Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2023, 20:36
Static task
static1
Behavioral task
behavioral1
Sample
8c2a203d80ebd6d5aaeffeb4611f45fad2d019a0d10de0ed3ae690a26de0732e.exe
Resource
win10v2004-20230220-en
General
-
Target
8c2a203d80ebd6d5aaeffeb4611f45fad2d019a0d10de0ed3ae690a26de0732e.exe
-
Size
1.4MB
-
MD5
e02c80f970a8d9d2f461a5c61801d884
-
SHA1
6b435dc379e477b9bd9d4271025f8862847378f6
-
SHA256
8c2a203d80ebd6d5aaeffeb4611f45fad2d019a0d10de0ed3ae690a26de0732e
-
SHA512
68f6b5f3f26df5f08fca13b9a98d3214ae56eb2b2721a9905e13d3ed602fe3d456a6e4395ce61141f2967ae66a28cbe2320e8be3cc5864239a7a3e6419911d27
-
SSDEEP
24576:Ayh+s8JwoDrNcsPBZ3cSNbHU1Sx6iAolIzJYrmJVt3JNYvRogZ7lScs/Vp1szleP:HYs0wodlPBZMSRbx6Bc65J38vR7nS2zX
Malware Config
Extracted
redline
mask
217.196.96.56:4138
-
auth_value
31aef25be0febb8e491794ef7f502c50
Extracted
redline
boom
217.196.96.56:4138
-
auth_value
1ce6aebe15bac07a7bc88b114bc49335
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a3752425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a3752425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" d6127315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" d6127315.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a3752425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a3752425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a3752425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a3752425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" d6127315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" d6127315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d6127315.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation c1747436.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation e5629069.exe -
Executes dropped EXE 14 IoCs
pid Process 3076 v4436106.exe 3588 v6351094.exe 2132 v1162027.exe 3376 v8813284.exe 3180 a3752425.exe 1532 b9072770.exe 1780 c1747436.exe 4840 oneetx.exe 3860 d6127315.exe 2396 e5629069.exe 2928 1.exe 4624 f5901494.exe 2924 oneetx.exe 1240 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4864 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a3752425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a3752425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d6127315.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8c2a203d80ebd6d5aaeffeb4611f45fad2d019a0d10de0ed3ae690a26de0732e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4436106.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1162027.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v8813284.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8c2a203d80ebd6d5aaeffeb4611f45fad2d019a0d10de0ed3ae690a26de0732e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4436106.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6351094.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v6351094.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v1162027.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8813284.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 31 IoCs
pid pid_target Process procid_target 4180 3180 WerFault.exe 87 1208 1780 WerFault.exe 94 2168 1780 WerFault.exe 94 4240 1780 WerFault.exe 94 3236 1780 WerFault.exe 94 4436 1780 WerFault.exe 94 2576 1780 WerFault.exe 94 2024 1780 WerFault.exe 94 4744 1780 WerFault.exe 94 956 1780 WerFault.exe 94 4668 1780 WerFault.exe 94 4572 4840 WerFault.exe 114 1768 4840 WerFault.exe 114 4648 4840 WerFault.exe 114 3304 4840 WerFault.exe 114 1800 4840 WerFault.exe 114 1916 4840 WerFault.exe 114 3692 4840 WerFault.exe 114 3980 4840 WerFault.exe 114 4736 4840 WerFault.exe 114 748 4840 WerFault.exe 114 1680 4840 WerFault.exe 114 3008 4840 WerFault.exe 114 4120 4840 WerFault.exe 114 1908 2396 WerFault.exe 158 4844 4840 WerFault.exe 114 1468 2924 WerFault.exe 165 4872 4840 WerFault.exe 114 4656 4840 WerFault.exe 114 2384 4840 WerFault.exe 114 2528 1240 WerFault.exe 175 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2896 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3180 a3752425.exe 3180 a3752425.exe 1532 b9072770.exe 1532 b9072770.exe 3860 d6127315.exe 3860 d6127315.exe 2928 1.exe 2928 1.