Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2023, 08:36
Static task
static1
Behavioral task
behavioral1
Sample
e28cb2dae89cfecce4d5713a14e9a3d9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e28cb2dae89cfecce4d5713a14e9a3d9.exe
Resource
win10v2004-20230220-en
General
-
Target
e28cb2dae89cfecce4d5713a14e9a3d9.exe
-
Size
1.4MB
-
MD5
e28cb2dae89cfecce4d5713a14e9a3d9
-
SHA1
8f3a305910b219830598e3ed70b5e3fba4724536
-
SHA256
d9a732545cd8f94b16d798ab31f369a6ad61fca19fc56780d531468ee2e6ff8c
-
SHA512
be90d22da378b623ae56c5b257c1553cca339166ff95c9cbb8718506a0b5c080d89f0a2beb68ec3168c2985f4c86de5fbaa65a79edb96073309b2129365cd703
-
SSDEEP
24576:WyOjrIOIXgVl6PKmSoIaq8v3AePh4mMxOmFhlyW4eJD/fpHwQnCB:lSWjS6f/AUh4Hx7fKenZC
Malware Config
Extracted
redline
mask
217.196.96.56:4138
-
auth_value
31aef25be0febb8e491794ef7f502c50
Extracted
redline
boom
217.196.96.56:4138
-
auth_value
1ce6aebe15bac07a7bc88b114bc49335
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5683585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5683585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" d2408755.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" d2408755.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d2408755.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5683585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5683585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5683585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" d2408755.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" d2408755.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a5683585.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation c5229159.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation e5209856.exe -
Executes dropped EXE 14 IoCs
pid Process 1984 v8487588.exe 640 v1847297.exe 4220 v6987823.exe 1968 v7605266.exe 3840 a5683585.exe 2232 b2057505.exe 4608 c5229159.exe 1268 oneetx.exe 1680 d2408755.exe 1936 e5209856.exe 2780 1.exe 5024 f6389154.exe 3340 oneetx.exe 4236 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2684 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a5683585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a5683585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d2408755.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v7605266.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e28cb2dae89cfecce4d5713a14e9a3d9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8487588.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8487588.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1847297.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6987823.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v6987823.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e28cb2dae89cfecce4d5713a14e9a3d9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v1847297.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7605266.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 32 IoCs
pid pid_target Process procid_target 544 3840 WerFault.exe 89 2772 4608 WerFault.exe 96 4752 4608 WerFault.exe 96 3512 4608 WerFault.exe 96 1792 4608 WerFault.exe 96 4336 4608 WerFault.exe 96 4120 4608 WerFault.exe 96 3360 4608 WerFault.exe 96 2276 4608 WerFault.exe 96 1556 4608 WerFault.exe 96 2280 4608 WerFault.exe 96 2168 1268 WerFault.exe 116 4944 1268 WerFault.exe 116 3680 1268 WerFault.exe 116 3356 1268 WerFault.exe 116 1544 1268 WerFault.exe 116 4904 1268 WerFault.exe 116 1336 1268 WerFault.exe 116 3840 1268 WerFault.exe 116 1396 1268 WerFault.exe 116 3940 1268 WerFault.exe 116 4260 1268 WerFault.exe 116 808 1268 WerFault.exe 116 4448 1268 WerFault.exe 116 4120 1268 WerFault.exe 116 5076 1936 WerFault.exe 161 4240 3340 WerFault.exe 166 3352 1268 WerFault.exe 116 4444 1268 WerFault.exe 116 400 1268 WerFault.exe 116 2504 4236 WerFault.exe 176 4852 1268 WerFault.exe 116 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 772 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3840 a5683585.exe 3840 a5683585.exe 2232 b2057505.exe 2232 b2057505.exe 1680 d2408755.exe 1680 d2408755.exe 2780 1.exe 2780 1.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3840 a5683585.exe Token: SeDebugPrivilege 2232 b2057505.exe Token: SeDebugPrivilege 1680 d2408755.exe Token: SeDebugPrivilege 1936 e5209856.exe Token: SeDebugPrivilege 2780 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4608 c5229159.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 1808 wrote to memory of 1984 1808 e28cb2dae89cfecce4d5713a14e9a3d9.exe 85 PID 1808 wrote to memory of 1984 1808 e28cb2dae89cfecce4d5713a14e9a3d9.exe 85 PID 1808 wrote to memory of 1984 1808 e28cb2dae89cfecce4d5713a14e9a3d9.exe 85 PID 1984 wrote to memory of 640 1984 v8487588.exe 86 PID 1984 wrote to memory of 640 1984 v8487588.exe 86 PID 1984 wrote to memory of 640 1984 v8487588.exe 86 PID 640 wrote to memory of 4220 640 v1847297.exe 87 PID 640 wrote to memory of 4220 640 v1847297.exe 87 PID 640 wrote to memory of 4220 640 v1847297.exe 87 PID 4220 wrote to memory of 1968 4220 v6987823.exe 88 PID 4220 wrote to memory of 1968 4220 v6987823.exe 88 PID 4220 wrote to memory of 1968 4220 v6987823.exe 88 PID 1968 wrote to memory of 3840 1968 v7605266.exe 89 PID 1968 wrote to memory of 3840 1968 v7605266.exe 89 PID 1968 wrote to memory of 3840 1968 v7605266.exe 89 PID 1968 wrote to memory of 2232 1968 v7605266.exe 95 PID 1968 wrote to memory of 2232 1968 v7605266.exe 95 PID 1968 wrote to memory of 2232 1968 v7605266.exe 95 PID 4220 wrote to memory of 4608 4220 v6987823.exe 96 PID 4220 wrote to memory of 4608 4220 v6987823.exe 96 PID 4220 wrote to memory of 4608 4220 v6987823.exe 96 PID 4608 wrote to memory of 1268 4608 c5229159.exe 116 PID 4608 wrote to memory of 1268 4608 c5229159.exe 116 PID 4608 wrote to memory of 1268 4608 c5229159.exe 116 PID 640 wrote to memory of 1680 640 v1847297.exe 119 PID 640 wrote to memory of 1680 640 v1847297.exe 119 PID 640 wrote to memory of 1680 640 v1847297.exe 119 PID 1268 wrote to memory of 772 1268 oneetx.exe 135 PID 1268 wrote to memory of 772 1268 oneetx.exe 135 PID 1268 wrote to memory of 772 1268 oneetx.exe 135 PID 1268 wrote to memory of 5076 1268 oneetx.exe 142 PID 1268 wrote to memory of 5076 1268 oneetx.exe 142 PID 1268 wrote to memory of 5076 1268 oneetx.exe 142 PID 5076 wrote to memory of 3640 5076 cmd.exe 146 PID 5076 wrote to memory of 3640 5076 cmd.exe 146 PID 5076 wrote to memory of 3640 5076 cmd.exe 146 PID 5076 wrote to memory of 1720 5076 cmd.exe 148 PID 5076 wrote to memory of 1720 5076 cmd.exe 148 PID 5076 wrote to memory of 1720 5076 cmd.exe 148 PID 5076 wrote to memory of 1692 5076 cmd.exe 149 PID 5076 wrote to memory of 1692 5076 cmd.exe 149 PID 5076 wrote to memory of 1692 5076 cmd.exe 149 PID 5076 wrote to memory of 2516 5076 cmd.exe 150 PID 5076 wrote to memory of 2516 5076 cmd.exe 150 PID 5076 wrote to memory of 2516 5076 cmd.exe 150 PID 5076 wrote to memory of 4116 5076 cmd.exe 151 PID 5076 wrote to memory of 4116 5076 cmd.exe 151 PID 5076 wrote to memory of 4116 5076 cmd.exe 151 PID 5076 wrote to memory of 3648 5076 cmd.exe 152 PID 5076 wrote to memory of 3648 5076 cmd.exe 152 PID 5076 wrote to memory of 3648 5076 cmd.exe 152 PID 1984 wrote to memory of 1936 1984 v8487588.exe 161 PID 1984 wrote to memory of 1936 1984 v8487588.exe 161 PID 1984 wrote to memory of 1936 1984 v8487588.exe 161 PID 1936 wrote to memory of 2780 1936 e5209856.exe 162 PID 1936 wrote to memory of 2780 1936 e5209856.exe 162 PID 1936 wrote to memory of 2780 1936 e5209856.exe 162 PID 1808 wrote to memory of 5024 1808 e28cb2dae89cfecce4d5713a14e9a3d9.exe 165 PID 1808 wrote to memory of 5024 1808 e28cb2dae89cfecce4d5713a14e9a3d9.exe 165 PID 1808 wrote to memory of 5024 1808 e28cb2dae89cfecce4d5713a14e9a3d9.exe 165 PID 1268 wrote to memory of 2684 1268 oneetx.exe 173 PID 1268 wrote to memory of 2684 1268 oneetx.exe 173 PID 1268 wrote to memory of 2684 1268 oneetx.exe 173
Processes
-
C:\Users\Admin\AppData\Local\Temp\e28cb2dae89cfecce4d5713a14e9a3d9.exe"C:\Users\Admin\AppData\Local\Temp\e28cb2dae89cfecce4d5713a14e9a3d9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8487588.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8487588.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1847297.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1847297.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6987823.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6987823.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7605266.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7605266.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5683585.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5683585.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3840 -s 10847⤵
- Program crash
PID:544
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b2057505.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b2057505.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5229159.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c5229159.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 6966⤵
- Program crash
PID:2772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 7726⤵
- Program crash
PID:4752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 8606⤵
- Program crash
PID:3512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 9726⤵
- Program crash
PID:1792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 8606⤵
- Program crash
PID:4336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 8606⤵
- Program crash
PID:4120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 12166⤵
- Program crash
PID:3360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 12326⤵
- Program crash
PID:2276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 13126⤵
- Program crash
PID:1556
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 6927⤵
- Program crash
PID:2168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 8847⤵
- Program crash
PID:4944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 8927⤵
- Program crash
PID:3680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 9167⤵
- Program crash
PID:3356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 11007⤵
- Program crash
PID:1544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 9167⤵
- Program crash
PID:4904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 11247⤵
- Program crash
PID:1336
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F7⤵
- Creates scheduled task(s)
PID:772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 8967⤵
- Program crash
PID:3840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 13007⤵
- Program crash
PID:1396
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3640
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"8⤵PID:1720
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E8⤵PID:1692
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2516
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"8⤵PID:4116
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E8⤵PID:3648
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 7527⤵
- Program crash
PID:3940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 7607⤵
- Program crash
PID:4260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 7287⤵
- Program crash
PID:808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 7687⤵
- Program crash
PID:4448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 15567⤵
- Program crash
PID:4120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 10967⤵
- Program crash
PID:3352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 16207⤵
- Program crash
PID:4444
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:2684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 15607⤵
- Program crash
PID:400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 16367⤵
- Program crash
PID:4852
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 7086⤵
- Program crash
PID:2280
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d2408755.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d2408755.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e5209856.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e5209856.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 13844⤵
- Program crash
PID:5076
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f6389154.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f6389154.exe2⤵
- Executes dropped EXE
PID:5024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3840 -ip 38401⤵PID:1164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4608 -ip 46081⤵PID:1692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4608 -ip 46081⤵PID:1132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4608 -ip 46081⤵PID:4804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4608 -ip 46081⤵PID:1856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4608 -ip 46081⤵PID:1672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4608 -ip 46081⤵PID:4476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4608 -ip 46081⤵PID:4812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4608 -ip 46081⤵PID:1936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4608 -ip 46081⤵PID:3176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4608 -ip 46081⤵PID:4324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1268 -ip 12681⤵PID:1584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1268 -ip 12681⤵PID:1464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1268 -ip 12681⤵PID:4988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1268 -ip 12681⤵PID:1084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1268 -ip 12681⤵PID:4332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1268 -ip 12681⤵PID:3064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1268 -ip 12681⤵PID:2312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1268 -ip 12681⤵PID:784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1268 -ip 12681⤵PID:3232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1268 -ip 12681⤵PID:2708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1268 -ip 12681⤵PID:1736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1268 -ip 12681⤵PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1268 -ip 12681⤵PID:2436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1268 -ip 12681⤵PID:2544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1936 -ip 19361⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3340 -s 3162⤵
- Program crash
PID:4240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3340 -ip 33401⤵PID:4072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1268 -ip 12681⤵PID:4392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1268 -ip 12681⤵PID:3100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1268 -ip 12681⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 3162⤵
- Program crash
PID:2504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4236 -ip 42361⤵PID:1696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1268 -ip 12681⤵PID:4020
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD54af47e1fd064095b1e5f05628463ec1c
SHA1d2c8baf9a3e55d4b27f57b2265144805eb52da2e
