe PID 628 wrote to memory of 2040 628 00062cb01088cea245cd5f3eb03f65a0e6b11a8126ce00034d87935a451cf99c.exe z39521806.exe PID 628 wrote to memory of 2040 628 00062cb01088cea245cd5f3eb03f65a0e6b11a8126ce00034d87935a451cf99c.exe z39521806.exe PID 628 wrote to memory of 2040 628 00062cb01088cea245cd5f3eb03f65a0e6b11a8126ce00034d87935a451cf99c.exe z39521806.exe PID 628 wrote to memory of 2040 628 00062cb01088cea245cd5f3eb03f65a0e6b11a8126ce00034d87935a451cf99c.exe z39521806.exe PID 628 wrote to memory of 2040 628 00062cb01088cea245cd5f3eb03f65a0e6b11a8126ce00034d87935a451cf99c.exe z39521806.exe PID 628 wrote to memory of 2040 628 00062cb01088cea245cd5f3eb03f65a0e6b11a8126ce00034d87935a451cf99c.exe z39521806.exe PID 2040 wrote to memory of 520 2040 z39521806.exe z55683695.exe PID 2040 wrote to memory of 520 2040 z39521806.exe z55683695.exe PID 2040 wrote to memory of 520 2040 z39521806.exe z55683695.exe PID 2040 wrote to memory of 520 2040 z39521806.exe z55683695.exe PID 2040 wrote to memory of 520 2040 z39521806.exe z55683695.exe PID 2040 wrote to memory of 520 2040 z39521806.exe z55683695.exe PID 2040 wrote to memory of 520 2040 z39521806.exe z55683695.exe PID 520 wrote to memory of 1492 520 z55683695.exe z72400309.exe PID 520 wrote to memory of 1492 520 z55683695.exe z72400309.exe PID 520 wrote to memory of 1492 520 z55683695.exe z72400309.exe PID 520 wrote to memory of 1492 520 z55683695.exe z72400309.exe PID 520 wrote to memory of 1492 520 z55683695.exe z72400309.exe PID 520 wrote to memory of 1492 520 z55683695.exe z72400309.exe PID 520 wrote to memory of 1492 520 z55683695.exe z72400309.exe PID 1492 wrote to memory of 1804 1492 z72400309.exe s99437407.exe PID 1492 wrote to memory of 1804 1492 z72400309.exe s99437407.exe PID 1492 wrote to memory of 1804 1492 z72400309.exe s99437407.exe PID 1492 wrote to memory of 1804 1492 z72400309.exe s99437407.exe PID 1492 wrote to memory of 1804 1492 z72400309.exe s99437407.exe PID 1492 wrote to memory of 1804 1492 z72400309.exe s99437407.exe PID 1492 wrote to memory of 1804 1492 z72400309.exe s99437407.exe PID 1804 wrote to memory of 1356 1804 s99437407.exe 1.exe PID 1804 wrote to memory of 1356 1804 s99437407.exe 1.exe PID 1804 wrote to memory of 1356 1804 s99437407.exe 1.exe PID 1804 wrote to memory of 1356 1804 s99437407.exe 1.exe PID 1804 wrote to memory of 1356 1804 s99437407.exe 1.exe PID 1804 wrote to memory of 1356 1804 s99437407.exe 1.exe PID 1804 wrote to memory of 1356 1804 s99437407.exe 1.exe PID 1492 wrote to memory of 1808 1492 z72400309.exe t88094007.exe PID 1492 wrote to memory of 1808 1492 z72400309.exe t88094007.exe PID 1492 wrote to memory of 1808 1492 z72400309.exe t88094007.exe PID 1492 wrote to memory of 1808 1492 z72400309.exe t88094007.exe PID 1492 wrote to memory of 1808 1492 z72400309.exe t88094007.exe PID 1492 wrote to memory of 1808 1492 z72400309.exe t88094007.exe PID 1492 wrote to memory of 1808 1492 z72400309.exe t88094007.