Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2023, 13:51
Static task
static1
Behavioral task
behavioral1
Sample
01e869ecc5271a3cd5c4c863fe7b5b8397c021b3ec27e49903b35795901abb72.exe
Resource
win10v2004-20230220-en
General
-
Target
01e869ecc5271a3cd5c4c863fe7b5b8397c021b3ec27e49903b35795901abb72.exe
-
Size
1.5MB
-
MD5
c45017d9c6f8df9c804f27966f2f2bfb
-
SHA1
4d827fd4a57cf1fa588ec8e60c5c240a1ce9b6e5
-
SHA256
01e869ecc5271a3cd5c4c863fe7b5b8397c021b3ec27e49903b35795901abb72
-
SHA512
a77c7fb70c6cb100037039ce633f2092b0bf64f165b6708324c8a9831bd803e6ef2cfcfb470553f0061d0742f66154582e4f62a69345d27f82525207e65b9518
-
SSDEEP
24576:WyGOh8hfQvxOf7IvFtFS17YlVN5Gij6DJQvabXcbzn3w8QSb33rDq:lGOh8lGwf7IvF47YlVNADJAt3JzDH
Malware Config
Extracted
redline
boom
217.196.96.56:4138
-
auth_value
1ce6aebe15bac07a7bc88b114bc49335
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" d0849410.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d0849410.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" d0849410.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4170381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4170381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4170381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4170381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" d0849410.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a4170381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4170381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" d0849410.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation c9806349.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation e4485669.exe -
Executes dropped EXE 14 IoCs
pid Process 2752 v7813146.exe 1708 v2318715.exe 4820 v6128363.exe 4772 v7976873.exe 1620 a4170381.exe 2188 b0176074.exe 3728 c9806349.exe 4276 oneetx.exe 1200 d0849410.exe 4828 e4485669.exe 4948 1.exe 2692 f3050897.exe 656 oneetx.exe 1580 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1216 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a4170381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a4170381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d0849410.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7976873.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v7976873.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 01e869ecc5271a3cd5c4c863fe7b5b8397c021b3ec27e49903b35795901abb72.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 01e869ecc5271a3cd5c4c863fe7b5b8397c021b3ec27e49903b35795901abb72.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7813146.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6128363.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7813146.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2318715.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v2318715.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v6128363.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 32 IoCs
pid pid_target Process procid_target 3604 1620 WerFault.exe 88 3976 3728 WerFault.exe 95 824 3728 WerFault.exe 95 2904 3728 WerFault.exe 95 4144 3728 WerFault.exe 95 3928 3728 WerFault.exe 95 2000 3728 WerFault.exe 95 4968 3728 WerFault.exe 95 4920 3728 WerFault.exe 95 4040 3728 WerFault.exe 95 1048 3728 WerFault.exe 95 1540 4276 WerFault.exe 115 3572 4276 WerFault.exe 115 3936 4276 WerFault.exe 115 2408 4276 WerFault.exe 115 2260 4276 WerFault.exe 115 1512 4276 WerFault.exe 115 1564 4276 WerFault.exe 115 3492 4276 WerFault.exe 115 5020 4276 WerFault.exe 115 552 4276 WerFault.exe 115 4252 4276 WerFault.exe 115 3680 4276 WerFault.exe 115 3996 4276 WerFault.exe 115 2528 4276 WerFault.exe 115 2020 4828 WerFault.exe 160 1992 4276 WerFault.exe 115 3624 656 WerFault.exe 168 3332 4276 WerFault.exe 115 4940 4276 WerFault.exe 115 2040 4276 WerFault.exe 115 4016 1580 WerFault.exe 178 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3364 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1620 a4170381.exe 1620 a4170381.exe 2188 b0176074.exe 2188 b0176074.exe 1200 d0849410.exe 1200 d0849410.