Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 00:36
Static task
static1
Behavioral task
behavioral1
Sample
1bbc3bff13812c25d47cd84bca3da2dc.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1bbc3bff13812c25d47cd84bca3da2dc.exe
Resource
win10v2004-20241007-en
General
-
Target
1bbc3bff13812c25d47cd84bca3da2dc.exe
-
Size
300KB
-
MD5
1bbc3bff13812c25d47cd84bca3da2dc
-
SHA1
d3406bf8d0e9ac246c272fa284a35a3560bdbff5
-
SHA256
0a17e2ca8f223de67c0864fac1d24c7bb2d0c796c46e9ce04e4dff374c577ea1
-
SHA512
181b1e2bd08978b6ee3da2b48e0b113623b85c42ab8cec2a23bd5119aba7105fdeef9b7b00343d37b0c8344494640ce0a51615393def8242334420134f75871f
-
SSDEEP
6144:O2JKCwoXjMvjfTK/zNTdEpZ4m1qpxXQKQrUJ0tYRVAOTIdTsImm:8CwoXjMbTKLNhEpZ4m0vXQKQrxgu
Malware Config
Extracted
redline
eewx
185.81.68.147:1912
Signatures
-
Amadey family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x000500000001a479-75.dat family_redline behavioral1/memory/2644-117-0x0000000000CC0000-0x0000000000D12000-memory.dmp family_redline behavioral1/memory/1464-184-0x00000000002A0000-0x00000000002F2000-memory.dmp family_redline -
Redline family
-
Blocklisted process makes network request 8 IoCs
flow pid Process 18 596 rundll32.exe 19 596 rundll32.exe 22 2564 rundll32.exe 23 2564 rundll32.exe 26 1432 rundll32.exe 27 1432 rundll32.exe 29 1408 rundll32.exe 30 1408 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
pid Process 2976 F9D9.tmp.ctx.exe 2700 F9D9.tmp.ctx.exe 2644 FCA8.tmp.ssg.exe 1688 4E4.tmp.gfx.exe 1516 Gxtuum.exe 680 update.exe 1464 ssg.exe 2656 update.exe 2752 update.exe 2624 ssg.exe -
Loads dropped DLL 57 IoCs
pid Process 1168 Explorer.EXE 2976 F9D9.tmp.ctx.exe 2700 F9D9.tmp.ctx.exe 2700 F9D9.tmp.ctx.exe 2700 F9D9.tmp.ctx.exe 2700 F9D9.tmp.ctx.exe 2700 F9D9.tmp.ctx.exe 2700 F9D9.tmp.ctx.exe 2700 F9D9.tmp.ctx.exe 2700 F9D9.tmp.ctx.exe 2700 F9D9.tmp.ctx.exe 2700 F9D9.tmp.ctx.exe 2700 F9D9.tmp.ctx.exe 2700 F9D9.tmp.ctx.exe 2700 F9D9.tmp.ctx.exe 2700 F9D9.tmp.ctx.exe 2700 F9D9.tmp.ctx.exe 2700 F9D9.tmp.ctx.exe 2700 F9D9.tmp.ctx.exe 2700 F9D9.tmp.ctx.exe 2700 F9D9.tmp.ctx.exe 2700 F9D9.tmp.ctx.exe 2700 F9D9.tmp.ctx.exe 2700 F9D9.tmp.ctx.exe 1688 4E4.tmp.gfx.exe 1516 Gxtuum.exe 1516 Gxtuum.exe 1516 Gxtuum.exe 2288 rundll32.exe 2288 rundll32.exe 2288 rundll32.exe 2288 rundll32.exe 596 rundll32.exe 596 rundll32.exe 596 rundll32.exe 596 rundll32.exe 1516 Gxtuum.exe 1516 Gxtuum.exe 1516 Gxtuum.exe 1516 Gxtuum.exe 1516 Gxtuum.exe 2984 rundll32.exe 2984 rundll32.exe 2984 rundll32.exe 2984 rundll32.exe 2564 rundll32.exe 2564 rundll32.exe 2564 rundll32.exe 2564 rundll32.exe 1432 rundll32.exe 1432 rundll32.exe 1432 rundll32.exe 1432 rundll32.exe 1408 rundll32.exe 1408 rundll32.exe 1408 rundll32.exe 1408 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\B78813B8AF2C3370857647\\B78813B8AF2C3370857647.exe" 1bbc3bff13812c25d47cd84bca3da2dc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\B78813B8AF2C3370857647\\B78813B8AF2C3370857647.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\B78813B8AF2C3370857647\\B78813B8AF2C3370857647.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Users\\Admin\\AppData\\Roaming\\B78813B8AF2C3370857647\\B78813B8AF2C3370857647.exe" update.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Gxtuum.job 4E4.tmp.gfx.exe -