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3180 a3752425.exe Token: SeDebugPrivilege 1532 b9072770.exe Token: SeDebugPrivilege 3860 d6127315.exe Token: SeDebugPrivilege 2396 e5629069.exe Token: SeDebugPrivilege 2928 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1780 c1747436.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 4024 wrote to memory of 3076 4024 8c2a203d80ebd6d5aaeffeb4611f45fad2d019a0d10de0ed3ae690a26de0732e.exe 83 PID 4024 wrote to memory of 3076 4024 8c2a203d80ebd6d5aaeffeb4611f45fad2d019a0d10de0ed3ae690a26de0732e.exe 83 PID 4024 wrote to memory of 3076 4024 8c2a203d80ebd6d5aaeffeb4611f45fad2d019a0d10de0ed3ae690a26de0732e.exe 83 PID 3076 wrote to memory of 3588 3076 v4436106.exe 84 PID 3076 wrote to memory of 3588 3076 v4436106.exe 84 PID 3076 wrote to memory of 3588 3076 v4436106.exe 84 PID 3588 wrote to memory of 2132 3588 v6351094.exe 85 PID 3588 wrote to memory of 2132 3588 v6351094.exe 85 PID 3588 wrote to memory of 2132 3588 v6351094.exe 85 PID 2132 wrote to memory of 3376 2132 v1162027.exe 86 PID 2132 wrote to memory of 3376 2132 v1162027.exe 86 PID 2132 wrote to memory of 3376 2132 v1162027.exe 86 PID 3376 wrote to memory of 3180 3376 v8813284.exe 87 PID 3376 wrote to memory of 3180 3376 v8813284.exe 87 PID 3376 wrote to memory of 3180 3376 v8813284.exe 87 PID 3376 wrote to memory of 1532 3376 v8813284.exe 93 PID 3376 wrote to memory of 1532 3376 v8813284.exe 93 PID 3376 wrote to memory of 1532 3376 v8813284.exe 93 PID 2132 wrote to memory of 1780 2132 v1162027.exe 94 PID 2132 wrote to memory of 1780 2132 v1162027.exe 94 PID 2132 wrote to memory of 1780 2132 v1162027.exe 94 PID 1780 wrote to memory of 4840 1780 c1747436.exe 114 PID 1780 wrote to memory of 4840 1780 c1747436.exe 114 PID 1780 wrote to memory of 4840 1780 c1747436.exe 114 PID 3588 wrote to memory of 3860 3588 v6351094.exe 117 PID 3588 wrote to memory of 3860 3588 v6351094.exe 117 PID 3588 wrote to memory of 3860 3588 v6351094.exe 117 PID 4840 wrote to memory of 2896 4840 oneetx.exe 133 PID 4840 wrote to memory of 2896 4840 oneetx.exe 133 PID 4840 wrote to memory of 2896 4840 oneetx.exe 133 PID 4840 wrote to memory of 3680 4840 oneetx.exe 139 PID 4840 wrote to memory of 3680 4840 oneetx.exe 139 PID 4840 wrote to memory of 3680 4840 oneetx.exe 139 PID 3680 wrote to memory of 872 3680 cmd.exe 143 PID 3680 wrote to memory of 872 3680 cmd.exe 143 PID 3680 wrote to memory of 872 3680 cmd.exe 143 PID 3680 wrote to memory of 4676 3680 cmd.exe 144 PID 3680 wrote to memory of 4676 3680 cmd.exe 144 PID 3680 wrote to memory of 4676 3680 cmd.exe 144 PID 3680 wrote to memory of 5048 3680 cmd.exe 145 PID 3680 wrote to memory of 5048 3680 cmd.exe 145 PID 3680 wrote to memory of 5048 3680 cmd.exe 145 PID 3680 wrote to memory of 884 3680 cmd.exe 146 PID 3680 wrote to memory of 884 3680 cmd.exe 146 PID 3680 wrote to memory of 884 3680 cmd.exe 146 PID 3680 wrote to memory of 4212 3680 cmd.exe 147 PID 3680 wrote to memory of 4212 3680 cmd.exe 147 PID 3680 wrote to memory of 4212 3680 cmd.exe 147 PID 3680 wrote to memory of 556 3680 cmd.exe 148 PID 3680 wrote to memory of 556 3680 cmd.exe 148 PID 3680 wrote to memory of 556 3680 cmd.exe 148 PID 3076 wrote to memory of 2396 3076 v4436106.exe 158 PID 3076 wrote to memory of 2396 3076 v4436106.exe 158 PID 3076 wrote to memory of 2396 3076 v4436106.exe 158 PID 2396 wrote to memory of 2928 2396 e5629069.exe 159 PID 2396 wrote to memory of 2928 2396 e5629069.exe 159 PID 2396 wrote to memory of 2928 2396 e5629069.exe 159 PID 4024 wrote to memory of 4624 4024 8c2a203d80ebd6d5aaeffeb4611f45fad2d019a0d10de0ed3ae690a26de0732e.exe 162 PID 4024 wrote to memory of 4624 4024 8c2a203d80ebd6d5aaeffeb4611f45fad2d019a0d10de0ed3ae690a26de0732e.exe 162 PID 4024 wrote to memory of 4624 4024 8c2a203d80ebd6d5aaeffeb4611f45fad2d019a0d10de0ed3ae690a26de0732e.exe 162 PID 4840 wrote to memory of 4864 4840 oneetx.exe 170 PID 4840 wrote to memory of 4864 4840 oneetx.exe 170 PID 4840 wrote to memory of 4864 4840 oneetx.exe 170
