Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-05-2023 17:08
Static task
static1
Behavioral task
behavioral1
Sample
c5f9f747e5e825d614fe4a88c43e5bcd00338d533ead8a2978c9d1504c5d6be2.exe
Resource
win10v2004-20230220-en
General
-
Target
c5f9f747e5e825d614fe4a88c43e5bcd00338d533ead8a2978c9d1504c5d6be2.exe
-
Size
1.5MB
-
MD5
72de8322e49c3dab41cafd18fdd819e1
-
SHA1
5e987faa28b8e94b20bfd2d7e6d6588064297599
-
SHA256
c5f9f747e5e825d614fe4a88c43e5bcd00338d533ead8a2978c9d1504c5d6be2
-
SHA512
60e97b653b15821be22e3010dc40f9e692e4f3688d9236f40ed386fe384ed6779b3b1d798815c1062eb39d227c9b6bad80f02aaa66e0614e870519c7d59805aa
-
SSDEEP
24576:kywknATleccaIopl3EI6FpeW+2ga2fCU7tkxdwiKCtzJhGaccWzf:zgTllbIof30yWUaUCU7todth1cN
Malware Config
Extracted
redline
mask
217.196.96.56:4138
-
auth_value
31aef25be0febb8e491794ef7f502c50
Extracted
redline
boom
217.196.96.56:4138
-
auth_value
1ce6aebe15bac07a7bc88b114bc49335
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a4448366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4448366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" d2386712.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" d2386712.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4448366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4448366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4448366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4448366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" d2386712.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d2386712.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" d2386712.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation e5617715.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation c2083336.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 14 IoCs
pid Process 1052 v4127778.exe 1580 v0515530.exe 1396 v8592012.exe 3768 v1091186.exe 2764 a4448366.exe 2432 b5029492.exe 3004 c2083336.exe 1652 oneetx.exe 4044 d2386712.exe 4708 e5617715.exe 4688 1.exe 4152 f4410918.exe 4504 oneetx.exe 5096 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1940 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a4448366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a4448366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d2386712.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c5f9f747e5e825d614fe4a88c43e5bcd00338d533ead8a2978c9d1504c5d6be2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0515530.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8592012.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1091186.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c5f9f747e5e825d614fe4a88c43e5bcd00338d533ead8a2978c9d1504c5d6be2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4127778.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4127778.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v0515530.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v8592012.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v1091186.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 31 IoCs
pid pid_target Process procid_target 2484 2764 WerFault.exe 89 2244 3004 WerFault.exe 96 3488 3004 WerFault.exe 96 3184 3004 WerFault.exe 96 4272 3004 WerFault.exe 96 1932 3004 WerFault.exe 96 820 3004 WerFault.exe 96 3196 3004 WerFault.exe 96 3980 3004 WerFault.exe 96 1216 3004 WerFault.exe 96 1648 3004 WerFault.exe 96 1852 1652 WerFault.exe 116 3388 1652 WerFault.exe 116 2480 1652 WerFault.exe 116 4820 1652 WerFault.exe 116 3420 1652 WerFault.exe 116 3944 1652 WerFault.exe 116 840 1652 WerFault.exe 116 3496 1652 WerFault.exe 116 4776 1652 WerFault.exe 116 4236 1652 WerFault.exe 116 1952 1652 WerFault.exe 116 3288 1652 WerFault.exe 116 3124 1652 WerFault.exe 116 3056 4708 WerFault.exe 160 1800 1652 WerFault.exe 116 392 4504 WerFault.exe 167 3344 1652 WerFault.exe 116 3508 1652 WerFault.exe 116 2404 1652 WerFault.exe 116 264 5096 WerFault.exe 177 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2240 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2764 a4448366.exe 2764 a4448366.exe 2432 b5029492.exe 2432 b5029492.exe 4044 d2386712.exe 4044 d2386712.exe 4688 1.exe 4688 1.