pid Process 880 powershell.exe 1956 powershell.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x00090000000173e4-12.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4E4.tmp.gfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ssg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ssg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FCA8.tmp.ssg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 2412 netsh.exe 1852 netsh.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2948 1bbc3bff13812c25d47cd84bca3da2dc.exe 1168 Explorer.EXE 2644 FCA8.tmp.ssg.exe 2644 FCA8.tmp.ssg.exe 2644 FCA8.tmp.ssg.exe 596 rundll32.exe 596 rundll32.exe 596 rundll32.exe 596 rundll32.exe 596 rundll32.exe 596 rundll32.exe 880 powershell.exe 1464 ssg.exe 1464 ssg.exe 1464 ssg.exe 2564 rundll32.exe 2564 rundll32.exe 2564 rundll32.exe 2564 rundll32.exe 2564 rundll32.exe 2564 rundll32.exe 1956 powershell.exe 2624 ssg.exe 2624 ssg.exe 2624 ssg.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2948 1bbc3bff13812c25d47cd84bca3da2dc.exe Token: SeSecurityPrivilege 2948 1bbc3bff13812c25d47cd84bca3da2dc.exe Token: SeTakeOwnershipPrivilege 2948 1bbc3bff13812c25d47cd84bca3da2dc.exe Token: SeLoadDriverPrivilege 2948 1bbc3bff13812c25d47cd84bca3da2dc.exe Token: SeSystemProfilePrivilege 2948 1bbc3bff13812c25d47cd84bca3da2dc.exe Token: SeSystemtimePrivilege 2948 1bbc3bff13812c25d47cd84bca3da2dc.exe Token: SeProfSingleProcessPrivilege 2948 1bbc3bff13812c25d47cd84bca3da2dc.exe Token: SeIncBasePriorityPrivilege 2948 1bbc3bff13812c25d47cd84bca3da2dc.exe Token: SeCreatePagefilePrivilege 2948 1bbc3bff13812c25d47cd84bca3da2dc.exe Token: SeBackupPrivilege 2948 1bbc3bff13812c25d47cd84bca3da2dc.exe Token: SeRestorePrivilege 2948 1bbc3bff13812c25d47cd84bca3da2dc.exe Token: SeShutdownPrivilege 2948 1bbc3bff13812c25d47cd84bca3da2dc.exe Token: SeDebugPrivilege 2948 1bbc3bff13812c25d47cd84bca3da2dc.exe Token: SeSystemEnvironmentPrivilege 2948 1bbc3bff13812c25d47cd84bca3da2dc.exe Token: SeRemoteShutdownPrivilege 2948 1bbc3bff13812c25d47cd84bca3da2dc.exe Token: SeUndockPrivilege 2948 1bbc3bff13812c25d47cd84bca3da2dc.exe Token: SeManageVolumePrivilege 2948 1bbc3bff13812c25d47cd84bca3da2dc.exe Token: 33 2948 1bbc3bff13812c25d47cd84bca3da2dc.exe Token: 34 2948 1bbc3bff13812c25d47cd84bca3da2dc.exe Token: 35 2948 1bbc3bff13812c25d47cd84bca3da2dc.exe Token: SeDebugPrivilege 2948 1bbc3bff13812c25d47cd84bca3da2dc.exe Token: SeIncreaseQuotaPrivilege 680 update.exe Token: SeSecurityPrivilege 680 update.exe Token: SeTakeOwnershipPrivilege 680 update.exe Token: SeLoadDriverPrivilege 680 update.exe Token: SeSystemProfilePrivilege 680 update.exe Token: SeSystemtimePrivilege 680 update.exe Token: SeProfSingleProcessPrivilege 680 update.exe Token: SeIncBasePriorityPrivilege 680 update.exe