SHA256d424e94a24cd74605955de24c2b1002b01dc0a46af7b0fea7110a74a89fe31dd
SHA512f6a86130e8593e6995f0fab5c7e03e20e383cdd2cbfea58faa3a430b83116c1fb9c2ff992abb2c99789adde4c4b9e61295ed5fbe8eaf6e97f72812aef20d73b5
-
Filesize
205KB
MD54af47e1fd064095b1e5f05628463ec1c
SHA1d2c8baf9a3e55d4b27f57b2265144805eb52da2e
SHA256d424e94a24cd74605955de24c2b1002b01dc0a46af7b0fea7110a74a89fe31dd
SHA512f6a86130e8593e6995f0fab5c7e03e20e383cdd2cbfea58faa3a430b83116c1fb9c2ff992abb2c99789adde4c4b9e61295ed5fbe8eaf6e97f72812aef20d73b5
-
Filesize
1.3MB
MD577918c99f118a1f84667a919dead46ba
SHA1eac0e11735f269614e2e41331f737a7b49f5ca5c
SHA25697e55462183d8bdc348fddfe9b509dd3c777ac88b0dba8592b9024228262e7be
SHA51257dfcf884a66419295229af09f9fe495423242982fc503727b4bd41e8f58ca7bfc9598d5aab04e9ec37b3f77362cc99fca3793173536b3c0b177afdfeb5b5815
-
Filesize
1.3MB
MD577918c99f118a1f84667a919dead46ba
SHA1eac0e11735f269614e2e41331f737a7b49f5ca5c
SHA25697e55462183d8bdc348fddfe9b509dd3c777ac88b0dba8592b9024228262e7be
SHA51257dfcf884a66419295229af09f9fe495423242982fc503727b4bd41e8f58ca7bfc9598d5aab04e9ec37b3f77362cc99fca3793173536b3c0b177afdfeb5b5815
-
Filesize
475KB
MD52fe6de075eda9fe4383ebbc148214f84
SHA1680612d383a41ba8e483de2a4573358bf7539975
SHA256683e7059ba54cfe9a74ebf1cbe87916957e6e90a03e9ab58acc39115c5f05a6d
SHA512b0e7cd9404f15633016fc50c1de40cff898f015c5eab0b96d36853873d07611b3fc33e40efeb5496e789544dcb4911eca4d2b671d6e3f787f4d28af1331b1cba
-
Filesize
475KB
MD52fe6de075eda9fe4383ebbc148214f84
SHA1680612d383a41ba8e483de2a4573358bf7539975
SHA256683e7059ba54cfe9a74ebf1cbe87916957e6e90a03e9ab58acc39115c5f05a6d
SHA512b0e7cd9404f15633016fc50c1de40cff898f015c5eab0b96d36853873d07611b3fc33e40efeb5496e789544dcb4911eca4d2b671d6e3f787f4d28af1331b1cba
-
Filesize
846KB
MD599d2432c0a45826ecdd1a655a342c183
SHA1f03df156d73161393422ee0c7188a15997c06b82
SHA256c969a87afbeee1f23ee1cb0b5ebdbd4a4a7fb8f4ce7c0afc107bf41d4592c33d
SHA512c8e670ad0b4ab1b94eea002b5125c6b8e765990e9995e4ca140111b46b1387ef18931f8ad6ac59a8879840621563c97d17b779d603369928a398020c9cc0f9cb
-
Filesize
846KB
MD599d2432c0a45826ecdd1a655a342c183
SHA1f03df156d73161393422ee0c7188a15997c06b82
SHA256c969a87afbeee1f23ee1cb0b5ebdbd4a4a7fb8f4ce7c0afc107bf41d4592c33d
SHA512c8e670ad0b4ab1b94eea002b5125c6b8e765990e9995e4ca140111b46b1387ef18931f8ad6ac59a8879840621563c97d17b779d603369928a398020c9cc0f9cb
-
Filesize
178KB
MD595f50cfed7b4c1625820780d4e647c2a
SHA120371d25cb7aae0459a889c9d07400c5d7c4fd00
SHA2569403c95307317cc06bc21d4a74700d70870e09cafa5bb5e275e47035cd3f3c2c
SHA512fd835523c5cb5035549c6bd2858bbf6953ad1827bda84815eb7cdf6b8021e88fa8e89cd8d5db4311c30dd43ed055caaf6dde2dcaf864db1c52e6542535b5830f
-
Filesize
178KB
MD595f50cfed7b4c1625820780d4e647c2a
SHA120371d25cb7aae0459a889c9d07400c5d7c4fd00
SHA2569403c95307317cc06bc21d4a74700d70870e09cafa5bb5e275e47035cd3f3c2c
SHA512fd835523c5cb5035549c6bd2858bbf6953ad1827bda84815eb7cdf6b8021e88fa8e89cd8d5db4311c30dd43ed055caaf6dde2dcaf864db1c52e6542535b5830f
-
Filesize
642KB
MD525333987b8f728508e1909b10aa3d441
SHA1f25b957633bb1a4c72bf2dad91a6e492e7bbcfcb
SHA2561aa27480800b8dd39a96320bac1a371f3631ed5a3c2bf54f79e76809cfa42a39
SHA5124a013b4e4ca1c8bb0042d295bf7f00466ff8f89b95c93e753a715f95a4f551a74e05fdbf1917bb81ac596ea53fa99583008b6de836c55d066ac16f9d83433873
-
Filesize
642KB
MD525333987b8f728508e1909b10aa3d441
SHA1f25b957633bb1a4c72bf2dad91a6e492e7bbcfcb
SHA2561aa27480800b8dd39a96320bac1a371f3631ed5a3c2bf54f79e76809cfa42a39
SHA5124a013b4e4ca1c8bb0042d295bf7f00466ff8f89b95c93e753a715f95a4f551a74e05fdbf1917bb81ac596ea53fa99583008b6de836c55d066ac16f9d83433873
-
Filesize
268KB
MD59a218672d91901f7aece2988e6bb4a92
SHA13a67d87b42a1df1541b1f9b58377b4f8f2e6f735
SHA2560efd40f79fd45f9ef021b924d955d053a0e444d474398a497ae2270a239981bf
SHA512f06add18652b12f3b9641fc8eb19ece60bc16ddb310f8042d0f36893c77cf5e618ddc5e23bb4a26f110cc03e35c22bf99305050bb20409500843011f08f04892
-
Filesize
268KB
MD59a218672d91901f7aece2988e6bb4a92
SHA13a67d87b42a1df1541b1f9b58377b4f8f2e6f735
SHA2560efd40f79fd45f9ef021b924d955d053a0e444d474398a497ae2270a239981bf
SHA512f06add18652b12f3b9641fc8eb19ece60bc16ddb310f8042d0f36893c77cf5e618ddc5e23bb4a26f110cc03e35c22bf99305050bb20409500843011f08f04892
-
Filesize
383KB
MD514cac55b63154963559a1a40e9f1e280
SHA10b9a0a0fabf2e41b1acf1826268a46e3b3c14963
SHA256f27f08749e92cc9d7a768f04972109acbf50e45ba0ccf9e807a3e0bb9750310d
SHA512d2d077e689e9b04de9beaa29d23c06c7e93eb8418e3844443a7225b5aff1a694190cf0a5b889aed3918427ab3a3d8fc76c6a5c41b9406863e27077939028ddca
-
Filesize
383KB
MD514cac55b63154963559a1a40e9f1e280
SHA10b9a0a0fabf2e41b1acf1826268a46e3b3c14963
SHA256f27f08749e92cc9d7a768f04972109acbf50e45ba0ccf9e807a3e0bb9750310d
SHA512d2d077e689e9b04de9beaa29d23c06c7e93eb8418e3844443a7225b5aff1a694190cf0a5b889aed3918427ab3a3d8fc76c6a5c41b9406863e27077939028ddca
-
Filesize
289KB
MD56a9ce2ce57765d5d79d66ed33ce454d3
SHA140fc971ea6b3aa6bb77e0f55444516ac3a7bf28a
SHA2563d9316057f275f2f2bd5685571002121551b2d10e622b5b95b41471c9eb6166e
SHA512eb57ddab3b71c403995782f9c9e2168da707bfbb630ebf2de45a2c46a967abd68e3b501778be41889c8739f5ad3f93c36eb1d574b74daee35a87d3f0ddb423d3
-
Filesize
289KB
MD56a9ce2ce57765d5d79d66ed33ce454d3
SHA140fc971ea6b3aa6bb77e0f55444516ac3a7bf28a
SHA2563d9316057f275f2f2bd5685571002121551b2d10e622b5b95b41471c9eb6166e
SHA512eb57ddab3b71c403995782f9c9e2168da707bfbb630ebf2de45a2c46a967abd68e3b501778be41889c8739f5ad3f93c36eb1d574b74daee35a87d3f0ddb423d3
-
Filesize
168KB
MD579c38b8b3e2c0cc01834269f1f388650
SHA1e9c66995a1a6f736e4ff112269847c66de1785f3
SHA256c4f62cce2d3796fb6fd0ac0419aa337103a441507c22032565f83d2ad185f024
SHA512b3416c07277713e1212818b2243f6ffcfa38458cdbb1be9482288ba4db2aaa0a7f3f0c27fd6ecaede8f060a9a970a930b431d8906de13b5f6e30b72d06ac9906
-
Filesize
168KB
MD579c38b8b3e2c0cc01834269f1f388650
SHA1e9c66995a1a6f736e4ff112269847c66de1785f3
SHA256c4f62cce2d3796fb6fd0ac0419aa337103a441507c22032565f83d2ad185f024
SHA512b3416c07277713e1212818b2243f6ffcfa38458cdbb1be9482288ba4db2aaa0a7f3f0c27fd6ecaede8f060a9a970a930b431d8906de13b5f6e30b72d06ac9906
-
Filesize
268KB
MD59a218672d91901f7aece2988e6bb4a92
SHA13a67d87b42a1df1541b1f9b58377b4f8f2e6f735
SHA2560efd40f79fd45f9ef021b924d955d053a0e444d474398a497ae2270a239981bf
SHA512f06add18652b12f3b9641fc8eb19ece60bc16ddb310f8042d0f36893c77cf5e618ddc5e23bb4a26f110cc03e35c22bf99305050bb20409500843011f08f04892
-
Filesize
268KB
MD59a218672d91901f7aece2988e6bb4a92
SHA13a67d87b42a1df1541b1f9b58377b4f8f2e6f735
SHA2560efd40f79fd45f9ef021b924d955d053a0e444d474398a497ae2270a239981bf
SHA512f06add18652b12f3b9641fc8eb19ece60bc16ddb310f8042d0f36893c77cf5e618ddc5e23bb4a26f110cc03e35c22bf99305050bb20409500843011f08f04892
-
Filesize
268KB
MD59a218672d91901f7aece2988e6bb4a92
SHA13a67d87b42a1df1541b1f9b58377b4f8f2e6f735
SHA2560efd40f79fd45f9ef021b924d955d053a0e444d474398a497ae2270a239981bf
SHA512f06add18652b12f3b9641fc8eb19ece60bc16ddb310f8042d0f36893c77cf5e618ddc5e23bb4a26f110cc03e35c22bf99305050bb20409500843011f08f04892
-
Filesize
268KB
MD59a218672d91901f7aece2988e6bb4a92
SHA13a67d87b42a1df1541b1f9b58377b4f8f2e6f735
SHA2560efd40f79fd45f9ef021b924d955d053a0e444d474398a497ae2270a239981bf
SHA512f06add18652b12f3b9641fc8eb19ece60bc16ddb310f8042d0f36893c77cf5e618ddc5e23bb4a26f110cc03e35c22bf99305050bb20409500843011f08f04892
-
Filesize
268KB
MD59a218672d91901f7aece2988e6bb4a92
SHA13a67d87b42a1df1541b1f9b58377b4f8f2e6f735
SHA2560efd40f79fd45f9ef021b924d955d053a0e444d474398a497ae2270a239981bf
SHA512f06add18652b12f3b9641fc8eb19ece60bc16ddb310f8042d0f36893c77cf5e618ddc5e23bb4a26f110cc03e35c22bf99305050bb20409500843011f08f04892
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b