Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-05-2023 18:41
Static task
static1
Behavioral task
behavioral1
Sample
fc558940cf67b92298af742c70fc1c24b1f696f15dcd7f45f9d3a487695cda86.exe
Resource
win10v2004-20230220-en
General
-
Target
fc558940cf67b92298af742c70fc1c24b1f696f15dcd7f45f9d3a487695cda86.exe
-
Size
1.5MB
-
MD5
53587e96c0dcfe0a35d9558a7851afe3
-
SHA1
27e2106b34135f32ac256fb2c4bb2cad742fd11f
-
SHA256
fc558940cf67b92298af742c70fc1c24b1f696f15dcd7f45f9d3a487695cda86
-
SHA512
4c22bca001174dca3a9be2847ec869eb2c013868fa7fc926e7447dab06021b7c700e8f8c4261df4e98eb5b066bec7b373d94b53ed48dd2604984522e4602edba
-
SSDEEP
24576:ayq9mk4JkVDSNXi9X1ZtutdOpxRjNom3AI9CCIp+kaXd2eZMclcFtTmT067:hOmpJkVGNXi9Xzt2OvRjiSFCCIAkTeyC
Malware Config
Extracted
redline
mask
217.196.96.56:4138
-
auth_value
31aef25be0febb8e491794ef7f502c50
Extracted
redline
boom
217.196.96.56:4138
-
auth_value
1ce6aebe15bac07a7bc88b114bc49335
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a8805012.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" d0803333.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" d0803333.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d0803333.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" d0803333.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8805012.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8805012.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8805012.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8805012.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8805012.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" d0803333.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation e6038360.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation c7927598.exe -
Executes dropped EXE 14 IoCs
pid Process 2832 v9683261.exe 1356 v0927880.exe 4476 v8074378.exe 4780 v9911613.exe 1500 a8805012.exe 3900 b6996686.exe 3764 c7927598.exe 3888 oneetx.exe 4944 d0803333.exe 4852 e6038360.exe 2584 oneetx.exe 4764 1.exe 2560 f6881872.exe 4464 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4324 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a8805012.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a8805012.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d0803333.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v0927880.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v8074378.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9911613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fc558940cf67b92298af742c70fc1c24b1f696f15dcd7f45f9d3a487695cda86.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9683261.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9683261.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0927880.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8074378.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v9911613.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fc558940cf67b92298af742c70fc1c24b1f696f15dcd7f45f9d3a487695cda86.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 32 IoCs
pid pid_target Process procid_target 4632 1500 WerFault.exe 87 5076 3764 WerFault.exe 94 4024 3764 WerFault.exe 94 4252 3764 WerFault.exe 94 4100 3764 WerFault.exe 94 4792 3764 WerFault.exe 94 3976 3764 WerFault.exe 94 936 3764 WerFault.exe 94 480 3764 WerFault.exe 94 3820 3764 WerFault.exe 94 4140 3764 WerFault.exe 94 2016 3888 WerFault.exe 114 4952 3888 WerFault.exe 114 3868 3888 WerFault.exe 114 2916 3888 WerFault.exe 114 4940 3888 WerFault.exe 114 4776 3888 WerFault.exe 114 3792 3888 WerFault.exe 114 1636 3888 WerFault.exe 114 4112 3888 WerFault.exe 114 1224 3888 WerFault.exe 114 2864 3888 WerFault.exe 114 2124 3888 WerFault.exe 114 2336 3888 WerFault.exe 114 4820 3888 WerFault.exe 114 3236 4852 WerFault.exe 159 968 2584 WerFault.exe 160 3400 3888 WerFault.exe 114 2368 3888 WerFault.exe 114 540 3888 WerFault.exe 114 3864 4464 WerFault.exe 174 4788 3888 WerFault.exe 114 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1448 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1500 a8805012.exe 1500 a8805012.exe 3900 b6996686.exe 3900 b6996686.exe 4944 d0803333.exe 4944 d0803333.exe 4764 1.exe 4764 1.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1500 a8805012.exe Token: SeDebugPrivilege 3900 b6996686.exe Token: SeDebugPrivilege 4944 d0803333.exe Token: SeDebugPrivilege 4852 e6038360.exe Token: SeDebugPrivilege 4764 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3764 c7927598.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2832 1788 fc558940cf67b92298af742c70fc1c24b1f696f15dcd7f45f9d3a487695cda86.exe 83 PID 1788 wrote to memory of 2832 1788 fc558940cf67b92298af742c70fc1c24b1f696f15dcd7f45f9d3a487695cda86.exe 83 PID 1788 wrote to memory of 2832 1788 fc558940cf67b92298af742c70fc1c24b1f696f15dcd7f45f9d3a487695cda86.exe 83 PID 2832 wrote to memory of 1356 2832 v9683261.exe 84 PID 2832 wrote to memory of 1356 2832 v9683261.exe 84 PID 2832 wrote to memory of 1356 2832 v9683261.exe 84 PID 1356 wrote to memory of 4476 1356 v0927880.exe 85 PID 1356 wrote to memory of 4476 1356 v0927880.exe 85 PID 1356 wrote to memory of 4476 1356 v0927880.exe 85 PID 4476 wrote to memory of 4780 4476 v8074378.exe 86 PID 4476 wrote to memory of 4780 4476 v8074378.exe 86 PID 4476 wrote to memory of 4780 4476 v8074378.exe 86 PID 4780 wrote to memory of 1500 4780 v9911613.exe 87 PID 4780 wrote to memory of 1500 4780 v9911613.exe 87 PID 4780 wrote to memory of 1500 4780 v9911613.exe 87 PID 4780 wrote to memory of 3900 4780 v9911613.exe 93 PID 4780 wrote to memory of 3900 4780 v9911613.exe 93 PID 4780 wrote to memory of 3900 4780 v9911613.exe 93 PID 4476 wrote to memory of 3764 4476 v8074378.exe 94 PID 4476 wrote to memory of 3764 4476 v8074378.exe 94 PID 4476 wrote to memory of 3764 4476 v8074378.exe 94 PID 3764 wrote to memory of 3888 3764 c7927598.exe 114 PID 3764 wrote to memory of 3888 3764 c7927598.exe 114 PID 3764 wrote to memory of 3888 3764 c7927598.exe 114 PID 1356 wrote to memory of 4944 1356 v0927880.exe 117 PID 1356 wrote to memory of 4944 1356 v0927880.exe 117 PID 1356 wrote to memory of 4944 1356 v0927880.exe 117 PID 3888 wrote to memory of 1448 3888 oneetx.exe 134 PID 3888 wrote to memory of 1448 3888 oneetx.exe 134 PID 3888 wrote to memory of 1448 3888 oneetx.exe 134 PID 3888 wrote to memory of 3896 3888 oneetx.exe 141 PID 3888 wrote to memory of 3896 3888 oneetx.exe 141 PID 3888 wrote to memory of 3896 3888 oneetx.exe 141 PID 3896 wrote to memory of 4780 3896 cmd.exe 145 PID 3896 wrote to memory of 4780 3896 cmd.exe 145 PID 3896 wrote to memory of 4780 3896 cmd.exe 145 PID 3896 wrote to memory of 844 3896 cmd.exe 146 PID 3896 wrote to memory of 844 3896 cmd.exe 146 PID 3896 wrote to memory of 844 3896 cmd.exe 146 PID 3896 wrote to memory of 1084 3896 cmd.exe 147 PID 3896 wrote to memory of 1084 3896 cmd.exe 147 PID 3896 wrote to memory of 1084 3896 cmd.exe 147 PID 3896 wrote to memory of 1344 3896 cmd.exe 148 PID 3896 wrote to memory of 1344 3896 cmd.exe 148 PID 3896 wrote to memory of 1344 3896 cmd.exe 148 PID 3896 wrote to memory of 4596 3896 cmd.exe 149 PID 3896 wrote to memory of 4596 3896 cmd.exe 149 PID 3896 wrote to memory of 4596 3896 cmd.exe 149 PID 3896 wrote to memory of 4812 3896 cmd.exe 150 PID 3896 wrote to memory of 4812 3896 cmd.exe 150 PID 3896 wrote to memory of 4812 3896 cmd.exe 150 PID 2832 wrote to memory of 4852 2832 v9683261.exe 159 PID 2832 wrote to memory of 4852 2832 v9683261.exe 159 PID 2832 wrote to memory of 4852 2832 v9683261.exe 159 PID 4852 wrote to memory of 4764 4852 e6038360.exe 161 PID 4852 wrote to memory of 4764 4852 e6038360.exe 161 PID 4852 wrote to memory of 4764 4852 e6038360.exe 161 PID 1788 wrote to memory of 2560 1788 fc558940cf67b92298af742c70fc1c24b1f696f15dcd7f45f9d3a487695cda86.exe 164 PID 1788 wrote to memory of 2560 1788 fc558940cf67b92298af742c70fc1c24b1f696f15dcd7f45f9d3a487695cda86.exe 164 PID 1788 wrote to memory of 2560 1788 fc558940cf67b92298af742c70fc1c24b1f696f15dcd7f45f9d3a487695cda86.exe 164 PID 3888 wrote to memory of 4324 3888 oneetx.exe 171 PID 3888 wrote to memory of 4324 3888 oneetx.exe 171 PID 3888 wrote to memory of 4324 3888 oneetx.exe 171
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc558940cf67b92298af742c70fc1c24b1f696f15dcd7f45f9d3a487695cda86.exe"C:\Users\Admin\AppData\Local\Temp\fc558940cf67b92298af742c70fc1c24b1f696f15dcd7f45f9d3a487695cda86.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9683261.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9683261.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0927880.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0927880.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8074378.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8074378.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9911613.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v9911613.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8805012.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a8805012.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 10767⤵
- Program crash
PID:4632
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b6996686.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b6996686.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3900
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7927598.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c7927598.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 6966⤵
- Program crash
PID:5076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 7606⤵
- Program crash
PID:4024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 7966⤵
- Program crash
PID:4252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 9526⤵
- Program crash
PID:4100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 9686⤵
- Program crash
PID:4792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 8086⤵
- Program crash
PID:3976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 12206⤵
- Program crash
PID:936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 12126⤵
- Program crash
PID:480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 13206⤵
- Program crash
PID:3820
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 6927⤵
- Program crash
PID:2016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 8287⤵
- Program crash
PID:4952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 9047⤵
- Program crash
PID:3868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 10527⤵
- Program crash
PID:2916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 10727⤵
- Program crash
PID:4940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 10727⤵
- Program crash
PID:4776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 11087⤵
- Program crash
PID:3792
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F7⤵
- Creates scheduled task(s)
PID:1448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 10047⤵
- Program crash
PID:1636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 7687⤵
- Program crash
PID:4112
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4780
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"8⤵PID:844
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E8⤵PID:1084
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1344
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"8⤵PID:4596
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E8⤵PID:4812
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 9047⤵
- Program crash
PID:1224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 9247⤵