Token: SeCreatePagefilePrivilege 680 update.exe Token: SeBackupPrivilege 680 update.exe Token: SeRestorePrivilege 680 update.exe Token: SeShutdownPrivilege 680 update.exe Token: SeDebugPrivilege 680 update.exe Token: SeSystemEnvironmentPrivilege 680 update.exe Token: SeRemoteShutdownPrivilege 680 update.exe Token: SeUndockPrivilege 680 update.exe Token: SeManageVolumePrivilege 680 update.exe Token: 33 680 update.exe Token: 34 680 update.exe Token: 35 680 update.exe Token: SeDebugPrivilege 2644 FCA8.tmp.ssg.exe Token: SeDebugPrivilege 880 powershell.exe Token: SeDebugPrivilege 1464 ssg.exe Token: SeIncreaseQuotaPrivilege 2656 update.exe Token: SeSecurityPrivilege 2656 update.exe Token: SeTakeOwnershipPrivilege 2656 update.exe Token: SeLoadDriverPrivilege 2656 update.exe Token: SeSystemProfilePrivilege 2656 update.exe Token: SeSystemtimePrivilege 2656 update.exe Token: SeProfSingleProcessPrivilege 2656 update.exe Token: SeIncBasePriorityPrivilege 2656 update.exe Token: SeCreatePagefilePrivilege 2656 update.exe Token: SeBackupPrivilege 2656 update.exe Token: SeRestorePrivilege 2656 update.exe Token: SeShutdownPrivilege 2656 update.exe Token: SeDebugPrivilege 2656 update.exe Token: SeSystemEnvironmentPrivilege 2656 update.exe Token: SeRemoteShutdownPrivilege 2656 update.exe Token: SeUndockPrivilege 2656 update.exe Token: SeManageVolumePrivilege 2656 update.exe Token: 33 2656 update.exe Token: 34 2656 update.exe Token: 35 2656 update.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1168 Explorer.EXE 1168 Explorer.EXE 1688 4E4.tmp.gfx.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1168 Explorer.EXE 1168 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2948 wrote to memory of 1168 2948 1bbc3bff13812c25d47cd84bca3da2dc.exe 21 PID 1168 wrote to memory of 2976 1168 Explorer.EXE 31 PID 1168 wrote to memory of 2976 1168 Explorer.EXE 31 PID 1168 wrote to memory of 2976 1168 Explorer.EXE 31 PID 2976 wrote to memory of 2700 2976 F9D9.tmp.ctx.exe 32 PID 2976 wrote to memory of 2700 2976 F9D9.tmp.ctx.exe 32 PID 2976 wrote to memory of 2700 2976 F9D9.tmp.ctx.exe 32 PID 1168 wrote to memory of 2644 1168 Explorer.EXE 33 PID 1168 wrote to memory of 2644 1168 Explorer.EXE 33 PID 1168 wrote to memory of 2644 1168 Explorer.EXE 33 PID 1168 wrote to memory of 2644 1168 Explorer.EXE 33 PID 1168 wrote to memory of 1688 1168 Explorer.EXE 34 PID 1168 wrote to memory of 1688 1168 Explorer.EXE 34 PID 1168 wrote to memory of 1688 1168 Explorer.EXE 34 PID 1168 wrote to memory of 1688 1168 Explorer.EXE 34 PID 1688 wrote to memory of 1516 1688 4E4.tmp.gfx.exe 35 PID 1688 wrote to memory of 1516 1688 4E4.tmp.gfx.exe 35 PID 1688 wrote to memory of 1516 1688 4E4.tmp.gfx.exe 35 PID 1688 wrote to memory of 1516 1688 4E4.tmp.gfx.exe 35 PID 1516 wrote to memory of 680 1516 Gxtuum.exe 38 PID 1516 wrote to memory of 680 1516 Gxtuum.exe 38 PID 1516 wrote to memory of 680 1516 Gxtuum.exe 38 PID 1516 wrote to memory of 680 1516 Gxtuum.exe 38 PID 1516 wrote to memory of 1464 1516 Gxtuum.exe 39 PID 1516 wrote to memory of 1464 1516 Gxtuum.exe 39 PID 1516 wrote to memory of 1464 1516 Gxtuum.exe 39 PID 1516 wrote to memory of 1464 1516 Gxtuum.exe 39 PID 1516 wrote to memory of 2288 1516 Gxtuum.exe 40 PID 1516 wrote to memory of 2288 1516 Gxtuum.exe 40 PID 1516 wrote to memory of 2288 1516 Gxtuum.exe 40 PID 1516 wrote to memory of 2288 1516 Gxtuum.exe 40 PID 1516 wrote to memory of 2288 1516 Gxtuum.exe 40 PID 1516 wrote to memory of 2288 1516 Gxtuum.exe 40 PID 1516 wrote to memory of 2288 1516 Gxtuum.exe 40 PID 2288 wrote to memory of 596 2288 rundll32.exe 41 PID 2288 wrote to memory of 596 2288 rundll32.exe 41 PID 2288 wrote to memory of 596 2288 rundll32.exe 41 PID 2288 wrote to memory of 596 2288 rundll32.exe 41 PID 596 wrote to memory of 2412 596 rundll32.exe 42 PID 596 wrote to memory of 2412 596 rundll32.exe 42 PID 596 wrote to memory of 2412 596 rundll32.exe 42 PID 596 wrote to memory of 880 596 rundll32.exe 44 PID 596 wrote to memory of 880 596 rundll32.exe 44 PID 596 wrote to memory of 880 596 rundll32.exe 44 PID 1516 wrote to memory of 2656 1516 Gxtuum.exe 46 PID 1516 wrote to memory of 2656 1516 Gxtuum.exe 46 PID 1516 wrote to memory of 2656 1516 Gxtuum.exe 46 PID 1516 wrote to memory of 2656 1516 Gxtuum.exe 46 PID 1516 wrote to memory of 2752 1516 Gxtuum.exe 47 PID 1516 wrote to memory of 2752 1516 Gxtuum.exe 47 PID 1516 wrote to memory of 2752 1516 Gxtuum.exe 47 PID 1516 wrote to memory of 2752 1516 Gxtuum.exe 47 PID 1516 wrote to memory of 2624 1516 Gxtuum.exe 48 PID 1516 wrote to memory of 2624 1516 Gxtuum.exe 48 PID 1516 wrote to memory of 2624 1516 Gxtuum.exe 48 PID 1516 wrote to memory of 2624 1516 Gxtuum.exe 48 PID 1516 wrote to memory of 2984 1516 Gxtuum.exe 49 PID 1516 wrote to memory of 2984 1516 Gxtuum.exe 49 PID 1516 wrote to memory of 2984 1516 Gxtuum.exe 49 PID 1516 wrote to memory of 2984 1516 Gxtuum.exe 49 PID 1516 wrote to memory of 2984 1516 Gxtuum.exe 49 PID 1516 wrote to memory of 2984 1516 Gxtuum.exe 49 PID 1516 wrote to memory of 2984 1516 Gxtuum.exe 49 PID 2984 wrote to memory of 2564 2984 rundll32.exe 50
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\1bbc3bff13812c25d47cd84bca3da2dc.exe"C:\Users\Admin\AppData\Local\Temp\1bbc3bff13812c25d47cd84bca3da2dc.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\F9D9.tmp.ctx.exe"C:\Users\Admin\AppData\Local\Temp\F9D9.tmp.ctx.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\F9D9.tmp.ctx.exe"C:\Users\Admin\AppData\Local\Temp\F9D9.tmp.ctx.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2700
-
-
-
C:\Users\Admin\AppData\Local\Temp\FCA8.tmp.ssg.exe"C:\Users\Admin\AppData\Local\Temp\FCA8.tmp.ssg.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\4E4.tmp.gfx.exe"C:\Users\Admin\AppData\Local\Temp\4E4.tmp.gfx.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\ee29ea508b\Gxtuum.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\10000830101\update.exe"C:\Users\Admin\AppData\Local\Temp\10000830101\update.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:680
-
-
C:\Users\Admin\AppData\Local\Temp\10000840101\ssg.exe"C:\Users\Admin\AppData\Local\Temp\10000840101\ssg.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\43266f2abbf198\cred64.dll, Main4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\43266f2abbf198\cred64.dll, Main5⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\system32\netsh.exenetsh wlan show profiles6⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2412
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\290804112282_Desktop.zip' -CompressionLevel Optimal6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:880
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10000820101\update.exe"C:\Users\Admin\AppData\Local\Temp\10000820101\update.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
C:\Users\Admin\AppData\Local\Temp\10000830101\update.exe"C:\Users\Admin\AppData\Local\Temp\10000830101\update.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\10000840101\ssg.exe"C:\Users\Admin\AppData\Local\Temp\10000840101\ssg.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2624
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\43266f2abbf198\cred64.dll, Main4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\43266f2abbf198\cred64.dll, Main5⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2564 -
C:\Windows\system32\netsh.exenetsh wlan show profiles6⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1852
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\290804112282_Desktop.zip' -CompressionLevel Optimal6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1956
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\43266f2abbf198\clip64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1432
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\43266f2abbf198\clip64.dll, Main4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1408
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD5d4d52e0295d3405c99b2cf6f51499413
SHA176ac5299acd46534cdaff720be6976b3b1d20b06
SHA256823b9f56f3b88743ad5e0068b76aaf3149c3b00ed7b6a90d651043a33a922310
SHA5122205ce19cebcbedfe2ed7183b12628ea99453d427e1cbf353590c69c1289120a7790e32f7fe3b0f2f835106eef59f33d9732ede97cb29b0fbc607f0056315bab
-
Filesize
300KB
MD57b6730ca4da283a35c41b831b9567f15
SHA192ef2fd33f713d72207209ec65f0de6eef395af5
SHA25694d7d12ae53ce97f38d8890383c2317ce03d45bd6ecaf0e0b9165c7066cd300c
SHA512ae2d10f9895e5f2af10b4fa87cdb7c930a531e910b55cd752b15dac77a432cc28eca6e5b32b95eeb21e238aaf2eb57e29474660cae93e734d0b6543c1d462ace
-
Filesize
10KB
MD554fb3da0626d4d6e15d125810156cd6a
SHA10c4582af381c0536ad667e748c454f92c336ba5a
SHA256007286151fe3259fd30f5162f4b331834159f54382963cd9a28dbe820c6fa07d
SHA512eaf19dc6b8d1094ec36ad4c45b15fd185212ef265b839f11ab869fec6b85a853b23683554c8853ea9aec2bae2d1d51d2b00cf7317d50a997ac33a8eff00673f8
-
Filesize
87KB
MD50e675d4a7a5b7ccd69013386793f68eb
SHA16e5821ddd8fea6681bda4448816f39984a33596b
SHA256bf5ff4603557c9959acec995653d052d9054ad4826df967974efd2f377c723d1
SHA512cae69a90f92936febde67dacd6ce77647cb3b3ed82bb66463cd9047e90723f633aa2fc365489de09fecdc510be15808c183b12e6236b0893af19633f6a670e66
-
Filesize
120KB
MD5f1e33a8f6f91c2ed93dc5049dd50d7b8
SHA123c583dc98aa3f6b8b108db5d90e65d3dd72e9b4
SHA2569459d246df7a3c638776305cf3683946ba8db26a7de90df8b60e1be0b27e53c4
SHA512229896da389d78cbdf2168753ed7fcc72d8e0e62c6607a3766d6d47842c0abd519ac4f5d46607b15e7ba785280f9d27b482954e931645337a152b8a54467c6a5
-
Filesize
19KB
MD5b56d69079d2001c1b2af272774b53a64
SHA167ede1c5a71412b11847f79f5a684eabaf00de01
SHA256f3a41d882544202b2e1bdf3d955458be11fc7f76ba12668388a681870636f143
SHA5127eb8fe111dd2e1f7e308b622461eb311c2b9fc4ef44c76e1def6c524eb7281d5522af12211f1f91f651f2b678592d2997fe4cd15724f700deaff314a1737b3a8
-
Filesize
19KB
MD55af784f599437629deea9fe4e8eb4799
SHA13c891b920fd2703edd6881117ea035ced5a619f6
SHA2567e5bd3ee263d09c7998e0d5ffa684906ddc56da61536331c89c74b039df00c7c
SHA5124df58513cf52511c0d2037cdc674115d8ed5a0ed4360eb6383cc6a798a7037f3f7f2d587797223ed7797ccd476f1c503b3c16e095843f43e6b87d55ad4822d70
-
Filesize
19KB
MD5e1ca15cf0597c6743b3876af23a96960
SHA1301231f7250431bd122b12ed34a8d4e8bb379457
SHA256990e46d8f7c9574a558ebdfcb8739fbccba59d0d3a2193c9c8e66807387a276d
SHA5127c9dacd882a0650bf2f553e9bc5647e6320a66021ac4c1adc802070fd53de4c6672a7bacfd397c51009a23b6762e85c8017895e9347a94d489d42c50fa0a1c42
-
Filesize
19KB
MD58d6599d7c4897dcd0217070cca074574
SHA125eacaaa4c6f89945e97388796a8c85ba6fb01fb
SHA256a011260fafaaaefd7e7326d8d5290c6a76d55e5af4e43ffa4de5fea9b08fa928
SHA512e8e2e7c5bff41ccaa0f77c3cfee48dac43c11e75688f03b719cc1d716db047597a7a2ce25b561171ef259957bdcd9dd4345a0e0125db2b36f31698ba178e2248
-
Filesize
22KB
MD5642b29701907e98e2aa7d36eba7d78b8
SHA116f46b0e057816f3592f9c0a6671111ea2f35114
SHA2565d72feac789562d445d745a55a99536fa9302b0c27b8f493f025ba69ba31941c
SHA5121beab2b368cc595beb39b2f5a2f52d334bc42bf674b8039d334c6d399c966aff0b15876105f0a4a54fa08e021cb44907ed47d31a0af9e789eb4102b82025cf57
-
Filesize
19KB
MD5f0c73f7454a5ce6fb8e3d795fdb0235d
SHA1acdd6c5a359421d268b28ddf19d3bcb71f36c010
SHA2562a59dd891533a028fae7a81e690e4c28c9074c2f327393fab17329affe53fd7b
SHA512bd6cf4e37c3e7a1a3b36f42858af1b476f69caa4ba1fd836a7e32220e5eff7ccc811c903019560844af988a7c77cc41dc6216c0c949d8e04516a537da5821a3e
-
Filesize
19KB
MD57d4d4593b478b4357446c106b64e61f8
SHA18a4969c9e59d7a7485c8cc5723c037b20dea5c9d
SHA2560a6e2224cde90a0d41926e8863f9956848ffbf19848e8855bd08953112afc801
SHA5127bc9c473705ec98ba0c1da31c295937d97710cedefc660f6a5cb0512bae36ad23bebb2f6f14df7ce7f90ec3f817b02f577317fdd514560aab22cb0434d8e4e0b
-
Filesize
19KB
MD57bc1b8712e266db746914db48b27ef9c
SHA1c76eb162c23865b3f1bd7978f7979d6ba09ccb60
SHA256f82d05aea21bcf6337ef45fbdad6d647d17c043a67b44c7234f149f861a012b9
SHA512db6983f5f9c18908266dbf01ef95ebae49f88edc04a0515699ef12201ac9a50f09939b8784c75ae513105ada5b155e5330bd42d70f8c8c48fe6005513aefad2a
-
Filesize
19KB
MD5b071e761cea670d89d7ae80e016ce7e6
SHA1c675be753dbef1624100f16674c2221a20cf07dd
SHA25663fb84a49308b857804ae1481d2d53b00a88bbd806d257d196de2bd5c385701e