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1620 a4170381.exe Token: SeDebugPrivilege 2188 b0176074.exe Token: SeDebugPrivilege 1200 d0849410.exe Token: SeDebugPrivilege 4828 e4485669.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3728 c9806349.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 384 wrote to memory of 2752 384 01e869ecc5271a3cd5c4c863fe7b5b8397c021b3ec27e49903b35795901abb72.exe 84 PID 384 wrote to memory of 2752 384 01e869ecc5271a3cd5c4c863fe7b5b8397c021b3ec27e49903b35795901abb72.exe 84 PID 384 wrote to memory of 2752 384 01e869ecc5271a3cd5c4c863fe7b5b8397c021b3ec27e49903b35795901abb72.exe 84 PID 2752 wrote to memory of 1708 2752 v7813146.exe 85 PID 2752 wrote to memory of 1708 2752 v7813146.exe 85 PID 2752 wrote to memory of 1708 2752 v7813146.exe 85 PID 1708 wrote to memory of 4820 1708 v2318715.exe 86 PID 1708 wrote to memory of 4820 1708 v2318715.exe 86 PID 1708 wrote to memory of 4820 1708 v2318715.exe 86 PID 4820 wrote to memory of 4772 4820 v6128363.exe 87 PID 4820 wrote to memory of 4772 4820 v6128363.exe 87 PID 4820 wrote to memory of 4772 4820 v6128363.exe 87 PID 4772 wrote to memory of 1620 4772 v7976873.exe 88 PID 4772 wrote to memory of 1620 4772 v7976873.exe 88 PID 4772 wrote to memory of 1620 4772 v7976873.exe 88 PID 4772 wrote to memory of 2188 4772 v7976873.exe 94 PID 4772 wrote to memory of 2188 4772 v7976873.exe 94 PID 4772 wrote to memory of 2188 4772 v7976873.exe 94 PID 4820 wrote to memory of 3728 4820 v6128363.exe 95 PID 4820 wrote to memory of 3728 4820 v6128363.exe 95 PID 4820 wrote to memory of 3728 4820 v6128363.exe 95 PID 3728 wrote to memory of 4276 3728 c9806349.exe 115 PID 3728 wrote to memory of 4276 3728 c9806349.exe 115 PID 3728 wrote to memory of 4276 3728 c9806349.exe 115 PID 1708 wrote to memory of 1200 1708 v2318715.exe 120 PID 1708 wrote to memory of 1200 1708 v2318715.exe 120 PID 1708 wrote to memory of 1200 1708 v2318715.exe 120 PID 4276 wrote to memory of 3364 4276 oneetx.exe 135 PID 4276 wrote to memory of 3364 4276 oneetx.exe 135 PID 4276 wrote to memory of 3364 4276 oneetx.exe 135 PID 4276 wrote to memory of 3864 4276 oneetx.exe 142 PID 4276 wrote to memory of 3864 4276 oneetx.exe 142 PID 4276 wrote to memory of 3864 4276 oneetx.exe 142 PID 3864 wrote to memory of 400 3864 cmd.exe 146 PID 3864 wrote to memory of 400 3864 cmd.exe 146 PID 3864 wrote to memory of 400 3864 cmd.exe 146 PID 3864 wrote to memory of 3004 3864 cmd.exe 147 PID 3864 wrote to memory of 3004 3864 cmd.exe 147 PID 3864 wrote to memory of 3004 3864 cmd.exe 147 PID 3864 wrote to memory of 2188 3864 cmd.exe 148 PID 3864 wrote to memory of 2188 3864 cmd.exe 148 PID 3864 wrote to memory of 2188 3864 cmd.exe 148 PID 3864 wrote to memory of 3740 3864 cmd.exe 149 PID 3864 wrote to memory of 3740 3864 cmd.exe 149 PID 3864 wrote to memory of 3740 3864 cmd.exe 149 PID 3864 wrote to memory of 3536 3864 cmd.exe 150 PID 3864 wrote to memory of 3536 3864 cmd.exe 150 PID 3864 wrote to memory of 3536 3864 cmd.exe 150 PID 3864 wrote to memory of 4420 3864 cmd.exe 151 PID 3864 wrote to memory of 4420 3864 cmd.exe 151 PID 3864 wrote to memory of 4420 3864 cmd.exe 151 PID 2752 wrote to memory of 4828 2752 v7813146.exe 160 PID 2752 wrote to memory of 4828 2752 v7813146.exe 160 PID 2752 wrote to memory of 4828 2752 v7813146.exe 160 PID 4828 wrote to memory of 4948 4828 e4485669.exe 162 PID 4828 wrote to memory of 4948 4828 e4485669.exe 162 PID 4828 wrote to memory of 4948 4828 e4485669.exe 162 PID 384 wrote to memory of 2692 384 01e869ecc5271a3cd5c4c863fe7b5b8397c021b3ec27e49903b35795901abb72.exe 165 PID 384 wrote to memory of 2692 384 01e869ecc5271a3cd5c4c863fe7b5b8397c021b3ec27e49903b35795901abb72.exe 165 PID 384 wrote to memory of 2692 384 01e869ecc5271a3cd5c4c863fe7b5b8397c021b3ec27e49903b35795901abb72.exe 165 PID 4276 wrote to memory of 1216 4276 oneetx.exe 173 PID 4276 wrote to memory of 1216 4276 oneetx.exe 173 PID 4276 wrote to memory of 1216 4276 oneetx.exe 173