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\00062cb01088cea245cd5f3eb03f65a0e6b11a8126ce00034d87935a451cf99c.exe"C:\Users\Admin\AppData\Local\Temp\00062cb01088cea245cd5f3eb03f65a0e6b11a8126ce00034d87935a451cf99c.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z39521806.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z39521806.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z55683695.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z55683695.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z72400309.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z72400309.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s99437407.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s99437407.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1356
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t88094007.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t88094007.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1808
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5b4841c081be7e630f1fee10f5a915b81
SHA1b2d48f2920233609091ba517dd946669bf03ffca
SHA256ef1db4bade71adb746f0b073644ed40aabe7e5ea7bb8225c0302ad248734f964
SHA512b6da024924dae7ddcb00e66a1dde4405834a3e6e6c720e31fd915a6dd0d3abfdd0355e09e4304e985190ad450c761d1f833958ab9e4dcfc9312d23e1f943f2bc
-
Filesize
1.0MB
MD5b4841c081be7e630f1fee10f5a915b81
SHA1b2d48f2920233609091ba517dd946669bf03ffca
SHA256ef1db4bade71adb746f0b073644ed40aabe7e5ea7bb8225c0302ad248734f964
SHA512b6da024924dae7ddcb00e66a1dde4405834a3e6e6c720e31fd915a6dd0d3abfdd0355e09e4304e985190ad450c761d1f833958ab9e4dcfc9312d23e1f943f2bc
-
Filesize
760KB
MD524a71d9f305c45d11388c3146ca3641b
SHA16174c7c5957e1749a65c3e90d0488aa13d561c71
SHA256af4fa3531996951312a75463104bc32a8807ee6be04ed1676df95e4fbbe933b7
SHA512a013823acc84dcda83de6ff093d03d371969d97987edd65114af96a6d0b1ab723564f3c463f65be527ff8427a2d5eea56b101ceb180c7d32ab4cbef2592667b4
-
Filesize
760KB
MD524a71d9f305c45d11388c3146ca3641b
SHA16174c7c5957e1749a65c3e90d0488aa13d561c71
SHA256af4fa3531996951312a75463104bc32a8807ee6be04ed1676df95e4fbbe933b7
SHA512a013823acc84dcda83de6ff093d03d371969d97987edd65114af96a6d0b1ab723564f3c463f65be527ff8427a2d5eea56b101ceb180c7d32ab4cbef2592667b4
-
Filesize
577KB
MD5b95670d4d454b5bf940f2fc894f64cc0
SHA12115d14dceb3da7efbd26b4d01c1ff08198abfd4
SHA256560dface634fe4540e762df4508ba84be32145ce5a07e923b71252c5f5ce81b4
SHA5125fb36f1a707a9f6543eeb7f45efc3044844fe2d5d808a316ceb2899e71aac17ea5d7f904ba06f9fcdf233b7283231881d2708e387d679afdff893c34690a6ab3
-
Filesize
577KB
MD5b95670d4d454b5bf940f2fc894f64cc0
SHA12115d14dceb3da7efbd26b4d01c1ff08198abfd4
SHA256560dface634fe4540e762df4508ba84be32145ce5a07e923b71252c5f5ce81b4
SHA5125fb36f1a707a9f6543eeb7f45efc3044844fe2d5d808a316ceb2899e71aac17ea5d7f904ba06f9fcdf233b7283231881d2708e387d679afdff893c34690a6ab3
-
Filesize
574KB
MD5a0800a820d04a3f6e1e9d1793545304c
SHA1ebd96cc1389c8daf45d6fc998aeb35bad8ca4e3b
SHA256b3afb1f8b257592e3b83eccd843e20b5b1bc3fa9397ae9838cd354e68cd90a6d
SHA51239153b8c0fb69ea49aa501f73aba5403e6e0668d5e9e6fce6b6069bd447580a8a9956028a4870e8d556353a47ccf7e50537b434a5b18563d6d80d210697b11bd
-
Filesize
574KB
MD5a0800a820d04a3f6e1e9d1793545304c
SHA1ebd96cc1389c8daf45d6fc998aeb35bad8ca4e3b
SHA256b3afb1f8b257592e3b83eccd843e20b5b1bc3fa9397ae9838cd354e68cd90a6d
SHA51239153b8c0fb69ea49aa501f73aba5403e6e0668d5e9e6fce6b6069bd447580a8a9956028a4870e8d556353a47ccf7e50537b434a5b18563d6d80d210697b11bd
-
Filesize
574KB
MD5a0800a820d04a3f6e1e9d1793545304c
SHA1ebd96cc1389c8daf45d6fc998aeb35bad8ca4e3b
SHA256b3afb1f8b257592e3b83eccd843e20b5b1bc3fa9397ae9838cd354e68cd90a6d
SHA51239153b8c0fb69ea49aa501f73aba5403e6e0668d5e9e6fce6b6069bd447580a8a9956028a4870e8d556353a47ccf7e50537b434a5b18563d6d80d210697b11bd
-
Filesize
169KB
MD5830ce1f343ea57b2cea81b63148e26ad
SHA164fd840ee672578181081160c078c597e8762607
SHA256b103b3d0c122f2c50aa6fd2d7b3f90d7776aa42e073481291c4f43384ba99ce8
SHA512d682a600f71dc29eba18b50f7c01fabce91d7d73afee085fb215a3e85c461f72b49acd0e48edb889536f7cef52d76f57709b6ae6e0108a81195f4bf8ae8680ed
-
Filesize
169KB
MD5830ce1f343ea57b2cea81b63148e26ad
SHA164fd840ee672578181081160c078c597e8762607
SHA256b103b3d0c122f2c50aa6fd2d7b3f90d7776aa42e073481291c4f43384ba99ce8
SHA512d682a600f71dc29eba18b50f7c01fabce91d7d73afee085fb215a3e85c461f72b49acd0e48edb889536f7cef52d76f57709b6ae6e0108a81195f4bf8ae8680ed
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
1.0MB
MD5b4841c081be7e630f1fee10f5a915b81
SHA1b2d48f2920233609091ba517dd946669bf03ffca
SHA256ef1db4bade71adb746f0b073644ed40aabe7e5ea7bb8225c0302ad248734f964
SHA512b6da024924dae7ddcb00e66a1dde4405834a3e6e6c720e31fd915a6dd0d3abfdd0355e09e4304e985190ad450c761d1f833958ab9e4dcfc9312d23e1f943f2bc
-
Filesize
1.0MB
MD5b4841c081be7e630f1fee10f5a915b81
SHA1b2d48f2920233609091ba517dd946669bf03ffca
SHA256ef1db4bade71adb746f0b073644ed40aabe7e5ea7bb8225c0302ad248734f964
SHA512b6da024924dae7ddcb00e66a1dde4405834a3e6e6c720e31fd915a6dd0d3abfdd0355e09e4304e985190ad450c761d1f833958ab9e4dcfc9312d23e1f943f2bc
-
Filesize
760KB
MD524a71d9f305c45d11388c3146ca3641b
SHA16174c7c5957e1749a65c3e90d0488aa13d561c71