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2764 a4448366.exe Token: SeDebugPrivilege 2432 b5029492.exe Token: SeDebugPrivilege 4044 d2386712.exe Token: SeDebugPrivilege 4708 e5617715.exe Token: SeDebugPrivilege 4688 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3004 c2083336.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 4176 wrote to memory of 1052 4176 c5f9f747e5e825d614fe4a88c43e5bcd00338d533ead8a2978c9d1504c5d6be2.exe 85 PID 4176 wrote to memory of 1052 4176 c5f9f747e5e825d614fe4a88c43e5bcd00338d533ead8a2978c9d1504c5d6be2.exe 85 PID 4176 wrote to memory of 1052 4176 c5f9f747e5e825d614fe4a88c43e5bcd00338d533ead8a2978c9d1504c5d6be2.exe 85 PID 1052 wrote to memory of 1580 1052 v4127778.exe 86 PID 1052 wrote to memory of 1580 1052 v4127778.exe 86 PID 1052 wrote to memory of 1580 1052 v4127778.exe 86 PID 1580 wrote to memory of 1396 1580 v0515530.exe 87 PID 1580 wrote to memory of 1396 1580 v0515530.exe 87 PID 1580 wrote to memory of 1396 1580 v0515530.exe 87 PID 1396 wrote to memory of 3768 1396 v8592012.exe 88 PID 1396 wrote to memory of 3768 1396 v8592012.exe 88 PID 1396 wrote to memory of 3768 1396 v8592012.exe 88 PID 3768 wrote to memory of 2764 3768 v1091186.exe 89 PID 3768 wrote to memory of 2764 3768 v1091186.exe 89 PID 3768 wrote to memory of 2764 3768 v1091186.exe 89 PID 3768 wrote to memory of 2432 3768 v1091186.exe 95 PID 3768 wrote to memory of 2432 3768 v1091186.exe 95 PID 3768 wrote to memory of 2432 3768 v1091186.exe 95 PID 1396 wrote to memory of 3004 1396 v8592012.exe 96 PID 1396 wrote to memory of 3004 1396 v8592012.exe 96 PID 1396 wrote to memory of 3004 1396 v8592012.exe 96 PID 3004 wrote to memory of 1652 3004 c2083336.exe 116 PID 3004 wrote to memory of 1652 3004 c2083336.exe 116 PID 3004 wrote to memory of 1652 3004 c2083336.exe 116 PID 1580 wrote to memory of 4044 1580 v0515530.exe 122 PID 1580 wrote to memory of 4044 1580 v0515530.exe 122 PID 1580 wrote to memory of 4044 1580 v0515530.exe 122 PID 1652 wrote to memory of 2240 1652 oneetx.exe 137 PID 1652 wrote to memory of 2240 1652 oneetx.exe 137 PID 1652 wrote to memory of 2240 1652 oneetx.exe 137 PID 1652 wrote to memory of 1860 1652 oneetx.exe 143 PID 1652 wrote to memory of 1860 1652 oneetx.exe 143 PID 1652 wrote to memory of 1860 1652 oneetx.exe 143 PID 1860 wrote to memory of 4996 1860 cmd.exe 147 PID 1860 wrote to memory of 4996 1860 cmd.exe 147 PID 1860 wrote to memory of 4996 1860 cmd.exe 147 PID 1860 wrote to memory of 2552 1860 cmd.exe 148 PID 1860 wrote to memory of 2552 1860 cmd.exe 148 PID 1860 wrote to memory of 2552 1860 cmd.exe 148 PID 1860 wrote to memory of 1732 1860 cmd.exe 149 PID 1860 wrote to memory of 1732 1860 cmd.exe 149 PID 1860 wrote to memory of 1732 1860 cmd.exe 149 PID 1860 wrote to memory of 1256 1860 cmd.exe 151 PID 1860 wrote to memory of 1256 1860 cmd.exe 151 PID 1860 wrote to memory of 1256 1860 cmd.exe 151 PID 1860 wrote to memory of 892 1860 cmd.exe 150 PID 1860 wrote to memory of 892 1860 cmd.exe 150 PID 1860 wrote to memory of 892 1860 cmd.exe 150 PID 1860 wrote to memory of 3352 1860 cmd.exe 152 PID 1860 wrote to memory of 3352 1860 cmd.exe 152 PID 1860 wrote to memory of 3352 1860 cmd.exe 152 PID 1052 wrote to memory of 4708 1052 v4127778.exe 160 PID 1052 wrote to memory of 4708 1052 v4127778.exe 160 PID 1052 wrote to memory of 4708 1052 v4127778.exe 160 PID 4708 wrote to memory of 4688 4708 e5617715.exe 161 PID 4708 wrote to memory of 4688 4708 e5617715.exe 161 PID 4708 wrote to memory of 4688 4708 e5617715.exe 161 PID 4176 wrote to memory of 4152 4176 c5f9f747e5e825d614fe4a88c43e5bcd00338d533ead8a2978c9d1504c5d6be2.exe 164 PID 4176 wrote to memory of 4152 4176 c5f9f747e5e825d614fe4a88c43e5bcd00338d533ead8a2978c9d1504c5d6be2.exe 164 PID 4176 wrote to memory of 4152 4176 c5f9f747e5e825d614fe4a88c43e5bcd00338d533ead8a2978c9d1504c5d6be2.exe 164 PID 1652 wrote to memory of 1940 1652 oneetx.exe 172 PID 1652 wrote to memory of 1940 1652 oneetx.exe 172 PID 1652 wrote to memory of 1940 1652 oneetx.exe 172
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5f9f747e5e825d614fe4a88c43e5bcd00338d533ead8a2978c9d1504c5d6be2.exe"C:\Users\Admin\AppData\Local\Temp\c5f9f747e5e825d614fe4a88c43e5bcd00338d533ead8a2978c9d1504c5d6be2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4127778.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4127778.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0515530.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0515530.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8592012.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8592012.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1091186.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1091186.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4448366.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4448366.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 10807⤵
- Program crash
PID:2484
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5029492.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b5029492.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c2083336.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c2083336.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 6966⤵
- Program crash
PID:2244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 7806⤵
- Program crash
PID:3488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 8566⤵
- Program crash
PID:3184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 8606⤵
- Program crash
PID:4272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 9646⤵
- Program crash
PID:1932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 9646⤵
- Program crash
PID:820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 12126⤵
- Program crash
PID:3196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 12366⤵
- Program crash
PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 13406⤵
- Program crash
PID:1216
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 6927⤵
- Program crash
PID:1852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 8487⤵
- Program crash
PID:3388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 9007⤵
- Program crash
PID:2480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 10607⤵
- Program crash
PID:4820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 10607⤵
- Program crash
PID:3420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 10927⤵
- Program crash
PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 11007⤵
- Program crash
PID:840
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F7⤵
- Creates scheduled task(s)
PID:2240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 9927⤵
- Program crash
PID:3496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 7567⤵
- Program crash
PID:4776
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4996
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"8⤵PID:2552
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E8⤵PID:1732
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"8⤵PID:892
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1256
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E8⤵PID:3352
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 7687⤵
- Program crash
PID:4236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 7487⤵
- Program crash
PID:1952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 9887⤵
- Program crash
PID:3288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 13047⤵
- Program crash
PID:3124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 11127⤵
- Program crash
PID:1800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 16087⤵
- Program crash
PID:3344
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:1940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 11127⤵
- Program crash
PID:3508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 16207⤵
- Program crash
PID:2404
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 7486⤵
- Program crash
PID:1648
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d2386712.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d2386712.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4044
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e5617715.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e5617715.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 13844⤵
- Program crash
PID:3056
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f4410918.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f4410918.exe2⤵
- Executes dropped EXE
PID:4152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2764 -ip 27641⤵PID:5008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3004 -ip 30041⤵PID:4560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3004 -ip 30041⤵PID:4648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3004 -ip 30041⤵PID:4848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3004 -ip 30041⤵PID:1420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3004 -ip 30041⤵PID:612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3004 -ip 30041⤵PID:2652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3004 -ip 30041⤵PID:1764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3004 -ip 30041⤵PID:4004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3004 -ip 30041⤵PID:3516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3004 -ip 30041⤵PID:3508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1652 -ip 16521⤵PID:5012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1652 -ip 16521⤵PID:64
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1652 -ip 16521⤵PID:3640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1652 -ip 16521⤵PID:4736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1652 -ip 16521⤵PID:4412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1652 -ip 16521⤵PID:4732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1652 -ip 16521⤵PID:3416
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1652 -ip 16521⤵PID:2224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1652 -ip 16521⤵PID:984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1652 -ip 16521⤵PID:1876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1652 -ip 16521⤵PID:3320
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1652 -ip 16521⤵PID:612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1652 -ip 16521⤵PID:3564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4708 -ip 47081⤵PID:4848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1652 -ip 16521⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 3202⤵
- Program crash
PID:392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4504 -ip 45041⤵PID:4280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1652 -ip 16521⤵PID:3296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1652 -ip 16521⤵PID:4376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1652 -ip 16521⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:5096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 3162⤵
- Program crash
PID:264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5096 -ip 50961⤵PID:2912
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5f86e199373fdef2a3241b197157a6e6a
SHA10d75cbbd2afd6b20592325a5d40c64fb290a1ce8
SHA256887c81662a6891583151aea88ead7776ad93b9b61f0aff434c99ddba5a76a421
SHA5121d2fb3d5a48e6a60582c99e71b3da199a5211ce05f360f99085a0f724a230f34a3da2308a5a7b0711fe15bf1f273773cede608951a2e9b65928f0e57286bb497
-
Filesize
205KB
MD5f86e199373fdef2a3241b197157a6e6a
SHA10d75cbbd2afd6b20592325a5d40c64fb290a1ce8
SHA256887c81662a6891583151aea88ead7776ad93b9b61f0aff434c99ddba5a76a421
SHA5121d2fb3d5a48e6a60582c99e71b3da199a5211ce05f360f99085a0f724a230f34a3da2308a5a7b0711fe15bf1f273773cede608951a2e9b65928f0e57286bb497
-
Filesize
1.3MB
MD5e2a6c5a4204901ff8abe3549b618248d
SHA12125222d187163cf50d20ea08a00320d11e5c9e2
SHA256481bc9972ba1ab630a7fde2e26a9929bd37fd42a05b1e31f245dce9bcc1a8159
SHA512ee70c50411471bc28a4ee08fdebc7093e295601c12fcef779576de49f7c2d2116b95e4ee49c4d6f75d2e5f21e879f9c43265610e86cd0083fbbc77b469d6a247
-
Filesize
1.3MB
MD5e2a6c5a4204901ff8abe3549b618248d
SHA12125222d187163cf50d20ea08a00320d11e5c9e2
SHA256481bc9972ba1ab630a7fde2e26a9929bd37fd42a05b1e31f245dce9bcc1a8159
SHA512ee70c50411471bc28a4ee08fdebc7093e295601c12fcef779576de49f7c2d2116b95e4ee49c4d6f75d2e5f21e879f9c43265610e86cd0083fbbc77b469d6a247
-
Filesize
473KB
MD572a216dddcae2b314788c8f8a40064f9
SHA13500ec561c88b0bfc013c6a8d0612840d6a01e56
SHA256448f30a10821547455aac70ffb862ac27fa59d3cc27ff9533d8eed6aaf0193ec
SHA512c62f6b15d373d01f73750700b436523ddff19e0c77db78beec52f5b2c48785b35ae3e2605b2a4227bf77a940bed7e7ed373dc75e2b739f83f5ca93ac6c58c260
-
Filesize
473KB
MD572a216dddcae2b314788c8f8a40064f9
SHA13500ec561c88b0bfc013c6a8d0612840d6a01e56
SHA256448f30a10821547455aac70ffb862ac27fa59d3cc27ff9533d8eed6aaf0193ec
SHA512c62f6b15d373d01f73750700b436523ddff19e0c77db78beec52f5b2c48785b35ae3e2605b2a4227bf77a940bed7e7ed373dc75e2b739f83f5ca93ac6c58c260
-
Filesize
847KB
MD53fb48d9e91ab6a3c3f07c77acad290ea
SHA15cc1c16a42b13c774c729aff41dd831a18548cf0
SHA2561d46c9bcfe11360038b3aee5b7e929f1f7d4b6a05e3d8ccc0d6d47e28e468765
SHA51280442f9d48f60ffcbfd25781e76994aff6a21756b65f35f80ec30bf6222aa09e2bc0a7742de73d8a3e393446b13254c6d2e07cf523983622117f2db329d98537
-
Filesize
847KB
MD53fb48d9e91ab6a3c3f07c77acad290ea
SHA15cc1c16a42b13c774c729aff41dd831a18548cf0
SHA2561d46c9bcfe11360038b3aee5b7e929f1f7d4b6a05e3d8ccc0d6d47e28e468765
SHA51280442f9d48f60ffcbfd25781e76994aff6a21756b65f35f80ec30bf6222aa09e2bc0a7742de73d8a3e393446b13254c6d2e07cf523983622117f2db329d98537
-
Filesize
177KB
MD5110983e3159f8057caa1f9ea9b84efb2
SHA18f98f7a0677cde1192264cad0fb610b81e194f66
SHA2563da9ad27d2e882875936f2f0c8f1030ee5a3f795f69f9e47394020445c023217
SHA512c1fde8b4e83ba471607ecbb1d55fe83d099a3c958a622e4e7376f5a12f80c7920b8706782c647d7ce95be4f09a40b5365630368b69fc24c18085fe432a0c3157
-
Filesize
177KB
MD5110983e3159f8057caa1f9ea9b84efb2
SHA18f98f7a0677cde1192264cad0fb610b81e194f66
SHA2563da9ad27d2e882875936f2f0c8f1030ee5a3f795f69f9e47394020445c023217
SHA512c1fde8b4e83ba471607ecbb1d55fe83d099a3c958a622e4e7376f5a12f80c7920b8706782c647d7ce95be4f09a40b5365630368b69fc24c18085fe432a0c3157
-
Filesize
643KB
MD526d01012c782d8ae8053b08aa56418b1
SHA16ebe80f804f5ba00e310b1d99ebde770c787a39c
SHA256ec0a3a0d5ecab0b52deccf09592bcbb7a9ce504f18419b03fa72df64656fafd8
SHA5122f0971bbdc2cd458d810d3c8c6077251e1cb1b73bba65ff00ad3e369e06e2689fb8dc1cbfc88d8d6b09fdda6e938f83d184802b0797c9b5297f04a6f495ca0c4
-
Filesize
643KB
MD526d01012c782d8ae8053b08aa56418b1
SHA16ebe80f804f5ba00e310b1d99ebde770c787a39c
SHA256ec0a3a0d5ecab0b52deccf09592bcbb7a9ce504f18419b03fa72df64656fafd8
SHA5122f0971bbdc2cd458d810d3c8c6077251e1cb1b73bba65ff00ad3e369e06e2689fb8dc1cbfc88d8d6b09fdda6e938f83d184802b0797c9b5297f04a6f495ca0c4
-
Filesize
265KB
MD50d2c44645433ac67081a4bfa3cf91c47
SHA1809063f3cf037c67847f2c355c24fc4a434be643
SHA2566c058cf7b50e59f3d63462a1d83a26f99c894f67c8355ca5d59fa6bd794ce4fa
SHA512c4036f31abc3a1c2db31643bccb13c358e0b51a2e30b0c42cfe9b3eb7e9a205a546e1fcf827a60e51ea80edfc0debfe78d0465958612dc3a7497e3847f001c3d
-
Filesize
265KB
MD50d2c44645433ac67081a4bfa3cf91c47
SHA1809063f3cf037c67847f2c355c24fc4a434be643
SHA2566c058cf7b50e59f3d63462a1d83a26f99c894f67c8355ca5d59fa6bd794ce4fa
SHA512c4036f31abc3a1c2db31643bccb13c358e0b51a2e30b0c42cfe9b3eb7e9a205a546e1fcf827a60e51ea80edfc0debfe78d0465958612dc3a7497e3847f001c3d
-
Filesize
384KB
MD5142037d1cef229a3568527cb66e63325
SHA1f1c99e5c50ac7edd23c1da5aad49f1eece5d3e93
SHA25617444cd797b2bd56f76dbb19bc69fb55802437e02c552edd9c5882924e336f88
SHA512e2aec5dc5d4ba38c09a03066032914817ca6adf14ba850f6ee5ca35e36091a367527c4ea691dbd763ab634762138bb81c11f044fe06e23a1b13ba5324efecaee
-
Filesize
384KB
MD5142037d1cef229a3568527cb66e63325
SHA1f1c99e5c50ac7edd23c1da5aad49f1eece5d3e93
SHA25617444cd797b2bd56f76dbb19bc69fb55802437e02c552edd9c5882924e336f88
SHA512e2aec5dc5d4ba38c09a03066032914817ca6adf14ba850f6ee5ca35e36091a367527c4ea691dbd763ab634762138bb81c11f044fe06e23a1b13ba5324efecaee
-
Filesize
286KB
MD5d6cc88e25103c705ef478bb29428d42e
SHA1532e87983cf0994db63e5b48045d563adc95fee3
SHA2568ba835f3f577c767b8c808d91a8d998d84b869217353e337d4cacdb7d1268e93
SHA512089363a42202789cc56c2e655078998a77561a05defb2aabc90b2021967e9a0894fb52279f4de62a84ae1a12de2852cb6a13b6cd7f0e9bca424a30e82eb89040
-
Filesize
286KB
MD5d6cc88e25103c705ef478bb29428d42e
SHA1532e87983cf0994db63e5b48045d563adc95fee3
SHA2568ba835f3f577c767b8c808d91a8d998d84b869217353e337d4cacdb7d1268e93
SHA512089363a42202789cc56c2e655078998a77561a05defb2aabc90b2021967e9a0894fb52279f4de62a84ae1a12de2852cb6a13b6cd7f0e9bca424a30e82eb89040
-
Filesize
168KB
MD5b37b687b57e9175d24161e36796fdf7d
SHA1589b5d7fe6078ac1b8383078d2818d8476bc5396
SHA2560349cfdca7da6fafd8a94e53893c7b0f1ba2447c088b1840581486e71dbec977
SHA512398afcbcc39cf7fa0d21a6f6fbece30302b3f22fbec9cebff527131bfbd2265d8b76eaecd8ba13a59054384772f2fc6f5912e3e48c5e2f31ea3a03ae7d5d012a
-
Filesize
168KB
MD5b37b687b57e9175d24161e36796fdf7d
SHA1589b5d7fe6078ac1b8383078d2818d8476bc5396
SHA2560349cfdca7da6fafd8a94e53893c7b0f1ba2447c088b1840581486e71dbec977
SHA512398afcbcc39cf7fa0d21a6f6fbece30302b3f22fbec9cebff527131bfbd2265d8b76eaecd8ba13a59054384772f2fc6f5912e3e48c5e2f31ea3a03ae7d5d012a
-
Filesize
265KB
MD50d2c44645433ac67081a4bfa3cf91c47
SHA1809063f3cf037c67847f2c355c24fc4a434be643
SHA2566c058cf7b50e59f3d63462a1d83a26f99c894f67c8355ca5d59fa6bd794ce4fa
SHA512c4036f31abc3a1c2db31643bccb13c358e0b51a2e30b0c42cfe9b3eb7e9a205a546e1fcf827a60e51ea80edfc0debfe78d0465958612dc3a7497e3847f001c3d
-
Filesize
265KB
MD50d2c44645433ac67081a4bfa3cf91c47
SHA1809063f3cf037c67847f2c355c24fc4a434be643
SHA2566c058cf7b50e59f3d63462a1d83a26f99c894f67c8355ca5d59fa6bd794ce4fa
SHA512c4036f31abc3a1c2db31643bccb13c358e0b51a2e30b0c42cfe9b3eb7e9a205a546e1fcf827a60e51ea80edfc0debfe78d0465958612dc3a7497e3847f001c3d
-
Filesize
265KB
MD50d2c44645433ac67081a4bfa3cf91c47
SHA1809063f3cf037c67847f2c355c24fc4a434be643
SHA2566c058cf7b50e59f3d63462a1d83a26f99c894f67c8355ca5d59fa6bd794ce4fa
SHA512c4036f31abc3a1c2db31643bccb13c358e0b51a2e30b0c42cfe9b3eb7e9a205a546e1fcf827a60e51ea80edfc0debfe78d0465958612dc3a7497e3847f001c3d
-
Filesize
265KB
MD50d2c44645433ac67081a4bfa3cf91c47
SHA1809063f3cf037c67847f2c355c24fc4a434be643
SHA2566c058cf7b50e59f3d63462a1d83a26f99c894f67c8355ca5d59fa6bd794ce4fa
SHA512c4036f31abc3a1c2db31643bccb13c358e0b51a2e30b0c42cfe9b3eb7e9a205a546e1fcf827a60e51ea80edfc0debfe78d0465958612dc3a7497e3847f001c3d
-
Filesize
265KB
MD50d2c44645433ac67081a4bfa3cf91c47
SHA1809063f3cf037c67847f2c355c24fc4a434be643
SHA2566c058cf7b50e59f3d63462a1d83a26f99c894f67c8355ca5d59fa6bd794ce4fa
SHA512c4036f31abc3a1c2db31643bccb13c358e0b51a2e30b0c42cfe9b3eb7e9a205a546e1fcf827a60e51ea80edfc0debfe78d0465958612dc3a7497e3847f001c3d
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b