Analysis
-
max time kernel
153s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2023 18:36
Static task
static1
Behavioral task
behavioral1
Sample
d3552c28c59bffb7cad458c153ccf9508b3d6f72eea79cc850b87d840deeec7a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d3552c28c59bffb7cad458c153ccf9508b3d6f72eea79cc850b87d840deeec7a.exe
Resource
win10v2004-20230220-en
General
-
Target
d3552c28c59bffb7cad458c153ccf9508b3d6f72eea79cc850b87d840deeec7a.exe
-
Size
1.5MB
-
MD5
dec1627450b1cd5f03fd0ef77053d715
-
SHA1
3ff311808558e289b521e6f80fa70c1d5455f13b
-
SHA256
d3552c28c59bffb7cad458c153ccf9508b3d6f72eea79cc850b87d840deeec7a
-
SHA512
66c89534c909f0f4ef40ee1ed960346bd0128cbd72cb2326c8672f713077320ae261c7c5dacff5dacd1cf628759594ced008463d408b04334c6e8c4851aa4d6f
-
SSDEEP
24576:Iy4ZxTXaH7IfjzmibqHZNk5VQrca9PBNc+9SA/oeZEJI8H/gWMcYd8X2Fcs:PAaH7qjzNm7k5Ra9PB59AYEy8HhMcYd2
Malware Config
Extracted
redline
most
185.161.248.73:4164
-
auth_value
7da4dfa153f2919e617aa016f7c36008
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/756-169-0x000000000A650000-0x000000000AC68000-memory.dmp redline_stealer behavioral2/memory/756-177-0x000000000A3C0000-0x000000000A426000-memory.dmp redline_stealer behavioral2/memory/756-180-0x000000000B9D0000-0x000000000BB92000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g45081145.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f45736132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f45736132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f45736132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f45736132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f45736132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g45081145.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g45081145.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g45081145.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection f45736132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g45081145.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation b86218251.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation c30165094.exe -
Executes dropped EXE 14 IoCs
pid Process 4316 i13450791.exe 652 i53012980.exe 1752 i52510893.exe 2952 i82825951.exe 756 a24843522.exe 1604 b86218251.exe 4540 oneetx.exe 4448 c30165094.exe 4888 oneetx.exe 2044 1.exe 4112 d53532297.exe 3840 f45736132.exe 4868 g45081145.exe 3444 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 5048 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features f45736132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" f45736132.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" g45081145.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i52510893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" i52510893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" i82825951.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d3552c28c59bffb7cad458c153ccf9508b3d6f72eea79cc850b87d840deeec7a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d3552c28c59bffb7cad458c153ccf9508b3d6f72eea79cc850b87d840deeec7a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" i13450791.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i82825951.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i13450791.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i53012980.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" i53012980.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 30 IoCs
pid pid_target Process procid_target 568 1604 WerFault.exe 93 4836 1604 WerFault.exe 93 4808 1604 WerFault.exe 93 5024 1604 WerFault.exe 93 3644 1604 WerFault.exe 93 3980 1604 WerFault.exe 93 3260 1604 WerFault.exe 93 1380 1604 WerFault.exe 93 2188 1604 WerFault.exe 93 2224 1604 WerFault.exe 93 4284 4540 WerFault.exe 113 4532 4540 WerFault.exe 113 2964 4540 WerFault.exe 113 1308 4540 WerFault.exe 113 2436 4540 WerFault.exe 113 4604 4540 WerFault.exe 113 3968 4540 WerFault.exe 113 2356 4540 WerFault.exe 113 2788 4540 WerFault.exe 113 2904 4540 WerFault.exe 113 3996 4540 WerFault.exe 113 4192 4540 WerFault.exe 113 2904 4540 WerFault.exe 113 384 4888 WerFault.exe 153 2032 4448 WerFault.exe 118 3364 3840 WerFault.exe 160 3800 4540 WerFault.exe 113 3180 4540 WerFault.exe 113 2316 4540 WerFault.exe 113 2432 3444 WerFault.exe 171 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 408 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 756 a24843522.exe 756 a24843522.exe 3840 f45736132.exe 3840 f45736132.exe 2044 1.exe 2044 1.exe 4868 g45081145.exe 4868 g45081145.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 756 a24843522.exe Token: SeDebugPrivilege 4448 c30165094.exe Token: SeDebugPrivilege 3840 f45736132.exe Token: SeDebugPrivilege 2044 1.exe Token: SeDebugPrivilege 4868 g45081145.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1604 b86218251.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 1080 wrote to memory of 4316 1080 d3552c28c59bffb7cad458c153ccf9508b3d6f72eea79cc850b87d840deeec7a.exe 81 PID 1080 wrote to memory of 4316 1080 d3552c28c59bffb7cad458c153ccf9508b3d6f72eea79cc850b87d840deeec7a.exe 81 PID 1080 wrote to memory of 4316 1080 d3552c28c59bffb7cad458c153ccf9508b3d6f72eea79cc850b87d840deeec7a.exe 81 PID 4316 wrote to memory of 652 4316 i13450791.exe 82 PID 4316 wrote to memory of 652 4316 i13450791.exe 82 PID 4316 wrote to memory of 652 4316 i13450791.exe 82 PID 652 wrote to memory of 1752 652 i53012980.exe 83 PID 652 wrote to memory of 1752 652 i53012980.exe 83 PID 652 wrote to memory of 1752 652 i53012980.exe 83 PID 1752 wrote to memory of 2952 1752 i52510893.exe 84 PID 1752 wrote to memory of 2952 1752 i52510893.exe 84 PID 1752 wrote to memory of 2952 1752 i52510893.exe 84 PID 2952 wrote to memory of 756 2952 i82825951.exe 85 PID 2952 wrote to memory of 756 2952 i82825951.exe 85 PID 2952 wrote to memory of 756 2952 i82825951.exe 85 PID 2952 wrote to memory of 1604 2952 i82825951.exe 93 PID 2952 wrote to memory of 1604 2952 i82825951.exe 93 PID 2952 wrote to memory of 1604 2952 i82825951.exe 93 PID 1604 wrote to memory of 4540 1604 b86218251.exe 113 PID 1604 wrote to memory of 4540 1604 b86218251.exe 113 PID 1604 wrote to memory of 4540 1604 b86218251.exe 113 PID 1752 wrote to memory of 4448 1752 i52510893.exe 118 PID 1752 wrote to memory of 4448 1752 i52510893.exe 118 PID 1752 wrote to memory of 4448 1752 i52510893.exe 118 PID 4540 wrote to memory of 408 4540 oneetx.exe 131 PID 4540 wrote to memory of 408 4540 oneetx.exe 131 PID 4540 wrote to memory of 408 4540 oneetx.exe 131 PID 4540 wrote to memory of 4604 4540 oneetx.exe 137 PID 4540 wrote to memory of 4604 4540 oneetx.exe 137 PID 4540 wrote to memory of 4604 4540 oneetx.exe 137 PID 4604 wrote to memory of 2084 4604 cmd.exe 141 PID 4604 wrote to memory of 2084 4604 cmd.exe 141 PID 4604 wrote to memory of 2084 4604 cmd.exe 141 PID 4604 wrote to memory of 4112 4604 cmd.exe 142 PID 4604 wrote to memory of 4112 4604 cmd.exe 142 PID 4604 wrote to memory of 4112 4604 cmd.exe 142 PID 4604 wrote to memory of 4052 4604 cmd.exe 143 PID 4604 wrote to memory of 4052 4604 cmd.exe 143 PID 4604 wrote to memory of 4052 4604 cmd.exe 143 PID 4604 wrote to memory of 2232 4604 cmd.exe 145 PID 4604 wrote to memory of 2232 4604 cmd.exe 145 PID 4604 wrote to memory of 2232 4604 cmd.exe 145 PID 4604 wrote to memory of 3908 4604 cmd.exe 147 PID 4604 wrote to memory of 3908 4604 cmd.exe 147 PID 4604 wrote to memory of 3908 4604 cmd.exe 147 PID 4604 wrote to memory of 4040 4604 cmd.exe 148 PID 4604 wrote to memory of 4040 4604 cmd.exe 148 PID 4604 wrote to memory of 4040 4604 cmd.exe 148 PID 4448 wrote to memory of 2044 4448 c30165094.exe 156 PID 4448 wrote to memory of 2044 4448 c30165094.exe 156 PID 4448 wrote to memory of 2044 4448 c30165094.exe 156 PID 652 wrote to memory of 4112 652 i53012980.exe 159 PID 652 wrote to memory of 4112 652 i53012980.exe 159 PID 652 wrote to memory of 4112 652 i53012980.exe 159 PID 4316 wrote to memory