SHA256af4fa3531996951312a75463104bc32a8807ee6be04ed1676df95e4fbbe933b7
SHA512a013823acc84dcda83de6ff093d03d371969d97987edd65114af96a6d0b1ab723564f3c463f65be527ff8427a2d5eea56b101ceb180c7d32ab4cbef2592667b4
-
Filesize
760KB
MD524a71d9f305c45d11388c3146ca3641b
SHA16174c7c5957e1749a65c3e90d0488aa13d561c71
SHA256af4fa3531996951312a75463104bc32a8807ee6be04ed1676df95e4fbbe933b7
SHA512a013823acc84dcda83de6ff093d03d371969d97987edd65114af96a6d0b1ab723564f3c463f65be527ff8427a2d5eea56b101ceb180c7d32ab4cbef2592667b4
-
Filesize
577KB
MD5b95670d4d454b5bf940f2fc894f64cc0
SHA12115d14dceb3da7efbd26b4d01c1ff08198abfd4
SHA256560dface634fe4540e762df4508ba84be32145ce5a07e923b71252c5f5ce81b4
SHA5125fb36f1a707a9f6543eeb7f45efc3044844fe2d5d808a316ceb2899e71aac17ea5d7f904ba06f9fcdf233b7283231881d2708e387d679afdff893c34690a6ab3
-
Filesize
577KB
MD5b95670d4d454b5bf940f2fc894f64cc0
SHA12115d14dceb3da7efbd26b4d01c1ff08198abfd4
SHA256560dface634fe4540e762df4508ba84be32145ce5a07e923b71252c5f5ce81b4
SHA5125fb36f1a707a9f6543eeb7f45efc3044844fe2d5d808a316ceb2899e71aac17ea5d7f904ba06f9fcdf233b7283231881d2708e387d679afdff893c34690a6ab3
-
Filesize
574KB
MD5a0800a820d04a3f6e1e9d1793545304c
SHA1ebd96cc1389c8daf45d6fc998aeb35bad8ca4e3b
SHA256b3afb1f8b257592e3b83eccd843e20b5b1bc3fa9397ae9838cd354e68cd90a6d
SHA51239153b8c0fb69ea49aa501f73aba5403e6e0668d5e9e6fce6b6069bd447580a8a9956028a4870e8d556353a47ccf7e50537b434a5b18563d6d80d210697b11bd
-
Filesize
574KB
MD5a0800a820d04a3f6e1e9d1793545304c
SHA1ebd96cc1389c8daf45d6fc998aeb35bad8ca4e3b
SHA256b3afb1f8b257592e3b83eccd843e20b5b1bc3fa9397ae9838cd354e68cd90a6d
SHA51239153b8c0fb69ea49aa501f73aba5403e6e0668d5e9e6fce6b6069bd447580a8a9956028a4870e8d556353a47ccf7e50537b434a5b18563d6d80d210697b11bd
-
Filesize
574KB
MD5a0800a820d04a3f6e1e9d1793545304c
SHA1ebd96cc1389c8daf45d6fc998aeb35bad8ca4e3b
SHA256b3afb1f8b257592e3b83eccd843e20b5b1bc3fa9397ae9838cd354e68cd90a6d
SHA51239153b8c0fb69ea49aa501f73aba5403e6e0668d5e9e6fce6b6069bd447580a8a9956028a4870e8d556353a47ccf7e50537b434a5b18563d6d80d210697b11bd
-
Filesize
169KB
MD5830ce1f343ea57b2cea81b63148e26ad
SHA164fd840ee672578181081160c078c597e8762607
SHA256b103b3d0c122f2c50aa6fd2d7b3f90d7776aa42e073481291c4f43384ba99ce8
SHA512d682a600f71dc29eba18b50f7c01fabce91d7d73afee085fb215a3e85c461f72b49acd0e48edb889536f7cef52d76f57709b6ae6e0108a81195f4bf8ae8680ed
-
Filesize
169KB
MD5830ce1f343ea57b2cea81b63148e26ad
SHA164fd840ee672578181081160c078c597e8762607
SHA256b103b3d0c122f2c50aa6fd2d7b3f90d7776aa42e073481291c4f43384ba99ce8
SHA512d682a600f71dc29eba18b50f7c01fabce91d7d73afee085fb215a3e85c461f72b49acd0e48edb889536f7cef52d76f57709b6ae6e0108a81195f4bf8ae8680ed
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf