Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
194s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 20:42
Static task
static1
Behavioral task
behavioral1
Sample
189ebb2509fb98fb6552421719c446efdf2daad510ed60c177fcc84112321ff6.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
189ebb2509fb98fb6552421719c446efdf2daad510ed60c177fcc84112321ff6.exe
Resource
win10v2004-20230220-en
General
-
Target
189ebb2509fb98fb6552421719c446efdf2daad510ed60c177fcc84112321ff6.exe
-
Size
1.4MB
-
MD5
9d8e0505246513493a86f38902bc8031
-
SHA1
1377b577ade57c286b91a997eda060619292f955
-
SHA256
189ebb2509fb98fb6552421719c446efdf2daad510ed60c177fcc84112321ff6
-
SHA512
2c762ccc36ea84633d1fda5402005e44c94731f50d4ba1e667b3a3abc8811ce597de2d7571733bed36802b7c87451b7da3190406d74435fa6f7be8b81a04bd0d
-
SSDEEP
24576:oyIQPzlb1rycJtqz3EKaij5/gjn1Sn3wDcDEvJNAtMDBshzICNtz047i1vnBMrIy:vlPfrEpRN/gjMo02NrCvW5BFIrd
Malware Config
Extracted
redline
max
185.161.248.73:4164
-
auth_value
efb1499709a5d08ed1ddf71cff71211f
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a26024373.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a26024373.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a26024373.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a26024373.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a26024373.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a26024373.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 280 i08317511.exe 1660 i86905583.exe 1260 i45390495.exe 1800 i82079015.exe 880 a26024373.exe 316 b30585462.exe -
Loads dropped DLL 12 IoCs
pid Process 1588 189ebb2509fb98fb6552421719c446efdf2daad510ed60c177fcc84112321ff6.exe 280 i08317511.exe 280 i08317511.exe 1660 i86905583.exe 1660 i86905583.exe 1260 i45390495.exe 1260 i45390495.exe 1800 i82079015.exe 1800 i82079015.exe 880 a26024373.exe 1800 i82079015.exe 316 b30585462.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a26024373.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features a26024373.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 189ebb2509fb98fb6552421719c446efdf2daad510ed60c177fcc84112321ff6.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i08317511.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" i08317511.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" i45390495.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" i82079015.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 189ebb2509fb98fb6552421719c446efdf2daad510ed60c177fcc84112321ff6.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i86905583.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" i86905583.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i45390495.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce i82079015.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 880 a26024373.exe 880 a26024373.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 880 a26024373.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1588 wrote to memory of 280 1588 189ebb2509fb98fb6552421719c446efdf2daad510ed60c177fcc84112321ff6.exe 27 PID 1588 wrote to memory of 280 1588 189ebb2509fb98fb6552421719c446efdf2daad510ed60c177fcc84112321ff6.exe 27 PID 1588 wrote to memory of 280 1588 189ebb2509fb98fb6552421719c446efdf2daad510ed60c177fcc84112321ff6.exe 27 PID 1588 wrote to memory of 280 1588 189ebb2509fb98fb6552421719c446efdf2daad510ed60c177fcc84112321ff6.exe 27 PID 1588 wrote to memory of 280 1588 189ebb2509fb98fb6552421719c446efdf2daad510ed60c177fcc84112321ff6.exe 27 PID 1588 wrote to memory of 280 1588 189ebb2509fb98fb6552421719c446efdf2daad510ed60c177fcc84112321ff6.exe 27 PID 1588 wrote to memory of 280 1588 189ebb2509fb98fb6552421719c446efdf2daad510ed60c177fcc84112321ff6.exe 27 PID 280 wrote to memory of 1660 280 i08317511.exe 28 PID 280 wrote to memory of 1660 280 i08317511.exe 28 PID 280 wrote to memory of 1660 280 i08317511.exe 28 PID 280 wrote to memory of 1660 280 i08317511.exe 28 PID 280 wrote to memory of 1660 280 i08317511.exe 28 PID 280 wrote to memory of 1660 280 i08317511.exe 28 PID 280 wrote to memory of 1660 280 i08317511.exe 28 PID 1660 wrote to memory of 1260 1660 i86905583.exe 29 PID 1660 wrote to memory of 1260 1660 i86905583.exe 29 PID 1660 wrote to memory of 1260 1660 i86905583.exe 29 PID 1660 wrote to memory of 1260 1660 i86905583.exe 29 PID 1660 wrote to memory of 1260 1660 i86905583.exe 29 PID 1660 wrote to memory of 1260 1660 i86905583.exe 29 PID 1660 wrote to memory of 1260 1660 i86905583.exe 29 PID 1260 wrote to memory of 1800 1260 i45390495.exe 30 PID 1260 wrote to memory of 1800 1260 i45390495.exe 30 PID 1260 wrote to memory of 1800 1260 i45390495.exe 30 PID 1260 wrote to memory of 1800 1260 i45390495.exe 30 PID 1260 wrote to memory of 1800 1260 i45390495.exe 30 PID 1260 wrote to memory of 1800 1260 i45390495.exe 30 PID 1260 wrote to memory of 1800 1260 i45390495.exe 30 PID 1800 wrote to memory of 880 1800 i82079015.exe 31 PID 1800 wrote to memory of 880 1800 i82079015.exe 31 PID 1800 wrote to memory of 880 1800 i82079015.exe 31 PID 1800 wrote to memory of 880 1800 i82079015.exe 31 PID 1800 wrote to memory of 880 1800 i82079015.exe 31 PID 1800 wrote to memory of 880 1800 i82079015.exe 31 PID 1800 wrote to memory of 880 1800 i82079015.exe 31 PID 1800 wrote to memory of 316 1800 i82079015.exe 32 PID 1800 wrote to memory of 316 1800 i82079015.exe 32 PID 1800 wrote to memory of 316 1800 i82079015.exe 32 PID 1800 wrote to memory of 316 1800 i82079015.exe 32 PID 1800 wrote to memory of 316 1800 i82079015.exe 32 PID 1800 wrote to memory of 316 1800 i82079015.exe 32 PID 1800 wrote to memory of 316 1800 i82079015.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\189ebb2509fb98fb6552421719c446efdf2daad510ed60c177fcc84112321ff6.exe"C:\Users\Admin\AppData\Local\Temp\189ebb2509fb98fb6552421719c446efdf2daad510ed60c177fcc84112321ff6.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i08317511.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i08317511.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:280 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i86905583.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i86905583.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i45390495.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i45390495.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i82079015.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i82079015.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a26024373.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a26024373.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:880
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b30585462.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b30585462.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:316
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5aa8dd256360d16edd0da217d03dd24ba
SHA1a0d784250966c91bad33928d32489d75196d37dc
SHA256cf4cc89b0c6a7aa7647c7089723635948e8c54de7b141be6925fac9afc921349
SHA512b9e51063f0ae7f9845406b0141679f0849dc69810a45df4930a5ba8a0f40b5f14299e378a404527eed1770f6ce814b14481ca2f3821af27f6c4041de88008608
-
Filesize
1.2MB
MD5aa8dd256360d16edd0da217d03dd24ba
SHA1a0d784250966c91bad33928d32489d75196d37dc
SHA256cf4cc89b0c6a7aa7647c7089723635948e8c54de7b141be6925fac9afc921349
SHA512b9e51063f0ae7f9845406b0141679f0849dc69810a45df4930a5ba8a0f40b5f14299e378a404527eed1770f6ce814b14481ca2f3821af27f6c4041de88008608
-
Filesize
1.0MB
MD56cca0371ceced7cc19ff5da9dc08196b
SHA1ac4854cf2df3fa1f6609791fb59bab7001a774db
SHA2568ade889bab255dc1e9ae32701335d12a9f3cb6d4e2704704fa8cd357d46040b1
SHA512a4352a7f102e4727a724b38404e2e3d2210272a3c141916a23737dc7c23e607ed46399ecb5d9b3d562b483c18b05df2bdf8d0f8b3e64c6a811bf239d49a61c26
-
Filesize
1.0MB
MD56cca0371ceced7cc19ff5da9dc08196b
SHA1ac4854cf2df3fa1f6609791fb59bab7001a774db
SHA2568ade889bab255dc1e9ae32701335d12a9f3cb6d4e2704704fa8cd357d46040b1
SHA512a4352a7f102e4727a724b38404e2e3d2210272a3c141916a23737dc7c23e607ed46399ecb5d9b3d562b483c18b05df2bdf8d0f8b3e64c6a811bf239d49a61c26
-
Filesize
569KB
MD559a1c1637c4e90ad48260acb1bfa494e
SHA16d60ed60b36446243592bba8eb25a5db1a679ce9
SHA2563a7e7a98ce29227ae6b6921478b86692eff1e271ec78e940de389dc7c6f3e0cd
SHA5121a38dc2f722b9a042693a1f5e71a4b01a5da27ab7b4f188baf290e7797f337dfb9711804f11da2adc981cd6b20d1d35027bb0256a87ab5c9dfe2297ee74c09a2
-
Filesize
569KB
MD559a1c1637c4e90ad48260acb1bfa494e
SHA16d60ed60b36446243592bba8eb25a5db1a679ce9
SHA2563a7e7a98ce29227ae6b6921478b86692eff1e271ec78e940de389dc7c6f3e0cd
SHA5121a38dc2f722b9a042693a1f5e71a4b01a5da27ab7b4f188baf290e7797f337dfb9711804f11da2adc981cd6b20d1d35027bb0256a87ab5c9dfe2297ee74c09a2
-
Filesize
310KB
MD5b9253542f48edaf9dca1fa8b5a61040d
SHA10a4910e471925daf4427e09a3e0e0a5027f7dcce
SHA2569994bc55089590916e561400ab46a821ab3ce5e7fbc20b723633ec2961a0f7d1
SHA51296ca4b9636f15438089148da11c5013207355cebe04e991d43af7fb87941065ece920513d5512571472556889a43c987a15ad948d195b0ced032e5f38c3e656a
-
Filesize
310KB
MD5b9253542f48edaf9dca1fa8b5a61040d
SHA10a4910e471925daf4427e09a3e0e0a5027f7dcce
SHA2569994bc55089590916e561400ab46a821ab3ce5e7fbc20b723633ec2961a0f7d1
SHA51296ca4b9636f15438089148da11c5013207355cebe04e991d43af7fb87941065ece920513d5512571472556889a43c987a15ad948d195b0ced032e5f38c3e656a
-
Filesize
176KB
MD59e6cbdae60a6ce3e6259183014829886
SHA1c4715a2468b1555c9a5178dc73dca7e8cc7f98de
SHA256603eeb76ee5d684353defc5cffab3c53f211108861be952f5817310969d89c7a
SHA5123a5ec75a2b290d7f40e116bdb0f878135b1e601d27fed2a923be2754f505854b287cf827a0af5474b71a46f309edfe0fc2c0263ba512185e8154417129e4dd7f
-
Filesize
176KB
MD59e6cbdae60a6ce3e6259183014829886
SHA1c4715a2468b1555c9a5178dc73dca7e8cc7f98de
SHA256603eeb76ee5d684353defc5cffab3c53f211108861be952f5817310969d89c7a
SHA5123a5ec75a2b290d7f40e116bdb0f878135b1e601d27fed2a923be2754f505854b287cf827a0af5474b71a46f309edfe0fc2c0263ba512185e8154417129e4dd7f
-
Filesize
168KB
MD5a2470420e1c82cd3ac3edfaa3255f6f1
SHA17a99c012d1faa9ff255e605a4a829a169282eeec
SHA2565d50c574a6072423746bb8591f3637261d7d1fbbc915e07af80f3ade2f83e2fe
SHA5121ba67aa70af077cedd9249ca126c4df05b6c270617a984f58d623135f3403c85519f7f1f1896ebc653dac0e06cf60d6cde79413e5810ba8e11d58da2017040f0
-
Filesize
168KB
MD5a2470420e1c82cd3ac3edfaa3255f6f1
SHA17a99c012d1faa9ff255e605a4a829a169282eeec
SHA2565d50c574a6072423746bb8591f3637261d7d1fbbc915e07af80f3ade2f83e2fe
SHA5121ba67aa70af077cedd9249ca126c4df05b6c270617a984f58d623135f3403c85519f7f1f1896ebc653dac0e06cf60d6cde79413e5810ba8e11d58da2017040f0
-
Filesize
1.2MB
MD5aa8dd256360d16edd0da217d03dd24ba
SHA1a0d784250966c91bad33928d32489d75196d37dc
SHA256cf4cc89b0c6a7aa7647c7089723635948e8c54de7b141be6925fac9afc921349
SHA512b9e51063f0ae7f9845406b0141679f0849dc69810a45df4930a5ba8a0f40b5f14299e378a404527eed1770f6ce814b14481ca2f3821af27f6c4041de88008608
-
Filesize
1.2MB
MD5aa8dd256360d16edd0da217d03dd24ba
SHA1a0d784250966c91bad33928d32489d75196d37dc
SHA256cf4cc89b0c6a7aa7647c7089723635948e8c54de7b141be6925fac9afc921349
SHA512b9e51063f0ae7f9845406b0141679f0849dc69810a45df4930a5ba8a0f40b5f14299e378a404527eed1770f6ce814b14481ca2f3821af27f6c4041de88008608
-
Filesize
1.0MB
MD56cca0371ceced7cc19ff5da9dc08196b
SHA1ac4854cf2df3fa1f6609791fb59bab7001a774db
SHA2568ade889bab255dc1e9ae32701335d12a9f3cb6d4e2704704fa8cd357d46040b1
SHA512a4352a7f102e4727a724b38404e2e3d2210272a3c141916a23737dc7c23e607ed46399ecb5d9b3d562b483c18b05df2bdf8d0f8b3e64c6a811bf239d49a61c26
-
Filesize
1.0MB
MD56cca0371ceced7cc19ff5da9dc08196b
SHA1ac4854cf2df3fa1f6609791fb59bab7001a774db
SHA2568ade889bab255dc1e9ae32701335d12a9f3cb6d4e2704704fa8cd357d46040b1
SHA512a4352a7f102e4727a724b38404e2e3d2210272a3c141916a23737dc7c23e607ed46399ecb5d9b3d562b483c18b05df2bdf8d0f8b3e64c6a811bf239d49a61c26
-
Filesize
569KB
MD559a1c1637c4e90ad48260acb1bfa494e
SHA16d60ed60b36446243592bba8eb25a5db1a679ce9
SHA2563a7e7a98ce29227ae6b6921478b86692eff1e271ec78e940de389dc7c6f3e0cd
SHA5121a38dc2f722b9a042693a1f5e71a4b01a5da27ab7b4f188baf290e7797f337dfb9711804f11da2adc981cd6b20d1d35027bb0256a87ab5c9dfe2297ee74c09a2
-
Filesize
569KB
MD559a1c1637c4e90ad48260acb1bfa494e
SHA16d60ed60b36446243592bba8eb25a5db1a679ce9
SHA2563a7e7a98ce29227ae6b6921478b86692eff1e271ec78e940de389dc7c6f3e0cd
SHA5121a38dc2f722b9a042693a1f5e71a4b01a5da27ab7b4f188baf290e7797f337dfb9711804f11da2adc981cd6b20d1d35027bb0256a87ab5c9dfe2297ee74c09a2
-
Filesize
310KB
MD5b9253542f48edaf9dca1fa8b5a61040d
SHA10a4910e471925daf4427e09a3e0e0a5027f7dcce
SHA2569994bc55089590916e561400ab46a821ab3ce5e7fbc20b723633ec2961a0f7d1
SHA51296ca4b9636f15438089148da11c5013207355cebe04e991d43af7fb87941065ece920513d5512571472556889a43c987a15ad948d195b0ced032e5f38c3e656a
-
Filesize
310KB
MD5b9253542f48edaf9dca1fa8b5a61040d
SHA10a4910e471925daf4427e09a3e0e0a5027f7dcce
SHA2569994bc55089590916e561400ab46a821ab3ce5e7fbc20b723633ec2961a0f7d1
SHA51296ca4b9636f15438089148da11c5013207355cebe04e991d43af7fb87941065ece920513d5512571472556889a43c987a15ad948d195b0ced032e5f38c3e656a
-
Filesize
176KB
MD59e6cbdae60a6ce3e6259183014829886
SHA1c4715a2468b1555c9a5178dc73dca7e8cc7f98de
SHA256603eeb76ee5d684353defc5cffab3c53f211108861be952f5817310969d89c7a
SHA5123a5ec75a2b290d7f40e116bdb0f878135b1e601d27fed2a923be2754f505854b287cf827a0af5474b71a46f309edfe0fc2c0263ba512185e8154417129e4dd7f
-
Filesize
176KB
MD59e6cbdae60a6ce3e6259183014829886
SHA1c4715a2468b1555c9a5178dc73dca7e8cc7f98de
SHA256603eeb76ee5d684353defc5cffab3c53f211108861be952f5817310969d89c7a
SHA5123a5ec75a2b290d7f40e116bdb0f878135b1e601d27fed2a923be2754f505854b287cf827a0af5474b71a46f309edfe0fc2c0263ba512185e8154417129e4dd7f
-
Filesize
168KB
MD5a2470420e1c82cd3ac3edfaa3255f6f1
SHA17a99c012d1faa9ff255e605a4a829a169282eeec
SHA2565d50c574a6072423746bb8591f3637261d7d1fbbc915e07af80f3ade2f83e2fe
SHA5121ba67aa70af077cedd9249ca126c4df05b6c270617a984f58d623135f3403c85519f7f1f1896ebc653dac0e06cf60d6cde79413e5810ba8e11d58da2017040f0
-
Filesize
168KB
MD5a2470420e1c82cd3ac3edfaa3255f6f1
SHA17a99c012d1faa9ff255e605a4a829a169282eeec
SHA2565d50c574a6072423746bb8591f3637261d7d1fbbc915e07af80f3ade2f83e2fe
SHA5121ba67aa70af077cedd9249ca126c4df05b6c270617a984f58d623135f3403c85519f7f1f1896ebc653dac0e06cf60d6cde79413e5810ba8e11d58da2017040f0