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c2a203d80ebd6d5aaeffeb4611f45fad2d019a0d10de0ed3ae690a26de0732e.exe"C:\Users\Admin\AppData\Local\Temp\8c2a203d80ebd6d5aaeffeb4611f45fad2d019a0d10de0ed3ae690a26de0732e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4436106.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4436106.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6351094.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6351094.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1162027.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1162027.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8813284.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8813284.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3752425.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a3752425.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3180 -s 10887⤵
- Program crash
PID:4180
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9072770.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9072770.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1747436.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1747436.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 6966⤵
- Program crash
PID:1208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 7806⤵
- Program crash
PID:2168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 8566⤵
- Program crash
PID:4240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 9726⤵
- Program crash
PID:3236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 9766⤵
- Program crash
PID:4436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 9766⤵
- Program crash
PID:2576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 12166⤵
- Program crash
PID:2024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 12086⤵
- Program crash
PID:4744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 13126⤵
- Program crash
PID:956
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 6967⤵
- Program crash
PID:4572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 8487⤵
- Program crash
PID:1768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 8927⤵
- Program crash
PID:4648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 10607⤵
- Program crash
PID:3304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 10887⤵
- Program crash
PID:1800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 10807⤵
- Program crash
PID:1916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 10927⤵
- Program crash
PID:3692
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F7⤵
- Creates scheduled task(s)
PID:2896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 9927⤵
- Program crash
PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 7847⤵
- Program crash
PID:4736
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:872
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"8⤵PID:4676
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E8⤵PID:5048
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:884
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"8⤵PID:4212
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E8⤵PID:556
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 9247⤵
- Program crash
PID:748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 13047⤵
- Program crash
PID:1680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 7687⤵
- Program crash
PID:3008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 13367⤵
- Program crash
PID:4120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 11087⤵
- Program crash
PID:4844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 16127⤵
- Program crash
PID:4872
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 10887⤵
- Program crash
PID:4656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 16287⤵
- Program crash
PID:2384
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 13566⤵
- Program crash
PID:4668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d6127315.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d6127315.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3860
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e5629069.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e5629069.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 15004⤵
- Program crash
PID:1908
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f5901494.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f5901494.exe2⤵
- Executes dropped EXE
PID:4624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3180 -ip 31801⤵PID:1476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1780 -ip 17801⤵PID:1248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1780 -ip 17801⤵PID:1184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1780 -ip 17801⤵PID:5052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1780 -ip 17801⤵PID:3596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1780 -ip 17801⤵PID:1904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1780 -ip 17801⤵PID:4116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1780 -ip 17801⤵PID:4664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1780 -ip 17801⤵PID:2008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1780 -ip 17801⤵PID:4224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1780 -ip 17801⤵PID:1228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4840 -ip 48401⤵PID:212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4840 -ip 48401⤵PID:1968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4840 -ip 48401⤵PID:3540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4840 -ip 48401⤵PID:4728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4840 -ip 48401⤵PID:4000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4840 -ip 48401⤵PID:4904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4840 -ip 48401⤵PID:4196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4840 -ip 48401⤵PID:4604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4840 -ip 48401⤵PID:2632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4840 -ip 48401⤵PID:3864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4840 -ip 48401⤵PID:3952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4840 -ip 48401⤵PID:3184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4840 -ip 48401⤵PID:1316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2396 -ip 23961⤵PID:2224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4840 -ip 48401⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 3122⤵
- Program crash
PID:1468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2924 -ip 29241⤵PID:1852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4840 -ip 48401⤵PID:4984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4840 -ip 48401⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4840 -ip 48401⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1240 -s 3122⤵
- Program crash
PID:2528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1240 -ip 12401⤵PID:1364
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5d14946548fe1fd668b6afd563843af7d
SHA19c5d2a31cea3542d3fcce546a67dda8c94a36a18
SHA256b6c00a42819fff20daed6720ab0f182fa0d8380c4f90bd2e524a0e7395e652da
SHA5122f3b28fcaf754751cd676048b98f14f41edeb1b41312e5a405ada0547fa3a8d200ab84f28991842a012eb841d07ca39bba6a6980c86f682f0388c6decb052bf4
-
Filesize
205KB
MD5d14946548fe1fd668b6afd563843af7d
SHA19c5d2a31cea3542d3fcce546a67dda8c94a36a18
SHA256b6c00a42819fff20daed6720ab0f182fa0d8380c4f90bd2e524a0e7395e652da
SHA5122f3b28fcaf754751cd676048b98f14f41edeb1b41312e5a405ada0547fa3a8d200ab84f28991842a012eb841d07ca39bba6a6980c86f682f0388c6decb052bf4
-
Filesize
1.3MB
MD50950e599d15704059f6c7d29d8a661ca
SHA1496e7957c2074cb0213e392ee48c4bd3283996d5
SHA256163662bae5b574c68e555ed0c73c7acf51bce35c24bf679d5468fca108fd0681
SHA51265f64fe518915532343db221572f9337c3c97466a1b04684a0ce5715ece598acba639a0647760708705a5f2fa9e0bd2135441aea77530dbed48e3c60e60c1d96
-
Filesize
1.3MB
MD50950e599d15704059f6c7d29d8a661ca
SHA1496e7957c2074cb0213e392ee48c4bd3283996d5
SHA256163662bae5b574c68e555ed0c73c7acf51bce35c24bf679d5468fca108fd0681
SHA51265f64fe518915532343db221572f9337c3c97466a1b04684a0ce5715ece598acba639a0647760708705a5f2fa9e0bd2135441aea77530dbed48e3c60e60c1d96
-
Filesize
475KB
MD5f8ecc0d891b5615324c6ceef8bfd51fb
SHA1175b07b0f4a110bd070097f1cd03d0f829ba0104
SHA2565ec836c61b91476a8c0477fd1d7a03e2f9e26c3448674f4556b9c9ba780c9bbc
SHA5126c69320ed00851de4f189d986d9eb8a0df158a2a2f54f161e60b187db5e17e431d4472fbecb68b8d4b70273af761e21279114cf188155046d3ae6f40174af677
-
Filesize
475KB
MD5f8ecc0d891b5615324c6ceef8bfd51fb
SHA1175b07b0f4a110bd070097f1cd03d0f829ba0104
SHA2565ec836c61b91476a8c0477fd1d7a03e2f9e26c3448674f4556b9c9ba780c9bbc
SHA5126c69320ed00851de4f189d986d9eb8a0df158a2a2f54f161e60b187db5e17e431d4472fbecb68b8d4b70273af761e21279114cf188155046d3ae6f40174af677
-
Filesize
845KB
MD5c2035c679337b715d5519fd09c00a270
SHA1c922240ee758341bfef7422b4084f1106d26060f
SHA2560911615416127187726777f74f8714ff1d76268e2330eb393e481b4b0ffb68ad
SHA51275d29ca6ce2d71aee9255e5dc8b087b3bef63655cf8302d3538bd7f2a85f6901c3cabce1890b3c4a5ce8cbedbe060922b65b510cb60bdd7baaf21c2ddbdfadd2
-
Filesize
845KB
MD5c2035c679337b715d5519fd09c00a270
SHA1c922240ee758341bfef7422b4084f1106d26060f
SHA2560911615416127187726777f74f8714ff1d76268e2330eb393e481b4b0ffb68ad
SHA51275d29ca6ce2d71aee9255e5dc8b087b3bef63655cf8302d3538bd7f2a85f6901c3cabce1890b3c4a5ce8cbedbe060922b65b510cb60bdd7baaf21c2ddbdfadd2
-
Filesize
178KB
MD56cc00fea992cf142bbae1ccde37b3510
SHA1d15decac4b670bfc5dcc77b09d6c6997986be777
SHA256fc134b12f9ccad7d7efd89accd6270a432fbf006382e6b9d2d6d58eebbc0f1ea
SHA512105d6e3b7594c0ad2fc6634e9dc3a134201788c18d26c54aff2bffa85704a0146ba06cf9ad47bfefb27cee2c47499147d995f3d5498e0948a1b24750fc39f978
-
Filesize
178KB
MD56cc00fea992cf142bbae1ccde37b3510
SHA1d15decac4b670bfc5dcc77b09d6c6997986be777
SHA256fc134b12f9ccad7d7efd89accd6270a432fbf006382e6b9d2d6d58eebbc0f1ea
SHA512105d6e3b7594c0ad2fc6634e9dc3a134201788c18d26c54aff2bffa85704a0146ba06cf9ad47bfefb27cee2c47499147d995f3d5498e0948a1b24750fc39f978
-
Filesize
641KB
MD552fcac741456537a29ad03487d78fcc6
SHA1e44b3bd767e40807f3cf342ea93ede053f6ed44f
SHA2568032014deb43ecdb1b671b40ca64b694b19433a7b3bd4d31cb3d38bfc5def5e4
SHA512034e5cbcc543788127120520716ef36f077a69b7fbcb1b01b925587bedb6b8d9f698d097a24f79a80956d95bd920957ff8c64766a210e32e39b4dfaefc52081a
-
Filesize
641KB
MD552fcac741456537a29ad03487d78fcc6
SHA1e44b3bd767e40807f3cf342ea93ede053f6ed44f
SHA2568032014deb43ecdb1b671b40ca64b694b19433a7b3bd4d31cb3d38bfc5def5e4
SHA512034e5cbcc543788127120520716ef36f077a69b7fbcb1b01b925587bedb6b8d9f698d097a24f79a80956d95bd920957ff8c64766a210e32e39b4dfaefc52081a
-
Filesize
268KB
MD52fada3471d8bf15e5681b600f1f0677a
SHA19aa09f610f11978f405303d1fac804ba3166e60c
SHA256e9ed7ee82855d79e54b21f9b3d22ebfc4268cde3c155d922389ccb2c195d538f
SHA512670b122dcafefee02dde9106154197f2c580fcaa38f290b1f0bc2dfcccfa5e1a7becb1e4c94f9551f32a014875171eea4b42d6c8fe4d6f479e7eeeb483f38b8f
-
Filesize
268KB
MD52fada3471d8bf15e5681b600f1f0677a
SHA19aa09f610f11978f405303d1fac804ba3166e60c
SHA256e9ed7ee82855d79e54b21f9b3d22ebfc4268cde3c155d922389ccb2c195d538f
SHA512670b122dcafefee02dde9106154197f2c580fcaa38f290b1f0bc2dfcccfa5e1a7becb1e4c94f9551f32a014875171eea4b42d6c8fe4d6f479e7eeeb483f38b8f
-
Filesize
383KB
MD5c7683584f771db2d35d150465b1ac43e
SHA139da16ef20ac958ef183dd2029a909e10e729b23
SHA2560b31c55173d929af379079e4f68ac82fbacf9f3c8ff464c51fc205f3a71b90c6
SHA512780ef03d61d6cc5563edb640f4276923614faf185a80083f8d5f62642fd3919a652026ba994dca5fd623883d50dc0ed4babc417ef6d7e4a1da0b862dbbf7c8c6
-
Filesize
383KB
MD5c7683584f771db2d35d150465b1ac43e
SHA139da16ef20ac958ef183dd2029a909e10e729b23
SHA2560b31c55173d929af379079e4f68ac82fbacf9f3c8ff464c51fc205f3a71b90c6
SHA512780ef03d61d6cc5563edb640f4276923614faf185a80083f8d5f62642fd3919a652026ba994dca5fd623883d50dc0ed4babc417ef6d7e4a1da0b862dbbf7c8c6
-
Filesize
289KB
MD56ef2cbd7c854c7bde47009c9922af36b
SHA14f25fef7ece2e53cfc8693b346276f3c9ff5cce9
SHA256b91ec91aff93ea424df5a068684df72b0ebf2733ac54a673319fd3e2765ae584
SHA512ae9d24704003df4ab125e8ce3ef708b4a5c44e9bf30c637094c34c37cf0398c73cb6cbf0653678e855554bf76fa857ab9fe79d74111d26f3b51c01a8f4d78cf9
-
Filesize
289KB
MD56ef2cbd7c854c7bde47009c9922af36b
SHA14f25fef7ece2e53cfc8693b346276f3c9ff5cce9
SHA256b91ec91aff93ea424df5a068684df72b0ebf2733ac54a673319fd3e2765ae584
SHA512ae9d24704003df4ab125e8ce3ef708b4a5c44e9bf30c637094c34c37cf0398c73cb6cbf0653678e855554bf76fa857ab9fe79d74111d26f3b51c01a8f4d78cf9
-
Filesize
168KB
MD515aebbf0260dfc22af8145e3b6b9f2ff
SHA167ad49a260d8158ece52c8606ce6842e61988a5f
SHA25672bbb7a80c42bb9705de2ec34becd82f5afc1a9f094ae4b4c1439f1977377cec
SHA51228fcfa8e8ecb5875267aaec7a2fdd80ceccc27f99e44cac902cbe675f9a9172e18de8132b9c591fbdee69a89317c11814d29f051a48d049a4fb2c5381fc88122
-
Filesize
168KB
MD515aebbf0260dfc22af8145e3b6b9f2ff
SHA167ad49a260d8158ece52c8606ce6842e61988a5f
SHA25672bbb7a80c42bb9705de2ec34becd82f5afc1a9f094ae4b4c1439f1977377cec
SHA51228fcfa8e8ecb5875267aaec7a2fdd80ceccc27f99e44cac902cbe675f9a9172e18de8132b9c591fbdee69a89317c11814d29f051a48d049a4fb2c5381fc88122
-
Filesize
268KB
MD52fada3471d8bf15e5681b600f1f0677a
SHA19aa09f610f11978f405303d1fac804ba3166e60c
SHA256e9ed7ee82855d79e54b21f9b3d22ebfc4268cde3c155d922389ccb2c195d538f
SHA512670b122dcafefee02dde9106154197f2c580fcaa38f290b1f0bc2dfcccfa5e1a7becb1e4c94f9551f32a014875171eea4b42d6c8fe4d6f479e7eeeb483f38b8f
-
Filesize
268KB
MD52fada3471d8bf15e5681b600f1f0677a
SHA19aa09f610f11978f405303d1fac804ba3166e60c
SHA256e9ed7ee82855d79e54b21f9b3d22ebfc4268cde3c155d922389ccb2c195d538f
SHA512670b122dcafefee02dde9106154197f2c580fcaa38f290b1f0bc2dfcccfa5e1a7becb1e4c94f9551f32a014875171eea4b42d6c8fe4d6f479e7eeeb483f38b8f
-
Filesize
268KB
MD52fada3471d8bf15e5681b600f1f0677a
SHA19aa09f610f11978f405303d1fac804ba3166e60c
SHA256e9ed7ee82855d79e54b21f9b3d22ebfc4268cde3c155d922389ccb2c195d538f
SHA512670b122dcafefee02dde9106154197f2c580fcaa38f290b1f0bc2dfcccfa5e1a7becb1e4c94f9551f32a014875171eea4b42d6c8fe4d6f479e7eeeb483f38b8f
-
Filesize
268KB
MD52fada3471d8bf15e5681b600f1f0677a
SHA19aa09f610f11978f405303d1fac804ba3166e60c
SHA256e9ed7ee82855d79e54b21f9b3d22ebfc4268cde3c155d922389ccb2c195d538f
SHA512670b122dcafefee02dde9106154197f2c580fcaa38f290b1f0bc2dfcccfa5e1a7becb1e4c94f9551f32a014875171eea4b42d6c8fe4d6f479e7eeeb483f38b8f
-
Filesize
268KB
MD52fada3471d8bf15e5681b600f1f0677a
SHA19aa09f610f11978f405303d1fac804ba3166e60c
SHA256e9ed7ee82855d79e54b21f9b3d22ebfc4268cde3c155d922389ccb2c195d538f
SHA512670b122dcafefee02dde9106154197f2c580fcaa38f290b1f0bc2dfcccfa5e1a7becb1e4c94f9551f32a014875171eea4b42d6c8fe4d6f479e7eeeb483f38b8f
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b