Processes
-
C:\Users\Admin\AppData\Local\Temp\01e869ecc5271a3cd5c4c863fe7b5b8397c021b3ec27e49903b35795901abb72.exe"C:\Users\Admin\AppData\Local\Temp\01e869ecc5271a3cd5c4c863fe7b5b8397c021b3ec27e49903b35795901abb72.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7813146.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7813146.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2318715.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2318715.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6128363.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6128363.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7976873.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v7976873.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4170381.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4170381.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 10847⤵
- Program crash
PID:3604
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0176074.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b0176074.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c9806349.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c9806349.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 6966⤵
- Program crash
PID:3976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 7726⤵
- Program crash
PID:824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 8566⤵
- Program crash
PID:2904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 9526⤵
- Program crash
PID:4144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 8566⤵
- Program crash
PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 8566⤵
- Program crash
PID:2000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 12206⤵
- Program crash
PID:4968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 12086⤵
- Program crash
PID:4920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 13206⤵
- Program crash
PID:4040
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 6927⤵
- Program crash
PID:1540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 9007⤵
- Program crash
PID:3572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 9407⤵
- Program crash
PID:3936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 11087⤵
- Program crash
PID:2408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 9487⤵
- Program crash
PID:2260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 11367⤵
- Program crash
PID:1512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 10847⤵
- Program crash
PID:1564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 9407⤵
- Program crash
PID:3492
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F7⤵
- Creates scheduled task(s)
PID:3364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 10127⤵
- Program crash
PID:5020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 13007⤵
- Program crash
PID:552
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:400
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"8⤵PID:3004
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E8⤵PID:2188
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3740
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"8⤵PID:3536
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E8⤵PID:4420
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 7647⤵
- Program crash
PID:4252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 6927⤵
- Program crash
PID:3680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 12927⤵
- Program crash
PID:3996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 12807⤵
- Program crash
PID:2528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 11327⤵
- Program crash
PID:1992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 11327⤵
- Program crash
PID:3332
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:1216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 15727⤵
- Program crash
PID:4940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 15607⤵
- Program crash
PID:2040
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 13366⤵
- Program crash
PID:1048
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d0849410.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d0849410.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1200
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e4485669.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e4485669.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
PID:4948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 13804⤵
- Program crash
PID:2020
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f3050897.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f3050897.exe2⤵
- Executes dropped EXE
PID:2692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1620 -ip 16201⤵PID:2732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3728 -ip 37281⤵PID:4076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3728 -ip 37281⤵PID:4120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3728 -ip 37281⤵PID:2052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3728 -ip 37281⤵PID:2116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3728 -ip 37281⤵PID:564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 3728 -ip 37281⤵PID:3608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3728 -ip 37281⤵PID:2736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3728 -ip 37281⤵PID:4944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3728 -ip 37281⤵PID:4980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3728 -ip 37281⤵PID:2316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4276 -ip 42761⤵PID:3708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4276 -ip 42761⤵PID:4424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4276 -ip 42761⤵PID:4924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4276 -ip 42761⤵PID:1376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4276 -ip 42761⤵PID:2484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4276 -ip 42761⤵PID:1580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4276 -ip 42761⤵PID:2268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4276 -ip 42761⤵PID:3956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4276 -ip 42761⤵PID:3368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4276 -ip 42761⤵PID:3628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4276 -ip 42761⤵PID:4372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4276 -ip 42761⤵PID:4128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4276 -ip 42761⤵PID:3312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4276 -ip 42761⤵PID:3216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4828 -ip 48281⤵PID:4512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4276 -ip 42761⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 3162⤵
- Program crash
PID:3624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 656 -ip 6561⤵PID:2332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4276 -ip 42761⤵PID:1040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4276 -ip 42761⤵PID:1604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4276 -ip 42761⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 3122⤵
- Program crash
PID:4016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1580 -ip 15801⤵PID:3856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD56940379147d9f30b6fc7edddf643b328
SHA195f3d373087c6a1f3c0784724baf13f69e0b4241
SHA2567827fced2b38a742a1620868e8278fda080bf3e134c844e59b577bba7d6c9a13
SHA512f804b66cbafb1bc8518cefebe27499292255a8f9830404435bfbc4415686b6c307ecd9907218cf008f632f2cfb60e1af29a48bb9a565b010671c79b9642d8821
-
Filesize
204KB
MD56940379147d9f30b6fc7edddf643b328
SHA195f3d373087c6a1f3c0784724baf13f69e0b4241
SHA2567827fced2b38a742a1620868e8278fda080bf3e134c844e59b577bba7d6c9a13
SHA512f804b66cbafb1bc8518cefebe27499292255a8f9830404435bfbc4415686b6c307ecd9907218cf008f632f2cfb60e1af29a48bb9a565b010671c79b9642d8821
-
Filesize
1.4MB
MD518485bc9cd85db56ed401689e8637358
SHA19542010bf0da0511c4ff722ee7e36423d8d19fa5
SHA256d5d004c923798470cb57b875c4e46c3a7cdc1e6b811a6fd3df397f59759d8f3f
SHA512f835bab6f2df06590e1f4369149bde0d215a8a15e61e1cbd167caeb0c4fccd1b2d3a3517885e019a93a7120f41c808d64b5b4561fad47d4c34bad123e88c6c90
-
Filesize
1.4MB
MD518485bc9cd85db56ed401689e8637358
SHA19542010bf0da0511c4ff722ee7e36423d8d19fa5
SHA256d5d004c923798470cb57b875c4e46c3a7cdc1e6b811a6fd3df397f59759d8f3f
SHA512f835bab6f2df06590e1f4369149bde0d215a8a15e61e1cbd167caeb0c4fccd1b2d3a3517885e019a93a7120f41c808d64b5b4561fad47d4c34bad123e88c6c90
-
Filesize
548KB
MD5495ea6883f7709181fb9405363126701
SHA13217ea0bc2e4a3ac363edf0a7e711ce9f89b71db
SHA256f399bd412206096460589d53cf63a05782e921a52e22ec674e55f83c8e399224
SHA512e222cc9d2b07abd4798ffb6987ea2f17663151a1b76e7a7b6f5ecc7f2fc735e2c85575bc1a72d2df43db5fad1c8387a76cbbdbba9fe6b5469e3ae0bd381aa5e7
-
Filesize
548KB
MD5495ea6883f7709181fb9405363126701
SHA13217ea0bc2e4a3ac363edf0a7e711ce9f89b71db
SHA256f399bd412206096460589d53cf63a05782e921a52e22ec674e55f83c8e399224
SHA512e222cc9d2b07abd4798ffb6987ea2f17663151a1b76e7a7b6f5ecc7f2fc735e2c85575bc1a72d2df43db5fad1c8387a76cbbdbba9fe6b5469e3ae0bd381aa5e7
-
Filesize
913KB
MD56d2874200d132965af27e0e676afbbae
SHA149b2f0037bb30d33632a035694a152260b905a16
SHA256e8de2212115f56ab0f982acdf3c53e165d64279d89ea62b1e0c6b8fe80637971
SHA512ff02747ade1586fd9999042846990b9c04f694863462e1b738f30396c54e9130a43b9bf78e34615d5af49f3fd90eb9825df64560f92a0fbc4b6b54fb3dc334da
-
Filesize
913KB
MD56d2874200d132965af27e0e676afbbae
SHA149b2f0037bb30d33632a035694a152260b905a16
SHA256e8de2212115f56ab0f982acdf3c53e165d64279d89ea62b1e0c6b8fe80637971
SHA512ff02747ade1586fd9999042846990b9c04f694863462e1b738f30396c54e9130a43b9bf78e34615d5af49f3fd90eb9825df64560f92a0fbc4b6b54fb3dc334da
-
Filesize
175KB
MD5fd4d015abcafd6abd973de7188a94972
SHA10b8df1dfa418e778e3e79b618ff6784712529658
SHA25675f2fe166e73bf63dfe49fcebd12a22e3300ccc183943e0f2f6e6d756163091c
SHA512d0f88218a9cea5e408ed37d17cd83ba5e0fcedf438b0d55a605ca2b90517f1e2c3b5d9a5805bdd5215a688d766dd26419f4f70eed72ed43a0974e91285d93275
-
Filesize
175KB
MD5fd4d015abcafd6abd973de7188a94972
SHA10b8df1dfa418e778e3e79b618ff6784712529658
SHA25675f2fe166e73bf63dfe49fcebd12a22e3300ccc183943e0f2f6e6d756163091c
SHA512d0f88218a9cea5e408ed37d17cd83ba5e0fcedf438b0d55a605ca2b90517f1e2c3b5d9a5805bdd5215a688d766dd26419f4f70eed72ed43a0974e91285d93275
-
Filesize
708KB
MD55739eae6463c5ea914ba45ff41d3209d
SHA101e57bb6c513370a1a11663fe0627d9bfe74c835
SHA256d5ef8a006fa5c098500f604b3b558c8d4107b029c13fa1f67aefcffce10d666d
SHA51241a4315427707fb7aab040a98165e663ccfc894ef0ba45638c25acae093815e6b7e4d222984fe5ab7bf1d2412bd574bf52a3879ed021d4ee89a819b902602122
-
Filesize
708KB
MD55739eae6463c5ea914ba45ff41d3209d
SHA101e57bb6c513370a1a11663fe0627d9bfe74c835
SHA256d5ef8a006fa5c098500f604b3b558c8d4107b029c13fa1f67aefcffce10d666d
SHA51241a4315427707fb7aab040a98165e663ccfc894ef0ba45638c25acae093815e6b7e4d222984fe5ab7bf1d2412bd574bf52a3879ed021d4ee89a819b902602122
-
Filesize
340KB
MD51c067a9ae9d11d487acd560d5d5ea0fc
SHA1b008c44c563864be2a454e2e2ab7d116f528f4f3
SHA2568bd1252681a79ddc120b2785b36bada50ae4a0845004d4a04b76b09442e427f3
SHA51278237b48070b8d5edd74177f36b6c0deb12b9e908ca0505ff612fe0a3d506734c45c3ef30ad6444e79cf9333581a01c103e5fe78c5dd10fa119f78b6f5f15559
-
Filesize
340KB
MD51c067a9ae9d11d487acd560d5d5ea0fc
SHA1b008c44c563864be2a454e2e2ab7d116f528f4f3
SHA2568bd1252681a79ddc120b2785b36bada50ae4a0845004d4a04b76b09442e427f3
SHA51278237b48070b8d5edd74177f36b6c0deb12b9e908ca0505ff612fe0a3d506734c45c3ef30ad6444e79cf9333581a01c103e5fe78c5dd10fa119f78b6f5f15559
-
Filesize
417KB
MD5f74b045e4d13bdb69636f257991f3e28
SHA1ba3be9b0077c2110e24618b7a96a39e07cf06522
SHA256712bf8f02291db5ebea4f34d713a81a3c44eb506142df4281029bcb4a7cd40f1
SHA5127fcc7cc24d6e98d83636d85c59a69af4db02b7b9fb40cc917708c219611af49af15b82a46e8ca0b5dd8f158e857c5ed44cf292d1d044e78668bca416271539e1
-
Filesize
417KB
MD5f74b045e4d13bdb69636f257991f3e28
SHA1ba3be9b0077c2110e24618b7a96a39e07cf06522
SHA256712bf8f02291db5ebea4f34d713a81a3c44eb506142df4281029bcb4a7cd40f1
SHA5127fcc7cc24d6e98d83636d85c59a69af4db02b7b9fb40cc917708c219611af49af15b82a46e8ca0b5dd8f158e857c5ed44cf292d1d044e78668bca416271539e1
-
Filesize
360KB
MD573a314d55a5d8990c96c399a088c8e39
SHA19b3b0f62f47afc7875424bb73536ea0befa6a3c4
SHA256b258b446b28ef85b4b07c01a84836520cd568b696ef72c0465d4bbbd6892f5d7
SHA512186f95f4fac7138aa1b2472088f172f7f0d8fac90385cfd5dfd1b957d3ce949559354a645e5b44b5b6b2c8f75510107e3373099094be029a960e4bd86543c387
-
Filesize
360KB
MD573a314d55a5d8990c96c399a088c8e39
SHA19b3b0f62f47afc7875424bb73536ea0befa6a3c4
SHA256b258b446b28ef85b4b07c01a84836520cd568b696ef72c0465d4bbbd6892f5d7
SHA512186f95f4fac7138aa1b2472088f172f7f0d8fac90385cfd5dfd1b957d3ce949559354a645e5b44b5b6b2c8f75510107e3373099094be029a960e4bd86543c387
-
Filesize
136KB
MD5b3ddfd4885f92c2918ee904150ad271a
SHA1672c7ef649a7c78b74572a712a30d8f6690c3284
SHA256075991f864f65874cf60c114ae8f862ab825b6a1a8490ae18cd2823e66e6bd28
SHA512a2acb6984cf47f88452e1b722b5148e9362316c1e4fe219bca4c4df6db65a1c404be12f6b941eed929cac4330f1c3c27083b97647a547b43dd866629ec92b15e
-
Filesize
136KB
MD5b3ddfd4885f92c2918ee904150ad271a
SHA1672c7ef649a7c78b74572a712a30d8f6690c3284
SHA256075991f864f65874cf60c114ae8f862ab825b6a1a8490ae18cd2823e66e6bd28
SHA512a2acb6984cf47f88452e1b722b5148e9362316c1e4fe219bca4c4df6db65a1c404be12f6b941eed929cac4330f1c3c27083b97647a547b43dd866629ec92b15e
-
Filesize
340KB
MD51c067a9ae9d11d487acd560d5d5ea0fc
SHA1b008c44c563864be2a454e2e2ab7d116f528f4f3
SHA2568bd1252681a79ddc120b2785b36bada50ae4a0845004d4a04b76b09442e427f3
SHA51278237b48070b8d5edd74177f36b6c0deb12b9e908ca0505ff612fe0a3d506734c45c3ef30ad6444e79cf9333581a01c103e5fe78c5dd10fa119f78b6f5f15559
-
Filesize
340KB
MD51c067a9ae9d11d487acd560d5d5ea0fc
SHA1b008c44c563864be2a454e2e2ab7d116f528f4f3
SHA2568bd1252681a79ddc120b2785b36bada50ae4a0845004d4a04b76b09442e427f3
SHA51278237b48070b8d5edd74177f36b6c0deb12b9e908ca0505ff612fe0a3d506734c45c3ef30ad6444e79cf9333581a01c103e5fe78c5dd10fa119f78b6f5f15559
-
Filesize
340KB
MD51c067a9ae9d11d487acd560d5d5ea0fc
SHA1b008c44c563864be2a454e2e2ab7d116f528f4f3
SHA2568bd1252681a79ddc120b2785b36bada50ae4a0845004d4a04b76b09442e427f3
SHA51278237b48070b8d5edd74177f36b6c0deb12b9e908ca0505ff612fe0a3d506734c45c3ef30ad6444e79cf9333581a01c103e5fe78c5dd10fa119f78b6f5f15559
-
Filesize
340KB
MD51c067a9ae9d11d487acd560d5d5ea0fc
SHA1b008c44c563864be2a454e2e2ab7d116f528f4f3
SHA2568bd1252681a79ddc120b2785b36bada50ae4a0845004d4a04b76b09442e427f3
SHA51278237b48070b8d5edd74177f36b6c0deb12b9e908ca0505ff612fe0a3d506734c45c3ef30ad6444e79cf9333581a01c103e5fe78c5dd10fa119f78b6f5f15559
-
Filesize
340KB
MD51c067a9ae9d11d487acd560d5d5ea0fc
SHA1b008c44c563864be2a454e2e2ab7d116f528f4f3
SHA2568bd1252681a79ddc120b2785b36bada50ae4a0845004d4a04b76b09442e427f3
SHA51278237b48070b8d5edd74177f36b6c0deb12b9e908ca0505ff612fe0a3d506734c45c3ef30ad6444e79cf9333581a01c103e5fe78c5dd10fa119f78b6f5f15559
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b