Analysis
-
max time kernel
157s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 19:45
Static task
static1
Behavioral task
behavioral1
Sample
d02b3a55b79aa8d477c9ebd482fc0742474b5bd599e85c32bca6c7d7f4be6bfc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d02b3a55b79aa8d477c9ebd482fc0742474b5bd599e85c32bca6c7d7f4be6bfc.exe
Resource
win10v2004-20230220-en
General
-
Target
d02b3a55b79aa8d477c9ebd482fc0742474b5bd599e85c32bca6c7d7f4be6bfc.exe
-
Size
1.5MB
-
MD5
fb0e5dde6a62026e9094f61e327e08dc
-
SHA1
53a24a2e2751be225ad4129ce4c7a7d591dcaf2b
-
SHA256
d02b3a55b79aa8d477c9ebd482fc0742474b5bd599e85c32bca6c7d7f4be6bfc
-
SHA512
1c51752a7f2c7ae4773325f91654204c067fc7e90ecf1881b783445f258299ccce7eb1e4d9c755f171b3c67d74e4f890f67637c4f2deca68acc16063f31d2646
-
SSDEEP
24576:SyC2lF1moJds6oAZSwBtQc9A4Mv+45/j5WO7dkWEDGlkuW8C1zJjnlyNFQ:5CW7s6awQtBv+45/j5W8iSlP4jl
Malware Config
Extracted
redline
mask
217.196.96.56:4138
-
auth_value
31aef25be0febb8e491794ef7f502c50
Extracted
redline
boom
217.196.96.56:4138
-
auth_value
1ce6aebe15bac07a7bc88b114bc49335
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3236-211-0x0000000006020000-0x0000000006638000-memory.dmp redline_stealer behavioral2/memory/3236-218-0x0000000006740000-0x00000000067A6000-memory.dmp redline_stealer behavioral2/memory/3236-220-0x0000000007590000-0x0000000007752000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4671981.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4671981.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" d5503867.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" d5503867.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" d5503867.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a4671981.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4671981.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4671981.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4671981.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" d5503867.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d5503867.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation e0624827.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation c1647560.exe -
Executes dropped EXE 13 IoCs
pid Process 1036 v7491997.exe 3328 v0680248.exe 636 v4559499.exe 2384 v0617922.exe 4144 a4671981.exe 3236 b9363926.exe 3512 c1647560.exe 4660 oneetx.exe 4232 d5503867.exe 2220 e0624827.exe 3384 1.exe 1692 f4233742.exe 2684 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4220 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a4671981.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d5503867.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a4671981.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d02b3a55b79aa8d477c9ebd482fc0742474b5bd599e85c32bca6c7d7f4be6bfc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7491997.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0680248.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v0680248.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4559499.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v4559499.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d02b3a55b79aa8d477c9ebd482fc0742474b5bd599e85c32bca6c7d7f4be6bfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7491997.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0617922.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v0617922.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 31 IoCs
pid pid_target Process procid_target 2308 4144 WerFault.exe 87 5036 3512 WerFault.exe 99 4356 3512 WerFault.exe 99 3564 3512 WerFault.exe 99 5000 3512 WerFault.exe 99 1864 3512 WerFault.exe 99 2532 3512 WerFault.exe 99 4932 3512 WerFault.exe 99 436 3512 WerFault.exe 99 404 3512 WerFault.exe 99 4572 3512 WerFault.exe 99 4120 4660 WerFault.exe 119 3316 4660 WerFault.exe 119 2208 4660 WerFault.exe 119 428 4660 WerFault.exe 119 1852 4660 WerFault.exe 119 3732 4660 WerFault.exe 119 4904 4660 WerFault.exe 119 1656 4660 WerFault.exe 119 2696 4660 WerFault.exe 119 2596 4660 WerFault.exe 119 3484 4660 WerFault.exe 119 2836 4660 WerFault.exe 119 4548 4660 WerFault.exe 119 4264 4660 WerFault.exe 119 5064 2220 WerFault.exe 161 3928 4660 WerFault.exe 119 3280 2684 WerFault.exe 168 4520 4660 WerFault.exe 119 4836 4660 WerFault.exe 119 3984 4660 WerFault.exe 119 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2616 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4144 a4671981.exe 4144 a4671981.exe 3236 b9363926.exe 3236 b9363926.exe 4232 d5503867.exe 4232 d5503867.exe 3384 1.exe 3384 1.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4144 a4671981.exe Token: SeDebugPrivilege 3236 b9363926.exe Token: SeDebugPrivilege 4232 d5503867.exe Token: SeDebugPrivilege 2220 e0624827.exe Token: SeDebugPrivilege 3384 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3512 c1647560.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 1672 wrote to memory of 1036 1672 d02b3a55b79aa8d477c9ebd482fc0742474b5bd599e85c32bca6c7d7f4be6bfc.exe 83 PID 1672 wrote to memory of 1036 1672 d02b3a55b79aa8d477c9ebd482fc0742474b5bd599e85c32bca6c7d7f4be6bfc.exe 83 PID 1672 wrote to memory of 1036 1672 d02b3a55b79aa8d477c9ebd482fc0742474b5bd599e85c32bca6c7d7f4be6bfc.exe 83 PID 1036 wrote to memory of 3328 1036 v7491997.exe 84 PID 1036 wrote to memory of 3328 1036 v7491997.exe 84 PID 1036 wrote to memory of 3328 1036 v7491997.exe 84 PID 3328 wrote to memory of 636 3328 v0680248.exe 85 PID 3328 wrote to memory of 636 3328 v0680248.exe 85 PID 3328 wrote to memory of 636 3328 v0680248.exe 85 PID 636 wrote to memory of 2384 636 v4559499.exe 86 PID 636 wrote to memory of 2384 636 v4559499.exe 86 PID 636 wrote to memory of 2384 636 v4559499.exe 86 PID 2384 wrote to memory of 4144 2384 v0617922.exe 87 PID 2384 wrote to memory of 4144 2384 v0617922.exe 87 PID 2384 wrote to memory of 4144 2384 v0617922.exe 87 PID 2384 wrote to memory of 3236 2384 v0617922.exe 97 PID 2384 wrote to memory of 3236 2384 v0617922.exe 97 PID 2384 wrote to memory of 3236 2384 v0617922.exe 97 PID 636 wrote to memory of 3512 636 v4559499.exe 99 PID 636 wrote to memory of 3512 636 v4559499.exe 99 PID 636 wrote to memory of 3512 636 v4559499.exe 99 PID 3512 wrote to memory of 4660 3512 c1647560.exe 119 PID 3512 wrote to memory of 4660 3512 c1647560.exe 119 PID 3512 wrote to memory of 4660 3512 c1647560.exe 119 PID 3328 wrote to memory of 4232 3328 v0680248.exe 124 PID 3328 wrote to memory of 4232 3328 v0680248.exe 124 PID 3328 wrote to memory of 4232 3328 v0680248.exe 124 PID 4660 wrote to memory of 2616 4660 oneetx.exe 137 PID 4660 wrote to memory of 2616 4660 oneetx.exe 137 PID 4660 wrote to memory of 2616 4660 oneetx.exe 137 PID 4660 wrote to memory of 4720 4660 oneetx.exe 143 PID 4660 wrote to memory of 4720 4660 oneetx.exe 143 PID 4660 wrote to memory of 4720 4660 oneetx.exe 143 PID 4720 wrote to memory of 1448 4720 cmd.exe 147 PID 4720 wrote to memory of 1448 4720 cmd.exe 147 PID 4720 wrote to memory of 1448 4720 cmd.exe 147 PID 4720 wrote to memory of 2692 4720 cmd.exe 148 PID 4720 wrote to memory of 2692 4720 cmd.exe 148 PID 4720 wrote to memory of 2692 4720 cmd.exe 148 PID 4720 wrote to memory of 1960 4720 cmd.exe 149 PID 4720 wrote to memory of 1960 4720 cmd.exe 149 PID 4720 wrote to memory of 1960 4720 cmd.exe 149 PID 4720 wrote to memory of 2384 4720 cmd.exe 151 PID 4720 wrote to memory of 2384 4720 cmd.exe 151 PID 4720 wrote to memory of 2384 4720 cmd.exe 151 PID 4720 wrote to memory of 4648 4720 cmd.exe 150 PID 4720 wrote to memory of 4648 4720 cmd.exe 150 PID 4720 wrote to memory of 4648 4720 cmd.exe 150 PID 4720 wrote to memory of 1776 4720 cmd.exe 152 PID 4720 wrote to memory of 1776 4720 cmd.exe 152 PID 4720 wrote to memory of 1776 4720 cmd.exe 152 PID 1036 wrote to memory of 2220 1036 v7491997.exe 161 PID 1036 wrote to memory of 2220 1036 v7491997.exe 161 PID 1036 wrote to memory of 2220 1036 v7491997.exe 161 PID 2220 wrote to memory of 3384 2220 e0624827.exe 162 PID 2220 wrote to memory of 3384 2220 e0624827.exe 162 PID 2220 wrote to memory of 3384 2220 e0624827.exe 162 PID 1672 wrote to memory of 1692 1672 d02b3a55b79aa8d477c9ebd482fc0742474b5bd599e85c32bca6c7d7f4be6bfc.exe 165 PID 1672 wrote to memory of 1692 1672 d02b3a55b79aa8d477c9ebd482fc0742474b5bd599e85c32bca6c7d7f4be6bfc.exe 165 PID 1672 wrote to memory of 1692 1672 d02b3a55b79aa8d477c9ebd482fc0742474b5bd599e85c32bca6c7d7f4be6bfc.exe 165 PID 4660 wrote to memory of 4220 4660 oneetx.exe 173 PID 4660 wrote to memory of 4220 4660 oneetx.exe 173 PID 4660 wrote to memory of 4220 4660 oneetx.exe 173
Processes
-
C:\Users\Admin\AppData\Local\Temp\d02b3a55b79aa8d477c9ebd482fc0742474b5bd599e85c32bca6c7d7f4be6bfc.exe"C:\Users\Admin\AppData\Local\Temp\d02b3a55b79aa8d477c9ebd482fc0742474b5bd599e85c32bca6c7d7f4be6bfc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7491997.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7491997.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0680248.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0680248.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4559499.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4559499.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0617922.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0617922.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4671981.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a4671981.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4144 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 10807⤵
- Program crash
PID:2308
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9363926.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b9363926.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1647560.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\c1647560.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 6966⤵
- Program crash
PID:5036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 7926⤵
- Program crash
PID:4356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 8126⤵
- Program crash
PID:3564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 8646⤵
- Program crash
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 9886⤵
- Program crash
PID:1864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 9886⤵
- Program crash
PID:2532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 12206⤵
- Program crash
PID:4932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 12126⤵
- Program crash
PID:436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 13206⤵
- Program crash
PID:404
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 6927⤵
- Program crash
PID:4120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 8447⤵
- Program crash
PID:3316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 8767⤵
- Program crash
PID:2208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 10527⤵
- Program crash
PID:428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 10527⤵
- Program crash
PID:1852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 10527⤵
- Program crash
PID:3732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 11087⤵
- Program crash
PID:4904
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F7⤵
- Creates scheduled task(s)
PID:2616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 9927⤵
- Program crash
PID:1656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 13047⤵
- Program crash
PID:2696
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1448
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"8⤵PID:2692
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E8⤵PID:1960
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"8⤵PID:4648
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2384
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E8⤵PID:1776
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 13607⤵
- Program crash
PID:2596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 13447⤵
- Program crash
PID:3484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 13247⤵
- Program crash
PID:2836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 6927⤵
- Program crash
PID:4548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 14927⤵
- Program crash
PID:4264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 11007⤵
- Program crash
PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 16287⤵
- Program crash
PID:4520
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:4220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 10967⤵
- Program crash
PID:4836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 16447⤵
- Program crash
PID:3984
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 13646⤵
- Program crash
PID:4572
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d5503867.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\d5503867.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e0624827.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\e0624827.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 2364⤵
- Program crash
PID:5064
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f4233742.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\f4233742.exe2⤵
- Executes dropped EXE
PID:1692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4144 -ip 41441⤵PID:1256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3512 -ip 35121⤵PID:844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3512 -ip 35121⤵PID:1692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3512 -ip 35121⤵PID:4380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3512 -ip 35121⤵PID:4100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3512 -ip 35121⤵PID:1828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3512 -ip 35121⤵PID:4836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3512 -ip 35121⤵PID:3972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3512 -ip 35121⤵PID:1868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 3512 -ip 35121⤵PID:800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3512 -ip 35121⤵PID:4860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4660 -ip 46601⤵PID:2812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4660 -ip 46601⤵PID:536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4660 -ip 46601⤵PID:4304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4660 -ip 46601⤵PID:2352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4660 -ip 46601⤵PID:5088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4660 -ip 46601⤵PID:2308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4660 -ip 46601⤵PID:4596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4660 -ip 46601⤵PID:4692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4660 -ip 46601⤵PID:2640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4660 -ip 46601⤵PID:4652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4660 -ip 46601⤵PID:3600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4660 -ip 46601⤵PID:3228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4660 -ip 46601⤵PID:4132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4660 -ip 46601⤵PID:916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2220 -ip 22201⤵PID:4736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4660 -ip 46601⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2684 -s 3162⤵
- Program crash
PID:3280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2684 -ip 26841⤵PID:4192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4660 -ip 46601⤵PID:5028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4660 -ip 46601⤵PID:1476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4660 -ip 46601⤵PID:3572
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD51cd99a9a3b79d9e0aff65c73afe6f4bf
SHA16ba783a6c7fc434fc86b8a06c3393a6b66804d1d
SHA2567cb16fa23b983de8a414317f2ba946453a811fda30f498d84b09d8405b488b6d
SHA512efb1e115665bca268e54c764e39d3cb22d8ba5abeab6d1400067c677c638af83e93b43e43165617dbc51e053a3c70f4a6e97ca901dd2af3ea6f320268044f331
-
Filesize
205KB
MD51cd99a9a3b79d9e0aff65c73afe6f4bf
SHA16ba783a6c7fc434fc86b8a06c3393a6b66804d1d
SHA2567cb16fa23b983de8a414317f2ba946453a811fda30f498d84b09d8405b488b6d
SHA512efb1e115665bca268e54c764e39d3cb22d8ba5abeab6d1400067c677c638af83e93b43e43165617dbc51e053a3c70f4a6e97ca901dd2af3ea6f320268044f331
-
Filesize
1.3MB
MD54016b033698455afefe651be4c276605
SHA17df2eb95d3208a4a1e60d3adb06935254aef09ac
SHA256775b00dd64c6b9d1d60afeecb0a5b41018516d40283c7dd6f9b8dea0faf478ff
SHA5123b9c4ebb03bd19ca64b29077239f65c4dc61fa2c4003aff2fdfd7b9ccdba8bd3d7e03dc807a00405eca18ff039b204edefaeace169cc87a60e8a34e711bac593
-
Filesize
1.3MB
MD54016b033698455afefe651be4c276605
SHA17df2eb95d3208a4a1e60d3adb06935254aef09ac
SHA256775b00dd64c6b9d1d60afeecb0a5b41018516d40283c7dd6f9b8dea0faf478ff
SHA5123b9c4ebb03bd19ca64b29077239f65c4dc61fa2c4003aff2fdfd7b9ccdba8bd3d7e03dc807a00405eca18ff039b204edefaeace169cc87a60e8a34e711bac593
-
Filesize
473KB
MD52ebcd5f43c1a9e635de870a8503b20a7
SHA170ab29a35c62cffe817d480627a2e062890baaa6
SHA256beb7618426779cc78505df05ca5f4f894c917f936a8c1e193f0c6895dead5dd7
SHA51273c2b387c2dfcd4dd96802ee3a4235f0be4da5aa26f25c0ee6bd34f095fddc239db0322f179656e82fcb35f662256017eb9466645f8ebb4356c60c325d768db9
-
Filesize
473KB
MD52ebcd5f43c1a9e635de870a8503b20a7
SHA170ab29a35c62cffe817d480627a2e062890baaa6
SHA256beb7618426779cc78505df05ca5f4f894c917f936a8c1e193f0c6895dead5dd7
SHA51273c2b387c2dfcd4dd96802ee3a4235f0be4da5aa26f25c0ee6bd34f095fddc239db0322f179656e82fcb35f662256017eb9466645f8ebb4356c60c325d768db9
-
Filesize
847KB
MD5251a6a2aa7188b0c75038845efed4d14
SHA11db36cd6237c1d35b3c7b3503158b1cf9f049ec8
SHA25600c92e7b4390bcaf4310090aa26afb36bb587725f409d8057e3b59850eb4c159
SHA5128dec906c098658ed331ad0a464ce5803aee0bf00fb57eb2adbd943e6ff59bd9c606c09ed767f1355cd25968e4ee934cb30424c49ba298aa9a87c5d3261ccdb94
-
Filesize
847KB
MD5251a6a2aa7188b0c75038845efed4d14
SHA11db36cd6237c1d35b3c7b3503158b1cf9f049ec8
SHA25600c92e7b4390bcaf4310090aa26afb36bb587725f409d8057e3b59850eb4c159
SHA5128dec906c098658ed331ad0a464ce5803aee0bf00fb57eb2adbd943e6ff59bd9c606c09ed767f1355cd25968e4ee934cb30424c49ba298aa9a87c5d3261ccdb94
-
Filesize
177KB
MD5e22dea9d5cf7fd37f289cf22fe860d90
SHA17913656ca3e41f2c6d77e8b4609ff8795a028bcf
SHA256165da909cf23cbd2a8047be821cf57d4597df8b768b5001146fd00b53f94b70d
SHA512f2e993e05ff8928c8905c3510ed6e369a87db6ac87de2308f1ce4845f7137f0eca4ff667cea2b46b1c61cace4abbeb511fb075c8738ad97561b6c9f8860fb63f
-
Filesize
177KB
MD5e22dea9d5cf7fd37f289cf22fe860d90
SHA17913656ca3e41f2c6d77e8b4609ff8795a028bcf
SHA256165da909cf23cbd2a8047be821cf57d4597df8b768b5001146fd00b53f94b70d
SHA512f2e993e05ff8928c8905c3510ed6e369a87db6ac87de2308f1ce4845f7137f0eca4ff667cea2b46b1c61cace4abbeb511fb075c8738ad97561b6c9f8860fb63f
-
Filesize
642KB
MD53f51610cec6b4b1ee4a00d9a45e63766
SHA196bdd733ce3602f4d345f68e58d83217e2b3d5fe
SHA256c5ab331efde937baa812733e5aba4a9e87fa9caab59a1074273371df54c722f5
SHA512f4410fa6a53e0d01e0cee6297579e4489d7eb47b54e5b56139a1b5a1ec2a9b5bb58d0229384dd211b88897a4ed1f90f1c9b4c298526e13c13a49d13de4234a28
-
Filesize
642KB
MD53f51610cec6b4b1ee4a00d9a45e63766
SHA196bdd733ce3602f4d345f68e58d83217e2b3d5fe
SHA256c5ab331efde937baa812733e5aba4a9e87fa9caab59a1074273371df54c722f5
SHA512f4410fa6a53e0d01e0cee6297579e4489d7eb47b54e5b56139a1b5a1ec2a9b5bb58d0229384dd211b88897a4ed1f90f1c9b4c298526e13c13a49d13de4234a28
-
Filesize
265KB
MD5bf7eb71715cb0fcfb7b40bb50b9fc031
SHA1bd8c5ef057e3ff4c64a56563ed8c028b608246b1
SHA256b837e7ce71b440d97df1e3108ee1fc24b22148fdde6599b390b1139599925ede
SHA512b487525de13d255ef23c4d96d03d26094754dc532f4182b3662ea027595b42ff50e20e26a9641fa89a7103d6d6219a625f2b8d07c46b64b74eebec4efa74763c
-
Filesize
265KB
MD5bf7eb71715cb0fcfb7b40bb50b9fc031
SHA1bd8c5ef057e3ff4c64a56563ed8c028b608246b1
SHA256b837e7ce71b440d97df1e3108ee1fc24b22148fdde6599b390b1139599925ede
SHA512b487525de13d255ef23c4d96d03d26094754dc532f4182b3662ea027595b42ff50e20e26a9641fa89a7103d6d6219a625f2b8d07c46b64b74eebec4efa74763c
-
Filesize
384KB
MD5eb4834a3c4de25e630d77074cf3cf824
SHA1a00a695924060d6a3d356a3297341e944147e7aa
SHA25623fc286b7515ea6c8f2013b7f887611f2c5eeffa6151514a0af5a1b5fdda9b4d
SHA5128dcb79b70a864d645298217aef0970acccb6f8e2913aa46d62ee5e61da157681737fe71a6031bd790844bf421f78049b59f47f3e2615527684a32ec42c523ff8
-
Filesize
384KB
MD5eb4834a3c4de25e630d77074cf3cf824
SHA1a00a695924060d6a3d356a3297341e944147e7aa
SHA25623fc286b7515ea6c8f2013b7f887611f2c5eeffa6151514a0af5a1b5fdda9b4d
SHA5128dcb79b70a864d645298217aef0970acccb6f8e2913aa46d62ee5e61da157681737fe71a6031bd790844bf421f78049b59f47f3e2615527684a32ec42c523ff8
-
Filesize
286KB
MD5d6c4fa0a4e79d7b2e64e32914ab0cb48
SHA18778d7963d26c66ad3f10633ae12121e230b5707
SHA256328d98bd381af683cf5419ac35aee76881535db26f4613ddd426bb83942dbed4
SHA51222b5bd38aea15c543d24b1c991766ce036a0b7948025ac3b2a308b4a19e0c518cd083db96b9c77940d537b815c1fb94d5b981caa4b6dbae5711bb788b729891d
-
Filesize
286KB
MD5d6c4fa0a4e79d7b2e64e32914ab0cb48
SHA18778d7963d26c66ad3f10633ae12121e230b5707
SHA256328d98bd381af683cf5419ac35aee76881535db26f4613ddd426bb83942dbed4
SHA51222b5bd38aea15c543d24b1c991766ce036a0b7948025ac3b2a308b4a19e0c518cd083db96b9c77940d537b815c1fb94d5b981caa4b6dbae5711bb788b729891d
-
Filesize
168KB
MD5c7bbf07b08aa7cc6fda1ad9b911e03c4
SHA108f461ea3cce4f73fd8e37ae89dde62edab6fd14
SHA256009f8b2591ffed6a62f643e03da7b91ea02e0465719f354284331bf85527d4f7
SHA512d98ee187388079d4b6625c430702f5345678009982c14f1964510907cbdd6b73b633495062d49eef8c5bfa53b5f162fa17cdd76633e14bd192659ead6ccd15b3
-
Filesize
168KB
MD5c7bbf07b08aa7cc6fda1ad9b911e03c4
SHA108f461ea3cce4f73fd8e37ae89dde62edab6fd14
SHA256009f8b2591ffed6a62f643e03da7b91ea02e0465719f354284331bf85527d4f7
SHA512d98ee187388079d4b6625c430702f5345678009982c14f1964510907cbdd6b73b633495062d49eef8c5bfa53b5f162fa17cdd76633e14bd192659ead6ccd15b3
-
Filesize
265KB
MD5bf7eb71715cb0fcfb7b40bb50b9fc031
SHA1bd8c5ef057e3ff4c64a56563ed8c028b608246b1
SHA256b837e7ce71b440d97df1e3108ee1fc24b22148fdde6599b390b1139599925ede
SHA512b487525de13d255ef23c4d96d03d26094754dc532f4182b3662ea027595b42ff50e20e26a9641fa89a7103d6d6219a625f2b8d07c46b64b74eebec4efa74763c
-
Filesize
265KB
MD5bf7eb71715cb0fcfb7b40bb50b9fc031
SHA1bd8c5ef057e3ff4c64a56563ed8c028b608246b1
SHA256b837e7ce71b440d97df1e3108ee1fc24b22148fdde6599b390b1139599925ede
SHA512b487525de13d255ef23c4d96d03d26094754dc532f4182b3662ea027595b42ff50e20e26a9641fa89a7103d6d6219a625f2b8d07c46b64b74eebec4efa74763c
-
Filesize
265KB
MD5bf7eb71715cb0fcfb7b40bb50b9fc031
SHA1bd8c5ef057e3ff4c64a56563ed8c028b608246b1
SHA256b837e7ce71b440d97df1e3108ee1fc24b22148fdde6599b390b1139599925ede
SHA512b487525de13d255ef23c4d96d03d26094754dc532f4182b3662ea027595b42ff50e20e26a9641fa89a7103d6d6219a625f2b8d07c46b64b74eebec4efa74763c
-
Filesize
265KB
MD5bf7eb71715cb0fcfb7b40bb50b9fc031
SHA1bd8c5ef057e3ff4c64a56563ed8c028b608246b1
SHA256b837e7ce71b440d97df1e3108ee1fc24b22148fdde6599b390b1139599925ede
SHA512b487525de13d255ef23c4d96d03d26094754dc532f4182b3662ea027595b42ff50e20e26a9641fa89a7103d6d6219a625f2b8d07c46b64b74eebec4efa74763c
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b
-
Filesize
168KB
MD57070d754b720fe5162742116d8683a49
SHA1e1e928cacf55633f30125dcf2e7aa6a0e6f4172e
SHA2565eec6e9402f614e6c92a23665003ad26a2606aa0700ebe58a86557bb84f4b7a2
SHA512cb8d4382b3e9617a9bb98f3e6b1a2a15df004a33008cfbc92049e3ef588b1bf7deb3748a4262962543588e1a36ac737001c3d99659dca974bb12ff78eac9739b