of 3840 4316 i13450791.exe 160 PID 4316 wrote to memory of 3840 4316 i13450791.exe 160 PID 4316 wrote to memory of 3840 4316 i13450791.exe 160 PID 1080 wrote to memory of 4868 1080 d3552c28c59bffb7cad458c153ccf9508b3d6f72eea79cc850b87d840deeec7a.exe 163 PID 1080 wrote to memory of 4868 1080 d3552c28c59bffb7cad458c153ccf9508b3d6f72eea79cc850b87d840deeec7a.exe 163 PID 1080 wrote to memory of 4868 1080 d3552c28c59bffb7cad458c153ccf9508b3d6f72eea79cc850b87d840deeec7a.exe 163 PID 4540 wrote to memory of 5048 4540 oneetx.exe 168 PID 4540 wrote to memory of 5048 4540 oneetx.exe 168 PID 4540 wrote to memory of 5048 4540 oneetx.exe 168
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3552c28c59bffb7cad458c153ccf9508b3d6f72eea79cc850b87d840deeec7a.exe"C:\Users\Admin\AppData\Local\Temp\d3552c28c59bffb7cad458c153ccf9508b3d6f72eea79cc850b87d840deeec7a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i13450791.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i13450791.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i53012980.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i53012980.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i52510893.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i52510893.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i82825951.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i82825951.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a24843522.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a24843522.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:756
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b86218251.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b86218251.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 6967⤵
- Program crash
PID:568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 7807⤵
- Program crash
PID:4836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 7967⤵
- Program crash
PID:4808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 9527⤵
- Program crash
PID:5024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 9607⤵
- Program crash
PID:3644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 9607⤵
- Program crash
PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 12207⤵
- Program crash
PID:3260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 12367⤵
- Program crash
PID:1380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 13167⤵
- Program crash
PID:2188
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 6368⤵
- Program crash
PID:4284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 8848⤵
- Program crash
PID:4532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 9528⤵
- Program crash
PID:2964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 10528⤵
- Program crash
PID:1308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 10608⤵
- Program crash
PID:2436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 10848⤵
- Program crash
PID:4604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 11088⤵
- Program crash
PID:3968
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F8⤵
- Creates scheduled task(s)
PID:408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 10008⤵
- Program crash
PID:2356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 7648⤵
- Program crash
PID:2788
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit8⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"9⤵PID:2084
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"9⤵PID:4112
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E9⤵PID:4052
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"9⤵PID:2232
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"9⤵PID:3908
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E9⤵PID:4040
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 7568⤵
- Program crash
PID:2904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 12648⤵
- Program crash
PID:3996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 7608⤵
- Program crash
PID:4192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 10008⤵
- Program crash
PID:2904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 10528⤵
- Program crash
PID:3800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 16208⤵
- Program crash
PID:3180
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main8⤵
- Loads dropped DLL
PID:5048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 14928⤵
- Program crash
PID:2316
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 14327⤵
- Program crash
PID:2224
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c30165094.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c30165094.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4448 -s 13766⤵
- Program crash
PID:2032
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d53532297.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d53532297.exe4⤵
- Executes dropped EXE
PID:4112
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f45736132.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f45736132.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3840 -s 10644⤵
- Program crash
PID:3364
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g45081145.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g45081145.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1604 -ip 16041⤵PID:4784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1604 -ip 16041⤵PID:972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1604 -ip 16041⤵PID:2536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1604 -ip 16041⤵PID:4780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1604 -ip 16041⤵PID:2316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1604 -ip 16041⤵PID:4604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1604 -ip 16041⤵PID:1272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1604 -ip 16041⤵PID:1060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1604 -ip 16041⤵PID:3396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1604 -ip 16041⤵PID:4132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4540 -ip 45401⤵PID:4948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4540 -ip 45401⤵PID:3676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4540 -ip 45401⤵PID:4716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4540 -ip 45401⤵PID:1544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4540 -ip 45401⤵PID:4472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4540 -ip 45401⤵PID:2216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4540 -ip 45401⤵PID:2476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4540 -ip 45401⤵PID:4784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4540 -ip 45401⤵PID:1140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4540 -ip 45401⤵PID:2172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4540 -ip 45401⤵PID:4324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4540 -ip 45401⤵PID:3152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4540 -ip 45401⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:4888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4888 -s 3122⤵
- Program crash
PID:384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4888 -ip 48881⤵PID:4532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4448 -ip 44481⤵PID:4672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 3840 -ip 38401⤵PID:4052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4540 -ip 45401⤵PID:4072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4540 -ip 45401⤵PID:3628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4540 -ip 45401⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵
- Executes dropped EXE
PID:3444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 3122⤵
- Program crash
PID:2432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3444 -ip 34441⤵PID:4032
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD53072a4aaccab9c61e203948b50ebd559
SHA1dc0bf1a56f2bc9f0faedf967d7d327ba2d60f584
SHA256aab79f64fc2849cf1b86443403ede979984e4d9e66378abb8370db61e1849a55
SHA51234d71cb934e6c20293f12558a218d2afa53403dc8d8b75afc59be91cfde2a28a9115ff1a7de80039ba458c16791248695182e734c61054d6f0f20844e41e997c
-
Filesize
176KB
MD53072a4aaccab9c61e203948b50ebd559
SHA1dc0bf1a56f2bc9f0faedf967d7d327ba2d60f584
SHA256aab79f64fc2849cf1b86443403ede979984e4d9e66378abb8370db61e1849a55
SHA51234d71cb934e6c20293f12558a218d2afa53403dc8d8b75afc59be91cfde2a28a9115ff1a7de80039ba458c16791248695182e734c61054d6f0f20844e41e997c
-
Filesize
1.3MB
MD5784e01b2f55c79ede558ce0b9320521b
SHA18a08fcdc8e4eb691ada36374e9cdfcabe1a56e89
SHA256476ac49b10e4d1d41bdcdc7b6a285252d91ff09f0aab9074b1230e0ef49bd74b
SHA512aafef5bd4717626f27d848f6c43f0f61c8760b319b4f50c4c5f948f156b0261ef80f8b8b884dc07be764c960cfd319dcdf63b8ccdc9352fac29caafeced3f558
-
Filesize
1.3MB
MD5784e01b2f55c79ede558ce0b9320521b
SHA18a08fcdc8e4eb691ada36374e9cdfcabe1a56e89
SHA256476ac49b10e4d1d41bdcdc7b6a285252d91ff09f0aab9074b1230e0ef49bd74b
SHA512aafef5bd4717626f27d848f6c43f0f61c8760b319b4f50c4c5f948f156b0261ef80f8b8b884dc07be764c960cfd319dcdf63b8ccdc9352fac29caafeced3f558
-
Filesize
395KB
MD551066ee72e6d4b3de560128606897f9f
SHA11d5f7833e714d4cef7460bcc7953698d3e429e8f
SHA2569aca46a970d75780bf365c8752542bef268c7ac3ffde06f790a9c1102da63101
SHA512371a4a23fa164085975b271a6e0a55a69d3f6d6409899ebb26d7e5e3caa923e3d07d3f67f2d2776e61004ffb90184da892cb5cf5065b6dc1f81f23f0d7d08af5
-
Filesize
395KB
MD551066ee72e6d4b3de560128606897f9f
SHA11d5f7833e714d4cef7460bcc7953698d3e429e8f
SHA2569aca46a970d75780bf365c8752542bef268c7ac3ffde06f790a9c1102da63101
SHA512371a4a23fa164085975b271a6e0a55a69d3f6d6409899ebb26d7e5e3caa923e3d07d3f67f2d2776e61004ffb90184da892cb5cf5065b6dc1f81f23f0d7d08af5
-
Filesize
1015KB
MD524e1966acb300711d43d01507631e3de
SHA18b182aa58bef2d1ee084176453e56a0b3d230201
SHA2561613c6c75982bdad64ea72d984d9f47e43178b7aa44ba1807358f8ef3a89c890
SHA512f6131d8be905ae635b106a6537f5c376cc0b02b94a5fb682911754478097ea294bc0324553443cb30045860b46d6c88417c35de8d0f54b0fd8da74ad7d110ea0
-
Filesize
1015KB
MD524e1966acb300711d43d01507631e3de
SHA18b182aa58bef2d1ee084176453e56a0b3d230201
SHA2561613c6c75982bdad64ea72d984d9f47e43178b7aa44ba1807358f8ef3a89c890
SHA512f6131d8be905ae635b106a6537f5c376cc0b02b94a5fb682911754478097ea294bc0324553443cb30045860b46d6c88417c35de8d0f54b0fd8da74ad7d110ea0
-
Filesize
205KB
MD5122b59b55839f1fb5c15f231309d893d
SHA106f550092f26782ad3fb299806b9f922916f698e
SHA256afae89b4a1e62ae8c70b0d131eaa4b37f1f8536a83d532c4e1c6460788557317
SHA512c5f09b632d84ca34729172acea280dea488f1cb7fcfc4e1d422e0985bbe0cbede3bb9494e232b3000ae92f248c43e930a8481efc8468ec421191a8ae502dcc9e
-
Filesize
205KB
MD5122b59b55839f1fb5c15f231309d893d
SHA106f550092f26782ad3fb299806b9f922916f698e
SHA256afae89b4a1e62ae8c70b0d131eaa4b37f1f8536a83d532c4e1c6460788557317
SHA512c5f09b632d84ca34729172acea280dea488f1cb7fcfc4e1d422e0985bbe0cbede3bb9494e232b3000ae92f248c43e930a8481efc8468ec421191a8ae502dcc9e
-
Filesize
843KB
MD5d339ee3353d9d24237faee37ba69e795
SHA15debedb03ec05860c2a663361bb3e1a8da8fda95
SHA25646ce6a3b728770da809665560f5ae16b88a8b55d27c280f68424c5e53c294a52
SHA512968e389051a5b30a085c83ac4cbaa26c7db1fd3b27533c8a5a02d618da0a4dee2fcbc7bf13647725a32438caaa8f2183b278539fabe5df6165dda892676ae417
-
Filesize
843KB
MD5d339ee3353d9d24237faee37ba69e795
SHA15debedb03ec05860c2a663361bb3e1a8da8fda95
SHA25646ce6a3b728770da809665560f5ae16b88a8b55d27c280f68424c5e53c294a52
SHA512968e389051a5b30a085c83ac4cbaa26c7db1fd3b27533c8a5a02d618da0a4dee2fcbc7bf13647725a32438caaa8f2183b278539fabe5df6165dda892676ae417
-
Filesize
574KB
MD5336f9298bb357cf0770ab267aaaf3156
SHA16d16915b33425f82acf0b96c69c769af80eb0d51
SHA2566f1c3b9eae61b871f2bd27f3bc95cca8aba998fee8b45f89f4581d9d4d8fdbb8
SHA5126a0f5ef80f74ae6bc29ca611c94c20776dda9d12dc2e465ded8f5a8ce846a3ad654e1a40672dc1b4cbd63cd6299b7373bc76bc994e53099944aeff6ea5dbd937
-
Filesize
574KB
MD5336f9298bb357cf0770ab267aaaf3156
SHA16d16915b33425f82acf0b96c69c769af80eb0d51
