Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2023 22:38
Static task
static1
Behavioral task
behavioral1
Sample
0420635ee8eadbc2f1adac320bbbf748c5504fb58a4d6cdf2bda95e2baac246b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0420635ee8eadbc2f1adac320bbbf748c5504fb58a4d6cdf2bda95e2baac246b.exe
Resource
win10v2004-20230220-en
General
-
Target
0420635ee8eadbc2f1adac320bbbf748c5504fb58a4d6cdf2bda95e2baac246b.exe
-
Size
1.2MB
-
MD5
a9ccf34425dd0d402210fe50736db661
-
SHA1
b9cbec41d75236a907e970b9b0da7e971f52806f
-
SHA256
0420635ee8eadbc2f1adac320bbbf748c5504fb58a4d6cdf2bda95e2baac246b
-
SHA512
008d284c7e71f6aebac2000fd5a032e9285072fabcead053558a7a36ff362434b0f0d5dc23dd8d41d335fd1bd588cc7ddd8267d95224c6ee645e71bdfa82cc1e
-
SSDEEP
24576:iykWBcJdymAkcFKbOHHFeGvKdjULCtdj3I8GN1NDnZAbOT41nP:JnBcJkmAkGHlOFI8djY8g/DOOT4F
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
life
185.161.248.73:4164
-
auth_value
8685d11953530b68ad5ec703809d9f91
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
z16387812.exez22676122.exez78139636.exes71400026.exe1.exet51284816.exepid process 1940 z16387812.exe 292 z22676122.exe 1148 z78139636.exe 1860 s71400026.exe 2036 1.exe 1692 t51284816.exe -
Loads dropped DLL 13 IoCs
Processes:
0420635ee8eadbc2f1adac320bbbf748c5504fb58a4d6cdf2bda95e2baac246b.exez16387812.exez22676122.exez78139636.exes71400026.exe1.exet51284816.exepid process 1976 0420635ee8eadbc2f1adac320bbbf748c5504fb58a4d6cdf2bda95e2baac246b.exe 1940 z16387812.exe 1940 z16387812.exe 292 z22676122.exe 292 z22676122.exe 1148 z78139636.exe 1148 z78139636.exe 1148 z78139636.exe 1860 s71400026.exe 1860 s71400026.exe 2036 1.exe 1148 z78139636.exe 1692 t51284816.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z78139636.exe0420635ee8eadbc2f1adac320bbbf748c5504fb58a4d6cdf2bda95e2baac246b.exez16387812.exez22676122.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z78139636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z78139636.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0420635ee8eadbc2f1adac320bbbf748c5504fb58a4d6cdf2bda95e2baac246b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0420635ee8eadbc2f1adac320bbbf748c5504fb58a4d6cdf2bda95e2baac246b.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z16387812.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z16387812.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce z22676122.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z22676122.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s71400026.exedescription pid process Token: SeDebugPrivilege 1860 s71400026.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
0420635ee8eadbc2f1adac320bbbf748c5504fb58a4d6cdf2bda95e2baac246b.exez16387812.exez22676122.exez78139636.exes71400026.exedescription pid process target process PID 1976 wrote to memory of 1940 1976 0420635ee8eadbc2f1adac320bbbf748c5504fb58a4d6cdf2bda95e2baac246b.exe z16387812.exe PID 1976 wrote to memory of 1940 1976 0420635ee8eadbc2f1adac320bbbf748c5504fb58a4d6cdf2bda95e2baac246b.exe z16387812.exe PID 1976 wrote to memory of 1940 1976 0420635ee8eadbc2f1adac320bbbf748c5504fb58a4d6cdf2bda95e2baac246b.exe z16387812.exe PID 1976 wrote to memory of 1940 1976 0420635ee8eadbc2f1adac320bbbf748c5504fb58a4d6cdf2bda95e2baac246b.exe z16387812.exe PID 1976 wrote to memory of 1940 1976 0420635ee8eadbc2f1adac320bbbf748c5504fb58a4d6cdf2bda95e2baac246b.exe z16387812.exe PID 1976 wrote to memory of 1940 1976 0420635ee8eadbc2f1adac320bbbf748c5504fb58a4d6cdf2bda95e2baac246b.exe z16387812.exe PID 1976 wrote to memory of 1940 1976 0420635ee8eadbc2f1adac320bbbf748c5504fb58a4d6cdf2bda95e2baac246b.exe z16387812.exe PID 1940 wrote to memory of 292 1940 z16387812.exe z22676122.exe PID 1940 wrote to memory of 292 1940 z16387812.exe z22676122.exe PID 1940 wrote to memory of 292 1940 z16387812.exe z22676122.exe PID 1940 wrote to memory of 292 1940 z16387812.exe z22676122.exe PID 1940 wrote to memory of 292 1940 z16387812.exe z22676122.exe PID 1940 wrote to memory of 292 1940 z16387812.exe z22676122.exe PID 1940 wrote to memory of 292 1940 z16387812.exe z22676122.exe PID 292 wrote to memory of 1148 292 z22676122.exe z78139636.exe PID 292 wrote to memory of 1148 292 z22676122.exe z78139636.exe PID 292 wrote to memory of 1148 292 z22676122.exe z78139636.exe PID 292 wrote to memory of 1148 292 z22676122.exe z78139636.exe PID 292 wrote to memory of 1148 292 z22676122.exe z78139636.exe PID 292 wrote to memory of 1148 292 z22676122.exe z78139636.exe PID 292 wrote to memory of 1148 292 z22676122.exe z78139636.exe PID 1148 wrote to memory of 1860 1148 z78139636.exe s71400026.exe PID 1148 wrote to memory of 1860 1148 z78139636.exe s71400026.exe PID 1148 wrote to memory of 1860 1148 z78139636.exe s71400026.exe PID 1148 wrote to memory of 1860 1148 z78139636.exe s71400026.exe PID 1148 wrote to memory of 1860 1148 z78139636.exe s71400026.exe PID 1148 wrote to memory of 1860 1148 z78139636.exe s71400026.exe PID 1148 wrote to memory of 1860 1148 z78139636.exe s71400026.exe PID 1860 wrote to memory of 2036 1860 s71400026.exe 1.exe PID 1860 wrote to memory of 2036 1860 s71400026.exe 1.exe PID 1860 wrote to memory of 2036 1860 s71400026.exe 1.exe PID 1860 wrote to memory of 2036 1860 s71400026.exe 1.exe PID 1860 wrote to memory of 2036 1860 s71400026.exe 1.exe PID 1860 wrote to memory of 2036 1860 s71400026.exe 1.exe PID 1860 wrote to memory of 2036 1860 s71400026.exe 1.exe PID 1148 wrote to memory of 1692 1148 z78139636.exe t51284816.exe PID 1148 wrote to memory of 1692 1148 z78139636.exe t51284816.exe PID 1148 wrote to memory of 1692 1148 z78139636.exe t51284816.exe PID 1148 wrote to memory of 1692 1148 z78139636.exe t51284816.exe PID 1148 wrote to memory of 1692 1148 z78139636.exe t51284816.exe PID 1148 wrote to memory of 1692 1148 z78139636.exe t51284816.exe PID 1148 wrote to memory of 1692 1148 z78139636.exe t51284816.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0420635ee8eadbc2f1adac320bbbf748c5504fb58a4d6cdf2bda95e2baac246b.exe"C:\Users\Admin\AppData\Local\Temp\0420635ee8eadbc2f1adac320bbbf748c5504fb58a4d6cdf2bda95e2baac246b.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z16387812.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z16387812.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z22676122.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z22676122.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z78139636.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z78139636.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s71400026.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s71400026.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2036
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t51284816.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t51284816.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1692
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD554d76db3ecfe041aa9836edda46b65c8
SHA12abfc59c31877daa6370425d1a97c6bdf11f2718
SHA256f8a34ac443101d6a97700b2e64cdae0403d1a0464fe2dc80b8ecd6716397635f
SHA512581ba9d9060395702fb46a810921c2769c8f08673559ab37448816f556cab04eee2c2b932396573fbca72764d2048a6c249bb4d7a1bb72fb58738de75a7bfcd1
-
Filesize
1.0MB
MD554d76db3ecfe041aa9836edda46b65c8
SHA12abfc59c31877daa6370425d1a97c6bdf11f2718
SHA256f8a34ac443101d6a97700b2e64cdae0403d1a0464fe2dc80b8ecd6716397635f
SHA512581ba9d9060395702fb46a810921c2769c8f08673559ab37448816f556cab04eee2c2b932396573fbca72764d2048a6c249bb4d7a1bb72fb58738de75a7bfcd1
-
Filesize
759KB
MD5fe003bfcb6c177fac32e5fae003753a9
SHA113ad3a8d41b7309b86984a47ccca7d2fc43f96b4
SHA25632fb4248e5efa4a818fd0375ab11d3fb22506f0494b04260ae868c42addb49b4
SHA512f5c52d803fc9de6661832234882377cb60dea2e8e54b263701d51c0527f089f25d3d65f7df48b022880fc902846487761cc6772e536eac754b3ae3968d72d49a
-
Filesize
759KB
MD5fe003bfcb6c177fac32e5fae003753a9
SHA113ad3a8d41b7309b86984a47ccca7d2fc43f96b4
SHA25632fb4248e5efa4a818fd0375ab11d3fb22506f0494b04260ae868c42addb49b4
SHA512f5c52d803fc9de6661832234882377cb60dea2e8e54b263701d51c0527f089f25d3d65f7df48b022880fc902846487761cc6772e536eac754b3ae3968d72d49a
-
Filesize
576KB
MD55fe801354b508d78fb4cd446df5cba2b
SHA1f8030d2400508aa416f05943b1121056c83f054f
SHA256fde13794d4293f4bc259e5412200c632acd4aefb82b162759cd123dc63eac003
SHA51269e965a70b6db03481ed78d0ea223f28dfa07a34110d48f9e826845970f89aef41916d83fb537ba5327dc04f1acf03f039d9e8fbb383827793f2cbfe4033fa9c
-
Filesize
576KB
MD55fe801354b508d78fb4cd446df5cba2b
SHA1f8030d2400508aa416f05943b1121056c83f054f
SHA256fde13794d4293f4bc259e5412200c632acd4aefb82b162759cd123dc63eac003
SHA51269e965a70b6db03481ed78d0ea223f28dfa07a34110d48f9e826845970f89aef41916d83fb537ba5327dc04f1acf03f039d9e8fbb383827793f2cbfe4033fa9c
-
Filesize
574KB
MD50b0d71e5896c81da871d4cd4dae2ce3a
SHA1c25ea63f2c94c117426d9fa8f3daff313579608d
SHA256f5098ea8e4e3c9a23e56f842fefc80ad5d832f0369a6135fb272754cd238f682
SHA512f91ffbd9cb7b83d58ba647422da8e891460c7627b51a9a6ec37f499c2dd76cf27d7aed4a006b4cecd12e81ad4b9358551b21076339b39f3a69a9038d960dff8f
-
Filesize
574KB
MD50b0d71e5896c81da871d4cd4dae2ce3a
SHA1c25ea63f2c94c117426d9fa8f3daff313579608d
SHA256f5098ea8e4e3c9a23e56f842fefc80ad5d832f0369a6135fb272754cd238f682
SHA512f91ffbd9cb7b83d58ba647422da8e891460c7627b51a9a6ec37f499c2dd76cf27d7aed4a006b4cecd12e81ad4b9358551b21076339b39f3a69a9038d960dff8f
-
Filesize
574KB
MD50b0d71e5896c81da871d4cd4dae2ce3a
SHA1c25ea63f2c94c117426d9fa8f3daff313579608d
SHA256f5098ea8e4e3c9a23e56f842fefc80ad5d832f0369a6135fb272754cd238f682
SHA512f91ffbd9cb7b83d58ba647422da8e891460c7627b51a9a6ec37f499c2dd76cf27d7aed4a006b4cecd12e81ad4b9358551b21076339b39f3a69a9038d960dff8f
-
Filesize
169KB
MD50379c97c1ba4073a16d95c7b7736cea5
SHA15c0d6eaef3ed224cf3c9ef84f870afe17972a383
SHA256bfb76db7bf30eeafcc8c2032c8b0fd998700714abe382e77cc650f1c12d50344
SHA51269dde90a8e93e7eb4db9fa6abc0923e4cdfeef2a4d90122ab52d07c98ebde39bf6977407d70f959c3e1f64212273cb01a8532e109032b40643a8e448b1b1e81c
-
Filesize
169KB
MD50379c97c1ba4073a16d95c7b7736cea5
SHA15c0d6eaef3ed224cf3c9ef84f870afe17972a383
SHA256bfb76db7bf30eeafcc8c2032c8b0fd998700714abe382e77cc650f1c12d50344
SHA51269dde90a8e93e7eb4db9fa6abc0923e4cdfeef2a4d90122ab52d07c98ebde39bf6977407d70f959c3e1f64212273cb01a8532e109032b40643a8e448b1b1e81c
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
1.0MB
MD554d76db3ecfe041aa9836edda46b65c8
SHA12abfc59c31877daa6370425d1a97c6bdf11f2718
SHA256f8a34ac443101d6a97700b2e64cdae0403d1a0464fe2dc80b8ecd6716397635f
SHA512581ba9d9060395702fb46a810921c2769c8f08673559ab37448816f556cab04eee2c2b932396573fbca72764d2048a6c249bb4d7a1bb72fb58738de75a7bfcd1
-
Filesize
1.0MB
MD554d76db3ecfe041aa9836edda46b65c8
SHA12abfc59c31877daa6370425d1a97c6bdf11f2718
SHA256f8a34ac443101d6a97700b2e64cdae0403d1a0464fe2dc80b8ecd6716397635f
SHA512581ba9d9060395702fb46a810921c2769c8f08673559ab37448816f556cab04eee2c2b932396573fbca72764d2048a6c249bb4d7a1bb72fb58738de75a7bfcd1
-
Filesize
759KB
MD5fe003bfcb6c177fac32e5fae003753a9
SHA113ad3a8d41b7309b86984a47ccca7d2fc43f96b4
SHA25632fb4248e5efa4a818fd0375ab11d3fb22506f0494b04260ae868c42addb49b4
SHA512f5c52d803fc9de6661832234882377cb60dea2e8e54b263701d51c0527f089f25d3d65f7df48b022880fc902846487761cc6772e536eac754b3ae3968d72d49a
-
Filesize
759KB
MD5fe003bfcb6c177fac32e5fae003753a9
SHA113ad3a8d41b7309b86984a47ccca7d2fc43f96b4
SHA25632fb4248e5efa4a818fd0375ab11d3fb22506f0494b04260ae868c42addb49b4
SHA512f5c52d803fc9de6661832234882377cb60dea2e8e54b263701d51c0527f089f25d3d65f7df48b022880fc902846487761cc6772e536eac754b3ae3968d72d49a
-
Filesize
576KB
MD55fe801354b508d78fb4cd446df5cba2b
SHA1f8030d2400508aa416f05943b1121056c83f054f
SHA256fde13794d4293f4bc259e5412200c632acd4aefb82b162759cd123dc63eac003
SHA51269e965a70b6db03481ed78d0ea223f28dfa07a34110d48f9e826845970f89aef41916d83fb537ba5327dc04f1acf03f039d9e8fbb383827793f2cbfe4033fa9c
-
Filesize
576KB
MD55fe801354b508d78fb4cd446df5cba2b
SHA1f8030d2400508aa416f05943b1121056c83f054f
SHA256fde13794d4293f4bc259e5412200c632acd4aefb82b162759cd123dc63eac003
SHA51269e965a70b6db03481ed78d0ea223f28dfa07a34110d48f9e826845970f89aef41916d83fb537ba5327dc04f1acf03f039d9e8fbb383827793f2cbfe4033fa9c
-
Filesize
574KB
MD50b0d71e5896c81da871d4cd4dae2ce3a
SHA1c25ea63f2c94c117426d9fa8f3daff313579608d
SHA256f5098ea8e4e3c9a23e56f842fefc80ad5d832f0369a6135fb272754cd238f682
SHA512f91ffbd9cb7b83d58ba647422da8e891460c7627b51a9a6ec37f499c2dd76cf27d7aed4a006b4cecd12e81ad4b9358551b21076339b39f3a69a9038d960dff8f
-
Filesize
574KB
MD50b0d71e5896c81da871d4cd4dae2ce3a
SHA1c25ea63f2c94c117426d9fa8f3daff313579608d
SHA256f5098ea8e4e3c9a23e56f842fefc80ad5d832f0369a6135fb272754cd238f682
SHA512f91ffbd9cb7b83d58ba647422da8e891460c7627b51a9a6ec37f499c2dd76cf27d7aed4a006b4cecd12e81ad4b9358551b21076339b39f3a69a9038d960dff8f
-
Filesize
574KB
MD50b0d71e5896c81da871d4cd4dae2ce3a
SHA1c25ea63f2c94c117426d9fa8f3daff313579608d
SHA256f5098ea8e4e3c9a23e56f842fefc80ad5d832f0369a6135fb272754cd238f682
SHA512f91ffbd9cb7b83d58ba647422da8e891460c7627b51a9a6ec37f499c2dd76cf27d7aed4a006b4cecd12e81ad4b9358551b21076339b39f3a69a9038d960dff8f
-
Filesize
169KB
MD50379c97c1ba4073a16d95c7b7736cea5
SHA15c0d6eaef3ed224cf3c9ef84f870afe17972a383
SHA256bfb76db7bf30eeafcc8c2032c8b0fd998700714abe382e77cc650f1c12d50344
SHA51269dde90a8e93e7eb4db9fa6abc0923e4cdfeef2a4d90122ab52d07c98ebde39bf6977407d70f959c3e1f64212273cb01a8532e109032b40643a8e448b1b1e81c
-
Filesize
169KB
MD50379c97c1ba4073a16d95c7b7736cea5
SHA15c0d6eaef3ed224cf3c9ef84f870afe17972a383
SHA256bfb76db7bf30eeafcc8c2032c8b0fd998700714abe382e77cc650f1c12d50344
SHA51269dde90a8e93e7eb4db9fa6abc0923e4cdfeef2a4d90122ab52d07c98ebde39bf6977407d70f959c3e1f64212273cb01a8532e109032b40643a8e448b1b1e81c
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf