Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2023, 17:30
Static task
static1
Behavioral task
behavioral1
Sample
0b47b14e356616bf30f9e0f7205f98fa1a8b5a115c9fcc1d968b4b86e0b08dd1.exe
Resource
win10v2004-20230220-en
General
-
Target
0b47b14e356616bf30f9e0f7205f98fa1a8b5a115c9fcc1d968b4b86e0b08dd1.exe
-
Size
1.5MB
-
MD5
9b776b053559abac6e55df060e72d8fc
-
SHA1
8672d2d8b754e2fdfa11094864c09bdec59538a1
-
SHA256
0b47b14e356616bf30f9e0f7205f98fa1a8b5a115c9fcc1d968b4b86e0b08dd1
-
SHA512
e7555716429524573b15a6e8aa322da6c84e08b912f9674b7197bca271d6a09b706d5e96a8fa1ea1025d71010ec0d79c40e4950cb82ea491713415178e45b1f0
-
SSDEEP
24576:my/zgTVa/Is053sXwGrky/gPmORIpxl5ymjd7voB8GF+k1LdriVdQzzbaHjB0:1/zg0/I1j07KmORIvl5yk9voBJF+khB+
Malware Config
Extracted
redline
mask
217.196.96.56:4138
-
auth_value
31aef25be0febb8e491794ef7f502c50
Extracted
redline
boom
217.196.96.56:4138
-
auth_value
1ce6aebe15bac07a7bc88b114bc49335
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" d1206410.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a3122097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a3122097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a3122097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" d1206410.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" d1206410.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d1206410.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a3122097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a3122097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a3122097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" d1206410.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation c5148689.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation e3989437.exe -
Executes dropped EXE 14 IoCs
pid Process 1164 v1379387.exe 2416 v9255864.exe 3984 v4317121.exe 2784 v3791748.exe 1756 a3122097.exe 648 b8126466.exe 3288 c5148689.exe 4136 oneetx.exe 1268 d1206410.exe 3584 e3989437.exe 3360 1.exe 2252 f8845565.exe 4692 oneetx.exe 2376 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 432 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a3122097.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d1206410.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a3122097.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1379387.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1379387.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9255864.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v9255864.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4317121.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v4317121.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3791748.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0b47b14e356616bf30f9e0f7205f98fa1a8b5a115c9fcc1d968b4b86e0b08dd1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v3791748.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0b47b14e356616bf30f9e0f7205f98fa1a8b5a115c9fcc1d968b4b86e0b08dd1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 31 IoCs
pid pid_target Process procid_target 4852 1756 WerFault.exe 87 2908 3288 WerFault.exe 95 3996 3288 WerFault.exe 95 4808 3288 WerFault.exe 95 5112 3288 WerFault.exe 95 2728 3288 WerFault.exe 95 4492 3288 WerFault.exe 95 1248 3288 WerFault.exe 95 1948 3288 WerFault.exe 95 1712 3288 WerFault.exe 95 3724 3288 WerFault.exe 95 4864 4136 WerFault.exe 115 4900 4136 WerFault.exe 115 3868 4136 WerFault.exe 115 2412 4136 WerFault.exe 115 2212 4136 WerFault.exe 115 3044 4136 WerFault.exe 115 1400 4136 WerFault.exe 115 3944 4136 WerFault.exe 115 860 4136 WerFault.exe 115 3124 4136 WerFault.exe 115 4668 4136 WerFault.exe 115 1552 4136 WerFault.exe 115 3968 4136 WerFault.exe 115 4388 3584 WerFault.exe 159 2432 4136 WerFault.exe 115 1620 4692 WerFault.exe 166 1740 4136 WerFault.exe 115 2892 4136 WerFault.exe 115 4488 4136 WerFault.exe 115 4244 2376 WerFault.exe 176 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5056 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1756 a3122097.exe 1756 a3122097.exe 648 b8126466.exe 648 b8126466.exe 1268 d1206410.exe 1268 d1206410.exe 3360 1.exe 3360 1.