SHA2566f1c3b9eae61b871f2bd27f3bc95cca8aba998fee8b45f89f4581d9d4d8fdbb8
SHA5126a0f5ef80f74ae6bc29ca611c94c20776dda9d12dc2e465ded8f5a8ce846a3ad654e1a40672dc1b4cbd63cd6299b7373bc76bc994e53099944aeff6ea5dbd937
-
Filesize
371KB
MD52cebadf577fe6f6f3c12f17c11c230cc
SHA1434758b05e5c0b95525187bbfc66a4ebda4a77fa
SHA256817ba0be5c900fcee95bb9945c28deed66eaa72112e32b4f8a35234d32edd89e
SHA512af44e3a4f25164cc85e00d258185c04e229c152fafce51c1d14498e9bed4ce0cfc8d064c497b54771e828aee93fb69ae8407c30fe584b2fd9ade53b77f737d82
-
Filesize
371KB
MD52cebadf577fe6f6f3c12f17c11c230cc
SHA1434758b05e5c0b95525187bbfc66a4ebda4a77fa
SHA256817ba0be5c900fcee95bb9945c28deed66eaa72112e32b4f8a35234d32edd89e
SHA512af44e3a4f25164cc85e00d258185c04e229c152fafce51c1d14498e9bed4ce0cfc8d064c497b54771e828aee93fb69ae8407c30fe584b2fd9ade53b77f737d82
-
Filesize
169KB
MD544842f02de9136d3073d7a210d7bbea8
SHA18fa007c23cc277d2eadb7b4c1882320a7fc7a391
SHA2561a17bfac2e0b37e479a3fecdd1cb3a85fab80984b296ee3bb8cd7654c63b9781
SHA5122e02a2640d1975fe120497bf6a3de5c8cab086d6361d3140cc8a32e9fb5a9fa6648f4da2b0a51892100a6d966daa0d437e572ef5fac9c8d07bf4747f576d5056
-
Filesize
169KB
MD544842f02de9136d3073d7a210d7bbea8
SHA18fa007c23cc277d2eadb7b4c1882320a7fc7a391
SHA2561a17bfac2e0b37e479a3fecdd1cb3a85fab80984b296ee3bb8cd7654c63b9781
SHA5122e02a2640d1975fe120497bf6a3de5c8cab086d6361d3140cc8a32e9fb5a9fa6648f4da2b0a51892100a6d966daa0d437e572ef5fac9c8d07bf4747f576d5056
-
Filesize
369KB
MD51e361c643937485358e2eee7a45af193
SHA1c5d8dc47038c96f367cb2479a643d387fbd85950
SHA2569d579349264b3975a7bf803d47467829045aaac81837467638715edc7381e94b
SHA5123ee6dd642f8b3c62edd65af2f644b42a0445f41600b33816b23276349f268e54ae78f10e7909dc7f3549f4d0ba59b2b2e18fba0584a3a563411700950271cd28
-
Filesize
369KB
MD51e361c643937485358e2eee7a45af193
SHA1c5d8dc47038c96f367cb2479a643d387fbd85950
SHA2569d579349264b3975a7bf803d47467829045aaac81837467638715edc7381e94b
SHA5123ee6dd642f8b3c62edd65af2f644b42a0445f41600b33816b23276349f268e54ae78f10e7909dc7f3549f4d0ba59b2b2e18fba0584a3a563411700950271cd28
-
Filesize
369KB
MD51e361c643937485358e2eee7a45af193
SHA1c5d8dc47038c96f367cb2479a643d387fbd85950
SHA2569d579349264b3975a7bf803d47467829045aaac81837467638715edc7381e94b
SHA5123ee6dd642f8b3c62edd65af2f644b42a0445f41600b33816b23276349f268e54ae78f10e7909dc7f3549f4d0ba59b2b2e18fba0584a3a563411700950271cd28
-
Filesize
369KB
MD51e361c643937485358e2eee7a45af193
SHA1c5d8dc47038c96f367cb2479a643d387fbd85950
SHA2569d579349264b3975a7bf803d47467829045aaac81837467638715edc7381e94b
SHA5123ee6dd642f8b3c62edd65af2f644b42a0445f41600b33816b23276349f268e54ae78f10e7909dc7f3549f4d0ba59b2b2e18fba0584a3a563411700950271cd28
-
Filesize
369KB
MD51e361c643937485358e2eee7a45af193
SHA1c5d8dc47038c96f367cb2479a643d387fbd85950
SHA2569d579349264b3975a7bf803d47467829045aaac81837467638715edc7381e94b
SHA5123ee6dd642f8b3c62edd65af2f644b42a0445f41600b33816b23276349f268e54ae78f10e7909dc7f3549f4d0ba59b2b2e18fba0584a3a563411700950271cd28
-
Filesize
369KB
MD51e361c643937485358e2eee7a45af193
SHA1c5d8dc47038c96f367cb2479a643d387fbd85950
SHA2569d579349264b3975a7bf803d47467829045aaac81837467638715edc7381e94b
SHA5123ee6dd642f8b3c62edd65af2f644b42a0445f41600b33816b23276349f268e54ae78f10e7909dc7f3549f4d0ba59b2b2e18fba0584a3a563411700950271cd28
-
Filesize
369KB
MD51e361c643937485358e2eee7a45af193
SHA1c5d8dc47038c96f367cb2479a643d387fbd85950
SHA2569d579349264b3975a7bf803d47467829045aaac81837467638715edc7381e94b
SHA5123ee6dd642f8b3c62edd65af2f644b42a0445f41600b33816b23276349f268e54ae78f10e7909dc7f3549f4d0ba59b2b2e18fba0584a3a563411700950271cd28
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
89KB
MD5cfe2ef912f30ac9bc36d8686888ca0d3
SHA1ddbbb63670b2f5bd903dadcff54ff8270825499b
SHA256675771ae0ef1ba5c7fdde82f950461c2c4487e56b3fc41f5c544b73c8b33f10d
SHA5125e0f51d137000e42e9cd0a41ab9de5a4c91bda677fce992f7b391ea5f9cb7cfb44c31a990bc6249b9dfed8f346881311c7c56f63fb1ef41ea8f757247cd9b68a
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf