Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2023, 13:47
Static task
static1
Behavioral task
behavioral1
Sample
98cb0f706ddf277e1dadc7d1c58e4658ffa9e8538539430899134dc90726ed53.exe
Resource
win10v2004-20230220-en
General
-
Target
98cb0f706ddf277e1dadc7d1c58e4658ffa9e8538539430899134dc90726ed53.exe
-
Size
1.5MB
-
MD5
22d7d9b6b2c9c4f1d5ae2d506c5e8726
-
SHA1
13a86ce4ece4d62ee31fe9c8b70da1371348e61b
-
SHA256
98cb0f706ddf277e1dadc7d1c58e4658ffa9e8538539430899134dc90726ed53
-
SHA512
71ff56af55a9e2a6e86c139a97018a2c13dd001f9fe7d5f0a24c2c30b989d22896f56f634300cb1ac40353932f83a83f9006fd1804d04854831e5b7b3dad7834
-
SSDEEP
24576:uy8uxW7bnZ8ok39Gaq/xBsQiHgL0oZrY3DZAZ///PolP+M/5XvcNxrW:9ZCbnyow9Y/xB7U36Z//EmsXq
Malware Config
Extracted
redline
boom
217.196.96.56:4138
-
auth_value
1ce6aebe15bac07a7bc88b114bc49335
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" d0542911.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d0542911.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5918958.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5918958.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5918958.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" d0542911.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" d0542911.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" d0542911.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a5918958.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5918958.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5918958.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation c2239064.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation e7476326.exe -
Executes dropped EXE 14 IoCs
pid Process 5052 v6859169.exe 2416 v4660463.exe 816 v1826175.exe 3540 v8662468.exe 1656 a5918958.exe 2660 b1151342.exe 4480 c2239064.exe 4644 oneetx.exe 3980 d0542911.exe 1904 oneetx.exe 4764 e7476326.exe 4620 1.exe 3488 f3124689.exe 1468 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 396 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a5918958.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a5918958.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d0542911.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 98cb0f706ddf277e1dadc7d1c58e4658ffa9e8538539430899134dc90726ed53.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6859169.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1826175.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v8662468.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 98cb0f706ddf277e1dadc7d1c58e4658ffa9e8538539430899134dc90726ed53.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v6859169.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4660463.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4660463.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v1826175.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8662468.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 32 IoCs
pid pid_target Process procid_target 3296 1656 WerFault.exe 85 1912 4480 WerFault.exe 90 4624 4480 WerFault.exe 90 4524 4480 WerFault.exe 90 920 4480 WerFault.exe 90 432 4480 WerFault.exe 90 4652 4480 WerFault.exe 90 828 4480 WerFault.exe 90 2844 4480 WerFault.exe 90 2368 4480 WerFault.exe 90 4888 4480 WerFault.exe 90 4124 4644 WerFault.exe 110 4632 4644 WerFault.exe 110 3932 4644 WerFault.exe 110 5048 4644 WerFault.exe 110 4436 4644 WerFault.exe 110 972 4644 WerFault.exe 110 1376 4644 WerFault.exe 110 3588 4644 WerFault.exe 110 4976 4644 WerFault.exe 110 4376 4644 WerFault.exe 110 3964 4644 WerFault.exe 110 2736 4644 WerFault.exe 110 2796 4644 WerFault.exe 110 1676 1904 WerFault.exe 150 4104 4764 WerFault.exe 153 4700 4644 WerFault.exe 110 4692 4644 WerFault.exe 110 1020 4644 WerFault.exe 110 448 4644 WerFault.exe 110 1472 1468 WerFault.exe 167 3928 4644 WerFault.exe 110 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1720 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1656 a5918958.exe 1656 a5918958.exe 2660 b1151342.exe 2660 b1151342.exe 3980 d0542911.exe 3980 d0542911.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1656 a5918958.exe Token: SeDebugPrivilege 2660 b1151342.exe Token: SeDebugPrivilege 3980 d0542911.exe Token: SeDebugPrivilege 4764 e7476326.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4480 c2239064.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 4276 wrote to memory of 5052 4276 98cb0f706ddf277e1dadc7d1c58e4658ffa9e8538539430899134dc90726ed53.exe 81 PID 4276 wrote to memory of 5052 4276 98cb0f706ddf277e1dadc7d1c58e4658ffa9e8538539430899134dc90726ed53.exe 81 PID 4276 wrote to memory of 5052 4276 98cb0f706ddf277e1dadc7d1c58e4658ffa9e8538539430899134dc90726ed53.exe 81 PID 5052 wrote to memory of 2416 5052 v6859169.exe 82 PID 5052 wrote to memory of 2416 5052 v6859169.exe 82 PID 5052 wrote to memory of 2416 5052 v6859169.exe 82 PID 2416 wrote to memory of 816 2416 v4660463.exe 83 PID 2416 wrote to memory of 816 2416 v4660463.exe 83 PID 2416 wrote to memory of 816 2416 v4660463.exe 83 PID 816 wrote to memory of 3540 816 v1826175.exe 84 PID 816 wrote to memory of 3540 816 v1826175.exe 84 PID 816 wrote to memory of 3540 816 v1826175.exe 84 PID 3540 wrote to memory of 1656 3540 v8662468.exe 85 PID 3540 wrote to memory of 1656 3540 v8662468.exe 85 PID 3540 wrote to memory of 1656 3540 v8662468.exe 85 PID 3540 wrote to memory of 2660 3540 v8662468.exe 89 PID 3540 wrote to memory of 2660 3540 v8662468.exe 89 PID 3540 wrote to memory of 2660 3540 v8662468.exe 89 PID 816 wrote to memory of 4480 816 v1826175.exe 90 PID 816 wrote to memory of 4480 816 v1826175.exe 90 PID 816 wrote to memory of 4480 816 v1826175.exe 90 PID 4480 wrote to memory of 4644 4480 c2239064.exe 110 PID 4480 wrote to memory of 4644 4480 c2239064.exe 110 PID 4480 wrote to memory of 4644 4480 c2239064.exe 110 PID 2416 wrote to memory of 3980 2416 v4660463.exe 114 PID 2416 wrote to memory of 3980 2416 v4660463.exe 114 PID 2416 wrote to memory of 3980 2416 v4660463.exe 114 PID 4644 wrote to memory of 1720 4644 oneetx.exe 128 PID 4644 wrote to memory of 1720 4644 oneetx.exe 128 PID 4644 wrote to memory of 1720 4644 oneetx.exe 128 PID 4644 wrote to memory of 748 4644 oneetx.exe 134 PID 4644 wrote to memory of 748 4644 oneetx.exe 134 PID 4644 wrote to memory of 748 4644 oneetx.exe 134 PID 748 wrote to memory of 1952 748 cmd.exe 138 PID 748 wrote to memory of 1952 748 cmd.exe 138 PID 748 wrote to memory of 1952 748 cmd.exe 138 PID 748 wrote to memory of 4712 748 cmd.exe 139 PID 748 wrote to memory of 4712 748 cmd.exe 139 PID 748 wrote to memory of 4712 748 cmd.exe 139 PID 748 wrote to memory of 116 748 cmd.exe 140 PID 748 wrote to memory of 116 748 cmd.exe 140 PID 748 wrote to memory of 116 748 cmd.exe 140 PID 748 wrote to memory of 224 748 cmd.exe 142 PID 748 wrote to memory of 224 748 cmd.exe 142 PID 748 wrote to memory of 224 748 cmd.exe 142 PID 748 wrote to memory of 3296 748 cmd.exe 141 PID 748 wrote to memory of 3296 748 cmd.exe 141 PID 748 wrote to memory of 3296 748 cmd.exe 141 PID 748 wrote to memory of 1412 748 cmd.exe 143 PID 748 wrote to memory of 1412 748 cmd.exe 143 PID 748 wrote to memory of 1412 748 cmd.exe 143 PID 5052 wrote to memory of 4764 5052 v6859169.exe 153 PID 5052 wrote to memory of 4764 5052 v6859169.exe 153 PID 5052 wrote to memory of 4764 5052 v6859169.exe 153 PID 4764 wrote to memory of 4620 4764 e7476326.exe 154 PID 4764 wrote to memory of 4620 4764 e7476326.exe 154 PID 4764 wrote to memory of 4620 4764 e7476326.exe 154 PID 4276 wrote to memory of 3488 4276 98cb0f706ddf277e1dadc7d1c58e4658ffa9e8538539430899134dc90726ed53.exe 157 PID 4276 wrote to memory of 3488 4276 98cb0f706ddf277e1dadc7d1c58e4658ffa9e8538539430899134dc90726ed53.exe 157 PID 4276 wrote to memory of 3488 4276 98cb0f706ddf277e1dadc7d1c58e4658ffa9e8538539430899134dc90726ed53.exe 157 PID 4644 wrote to memory of 396 4644 oneetx.exe 164 PID 4644 wrote to memory of 396 4644 oneetx.exe 164 PID 4644 wrote to memory of 396 4644 oneetx.exe 164
Processes
-
C:\Users\Admin\AppData\Local\Temp\98cb0f706ddf277e1dadc7d1c58e4658ffa9e8538539430899134dc90726ed53.exe"C:\Users\Admin\AppData\Local\Temp\98cb0f706ddf277e1dadc7d1c58e4658ffa9e8538539430899134dc90726ed53.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6859169.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6859169.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4660463.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4660463.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1826175.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1826175.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8662468.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v8662468.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5918958.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5918958.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1656 -s 10847⤵
- Program crash
PID:3296
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1151342.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b1151342.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c2239064.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c2239064.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 6966⤵
- Program crash
PID:1912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 7926⤵
- Program crash
PID:4624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 8566⤵
- Program crash
PID:4524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 8646⤵
- Program crash
PID:920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 9766⤵
- Program crash
PID:432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 9766⤵
- Program crash
PID:4652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 12206⤵
- Program crash
PID:828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 12046⤵
- Program crash
PID:2844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 13286⤵
- Program crash
PID:2368
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 6927⤵
- Program crash
PID:4124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 8447⤵
- Program crash
PID:4632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 8927⤵
- Program crash
PID:3932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 10527⤵
- Program crash
PID:5048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 10607⤵
- Program crash
PID:4436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 10607⤵
- Program crash
PID:972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 11327⤵
- Program crash
PID:1376
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F7⤵
- Creates scheduled task(s)
PID:1720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 10167⤵
- Program crash
PID:3588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 10607⤵
- Program crash
PID:4976
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1952
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"8⤵PID:4712
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E8⤵PID:116
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"8⤵PID:3296
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:224
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E8⤵PID:1412
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 9527⤵
- Program crash
PID:4376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 7687⤵
- Program crash
PID:3964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 7527⤵
- Program crash
PID:2736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 7807⤵
- Program crash
PID:2796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 11487⤵
- Program crash
PID:4700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 11047⤵
- Program crash
PID:4692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 16047⤵
- Program crash
PID:1020
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 16087⤵
- Program crash
PID:448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 16127⤵
- Program crash
PID:3928
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 13606⤵
- Program crash
PID:4888
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d0542911.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d0542911.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3980
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e7476326.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e7476326.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
PID:4620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4764 -s 14964⤵
- Program crash
PID:4104
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f3124689.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f3124689.exe2⤵
- Executes dropped EXE
PID:3488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1656 -ip 16561⤵PID:4328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4480 -ip 44801⤵PID:4472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 4480 -ip 44801⤵PID:1372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4480 -ip 44801⤵PID:1576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4480 -ip 44801⤵PID:1356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4480 -ip 44801⤵PID:4748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4480 -ip 44801⤵PID:4552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4480 -ip 44801⤵PID:4708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4480 -ip 44801⤵PID:3752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4480 -ip 44801⤵PID:3716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4480 -ip 44801⤵PID:4520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4644 -ip 46441⤵PID:780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4644 -ip 46441⤵PID:2392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4644 -ip 46441⤵PID:4876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 4644 -ip 46441⤵PID:5064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4644 -ip 46441⤵PID:4156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4644 -ip 46441⤵PID:4164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4644 -ip 46441⤵PID:3740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4644 -ip 46441⤵PID:1972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4644 -ip 46441⤵PID:1476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4644 -ip 46441⤵PID:2536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4644 -ip 46441⤵PID:4844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 4644 -ip 46441⤵PID:2780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 4644 -ip 46441⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 3162⤵
- Program crash
PID:1676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1904 -ip 19041⤵PID:1928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4764 -ip 47641⤵PID:2776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4644 -ip 46441⤵PID:2912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4644 -ip 46441⤵PID:4444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4644 -ip 46441⤵PID:1176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4644 -ip 46441⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 3122⤵
- Program crash
PID:1472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1468 -ip 14681⤵PID:1248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4644 -ip 46441⤵PID:2036
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5413954b414785eae69a05bf357f571f1
SHA1bd7b1ea1d88c89eec3181ac858c0283ebb5b3b69
SHA25670c8c8f88673ca02673a70e350a3aaded8423334ec78ef9f3e1b9f60fb0c7c38
SHA512984579bf500ee23fa12a5b7bdf77e94d72285511096958f8da5061c09159db02dcecedc835e833c5c740f3ab2bc6e2910626feab0a4ecb3fb1f9382c440c4078
-
Filesize
204KB
MD5413954b414785eae69a05bf357f571f1
SHA1bd7b1ea1d88c89eec3181ac858c0283ebb5b3b69
SHA25670c8c8f88673ca02673a70e350a3aaded8423334ec78ef9f3e1b9f60fb0c7c38
SHA512984579bf500ee23fa12a5b7bdf77e94d72285511096958f8da5061c09159db02dcecedc835e833c5c740f3ab2bc6e2910626feab0a4ecb3fb1f9382c440c4078
-
Filesize
1.4MB
MD5859bcd0b9dcfac642105f5e87034d150
SHA12031f9000d825833509efed0754e85f6739470d3
SHA256e988e50dcb28d161e42be1d9bc75f8c5351b277ab3a7368eddb7e9a7dd0a3f0f
SHA512a98acbe70b3d03c0db443cd1ae5250c830b510ff35579a618ac8c8245a8b81322af4c0b2114f728d96d1b2a1e6421d81c289c9e5cf216cd243cfd5945aabe58a
-
Filesize
1.4MB
MD5859bcd0b9dcfac642105f5e87034d150
SHA12031f9000d825833509efed0754e85f6739470d3
SHA256e988e50dcb28d161e42be1d9bc75f8c5351b277ab3a7368eddb7e9a7dd0a3f0f
SHA512a98acbe70b3d03c0db443cd1ae5250c830b510ff35579a618ac8c8245a8b81322af4c0b2114f728d96d1b2a1e6421d81c289c9e5cf216cd243cfd5945aabe58a
-
Filesize
548KB
MD53b9ad36088369c5cb80cfbea72ae7357
SHA16ea98c7efab394f069eb9a8d36685f99bc65d631
SHA2563f06712bf05d37cae98dbd23948cb442f95891570ed2f75a190c4550d36610da
SHA512b7e5f2b84004b5fe732f55f6f23202a7be6b58c82f4792394dccdf52eb8da3ed00a34822fe5204d95964e04f76c2d806815407e0f019944686522f89802b766a
-
Filesize
548KB
MD53b9ad36088369c5cb80cfbea72ae7357
SHA16ea98c7efab394f069eb9a8d36685f99bc65d631
SHA2563f06712bf05d37cae98dbd23948cb442f95891570ed2f75a190c4550d36610da
SHA512b7e5f2b84004b5fe732f55f6f23202a7be6b58c82f4792394dccdf52eb8da3ed00a34822fe5204d95964e04f76c2d806815407e0f019944686522f89802b766a
-
Filesize
913KB
MD544401921f5a81da5d51674befb1f40b0
SHA1def1e5b35db9a356e28591ca4d95a00dd8f51c33
SHA256e1997a39dc7ad9314a94903632b5cfd6b66734ce49a5c267377021195f074358
SHA5127fe2d6c8c429c206c6e5fe85f2bb6bd093095003ba5f814927d812e415c9b20a1b0b7fb10a8769182876441b01a66a688cbd3d40290cee5b35a2b72985339485
-
Filesize
913KB
MD544401921f5a81da5d51674befb1f40b0
SHA1def1e5b35db9a356e28591ca4d95a00dd8f51c33
SHA256e1997a39dc7ad9314a94903632b5cfd6b66734ce49a5c267377021195f074358
SHA5127fe2d6c8c429c206c6e5fe85f2bb6bd093095003ba5f814927d812e415c9b20a1b0b7fb10a8769182876441b01a66a688cbd3d40290cee5b35a2b72985339485
-
Filesize
175KB
MD52574fb7c6df8da1234ac7b4a477a0ad7
SHA1f14325043925a58fa3cf20d0ad2e317fbc6a39c4
SHA2563687255f0a300fe5c5eb39f6d9e13fb9a8abaeac7d285593a967dcfe5fbd7da0
SHA5126f238f8574691b8144055f5c60840ffef8d382c2bcc97540107d963ad6f87a5b57446080e0bbf4c7446af6fd889260c0b1a5b86368532f0cb74c2f664eb5d89a
-
Filesize
175KB
MD52574fb7c6df8da1234ac7b4a477a0ad7
SHA1f14325043925a58fa3cf20d0ad2e317fbc6a39c4
SHA2563687255f0a300fe5c5eb39f6d9e13fb9a8abaeac7d285593a967dcfe5fbd7da0
SHA5126f238f8574691b8144055f5c60840ffef8d382c2bcc97540107d963ad6f87a5b57446080e0bbf4c7446af6fd889260c0b1a5b86368532f0cb74c2f664eb5d89a
-
Filesize
708KB
MD519cfc2f32c35b8925a4ce24701d7addd
SHA1e424c6d80b294ec62de4041dace5b1e4b5d6ec8b
SHA256d38542f8584dcd81c9a6aa2dfbcb606cb61e9dd2d62cc14e997f0c4cecf017d2
SHA512366dafb7cd4494d142859a3d27646add8ccd208015ab1ac7ba1e42aa3644079cc6cadc35cf9d9d4705058e95fe012e719a8a09711974cc371c0b3f1da888171e
-
Filesize
708KB
MD519cfc2f32c35b8925a4ce24701d7addd
SHA1e424c6d80b294ec62de4041dace5b1e4b5d6ec8b
SHA256d38542f8584dcd81c9a6aa2dfbcb606cb61e9dd2d62cc14e997f0c4cecf017d2
SHA512366dafb7cd4494d142859a3d27646add8ccd208015ab1ac7ba1e42aa3644079cc6cadc35cf9d9d4705058e95fe012e719a8a09711974cc371c0b3f1da888171e
-
Filesize
340KB
MD58a3b776908393c0f791f3d7137ea5af7
SHA17342c9fb06d6c0a8b71cc49ab5fe452db896ee0a
SHA25651469fee41518cd52c793facafe33a2277004cf6ae23c82ff44e39968d3a7aec
SHA5125349333e5e211dc0ed7c728f4b051f156c643dd0dfb590ad3da0039a7a07cd617a6d288156eab4d0b0c7980c777eed56b4dd16f46d14ecdfd232aa72cdc16ebe
-
Filesize
340KB
MD58a3b776908393c0f791f3d7137ea5af7
SHA17342c9fb06d6c0a8b71cc49ab5fe452db896ee0a
SHA25651469fee41518cd52c793facafe33a2277004cf6ae23c82ff44e39968d3a7aec
SHA5125349333e5e211dc0ed7c728f4b051f156c643dd0dfb590ad3da0039a7a07cd617a6d288156eab4d0b0c7980c777eed56b4dd16f46d14ecdfd232aa72cdc16ebe
-
Filesize
417KB
MD5e382efe73e10703f2ef55bfe94eec1f1
SHA1009ef5faabefa99ef988712d89a9e34d57718861
SHA256fa46359db45a63b2e5ad62bd15ad14f4a04efe881dd296ad337ec4512a7f249d
SHA512ed7df61070a151a1799d3d424778de586da6c7c66ee751e6d8cf5054dcd0268f3b57627e4c4512f228825d23f479500a4ee5e68d33489c1d0ef1bd1dca7f9408
-
Filesize
417KB
MD5e382efe73e10703f2ef55bfe94eec1f1
SHA1009ef5faabefa99ef988712d89a9e34d57718861
SHA256fa46359db45a63b2e5ad62bd15ad14f4a04efe881dd296ad337ec4512a7f249d
SHA512ed7df61070a151a1799d3d424778de586da6c7c66ee751e6d8cf5054dcd0268f3b57627e4c4512f228825d23f479500a4ee5e68d33489c1d0ef1bd1dca7f9408
-
Filesize
360KB
MD519f3f7309b41e57913114c7f92c884c4
SHA1aa6e33284c37552b1cb0fb08454aef6c69db3e38
SHA25651bcb739a1091b323f0244047e42c30a870d7bf60bd37eff90c8d68da4e20f2f
SHA512de558454393d9be2cd1a8b14e71f65785878fa99ceeae04c8bca25073d6d1535adfa4ebf49e82d4b5251bba0f15d349b88c19ae5469e69b928ae33aff098ff59
-
Filesize
360KB
MD519f3f7309b41e57913114c7f92c884c4
SHA1aa6e33284c37552b1cb0fb08454aef6c69db3e38
SHA25651bcb739a1091b323f0244047e42c30a870d7bf60bd37eff90c8d68da4e20f2f
SHA512de558454393d9be2cd1a8b14e71f65785878fa99ceeae04c8bca25073d6d1535adfa4ebf49e82d4b5251bba0f15d349b88c19ae5469e69b928ae33aff098ff59
-
Filesize
136KB
MD50ec6c352238f10bbe9fdbc4dd25c70f4
SHA1095b4f088d4c326d3671b485cffb0675a9315a24
SHA256927cab6fae983b9bfb737ee451a0359881370a19ac9880aae31fc15d5985de82
SHA512331a0d7f72148efc5b95f4c18d0386989223518a76dda33a46cff895269c25c0135ae49be9b5da0e934a8d5d3a983c232bee57f939570449c0d861704ad054f1
-
Filesize
136KB
MD50ec6c352238f10bbe9fdbc4dd25c70f4
SHA1095b4f088d4c326d3671b485cffb0675a9315a24
SHA256927cab6fae983b9bfb737ee451a0359881370a19ac9880aae31fc15d5985de82
SHA512331a0d7f72148efc5b95f4c18d0386989223518a76dda33a46cff895269c25c0135ae49be9b5da0e934a8d5d3a983c232bee57f939570449c0d861704ad054f1
-
Filesize
340KB
MD58a3b776908393c0f791f3d7137ea5af7
SHA17342c9fb06d6c0a8b71cc49ab5fe452db896ee0a
SHA25651469fee41518cd52c793facafe33a2277004cf6ae23c82ff44e39968d3a7aec
SHA5125349333e5e211dc0ed7c728f4b051f156c643dd0dfb590ad3da0039a7a07cd617a6d288156eab4d0b0c7980c777eed56b4dd16f46d14ecdfd232aa72cdc16ebe
-
Filesize
340KB
MD58a3b776908393c0f791f3d7137ea5af7
SHA17342c9fb06d6c0a8b71cc49ab5fe452db896ee0a
SHA25651469fee41518cd52c793facafe33a2277004cf6ae23c82ff44e39968d3a7aec
SHA5125349333e5e211dc0ed7c728f4b051f156c643dd0dfb590ad3da0039a7a07cd617a6d288156eab4d0b0c7980c777eed56b4dd16f46d14ecdfd232aa72cdc16ebe
-
Filesize
340KB
MD58a3b776908393c0f791f3d7137ea5af7
SHA17342c9fb06d6c0a8b71cc49ab5fe452db896ee0a
SHA25651469fee41518cd52c793facafe33a2277004cf6ae23c82ff44e39968d3a7aec
SHA5125349333e5e211dc0ed7c728f4b051f156c643dd0dfb590ad3da0039a7a07cd617a6d288156eab4d0b0c7980c777eed56b4dd16f46d14ecdfd232aa72cdc16ebe
-
Filesize
340KB
MD58a3b776908393c0f791f3d7137ea5af7
SHA17342c9fb06d6c0a8b71cc49ab5fe452db896ee0a
SHA25651469fee41518cd52c793facafe33a2277004cf6ae23c82ff44e39968d3a7aec
SHA5125349333e5e211dc0ed7c728f4b051f156c643dd0dfb590ad3da0039a7a07cd617a6d288156eab4d0b0c7980c777eed56b4dd16f46d14ecdfd232aa72cdc16ebe
-
Filesize
340KB
MD58a3b776908393c0f791f3d7137ea5af7
SHA17342c9fb06d6c0a8b71cc49ab5fe452db896ee0a
SHA25651469fee41518cd52c793facafe33a2277004cf6ae23c82ff44e39968d3a7aec
SHA5125349333e5e211dc0ed7c728f4b051f156c643dd0dfb590ad3da0039a7a07cd617a6d288156eab4d0b0c7980c777eed56b4dd16f46d14ecdfd232aa72cdc16ebe
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b