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1756 a3122097.exe Token: SeDebugPrivilege 648 b8126466.exe Token: SeDebugPrivilege 1268 d1206410.exe Token: SeDebugPrivilege 3584 e3989437.exe Token: SeDebugPrivilege 3360 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3288 c5148689.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 5036 wrote to memory of 1164 5036 0b47b14e356616bf30f9e0f7205f98fa1a8b5a115c9fcc1d968b4b86e0b08dd1.exe 83 PID 5036 wrote to memory of 1164 5036 0b47b14e356616bf30f9e0f7205f98fa1a8b5a115c9fcc1d968b4b86e0b08dd1.exe 83 PID 5036 wrote to memory of 1164 5036 0b47b14e356616bf30f9e0f7205f98fa1a8b5a115c9fcc1d968b4b86e0b08dd1.exe 83 PID 1164 wrote to memory of 2416 1164 v1379387.exe 84 PID 1164 wrote to memory of 2416 1164 v1379387.exe 84 PID 1164 wrote to memory of 2416 1164 v1379387.exe 84 PID 2416 wrote to memory of 3984 2416 v9255864.exe 85 PID 2416 wrote to memory of 3984 2416 v9255864.exe 85 PID 2416 wrote to memory of 3984 2416 v9255864.exe 85 PID 3984 wrote to memory of 2784 3984 v4317121.exe 86 PID 3984 wrote to memory of 2784 3984 v4317121.exe 86 PID 3984 wrote to memory of 2784 3984 v4317121.exe 86 PID 2784 wrote to memory of 1756 2784 v3791748.exe 87 PID 2784 wrote to memory of 1756 2784 v3791748.exe 87 PID 2784 wrote to memory of 1756 2784 v3791748.exe 87 PID 2784 wrote to memory of 648 2784 v3791748.exe 94 PID 2784 wrote to memory of 648 2784 v3791748.exe 94 PID 2784 wrote to memory of 648 2784 v3791748.exe 94 PID 3984 wrote to memory of 3288 3984 v4317121.exe 95 PID 3984 wrote to memory of 3288 3984 v4317121.exe 95 PID 3984 wrote to memory of 3288 3984 v4317121.exe 95 PID 3288 wrote to memory of 4136 3288 c5148689.exe 115 PID 3288 wrote to memory of 4136 3288 c5148689.exe 115 PID 3288 wrote to memory of 4136 3288 c5148689.exe 115 PID 2416 wrote to memory of 1268 2416 v9255864.exe 118 PID 2416 wrote to memory of 1268 2416 v9255864.exe 118 PID 2416 wrote to memory of 1268 2416 v9255864.exe 118 PID 4136 wrote to memory of 5056 4136 oneetx.exe 134 PID 4136 wrote to memory of 5056 4136 oneetx.exe 134 PID 4136 wrote to memory of 5056 4136 oneetx.exe 134 PID 4136 wrote to memory of 4892 4136 oneetx.exe 140 PID 4136 wrote to memory of 4892 4136 oneetx.exe 140 PID 4136 wrote to memory of 4892 4136 oneetx.exe 140 PID 4892 wrote to memory of 3752 4892 cmd.exe 144 PID 4892 wrote to memory of 3752 4892 cmd.exe 144 PID 4892 wrote to memory of 3752 4892 cmd.exe 144 PID 4892 wrote to memory of 3836 4892 cmd.exe 145 PID 4892 wrote to memory of 3836 4892 cmd.exe 145 PID 4892 wrote to memory of 3836 4892 cmd.exe 145 PID 4892 wrote to memory of 392 4892 cmd.exe 146 PID 4892 wrote to memory of 392 4892 cmd.exe 146 PID 4892 wrote to memory of 392 4892 cmd.exe 146 PID 4892 wrote to memory of 832 4892 cmd.exe 147 PID 4892 wrote to memory of 832 4892 cmd.exe 147 PID 4892 wrote to memory of 832 4892 cmd.exe 147 PID 4892 wrote to memory of 4688 4892 cmd.exe 148 PID 4892 wrote to memory of 4688 4892 cmd.exe 148 PID 4892 wrote to memory of 4688 4892 cmd.exe 148 PID 4892 wrote to memory of 4496 4892 cmd.exe 149 PID 4892 wrote to memory of 4496 4892 cmd.exe 149 PID 4892 wrote to memory of 4496 4892 cmd.exe 149 PID 1164 wrote to memory of 3584 1164 v1379387.exe 159 PID 1164 wrote to memory of 3584 1164 v1379387.exe 159 PID 1164 wrote to memory of 3584 1164 v1379387.exe 159 PID 3584 wrote to memory of 3360 3584 e3989437.exe 160 PID 3584 wrote to memory of 3360 3584 e3989437.exe 160 PID 3584 wrote to memory of 3360 3584 e3989437.exe 160 PID 5036 wrote to memory of 2252 5036 0b47b14e356616bf30f9e0f7205f98fa1a8b5a115c9fcc1d968b4b86e0b08dd1.exe 163 PID 5036 wrote to memory of 2252 5036 0b47b14e356616bf30f9e0f7205f98fa1a8b5a115c9fcc1d968b4b86e0b08dd1.exe 163 PID 5036 wrote to memory of 2252 5036 0b47b14e356616bf30f9e0f7205f98fa1a8b5a115c9fcc1d968b4b86e0b08dd1.exe 163 PID 4136 wrote to memory of 432 4136 oneetx.exe 171 PID 4136 wrote to memory of 432 4136 oneetx.exe 171 PID 4136 wrote to memory of 432 4136 oneetx.exe 171
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b47b14e356616bf30f9e0f7205f98fa1a8b5a115c9fcc1d968b4b86e0b08dd1.exe"C:\Users\Admin\AppData\Local\Temp\0b47b14e356616bf30f9e0f7205f98fa1a8b5a115c9fcc1d968b4b86e0b08dd1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1379387.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1379387.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9255864.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9255864.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4317121.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4317121.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3791748.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3791748.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3122097.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3122097.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1756 -s 10807⤵
- Program crash
PID:4852
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8126466.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8126466.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:648
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5148689.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5148689.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 6966⤵
- Program crash
PID:2908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 7646⤵
- Program crash
PID:3996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 8606⤵
- Program crash
PID:4808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 9526⤵
- Program crash
PID:5112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 9766⤵
- Program crash
PID:2728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 9726⤵
- Program crash
PID:4492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 12126⤵
- Program crash
PID:1248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 12246⤵
- Program crash
PID:1948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 13166⤵
- Program crash
PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 6927⤵
- Program crash
PID:4864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 8327⤵
- Program crash
PID:4900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 8447⤵
- Program crash
PID:3868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 10527⤵
- Program crash
PID:2412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 10607⤵
- Program crash
PID:2212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 10847⤵
- Program crash
PID:3044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 10607⤵
- Program crash
PID:1400
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F7⤵
- Creates scheduled task(s)
PID:5056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 9927⤵
- Program crash
PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 13087⤵
- Program crash
PID:860
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3752
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"8⤵PID:3836
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E8⤵PID:392
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:832
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"8⤵PID:4688
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E8⤵PID:4496
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 13447⤵
- Program crash
PID:3124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 13207⤵
- Program crash
PID:4668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 13607⤵
- Program crash
PID:1552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 13407⤵
- Program crash
PID:3968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 10647⤵
- Program crash
PID:2432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 16087⤵
- Program crash
PID:1740
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 10647⤵
- Program crash
PID:2892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4136 -s 16207⤵
- Program crash
PID:4488
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3288 -s 8686⤵
- Program crash
PID:3724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d1206410.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d1206410.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e3989437.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e3989437.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 11884⤵
- Program crash
PID:4388
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f8845565.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f8845565.exe2⤵
- Executes dropped EXE
PID:2252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 1756 -ip 17561⤵PID:3404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 3288 -ip 32881⤵PID:1180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3288 -ip 32881⤵PID:444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3288 -ip 32881⤵PID:1992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3288 -ip 32881⤵PID:3284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3288 -ip 32881⤵PID:2152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3288 -ip 32881⤵PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3288 -ip 32881⤵PID:1192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3288 -ip 32881⤵PID:4416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3288 -ip 32881⤵PID:892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3288 -ip 32881⤵PID:4412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4136 -ip 41361⤵PID:2968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4136 -ip 41361⤵PID:3668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4136 -ip 41361⤵PID:4712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4136 -ip 41361⤵PID:3316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4136 -ip 41361⤵PID:2660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4136 -ip 41361⤵PID:4132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4136 -ip 41361⤵PID:228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4136 -ip 41361⤵PID:2292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4136 -ip 41361⤵PID:1320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4136 -ip 41361⤵PID:808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4136 -ip 41361⤵PID:2628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4136 -ip 41361⤵PID:4644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4136 -ip 41361⤵PID:1624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3584 -ip 35841⤵PID:3900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4136 -ip 41361⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 3162⤵
- Program crash
PID:1620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4692 -ip 46921⤵PID:3824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4136 -ip 41361⤵PID:1116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4136 -ip 41361⤵PID:4812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 4136 -ip 41361⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 3122⤵
- Program crash
PID:4244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2376 -ip 23761⤵PID:1924
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD569ae2c7fa4920b1a85189a5a0c9d94dd
SHA1a47e0fe00471d39ad3fcdf04a07007eb184db239
SHA256cba41a1855f4c4d3c5273c5332bbde9c2672c15f6262771a1bec0adf08788b65
SHA5121dd8eb31069ed42b89c9699c6ca610400390c4b70ff57d5baf9fea3a3de9bc96a43ca0ef2e1266653ce034951031a125940e7e0d5534a28d806d960834812ea9
-
Filesize
205KB
MD569ae2c7fa4920b1a85189a5a0c9d94dd
SHA1a47e0fe00471d39ad3fcdf04a07007eb184db239
SHA256cba41a1855f4c4d3c5273c5332bbde9c2672c15f6262771a1bec0adf08788b65
SHA5121dd8eb31069ed42b89c9699c6ca610400390c4b70ff57d5baf9fea3a3de9bc96a43ca0ef2e1266653ce034951031a125940e7e0d5534a28d806d960834812ea9
-
Filesize
1.3MB
MD51ef7ed4ffd08f325fc900e53210c8c22
SHA14a424afb5a8d60d9e628e911111d695fcd2213fe
SHA256312a7beb6f079a6d94d15ea4c695b12dd1dbf4eb2611c435381146570436b31e
SHA5121a76b094d28bac41bc2f04bc504034bf167963f5d51a6362e9a91b7426a833e46bbd3acf8015a3f4b170d4bb7f330e79b2e8cfa69e9bbb8ba1df9dceb1a06325
-
Filesize
1.3MB
MD51ef7ed4ffd08f325fc900e53210c8c22
SHA14a424afb5a8d60d9e628e911111d695fcd2213fe
SHA256312a7beb6f079a6d94d15ea4c695b12dd1dbf4eb2611c435381146570436b31e
SHA5121a76b094d28bac41bc2f04bc504034bf167963f5d51a6362e9a91b7426a833e46bbd3acf8015a3f4b170d4bb7f330e79b2e8cfa69e9bbb8ba1df9dceb1a06325
-
Filesize
477KB
MD521a9661d5d047b681c4faf9b9627f3b3
SHA1051bc4e264a8b363b8ead02ff6ca24ddef0423d9
SHA256d5a9f45493b6edf05548aadab432b7609242b1a5b8cfe95847ed41b74145cef5
SHA5129e67ea9b4ef916cc9bb0aa7fd9be8b2d00b7d79077be1c827e33f8fd81c9b3bdfaac5dbadf5c06155a93b175ad3e457cd237fc88ff5431a2847282bb2958664e
-
Filesize
477KB
MD521a9661d5d047b681c4faf9b9627f3b3
SHA1051bc4e264a8b363b8ead02ff6ca24ddef0423d9
SHA256d5a9f45493b6edf05548aadab432b7609242b1a5b8cfe95847ed41b74145cef5
SHA5129e67ea9b4ef916cc9bb0aa7fd9be8b2d00b7d79077be1c827e33f8fd81c9b3bdfaac5dbadf5c06155a93b175ad3e457cd237fc88ff5431a2847282bb2958664e
-
Filesize
848KB
MD52f4f95a381b459d9eadac5efee532a98
SHA18912a4efcc10e54bb769ffc272a1c53be67c52a5
SHA2568cc8b0aa8e0f3267e0be398c9821d84f639c1235d92496ec4320f403747d3d82
SHA512c87325cec9e12850e71beea1f0c3eac91bd78d98859f209981d8a77aa982e7df97fd7b6477e383aa86d96fbfcea97e65021692c76040611803d2b64d2ccd6a14
-
Filesize
848KB
MD52f4f95a381b459d9eadac5efee532a98
SHA18912a4efcc10e54bb769ffc272a1c53be67c52a5
SHA2568cc8b0aa8e0f3267e0be398c9821d84f639c1235d92496ec4320f403747d3d82
SHA512c87325cec9e12850e71beea1f0c3eac91bd78d98859f209981d8a77aa982e7df97fd7b6477e383aa86d96fbfcea97e65021692c76040611803d2b64d2ccd6a14
-
Filesize
177KB
MD5c24db320c3483aa0787c32c6518ff33a
SHA1c594baf2c9413a908d48d6e4a310585bc0839f06
SHA256bcb5655b424f78c02ed6734e9cee73406d26e3ebc6453f505d76a9df191c5f21
SHA5123f598fc8d7abbeffbb3910ce35786e11cb932e6c57bc85b3d93b3c4d450f67ca6940283ecfb975c8317fb59a86d6920078d5014ace52dc2040dd3283ad0e6ea4
-
Filesize
177KB
MD5c24db320c3483aa0787c32c6518ff33a
SHA1c594baf2c9413a908d48d6e4a310585bc0839f06
SHA256bcb5655b424f78c02ed6734e9cee73406d26e3ebc6453f505d76a9df191c5f21
SHA5123f598fc8d7abbeffbb3910ce35786e11cb932e6c57bc85b3d93b3c4d450f67ca6940283ecfb975c8317fb59a86d6920078d5014ace52dc2040dd3283ad0e6ea4
-
Filesize
644KB
MD5dfdc92a219932d0ef3498837c909f86e
SHA1ef13483533697b8c6519cf31449a446108ff0185
SHA25600503f0d96f0fd13f2209bcf6849a09b71d23e9b2b82ee6f77e0bacc15f03a6d
SHA5121b9f717e0e1c8bfa46e368b50609d485c81fefc7ca306cb7d6e660d55185d1a00665cadd5b948fe6e41b16ffeaa12f4b8b9972bfb115ecb2be82eaf99701c5a8
-
Filesize
644KB
MD5dfdc92a219932d0ef3498837c909f86e
SHA1ef13483533697b8c6519cf31449a446108ff0185
SHA25600503f0d96f0fd13f2209bcf6849a09b71d23e9b2b82ee6f77e0bacc15f03a6d
SHA5121b9f717e0e1c8bfa46e368b50609d485c81fefc7ca306cb7d6e660d55185d1a00665cadd5b948fe6e41b16ffeaa12f4b8b9972bfb115ecb2be82eaf99701c5a8
-
Filesize
271KB
MD50207b140f173e2a497f0361997f11469
SHA11101f20ef224077653a1e25daa2df570ddb3cb76
SHA256380c878224aa0a0457d986b15ecf9622f46bf05da66bd80082965f4be415d6e1
SHA51242831601a446cc153b26606aeecae053051eb389406a7e69670ed5d36f7a2f9e84480f431469aada2687c887b557570eebd64d7921e33dc7500c0261fe61101a
-
Filesize
271KB
MD50207b140f173e2a497f0361997f11469
SHA11101f20ef224077653a1e25daa2df570ddb3cb76
SHA256380c878224aa0a0457d986b15ecf9622f46bf05da66bd80082965f4be415d6e1
SHA51242831601a446cc153b26606aeecae053051eb389406a7e69670ed5d36f7a2f9e84480f431469aada2687c887b557570eebd64d7921e33dc7500c0261fe61101a
-
Filesize
384KB
MD5662dc5a861b6de23cad1076ae2511501
SHA1e36558f2c7c13243519e3c224b537f11800b2aec
SHA256634a9b45b9d0f66924f88cb8ccfe81420d5f4fa299f4766d6188e23297469678
SHA51268cafe4b096ff053065d6b5f54a43a46c3966118853daf99ce35833dd0ee1beccfb2523ca8d0d062f3c49b1f10cf29056a278e9dbf9f3e2b1e497b5fdbd52d0d
-
Filesize
384KB
MD5662dc5a861b6de23cad1076ae2511501
SHA1e36558f2c7c13243519e3c224b537f11800b2aec
SHA256634a9b45b9d0f66924f88cb8ccfe81420d5f4fa299f4766d6188e23297469678
SHA51268cafe4b096ff053065d6b5f54a43a46c3966118853daf99ce35833dd0ee1beccfb2523ca8d0d062f3c49b1f10cf29056a278e9dbf9f3e2b1e497b5fdbd52d0d
-
Filesize
291KB
MD531672155f15c1004d634d94cfb5601ed
SHA12db73caf0fce8789ca30e7b887ad76692d7ef105
SHA25685dc0b981ce04bc8c41cba3a7e22be154012beb2813a028c8145ea0bc72481e4
SHA512764f7fbe66412f6acf364942e339161678d6b2fcfd566ad474903c3571990452277e6c60334922aadd9e19e3b43219391847f19d4c409d7aafb73f9011ae036b
-
Filesize
291KB
MD531672155f15c1004d634d94cfb5601ed
SHA12db73caf0fce8789ca30e7b887ad76692d7ef105
SHA25685dc0b981ce04bc8c41cba3a7e22be154012beb2813a028c8145ea0bc72481e4
SHA512764f7fbe66412f6acf364942e339161678d6b2fcfd566ad474903c3571990452277e6c60334922aadd9e19e3b43219391847f19d4c409d7aafb73f9011ae036b
-
Filesize
168KB
MD53bdba85b5933ce2da6a25f2cbd142cd6
SHA1da2bf3da25ba86978be0e8b3d5b89f201c7cfb56
SHA2568e5e3e182a0bcc2f109be800e07465d51482f678442e8d419eb57e24dbbe5135
SHA5120c663f1f451420eb24f28cf17beeeda487f7ee7fa4de9614d1845175a5e06e36e23386e5a27a74d08ce2ca976e787b4e9b87c72910f529b783dacaadec64431b
-
Filesize
168KB
MD53bdba85b5933ce2da6a25f2cbd142cd6
SHA1da2bf3da25ba86978be0e8b3d5b89f201c7cfb56
SHA2568e5e3e182a0bcc2f109be800e07465d51482f678442e8d419eb57e24dbbe5135
SHA5120c663f1f451420eb24f28cf17beeeda487f7ee7fa4de9614d1845175a5e06e36e23386e5a27a74d08ce2ca976e787b4e9b87c72910f529b783dacaadec64431b
-
Filesize
271KB
MD50207b140f173e2a497f0361997f11469
SHA11101f20ef224077653a1e25daa2df570ddb3cb76
SHA256380c878224aa0a0457d986b15ecf9622f46bf05da66bd80082965f4be415d6e1
SHA51242831601a446cc153b26606aeecae053051eb389406a7e69670ed5d36f7a2f9e84480f431469aada2687c887b557570eebd64d7921e33dc7500c0261fe61101a
-
Filesize
271KB
MD50207b140f173e2a497f0361997f11469
SHA11101f20ef224077653a1e25daa2df570ddb3cb76
SHA256380c878224aa0a0457d986b15ecf9622f46bf05da66bd80082965f4be415d6e1
SHA51242831601a446cc153b26606aeecae053051eb389406a7e69670ed5d36f7a2f9e84480f431469aada2687c887b557570eebd64d7921e33dc7500c0261fe61101a
-
Filesize
271KB
MD50207b140f173e2a497f0361997f11469
SHA11101f20ef224077653a1e25daa2df570ddb3cb76
SHA256380c878224aa0a0457d986b15ecf9622f46bf05da66bd80082965f4be415d6e1
SHA51242831601a446cc153b26606aeecae053051eb389406a7e69670ed5d36f7a2f9e84480f431469aada2687c887b557570eebd64d7921e33dc7500c0261fe61101a
-
Filesize
271KB
MD50207b140f173e2a497f0361997f11469
SHA11101f20ef224077653a1e25daa2df570ddb3cb76
SHA256380c878224aa0a0457d986b15ecf9622f46bf05da66bd80082965f4be415d6e1
SHA51242831601a446cc153b26606aeecae053051eb389406a7e69670ed5d36f7a2f9e84480f431469aada2687c887b557570eebd64d7921e33dc7500c0261fe61101a
-
Filesize
271KB
MD50207b140f173e2a497f0361997f11469
SHA11101f20ef224077653a1e25daa2df570ddb3cb76
SHA256380c878224aa0a0457d986b15ecf9622f46bf05da66bd80082965f4be415d6e1
SHA51242831601a446cc153b26606aeecae053051eb389406a7e69670ed5d36f7a2f9e84480f431469aada2687c887b557570eebd64d7921e33dc7500c0261fe61101a
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b