Analysis
-
max time kernel
48s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 22:00
Static task
static1
Behavioral task
behavioral1
Sample
f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940.exe
Resource
win10v2004-20220812-en
General
-
Target
f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940.exe
-
Size
140KB
-
MD5
6df8cc0effe7944cd6200ccc2561cc48
-
SHA1
19c98316c42058baecfc6eb0aaa2fc713cc6fd8b
-
SHA256
f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
-
SHA512
8be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
SSDEEP
1536:kZqW1suA2HJm/2n8vwUSnnm68vUsRqw1sz6GILUQBqxIN9LNDYmYyfrdQk8PgF7b:011vpG28vCt8vUO1A6QxIifAGrgp
Malware Config
Signatures
-
Executes dropped EXE 12 IoCs
pid Process 1168 SVOHOST.exe 1196 SVOHOST.exe 980 SVOHOST.exe 1700 SVOHOST.exe 2004 SVOHOST.exe 960 SVOHOST.exe 1964 SVOHOST.exe 820 SVOHOST.exe 660 SVOHOST.exe 2044 SVOHOST.exe 888 SVOHOST.exe 1640 SVOHOST.exe -
Deletes itself 1 IoCs
pid Process 944 cmd.exe -
Loads dropped DLL 24 IoCs
pid Process 1364 f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940.exe 1364 f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940.exe 1168 SVOHOST.exe 1168 SVOHOST.exe 1196 SVOHOST.exe 1196 SVOHOST.exe 980 SVOHOST.exe 980 SVOHOST.exe 1700 SVOHOST.exe 1700 SVOHOST.exe 2004 SVOHOST.exe 2004 SVOHOST.exe 960 SVOHOST.exe 960 SVOHOST.exe 1964 SVOHOST.exe 1964 SVOHOST.exe 820 SVOHOST.exe 820 SVOHOST.exe 660 SVOHOST.exe 660 SVOHOST.exe 2044 SVOHOST.exe 2044 SVOHOST.exe 888 SVOHOST.exe 888 SVOHOST.exe -
Adds Run key to start application 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run SVOHOST.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run SVOHOST.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run SVOHOST.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run SVOHOST.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run SVOHOST.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940.exe -
Drops file in System32 directory 49 IoCs
description ioc Process File created C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\noruns.reg SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File opened for modification C:\Windows\SysWOW64\noruns.reg SVOHOST.exe File opened for modification C:\Windows\SysWOW64\noruns.reg SVOHOST.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File created C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File created C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\noruns.reg SVOHOST.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File created C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File created C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\noruns.reg SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File opened for modification C:\Windows\SysWOW64\noruns.reg SVOHOST.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\noruns.reg SVOHOST.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\noruns.reg f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940.exe File created C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File created C:\Windows\SysWOW64\noruns.reg f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File opened for modification C:\Windows\SysWOW64\noruns.reg SVOHOST.exe File created C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\noruns.reg SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File created C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940.exe File created C:\Windows\SysWOW64\SVOHOST.exe f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File created C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File created C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\noruns.reg SVOHOST.exe File created C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\noruns.reg SVOHOST.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1364 f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940.exe 1364 f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940.exe 1168 SVOHOST.exe 1168 SVOHOST.exe 1196 SVOHOST.exe 1196 SVOHOST.exe 980 SVOHOST.exe 980 SVOHOST.exe 1700 SVOHOST.exe 1700 SVOHOST.exe 2004 SVOHOST.exe 2004 SVOHOST.exe 960 SVOHOST.exe 960 SVOHOST.exe 1964 SVOHOST.exe 1964 SVOHOST.exe 820 SVOHOST.exe 820 SVOHOST.exe 660 SVOHOST.exe 660 SVOHOST.exe 2044 SVOHOST.exe 2044 SVOHOST.exe 888 SVOHOST.exe 888 SVOHOST.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1364 wrote to memory of 1168 1364 f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940.exe 26 PID 1364 wrote to memory of 1168 1364 f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940.exe 26 PID 1364 wrote to memory of 1168 1364 f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940.exe 26 PID 1364 wrote to memory of 1168 1364 f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940.exe 26 PID 1364 wrote to memory of 944 1364 f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940.exe 27 PID 1364 wrote to memory of 944 1364 f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940.exe 27 PID 1364 wrote to memory of 944 1364 f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940.exe 27 PID 1364 wrote to memory of 944 1364 f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940.exe 27 PID 1168 wrote to memory of 1196 1168 SVOHOST.exe 29 PID 1168 wrote to memory of 1196 1168 SVOHOST.exe 29 PID 1168 wrote to memory of 1196 1168 SVOHOST.exe 29 PID 1168 wrote to memory of 1196 1168 SVOHOST.exe 29 PID 1168 wrote to memory of 680 1168 SVOHOST.exe 30 PID 1168 wrote to memory of 680 1168 SVOHOST.exe 30 PID 1168 wrote to memory of 680 1168 SVOHOST.exe 30 PID 1168 wrote to memory of 680 1168 SVOHOST.exe 30 PID 1196 wrote to memory of 980 1196 SVOHOST.exe 32 PID 1196 wrote to memory of 980 1196 SVOHOST.exe 32 PID 1196 wrote to memory of 980 1196 SVOHOST.exe 32 PID 1196 wrote to memory of 980 1196 SVOHOST.exe 32 PID 1196 wrote to memory of 1340 1196 SVOHOST.exe 33 PID 1196 wrote to memory of 1340 1196 SVOHOST.exe 33 PID 1196 wrote to memory of 1340 1196 SVOHOST.exe 33 PID 1196 wrote to memory of 1340 1196 SVOHOST.exe 33 PID 980 wrote to memory of 1700 980 SVOHOST.exe 35 PID 980 wrote to memory of 1700 980 SVOHOST.exe 35 PID 980 wrote to memory of 1700 980 SVOHOST.exe 35 PID 980 wrote to memory of 1700 980 SVOHOST.exe 35 PID 980 wrote to memory of 596 980 SVOHOST.exe 36 PID 980 wrote to memory of 596 980 SVOHOST.exe 36 PID 980 wrote to memory of 596 980 SVOHOST.exe 36 PID 980 wrote to memory of 596 980 SVOHOST.exe 36 PID 1700 wrote to memory of 2004 1700 SVOHOST.exe 38 PID 1700 wrote to memory of 2004 1700 SVOHOST.exe 38 PID 1700 wrote to memory of 2004 1700 SVOHOST.exe 38 PID 1700 wrote to memory of 2004 1700 SVOHOST.exe 38 PID 1700 wrote to memory of 1532 1700 SVOHOST.exe 39 PID 1700 wrote to memory of 1532 1700 SVOHOST.exe 39 PID 1700 wrote to memory of 1532 1700 SVOHOST.exe 39 PID 1700 wrote to memory of 1532 1700 SVOHOST.exe 39 PID 2004 wrote to memory of 960 2004 SVOHOST.exe 41 PID 2004 wrote to memory of 960 2004 SVOHOST.exe 41 PID 2004 wrote to memory of 960 2004 SVOHOST.exe 41 PID 2004 wrote to memory of 960 2004 SVOHOST.exe 41 PID 2004 wrote to memory of 1800 2004 SVOHOST.exe 42 PID 2004 wrote to memory of 1800 2004 SVOHOST.exe 42 PID 2004 wrote to memory of 1800 2004 SVOHOST.exe 42 PID 2004 wrote to memory of 1800 2004 SVOHOST.exe 42 PID 960 wrote to memory of 1964 960 SVOHOST.exe 44 PID 960 wrote to memory of 1964 960 SVOHOST.exe 44 PID 960 wrote to memory of 1964 960 SVOHOST.exe 44 PID 960 wrote to memory of 1964 960 SVOHOST.exe 44 PID 960 wrote to memory of 2016 960 SVOHOST.exe 45 PID 960 wrote to memory of 2016 960 SVOHOST.exe 45 PID 960 wrote to memory of 2016 960 SVOHOST.exe 45 PID 960 wrote to memory of 2016 960 SVOHOST.exe 45 PID 1964 wrote to memory of 820 1964 SVOHOST.exe 47 PID 1964 wrote to memory of 820 1964 SVOHOST.exe 47 PID 1964 wrote to memory of 820 1964 SVOHOST.exe 47 PID 1964 wrote to memory of 820 1964 SVOHOST.exe 47 PID 1964 wrote to memory of 1376 1964 SVOHOST.exe 48 PID 1964 wrote to memory of 1376 1964 SVOHOST.exe 48 PID 1964 wrote to memory of 1376 1964 SVOHOST.exe 48 PID 1964 wrote to memory of 1376 1964 SVOHOST.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940.exe"C:\Users\Admin\AppData\Local\Temp\f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:820 -
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:660 -
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2044 -
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:888 -
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"13⤵
- Executes dropped EXE
PID:1640
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Windows\SysWOW64\SVOHOST.exe"13⤵PID:1712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Windows\SysWOW64\SVOHOST.exe"12⤵PID:1660
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Windows\SysWOW64\SVOHOST.exe"11⤵PID:1548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Windows\SysWOW64\SVOHOST.exe"10⤵PID:524
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Windows\SysWOW64\SVOHOST.exe"9⤵PID:1376
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Windows\SysWOW64\SVOHOST.exe"8⤵PID:2016
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Windows\SysWOW64\SVOHOST.exe"7⤵PID:1800
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Windows\SysWOW64\SVOHOST.exe"6⤵PID:1532
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Windows\SysWOW64\SVOHOST.exe"5⤵PID:596
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Windows\SysWOW64\SVOHOST.exe"4⤵PID:1340
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Windows\SysWOW64\SVOHOST.exe"3⤵PID:680
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940.exe"2⤵
- Deletes itself
PID:944
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
122B
MD5704f9f14e6c5b902de15f37bbb234bbc
SHA14e7bd14012b5fe1b07b9ed99a00565ed1d86348b
SHA25669c8425b75d3be48f68c1abf33bb9d30688bbd9d28809d92f9dc537393a3d3b4
SHA51202376153d198f415f53aabc67272c6042ee4f2c1048b3c5025200d8946f433669cd48295e1bfcd33d1fc8c24f4e1ff0dfb78e36926ad91a334e02718afa93042
-
Filesize
122B
MD5704f9f14e6c5b902de15f37bbb234bbc
SHA14e7bd14012b5fe1b07b9ed99a00565ed1d86348b
SHA25669c8425b75d3be48f68c1abf33bb9d30688bbd9d28809d92f9dc537393a3d3b4
SHA51202376153d198f415f53aabc67272c6042ee4f2c1048b3c5025200d8946f433669cd48295e1bfcd33d1fc8c24f4e1ff0dfb78e36926ad91a334e02718afa93042
-
Filesize
122B
MD5704f9f14e6c5b902de15f37bbb234bbc
SHA14e7bd14012b5fe1b07b9ed99a00565ed1d86348b
SHA25669c8425b75d3be48f68c1abf33bb9d30688bbd9d28809d92f9dc537393a3d3b4
SHA51202376153d198f415f53aabc67272c6042ee4f2c1048b3c5025200d8946f433669cd48295e1bfcd33d1fc8c24f4e1ff0dfb78e36926ad91a334e02718afa93042
-
Filesize
122B
MD5704f9f14e6c5b902de15f37bbb234bbc
SHA14e7bd14012b5fe1b07b9ed99a00565ed1d86348b
SHA25669c8425b75d3be48f68c1abf33bb9d30688bbd9d28809d92f9dc537393a3d3b4
SHA51202376153d198f415f53aabc67272c6042ee4f2c1048b3c5025200d8946f433669cd48295e1bfcd33d1fc8c24f4e1ff0dfb78e36926ad91a334e02718afa93042
-
Filesize
122B
MD5704f9f14e6c5b902de15f37bbb234bbc
SHA14e7bd14012b5fe1b07b9ed99a00565ed1d86348b
SHA25669c8425b75d3be48f68c1abf33bb9d30688bbd9d28809d92f9dc537393a3d3b4
SHA51202376153d198f415f53aabc67272c6042ee4f2c1048b3c5025200d8946f433669cd48295e1bfcd33d1fc8c24f4e1ff0dfb78e36926ad91a334e02718afa93042
-
Filesize
122B
MD5704f9f14e6c5b902de15f37bbb234bbc
SHA14e7bd14012b5fe1b07b9ed99a00565ed1d86348b
SHA25669c8425b75d3be48f68c1abf33bb9d30688bbd9d28809d92f9dc537393a3d3b4
SHA51202376153d198f415f53aabc67272c6042ee4f2c1048b3c5025200d8946f433669cd48295e1bfcd33d1fc8c24f4e1ff0dfb78e36926ad91a334e02718afa93042
-
Filesize
122B
MD5704f9f14e6c5b902de15f37bbb234bbc
SHA14e7bd14012b5fe1b07b9ed99a00565ed1d86348b
SHA25669c8425b75d3be48f68c1abf33bb9d30688bbd9d28809d92f9dc537393a3d3b4
SHA51202376153d198f415f53aabc67272c6042ee4f2c1048b3c5025200d8946f433669cd48295e1bfcd33d1fc8c24f4e1ff0dfb78e36926ad91a334e02718afa93042
-
Filesize
122B
MD5704f9f14e6c5b902de15f37bbb234bbc
SHA14e7bd14012b5fe1b07b9ed99a00565ed1d86348b
SHA25669c8425b75d3be48f68c1abf33bb9d30688bbd9d28809d92f9dc537393a3d3b4
SHA51202376153d198f415f53aabc67272c6042ee4f2c1048b3c5025200d8946f433669cd48295e1bfcd33d1fc8c24f4e1ff0dfb78e36926ad91a334e02718afa93042
-
Filesize
122B
MD5704f9f14e6c5b902de15f37bbb234bbc
SHA14e7bd14012b5fe1b07b9ed99a00565ed1d86348b
SHA25669c8425b75d3be48f68c1abf33bb9d30688bbd9d28809d92f9dc537393a3d3b4
SHA51202376153d198f415f53aabc67272c6042ee4f2c1048b3c5025200d8946f433669cd48295e1bfcd33d1fc8c24f4e1ff0dfb78e36926ad91a334e02718afa93042
-
Filesize
122B
MD5704f9f14e6c5b902de15f37bbb234bbc
SHA14e7bd14012b5fe1b07b9ed99a00565ed1d86348b
SHA25669c8425b75d3be48f68c1abf33bb9d30688bbd9d28809d92f9dc537393a3d3b4
SHA51202376153d198f415f53aabc67272c6042ee4f2c1048b3c5025200d8946f433669cd48295e1bfcd33d1fc8c24f4e1ff0dfb78e36926ad91a334e02718afa93042
-
Filesize
122B
MD5704f9f14e6c5b902de15f37bbb234bbc
SHA14e7bd14012b5fe1b07b9ed99a00565ed1d86348b
SHA25669c8425b75d3be48f68c1abf33bb9d30688bbd9d28809d92f9dc537393a3d3b4
SHA51202376153d198f415f53aabc67272c6042ee4f2c1048b3c5025200d8946f433669cd48295e1bfcd33d1fc8c24f4e1ff0dfb78e36926ad91a334e02718afa93042
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208
-
Filesize
140KB
MD56df8cc0effe7944cd6200ccc2561cc48
SHA119c98316c42058baecfc6eb0aaa2fc713cc6fd8b
SHA256f0263cf12d3133afe22ed18a11f4c720ecf2894a922d5fc74ea82ee4d5385940
SHA5128be86f3cdb15a4d068b05e4b05151ac52e9b9f6641a86e1869eb303a2c9694e5cf82656a551039695bf15425f6136d68e4205f8ecc9791c396c6e46619383208