Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2023, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
889aca8eb3e11ae5630ff615ffbe7b71924f0f789e8c22431e16d169f41a310b.exe
Resource
win10v2004-20230221-en
General
-
Target
889aca8eb3e11ae5630ff615ffbe7b71924f0f789e8c22431e16d169f41a310b.exe
-
Size
1.4MB
-
MD5
618dd2dc23d3793e80b51d6e68a19e8a
-
SHA1
9da066e0639521fd35c5eff02bf35ec3ebad9ae2
-
SHA256
889aca8eb3e11ae5630ff615ffbe7b71924f0f789e8c22431e16d169f41a310b
-
SHA512
f76b2633d6e9785e3fd9e4eb4aaf233a49383301f24e5c0b3b29a7b1f7b99e41dd2b852d1e0b8b71d949ea9e0a8a0a08affa29d62b145b3324e0054ecce25557
-
SSDEEP
24576:vytSnmM/cZawZ9VBLKLdG00nttFXGxW57M2WVciGWAC/tpCpZAvQfP7uU:6t5JZDFhdnt7XGMdvfWkAvoz
Malware Config
Extracted
redline
mask
217.196.96.56:4138
-
auth_value
31aef25be0febb8e491794ef7f502c50
Extracted
redline
boom
217.196.96.56:4138
-
auth_value
1ce6aebe15bac07a7bc88b114bc49335
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5869796.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5869796.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5869796.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" d7902262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" d7902262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" d7902262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" d7902262.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a5869796.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5869796.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d7902262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5869796.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation e9853667.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation c8820539.exe -
Executes dropped EXE 14 IoCs
pid Process 3980 v3418592.exe 4832 v8675245.exe 4808 v6046378.exe 4704 v8855124.exe 8 a5869796.exe 2156 b5194417.exe 424 c8820539.exe 1376 oneetx.exe 60 d7902262.exe 4956 e9853667.exe 4020 1.exe 232 f6751349.exe 1340 oneetx.exe 1016 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4928 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a5869796.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a5869796.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d7902262.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6046378.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8855124.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v8855124.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 889aca8eb3e11ae5630ff615ffbe7b71924f0f789e8c22431e16d169f41a310b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3418592.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3418592.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v6046378.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 889aca8eb3e11ae5630ff615ffbe7b71924f0f789e8c22431e16d169f41a310b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8675245.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8675245.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 32 IoCs
pid pid_target Process procid_target 2856 8 WerFault.exe 88 2764 424 WerFault.exe 99 4964 424 WerFault.exe 99 3372 424 WerFault.exe 99 964 424 WerFault.exe 99 4952 424 WerFault.exe 99 1700 424 WerFault.exe 99 1924 424 WerFault.exe 99 2908 424 WerFault.exe 99 4984 424 WerFault.exe 99 2484 424 WerFault.exe 99 780 1376 WerFault.exe 119 4672 1376 WerFault.exe 119 5080 1376 WerFault.exe 119 4092 1376 WerFault.exe 119 1568 1376 WerFault.exe 119 4044 1376 WerFault.exe 119 3944 1376 WerFault.exe 119 460 1376 WerFault.exe 119 3780 1376 WerFault.exe 119 2848 1376 WerFault.exe 119 4468 1376 WerFault.exe 119 4148 1376 WerFault.exe 119 3368 1376 WerFault.exe 119 2904 1376 WerFault.exe 119 1208 4956 WerFault.exe 161 780 1340 WerFault.exe 166 4436 1376 WerFault.exe 119 5004 1376 WerFault.exe 119 2168 1376 WerFault.exe 119 4940 1376 WerFault.exe 119 3600 1016 WerFault.exe 176 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3144 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 8 a5869796.exe 8 a5869796.exe 2156 b5194417.exe 2156 b5194417.exe 60 d7902262.exe 60 d7902262.exe 4020 1.exe 4020 1.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 8 a5869796.exe Token: SeDebugPrivilege 2156 b5194417.exe Token: SeDebugPrivilege 60 d7902262.exe Token: SeDebugPrivilege 4956 e9853667.exe Token: SeDebugPrivilege 4020 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 424 c8820539.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2120 wrote to memory of 3980 2120 889aca8eb3e11ae5630ff615ffbe7b71924f0f789e8c22431e16d169f41a310b.exe 84 PID 2120 wrote to memory of 3980 2120 889aca8eb3e11ae5630ff615ffbe7b71924f0f789e8c22431e16d169f41a310b.exe 84 PID 2120 wrote to memory of 3980 2120 889aca8eb3e11ae5630ff615ffbe7b71924f0f789e8c22431e16d169f41a310b.exe 84 PID 3980 wrote to memory of 4832 3980 v3418592.exe 85 PID 3980 wrote to memory of 4832 3980 v3418592.exe 85 PID 3980 wrote to memory of 4832 3980 v3418592.exe 85 PID 4832 wrote to memory of 4808 4832 v8675245.exe 86 PID 4832 wrote to memory of 4808 4832 v8675245.exe 86 PID 4832 wrote to memory of 4808 4832 v8675245.exe 86 PID 4808 wrote to memory of 4704 4808 v6046378.exe 87 PID 4808 wrote to memory of 4704 4808 v6046378.exe 87 PID 4808 wrote to memory of 4704 4808 v6046378.exe 87 PID 4704 wrote to memory of 8 4704 v8855124.exe 88 PID 4704 wrote to memory of 8 4704 v8855124.exe 88 PID 4704 wrote to memory of 8 4704 v8855124.exe 88 PID 4704 wrote to memory of 2156 4704 v8855124.exe 98 PID 4704 wrote to memory of 2156 4704 v8855124.exe 98 PID 4704 wrote to memory of 2156 4704 v8855124.exe 98 PID 4808 wrote to memory of 424 4808 v6046378.exe 99 PID 4808 wrote to memory of 424 4808 v6046378.exe 99 PID 4808 wrote to memory of 424 4808 v6046378.exe 99 PID 424 wrote to memory of 1376 424 c8820539.exe 119 PID 424 wrote to memory of 1376 424 c8820539.exe 119 PID 424 wrote to memory of 1376 424 c8820539.exe 119 PID 4832 wrote to memory of 60 4832 v8675245.exe 122 PID 4832 wrote to memory of 60 4832 v8675245.exe 122 PID 4832 wrote to memory of 60 4832 v8675245.exe 122 PID 1376 wrote to memory of 3144 1376 oneetx.exe 139 PID 1376 wrote to memory of 3144 1376 oneetx.exe 139 PID 1376 wrote to memory of 3144 1376 oneetx.exe 139 PID 1376 wrote to memory of 4248 1376 oneetx.exe 145 PID 1376 wrote to memory of 4248 1376 oneetx.exe 145 PID 1376 wrote to memory of 4248 1376 oneetx.exe 145 PID 4248 wrote to memory of 1880 4248 cmd.exe 149 PID 4248 wrote to memory of 1880 4248 cmd.exe 149 PID 4248 wrote to memory of 1880 4248 cmd.exe 149 PID 4248 wrote to memory of 1168 4248 cmd.exe 150 PID 4248 wrote to memory of 1168 4248 cmd.exe 150 PID 4248 wrote to memory of 1168 4248 cmd.exe 150 PID 4248 wrote to memory of 4872 4248 cmd.exe 151 PID 4248 wrote to memory of 4872 4248 cmd.exe 151 PID 4248 wrote to memory of 4872 4248 cmd.exe 151 PID 4248 wrote to memory of 4328 4248 cmd.exe 152 PID 4248 wrote to memory of 4328 4248 cmd.exe 152 PID 4248 wrote to memory of 4328 4248 cmd.exe 152 PID 4248 wrote to memory of 4544 4248 cmd.exe 153 PID 4248 wrote to memory of 4544 4248 cmd.exe 153 PID 4248 wrote to memory of 4544 4248 cmd.exe 153 PID 4248 wrote to memory of 4136 4248 cmd.exe 154 PID 4248 wrote to memory of 4136 4248 cmd.exe 154 PID 4248 wrote to memory of 4136 4248 cmd.exe 154 PID 3980 wrote to memory of 4956 3980 v3418592.exe 161 PID 3980 wrote to memory of 4956 3980 v3418592.exe 161 PID 3980 wrote to memory of 4956 3980 v3418592.exe 161 PID 4956 wrote to memory of 4020 4956 e9853667.exe 162 PID 4956 wrote to memory of 4020 4956 e9853667.exe 162 PID 4956 wrote to memory of 4020 4956 e9853667.exe 162 PID 2120 wrote to memory of 232 2120 889aca8eb3e11ae5630ff615ffbe7b71924f0f789e8c22431e16d169f41a310b.exe 165 PID 2120 wrote to memory of 232 2120 889aca8eb3e11ae5630ff615ffbe7b71924f0f789e8c22431e16d169f41a310b.exe 165 PID 2120 wrote to memory of 232 2120 889aca8eb3e11ae5630ff615ffbe7b71924f0f789e8c22431e16d169f41a310b.exe 165 PID 1376 wrote to memory of 4928 1376 oneetx.exe 173 PID 1376 wrote to memory of 4928 1376 oneetx.exe 173 PID 1376 wrote to memory of 4928 1376 oneetx.exe 173
Processes
-
C:\Users\Admin\AppData\Local\Temp\889aca8eb3e11ae5630ff615ffbe7b71924f0f789e8c22431e16d169f41a310b.exe"C:\Users\Admin\AppData\Local\Temp\889aca8eb3e11ae5630ff615ffbe7b71924f0f789e8c22431e16d169f41a310b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3418592.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3418592.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8675245.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8675245.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6046378.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6046378.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8855124.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8855124.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5869796.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5869796.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:8 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 10807⤵
- Program crash
PID:2856
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5194417.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5194417.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8820539.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c8820539.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 424 -s 6966⤵
- Program crash
PID:2764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 424 -s 7726⤵
- Program crash
PID:4964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 424 -s 8806⤵
- Program crash
PID:3372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 424 -s 8886⤵
- Program crash
PID:964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 424 -s 8926⤵
- Program crash
PID:4952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 424 -s 9926⤵
- Program crash
PID:1700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 424 -s 12166⤵
- Program crash
PID:1924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 424 -s 12086⤵
- Program crash
PID:2908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 424 -s 13166⤵
- Program crash
PID:4984
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 6967⤵
- Program crash
PID:780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 10047⤵
- Program crash
PID:4672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 10727⤵
- Program crash
PID:5080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 10807⤵
- Program crash
PID:4092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 11007⤵
- Program crash
PID:1568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 10047⤵
- Program crash
PID:4044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 11527⤵
- Program crash
PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 10967⤵
- Program crash
PID:460
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F7⤵
- Creates scheduled task(s)
PID:3144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 9927⤵
- Program crash
PID:3780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 8007⤵
- Program crash
PID:2848
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1880
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"8⤵PID:1168
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E8⤵PID:4872
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4328
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"8⤵PID:4544
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E8⤵PID:4136
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 8887⤵
- Program crash
PID:4468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 7967⤵
- Program crash
PID:4148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 13047⤵
- Program crash
PID:3368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 13087⤵
- Program crash
PID:2904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 11807⤵
- Program crash
PID:4436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 16367⤵
- Program crash
PID:5004
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 15807⤵
- Program crash
PID:2168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 16447⤵
- Program crash
PID:4940
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 424 -s 17526⤵
- Program crash
PID:2484
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d7902262.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d7902262.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:60
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e9853667.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e9853667.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 13844⤵
- Program crash
PID:1208
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f6751349.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f6751349.exe2⤵
- Executes dropped EXE
PID:232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 8 -ip 81⤵PID:884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 424 -ip 4241⤵PID:1572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 424 -ip 4241⤵PID:4108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 424 -ip 4241⤵PID:3644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 424 -ip 4241⤵PID:444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 424 -ip 4241⤵PID:5032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 424 -ip 4241⤵PID:2448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 424 -ip 4241⤵PID:2884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 424 -ip 4241⤵PID:4980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 424 -ip 4241⤵PID:2912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 424 -ip 4241⤵PID:1148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1376 -ip 13761⤵PID:5024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1376 -ip 13761⤵PID:3116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1376 -ip 13761⤵PID:1408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1376 -ip 13761⤵PID:4296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1376 -ip 13761⤵PID:4032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1376 -ip 13761⤵PID:1128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1376 -ip 13761⤵PID:1344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1376 -ip 13761⤵PID:2656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1376 -ip 13761⤵PID:884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1376 -ip 13761⤵PID:2616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1376 -ip 13761⤵PID:3484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1376 -ip 13761⤵PID:3784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1376 -ip 13761⤵PID:1452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1376 -ip 13761⤵PID:3120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4956 -ip 49561⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1340 -s 3122⤵
- Program crash
PID:780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1340 -ip 13401⤵PID:1968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1376 -ip 13761⤵PID:1472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1376 -ip 13761⤵PID:5084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1376 -ip 13761⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 3122⤵
- Program crash
PID:3600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1376 -ip 13761⤵PID:3144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1016 -ip 10161⤵PID:2176
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5ff3f2e2d2f4dfe0cc9a29b492edac505
SHA16d954a3393a0f34c21203f2d583c30d297e25bdf
SHA256591037939544b3699a02788b79c0f6d7946f86c840c3c9c065a4bbef22cfe8ba
SHA5124d48075b8a1b19321924e45c85c19a21586fe52144800c9ccaebe7579023970cb21cae486c1359126f2df8c89b808cf13fba19c342b6a24497b1b501a0b714d0
-
Filesize
205KB
MD5ff3f2e2d2f4dfe0cc9a29b492edac505
SHA16d954a3393a0f34c21203f2d583c30d297e25bdf
SHA256591037939544b3699a02788b79c0f6d7946f86c840c3c9c065a4bbef22cfe8ba
SHA5124d48075b8a1b19321924e45c85c19a21586fe52144800c9ccaebe7579023970cb21cae486c1359126f2df8c89b808cf13fba19c342b6a24497b1b501a0b714d0
-
Filesize
1.3MB
MD57b99012d91c23c99d142d379f9bde443
SHA16e7fb7441a528094f23453fcbff98b188fdb874a
SHA2560a12ed8f79214440c08f459757d192496aa767849283a02764d9ccadbb4ef252
SHA512ae8ec2608aa40db8b5312453f3d1a7ab261273fc0dd4df8abb1cf24aaedc5fab6ecc9200c1ad702b354ec5eb05638d14df098a8c6e7d4bc2cee42a3655c55925
-
Filesize
1.3MB
MD57b99012d91c23c99d142d379f9bde443
SHA16e7fb7441a528094f23453fcbff98b188fdb874a
SHA2560a12ed8f79214440c08f459757d192496aa767849283a02764d9ccadbb4ef252
SHA512ae8ec2608aa40db8b5312453f3d1a7ab261273fc0dd4df8abb1cf24aaedc5fab6ecc9200c1ad702b354ec5eb05638d14df098a8c6e7d4bc2cee42a3655c55925
-
Filesize
475KB
MD5b947f9232c7d70eeb1a55f5bd88afa27
SHA1449c8edac39405a4c272c09f9ac35711abad6d84
SHA256338b74794877d5a7c22619cc887124ef1867dbc1ee1a55294d8c017a95d83023
SHA51296be2c4efcbbd7623c7cdb0fc5764be1e3bd47d06e7b7f817df72c8fb00dd2b3f635bda686f242b62af1ef6a7cb03a11e805ce3b9e98c321e8f1d5937e017dad
-
Filesize
475KB
MD5b947f9232c7d70eeb1a55f5bd88afa27
SHA1449c8edac39405a4c272c09f9ac35711abad6d84
SHA256338b74794877d5a7c22619cc887124ef1867dbc1ee1a55294d8c017a95d83023
SHA51296be2c4efcbbd7623c7cdb0fc5764be1e3bd47d06e7b7f817df72c8fb00dd2b3f635bda686f242b62af1ef6a7cb03a11e805ce3b9e98c321e8f1d5937e017dad
-
Filesize
846KB
MD5706a3f96db97be751bbd888038244f39
SHA1c87efed71fffa0d539728d31144709c525f9aa96
SHA2561352734ee958b396438dbce80ee9c699ff0b612a9aa8035a4bdf04bf404bf403
SHA5129ce8c94d539eeac1e3fd459c9be47f2794411ed57a1ce2aeddfe50e199f43d3c431f226e37ea0483e08568cb9a6a8f783c008297c6c9806a64e7144ff5127fda
-
Filesize
846KB
MD5706a3f96db97be751bbd888038244f39
SHA1c87efed71fffa0d539728d31144709c525f9aa96
SHA2561352734ee958b396438dbce80ee9c699ff0b612a9aa8035a4bdf04bf404bf403
SHA5129ce8c94d539eeac1e3fd459c9be47f2794411ed57a1ce2aeddfe50e199f43d3c431f226e37ea0483e08568cb9a6a8f783c008297c6c9806a64e7144ff5127fda
-
Filesize
178KB
MD59e506909d44204b311f5e294f5ddd27f
SHA1e03e575542c4426d0ae0986ec4238fcf10972930
SHA256d03ce1324a05e87c0f782b1271399ba5b258eb5ff5bcdf8c24b28de13ebe0d52
SHA512b2e1bb66dfb9ba2f646b6d7c81b002b445d92c2810479a182a9faccc7d4f8532ae38ffd48733429b3aa88432c9fc16e5e7c76412b6d5953b0c0b86a3b87afe97
-
Filesize
178KB
MD59e506909d44204b311f5e294f5ddd27f
SHA1e03e575542c4426d0ae0986ec4238fcf10972930
SHA256d03ce1324a05e87c0f782b1271399ba5b258eb5ff5bcdf8c24b28de13ebe0d52
SHA512b2e1bb66dfb9ba2f646b6d7c81b002b445d92c2810479a182a9faccc7d4f8532ae38ffd48733429b3aa88432c9fc16e5e7c76412b6d5953b0c0b86a3b87afe97
-
Filesize
642KB
MD57fd9afc65a920b5eabe166d68c11abd7
SHA14153bc72731a452560a44097826fa91943ae0377
SHA25648a3a6e77e38a173328bb5abe36ec8d47caa3596b4944c41c446ad2aa9e967bc
SHA512b463ee8e18b6b2025698b595cdfd79282da0981cff8c58b7d599513ad4625bbd12183f2521262e5189f0e2fec1810ade49f172eafda3ee4f59ab4d09b3c8b058
-
Filesize
642KB
MD57fd9afc65a920b5eabe166d68c11abd7
SHA14153bc72731a452560a44097826fa91943ae0377
SHA25648a3a6e77e38a173328bb5abe36ec8d47caa3596b4944c41c446ad2aa9e967bc
SHA512b463ee8e18b6b2025698b595cdfd79282da0981cff8c58b7d599513ad4625bbd12183f2521262e5189f0e2fec1810ade49f172eafda3ee4f59ab4d09b3c8b058
-
Filesize
268KB
MD54ce462e3392fb1de170bc03d9d0e7403
SHA19cf04b4e227686f318ed19f4c8ce7d95db387f23
SHA25658d2bd54892876b5d6f0d3591554aade35f84fe053a29b653931caeaf5629e9a
SHA512f717d379022a7366b4c79ca948edd3c265c583a00c6d75415c0b1f3776ab78b3021b30631ef8a54065fcc483e977018a20e63136b2fdfdc647ce38883fece733
-
Filesize
268KB
MD54ce462e3392fb1de170bc03d9d0e7403
SHA19cf04b4e227686f318ed19f4c8ce7d95db387f23
SHA25658d2bd54892876b5d6f0d3591554aade35f84fe053a29b653931caeaf5629e9a
SHA512f717d379022a7366b4c79ca948edd3c265c583a00c6d75415c0b1f3776ab78b3021b30631ef8a54065fcc483e977018a20e63136b2fdfdc647ce38883fece733
-
Filesize
383KB
MD5170a2e44d21a4e6f98599ee1efb4978d
SHA192dee689b06c995daef7440485a8c89dd927f5af
SHA256870a2acfb39f107eb95eef67cb9729852cca40ba3785a3b004ee65710fb41b70
SHA512568fc6e6347afeeb77d86c1caae677f4c2e1496ce6357ead1f21faa6b6ec95d1545a1f50bac52f2ec1b61bdca89b274cc6b1d4aa4047d15e9c4eb66e360a41d1
-
Filesize
383KB
MD5170a2e44d21a4e6f98599ee1efb4978d
SHA192dee689b06c995daef7440485a8c89dd927f5af
SHA256870a2acfb39f107eb95eef67cb9729852cca40ba3785a3b004ee65710fb41b70
SHA512568fc6e6347afeeb77d86c1caae677f4c2e1496ce6357ead1f21faa6b6ec95d1545a1f50bac52f2ec1b61bdca89b274cc6b1d4aa4047d15e9c4eb66e360a41d1
-
Filesize
289KB
MD50ae397a5ce447a5b0c0805bad22aceb7
SHA1b1d718919c159e981cce17f6698f3b820cddee29
SHA256bb33c6e5d6be2aacd04fd38e0e6dddcd05800a6e4c4ca00a9559139c0b38ae84
SHA512256c646adaf0fba458353b9f7d2e7a794191af79bc974be69833bc6136e248761f2205d7fea6849674b9126fe1e2b9cee15f00d04b50cd85921af4868e7a925a
-
Filesize
289KB
MD50ae397a5ce447a5b0c0805bad22aceb7
SHA1b1d718919c159e981cce17f6698f3b820cddee29
SHA256bb33c6e5d6be2aacd04fd38e0e6dddcd05800a6e4c4ca00a9559139c0b38ae84
SHA512256c646adaf0fba458353b9f7d2e7a794191af79bc974be69833bc6136e248761f2205d7fea6849674b9126fe1e2b9cee15f00d04b50cd85921af4868e7a925a
-
Filesize
168KB
MD5aab172b6656f5eb54f431cd432644e95
SHA14b771cdd7e23bf62773b154417b5d0f2a0b562b9
SHA25654d666ed3a2ba6ff1938bb61a7acbe1eed28981d3993bdd87314e877bcfe0bd5
SHA512faae84d9112856c1926c86e4741e2d7b0cbc443760f7c0ab8712d153cc2e07a394813ea67256a25238ed20b9511507f9e1754445bffd58ac5caa8c63c3edf63d
-
Filesize
168KB
MD5aab172b6656f5eb54f431cd432644e95
SHA14b771cdd7e23bf62773b154417b5d0f2a0b562b9
SHA25654d666ed3a2ba6ff1938bb61a7acbe1eed28981d3993bdd87314e877bcfe0bd5
SHA512faae84d9112856c1926c86e4741e2d7b0cbc443760f7c0ab8712d153cc2e07a394813ea67256a25238ed20b9511507f9e1754445bffd58ac5caa8c63c3edf63d
-
Filesize
268KB
MD54ce462e3392fb1de170bc03d9d0e7403
SHA19cf04b4e227686f318ed19f4c8ce7d95db387f23
SHA25658d2bd54892876b5d6f0d3591554aade35f84fe053a29b653931caeaf5629e9a
SHA512f717d379022a7366b4c79ca948edd3c265c583a00c6d75415c0b1f3776ab78b3021b30631ef8a54065fcc483e977018a20e63136b2fdfdc647ce38883fece733
-
Filesize
268KB
MD54ce462e3392fb1de170bc03d9d0e7403
SHA19cf04b4e227686f318ed19f4c8ce7d95db387f23
SHA25658d2bd54892876b5d6f0d3591554aade35f84fe053a29b653931caeaf5629e9a
SHA512f717d379022a7366b4c79ca948edd3c265c583a00c6d75415c0b1f3776ab78b3021b30631ef8a54065fcc483e977018a20e63136b2fdfdc647ce38883fece733
-
Filesize
268KB
MD54ce462e3392fb1de170bc03d9d0e7403
SHA19cf04b4e227686f318ed19f4c8ce7d95db387f23
SHA25658d2bd54892876b5d6f0d3591554aade35f84fe053a29b653931caeaf5629e9a
SHA512f717d379022a7366b4c79ca948edd3c265c583a00c6d75415c0b1f3776ab78b3021b30631ef8a54065fcc483e977018a20e63136b2fdfdc647ce38883fece733
-
Filesize
268KB
MD54ce462e3392fb1de170bc03d9d0e7403
SHA19cf04b4e227686f318ed19f4c8ce7d95db387f23
SHA25658d2bd54892876b5d6f0d3591554aade35f84fe053a29b653931caeaf5629e9a
SHA512f717d379022a7366b4c79ca948edd3c265c583a00c6d75415c0b1f3776ab78b3021b30631ef8a54065fcc483e977018a20e63136b2fdfdc647ce38883fece733
-
Filesize
268KB
MD54ce462e3392fb1de170bc03d9d0e7403
SHA19cf04b4e227686f318ed19f4c8ce7d95db387f23
SHA25658d2bd54892876b5d6f0d3591554aade35f84fe053a29b653931caeaf5629e9a
SHA512f717d379022a7366b4c79ca948edd3c265c583a00c6d75415c0b1f3776ab78b3021b30631ef8a54065fcc483e977018a20e63136b2fdfdc647ce38883fece733
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b