- Program crash
PID:2864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 12727⤵
- Program crash
PID:2124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 7647⤵
- Program crash
PID:2336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 14527⤵
- Program crash
PID:4820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 11007⤵
- Program crash
PID:3400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 15567⤵
- Program crash
PID:2368
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 11007⤵
- Program crash
PID:540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 16447⤵
- Program crash
PID:4788
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 13726⤵
- Program crash
PID:4140
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d0803333.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d0803333.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e6038360.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e6038360.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 15164⤵
- Program crash
PID:3236
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f6881872.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f6881872.exe2⤵
- Executes dropped EXE
PID:2560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1500 -ip 15001⤵PID:4864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3764 -ip 37641⤵PID:3400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3764 -ip 37641⤵PID:4912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3764 -ip 37641⤵PID:2160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3764 -ip 37641⤵PID:3412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3764 -ip 37641⤵PID:3076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3764 -ip 37641⤵PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3764 -ip 37641⤵PID:1332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3764 -ip 37641⤵PID:3668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3764 -ip 37641⤵PID:3024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3764 -ip 37641⤵PID:2804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3888 -ip 38881⤵PID:4908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3888 -ip 38881⤵PID:736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3888 -ip 38881⤵PID:2896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3888 -ip 38881⤵PID:1792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3888 -ip 38881⤵PID:1136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3888 -ip 38881⤵PID:4656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3888 -ip 38881⤵PID:2128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3888 -ip 38881⤵PID:2944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3888 -ip 38881⤵PID:4484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3888 -ip 38881⤵PID:4268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3888 -ip 38881⤵PID:1680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3888 -ip 38881⤵PID:3904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3888 -ip 38881⤵PID:4116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3888 -ip 38881⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 3122⤵
- Program crash
PID:968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4852 -ip 48521⤵PID:3792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2584 -ip 25841⤵PID:4376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3888 -ip 38881⤵PID:1012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3888 -ip 38881⤵PID:4460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3888 -ip 38881⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 3202⤵
- Program crash
PID:3864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4464 -ip 44641⤵PID:4252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3888 -ip 38881⤵PID:3696
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5c8bf0df99d2b47cd264385bfff4f5cec
SHA18e73c90de33325deab8c4d58f4d457a748831c69
SHA2561a9745b8a92838c9def3c49f6e732a1c349dc25d0c6f9359c1cac5f15f76fabe
SHA5123af8edd4f16a9ef18cb917e9f0c87a95ec517a4e255cd2e67627587c60ef7077b95ec69b567bdeef890149628000563f20b471b05f32f3c52dfedbbed97bf864
-
Filesize
205KB
MD5c8bf0df99d2b47cd264385bfff4f5cec
SHA18e73c90de33325deab8c4d58f4d457a748831c69
SHA2561a9745b8a92838c9def3c49f6e732a1c349dc25d0c6f9359c1cac5f15f76fabe
SHA5123af8edd4f16a9ef18cb917e9f0c87a95ec517a4e255cd2e67627587c60ef7077b95ec69b567bdeef890149628000563f20b471b05f32f3c52dfedbbed97bf864
-
Filesize
1.3MB
MD516f11291591baf2765ae5df2995f35d7
SHA1a4bdcefb00ee86d7eba335eebac535803a9cb0d3
SHA25602e6274e6dfefd941091b79d50a7098823bb61f90ed32545a36a15147452cc94
SHA5122208989b96c830bdd51a58b51e5927e48133f67f9fbe491c300d23be77b3604f10396b545e8abec36a67520844ab061c387ef49b3a26b85211d5b3e604bb02b5
-
Filesize
1.3MB
MD516f11291591baf2765ae5df2995f35d7
SHA1a4bdcefb00ee86d7eba335eebac535803a9cb0d3
SHA25602e6274e6dfefd941091b79d50a7098823bb61f90ed32545a36a15147452cc94
SHA5122208989b96c830bdd51a58b51e5927e48133f67f9fbe491c300d23be77b3604f10396b545e8abec36a67520844ab061c387ef49b3a26b85211d5b3e604bb02b5
-
Filesize
478KB
MD56f99a951d1e169c51f5572563f9a8db1
SHA1624305934359c2a4f7db47967414d5ef029f48df
SHA256bba62c067d01bfbb0dd4e742dbb2ebbd9d73d338effd96d590974f1ebebee3ed
SHA5120e4a135ecb240bb0aab0e7bb8b1ed1d0c90d534e4f665125401253bd5bc3d6c04b77707436819e527340d05efa1ee2f7f4a588c1247ee202dba13fe757c4c172
-
Filesize
478KB
MD56f99a951d1e169c51f5572563f9a8db1
SHA1624305934359c2a4f7db47967414d5ef029f48df
SHA256bba62c067d01bfbb0dd4e742dbb2ebbd9d73d338effd96d590974f1ebebee3ed
SHA5120e4a135ecb240bb0aab0e7bb8b1ed1d0c90d534e4f665125401253bd5bc3d6c04b77707436819e527340d05efa1ee2f7f4a588c1247ee202dba13fe757c4c172
-
Filesize
849KB
MD509d4d343b5e03b15a347bb026eebda01
SHA1349240b8f8102eb5f2a0bfb81479868d4f11fe72
SHA25683d583242e4370c2c837624307293d00f9aca49d83dcb1f40f8b58d9d31fd3c1
SHA512deee3a5e2af94782c89ef9c946c30af114166351b364ded3b53506780f0dfaa229375b8ca96354c74cdde850ca5fba454a251d01d7dd5a33f6d9cebade478097
-
Filesize
849KB
MD509d4d343b5e03b15a347bb026eebda01
SHA1349240b8f8102eb5f2a0bfb81479868d4f11fe72
SHA25683d583242e4370c2c837624307293d00f9aca49d83dcb1f40f8b58d9d31fd3c1
SHA512deee3a5e2af94782c89ef9c946c30af114166351b364ded3b53506780f0dfaa229375b8ca96354c74cdde850ca5fba454a251d01d7dd5a33f6d9cebade478097
-
Filesize
177KB
MD586962cda7b3249b647ec3058431e342e
SHA1f1c6a6fec68c4d7a730ad5cab7569ed983d7669b
SHA2569da27dd7e129f04241b1723422621817e66635815c0b4828f5e88882db7d4fe4
SHA5128be3fb1a9e329338692e863eb8b90c3442c918ab3972d4f4eba0f35e8546525a7f49b8dac1c11fe45fbd91c76b3c820e877ec70dc02a9f74210de1851c0ec6e6
-
Filesize
177KB
MD586962cda7b3249b647ec3058431e342e
SHA1f1c6a6fec68c4d7a730ad5cab7569ed983d7669b
SHA2569da27dd7e129f04241b1723422621817e66635815c0b4828f5e88882db7d4fe4
SHA5128be3fb1a9e329338692e863eb8b90c3442c918ab3972d4f4eba0f35e8546525a7f49b8dac1c11fe45fbd91c76b3c820e877ec70dc02a9f74210de1851c0ec6e6
-
Filesize
644KB
MD50136ab0fc8c09bdc4819defcb09bdc1c
SHA14e1a7d5790d81d9dc692a4be97f771f4ea185d70
SHA256819e759ceaca30c32bec52f66afaeaa018240c6b35d08b10389870f5867d31f9
SHA512278d36229862c46b95f79e4ed491fd069185ca7d445903ef0529ea5e010007741eb56f4726c5b8929d2cddb95317a101b316ecbfeaa9d9aed5ef1457b4c3c4ab
-
Filesize
644KB
MD50136ab0fc8c09bdc4819defcb09bdc1c
SHA14e1a7d5790d81d9dc692a4be97f771f4ea185d70
SHA256819e759ceaca30c32bec52f66afaeaa018240c6b35d08b10389870f5867d31f9
SHA512278d36229862c46b95f79e4ed491fd069185ca7d445903ef0529ea5e010007741eb56f4726c5b8929d2cddb95317a101b316ecbfeaa9d9aed5ef1457b4c3c4ab
-
Filesize
271KB
MD57e0af171ec4a6f38ef669aeb41e3a812
SHA17b20f557b9d2d5069cde3bfd28f59c6a7b117bab
SHA256c04c067bf6ce49a9da0881d42dc870aff0521d433a245f6af75b04d5f222c5a9
SHA51216bbe092b7f162cb8b7355ddd8b6700b5f1401ae1c02de23003b4d5b61a0ef7864460799016a7dafc8b371244bb50b287ee445957eafdcfa90007064cabac201
-
Filesize
271KB
MD57e0af171ec4a6f38ef669aeb41e3a812
SHA17b20f557b9d2d5069cde3bfd28f59c6a7b117bab
SHA256c04c067bf6ce49a9da0881d42dc870aff0521d433a245f6af75b04d5f222c5a9
SHA51216bbe092b7f162cb8b7355ddd8b6700b5f1401ae1c02de23003b4d5b61a0ef7864460799016a7dafc8b371244bb50b287ee445957eafdcfa90007064cabac201
-
Filesize
384KB
MD579e7e7eb27803bde89af9a3877af36f3
SHA124e02dcc1afd7fd792fc4b7cd7ece8d9bffeebb9
SHA256af3e13d7059ed16465f81ab1bf60571df3e2b46f09d9a97eb08b7375c04398c9
SHA51279e1abd4de4b9269d01920a3213032b5ddf5643a40dd5052e268982b6715f08ddeb56eccc29737db9a99dca7bbb9615644e88467fab5626565ee280387597da5
-
Filesize
384KB
MD579e7e7eb27803bde89af9a3877af36f3
SHA124e02dcc1afd7fd792fc4b7cd7ece8d9bffeebb9
SHA256af3e13d7059ed16465f81ab1bf60571df3e2b46f09d9a97eb08b7375c04398c9
SHA51279e1abd4de4b9269d01920a3213032b5ddf5643a40dd5052e268982b6715f08ddeb56eccc29737db9a99dca7bbb9615644e88467fab5626565ee280387597da5
-
Filesize
292KB
MD5512df677761b9b154a062178c861ce66
SHA13ea2cd19a22d380380d690ff2fda5845568ee74f
SHA256bc64e044e856765b51d2c2e5217e6444729661c5204cbfff34deff1c9cd837c7
SHA51262f56b9b5ba5bc526f08c5300df701b93a15e5a9ff746633d4e37214efdeebd8aa17fca6511f1b38ed22812e7736bf277632a0edee5527677468ca23710389a6
-
Filesize
292KB
MD5512df677761b9b154a062178c861ce66
SHA13ea2cd19a22d380380d690ff2fda5845568ee74f
SHA256bc64e044e856765b51d2c2e5217e6444729661c5204cbfff34deff1c9cd837c7
SHA51262f56b9b5ba5bc526f08c5300df701b93a15e5a9ff746633d4e37214efdeebd8aa17fca6511f1b38ed22812e7736bf277632a0edee5527677468ca23710389a6
-
Filesize
168KB
MD5880d12e19a3fe117017299da933401a2
SHA16fc3ec38c511f182bdcf5d69ea7f5d83075e35c3
SHA2562d1573ecf87bf7618c087b9b0d77a69590af99b293a5cb11f22554137c8eee1c
SHA5122a8d581913914fcbdf2d4c07eff648fb3cdc1768ffba7ab343f3b264d607e63a3c143f1ed35a802be766ef80966b0b0c9ffd7a8c2a3a3028853d93c9d1bd7c05
-
Filesize
168KB
MD5880d12e19a3fe117017299da933401a2
SHA16fc3ec38c511f182bdcf5d69ea7f5d83075e35c3
SHA2562d1573ecf87bf7618c087b9b0d77a69590af99b293a5cb11f22554137c8eee1c
SHA5122a8d581913914fcbdf2d4c07eff648fb3cdc1768ffba7ab343f3b264d607e63a3c143f1ed35a802be766ef80966b0b0c9ffd7a8c2a3a3028853d93c9d1bd7c05
-
Filesize
271KB
MD57e0af171ec4a6f38ef669aeb41e3a812
SHA17b20f557b9d2d5069cde3bfd28f59c6a7b117bab
SHA256c04c067bf6ce49a9da0881d42dc870aff0521d433a245f6af75b04d5f222c5a9
SHA51216bbe092b7f162cb8b7355ddd8b6700b5f1401ae1c02de23003b4d5b61a0ef7864460799016a7dafc8b371244bb50b287ee445957eafdcfa90007064cabac201
-
Filesize
271KB
MD57e0af171ec4a6f38ef669aeb41e3a812
SHA17b20f557b9d2d5069cde3bfd28f59c6a7b117bab
SHA256c04c067bf6ce49a9da0881d42dc870aff0521d433a245f6af75b04d5f222c5a9
SHA51216bbe092b7f162cb8b7355ddd8b6700b5f1401ae1c02de23003b4d5b61a0ef7864460799016a7dafc8b371244bb50b287ee445957eafdcfa90007064cabac201
-
Filesize
271KB
MD57e0af171ec4a6f38ef669aeb41e3a812
SHA17b20f557b9d2d5069cde3bfd28f59c6a7b117bab
SHA256c04c067bf6ce49a9da0881d42dc870aff0521d433a245f6af75b04d5f222c5a9
SHA51216bbe092b7f162cb8b7355ddd8b6700b5f1401ae1c02de23003b4d5b61a0ef7864460799016a7dafc8b371244bb50b287ee445957eafdcfa90007064cabac201
-
Filesize
271KB
MD57e0af171ec4a6f38ef669aeb41e3a812
SHA17b20f557b9d2d5069cde3bfd28f59c6a7b117bab
SHA256c04c067bf6ce49a9da0881d42dc870aff0521d433a245f6af75b04d5f222c5a9
SHA51216bbe092b7f162cb8b7355ddd8b6700b5f1401ae1c02de23003b4d5b61a0ef7864460799016a7dafc8b371244bb50b287ee445957eafdcfa90007064cabac201
-
Filesize
271KB
MD57e0af171ec4a6f38ef669aeb41e3a812
SHA17b20f557b9d2d5069cde3bfd28f59c6a7b117bab
SHA256c04c067bf6ce49a9da0881d42dc870aff0521d433a245f6af75b04d5f222c5a9
SHA51216bbe092b7f162cb8b7355ddd8b6700b5f1401ae1c02de23003b4d5b61a0ef7864460799016a7dafc8b371244bb50b287ee445957eafdcfa90007064cabac201
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b