SHA512f2ecbdaba3516d92bd29dcce618185f1755451d95c7dbbe23f8215318f6f300a9964c93ec3ed65c5535d87be82b668e1d3025a7e325af71a05f14e15d530d35f
-
Filesize
19KB
MD51dccf27f2967601ce6666c8611317f03
SHA1d8246df2ed9ec4a8a719fd4b1db4fd8a71ef679b
SHA2566a83ab9a413afd74d77a090f52784b0128527bee9cb0a4224c59d5c75fc18387
SHA51270b96d69d609211f8b9e05fa510ea7d574ae8da3a6498f5c982aee71635b8a749162247055b7ba21a884bfa06c1415b68912c463f0f1b6ffb9049f3532386877
-
Filesize
19KB
MD5569a7ac3f6824a04282ff708c629a6d2
SHA1fc0d78de1075dfd4c1024a72074d09576d4d4181
SHA25684c579a8263a87991ca1d3aee2845e1c262fb4b849606358062093d08afdc7a2
SHA512e9cbff82e32540f9230cead9063acb1aceb7ccc9f3338c0b7ad10b0ac70ff5b47c15944d0dce33ea8405554aa9b75de30b26ae2ca55db159d45b6e64bc02a180
-
Filesize
21KB
MD51d75e7b9f68c23a195d408cf02248119
SHA162179fc9a949d238bb221d7c2f71ba7c1680184c
SHA25667ebe168b7019627d68064043680674f9782fda7e30258748b29412c2b3d4c6b
SHA512c2ee84a9aeac34f7b51426d12f87bb35d8c3238bb26a6e14f412ea485e5bd3b8fb5b1231323d4b089cf69d8180a38ddd7fd593cc52cbdf250125ad02d66eea9d
-
Filesize
19KB
MD5623283471b12f1bdb83e25dbafaf9c16
SHA1ecbba66f4dca89a3faa3e242e30aefac8de02153
SHA2569ca500775fee9ff69b960d65040b8dc415a2efde2982a9251ee6a3e8de625bc7
SHA51254b69ffa2c263be4ddadca62fa2867fea6148949d64c2634745db3dcbc1ba0ecf7167f02fa53efd69eaaee81d617d914f370f26ca16ee5850853f70c69e9a61f
-
Filesize
19KB
MD561f70f2d1e3f22e976053df5f3d8ecb7
SHA17d224b7f404cde960e6b7a1c449b41050c8e9c58
SHA2562695761b010d22fdfda2b5e73cf0ac7328ccc62b4b28101d5c10155dd9a48020
SHA5121ddc568590e9954db198f102be99eabb4133b49e9f3b464f2fc7f31cc77d06d5a7132152f4b331332c42f241562ee6c7bf1c2d68e546db3f59ab47eaf83a22cf
-
Filesize
19KB
MD5d6ad0f2652460f428c0e8fc40b6f6115
SHA11a5152871abc5cf3d4868a218de665105563775e
SHA2564ef09fa6510eeebb4855b6f197b20a7a27b56368c63cc8a3d1014fa4231ab93a
SHA512ceafeee932919bc002b111d6d67b7c249c85d30da35dfbcebd1f37db51e506ac161e4ee047ff8f7bf0d08da6a7f8b97e802224920bd058f8e790e6fa0ee48b22
-
Filesize
19KB
MD5eab486e4719b916cad05d64cd4e72e43
SHA1876c256fb2aeb0b25a63c9ee87d79b7a3c157ead
SHA25605fe96faa8429992520451f4317fbceba1b17716fa2caf44ddc92ede88ce509d
SHA512c50c3e656cc28a2f4f6377ba24d126bdc248a3125dca490994f8cace0a4903e23346ae937bb5b0a333f7d39ece42665ae44fde2fd5600873489f3982151a0f5d
-
Filesize
23KB
MD5da5e087677c8ebbc0062eac758dfed49
SHA1ca69d48efa07090acb7ae7c1608f61e8d26d3985
SHA25608a43a53a66d8acb2e107e6fc71213cedd180363055a2dc5081fe5a837940dce
SHA5126262e9a0808d8f64e5f2dfad5242cd307e2f5eaa78f0a768f325e65c98db056c312d79f0b3e63c74e364af913a832c1d90f4604fe26cc5fb05f3a5a661b12573
-
Filesize
19KB
MD533a0fe1943c5a325f93679d6e9237fee
SHA1737d2537d602308fc022dbc0c29aa607bcdec702
SHA2565af7aa065ffdbf98d139246e198601bfde025d11a6c878201f4b99876d6c7eac
SHA512cab7fcaa305a9ace1f1cc7077b97526bebc0921adf23273e74cd42d7fe99401d4f7ede8ecb9847b6734a13760b9ebe4dbd2465a3db3139ed232dbef68fb62c54
-
Filesize
21KB
MD5633dca52da4ebaa6f4bf268822c6dc88
SHA11ebfc0f881ce338d2f66fcc3f9c1cbb94cdc067e
SHA256424fd5d3d3297a8ab1227007ef8ded5a4f194f24bd573a5211be71937aa55d22
SHA512ed058525ee7b4cc7e12561c7d674c26759a4301322ff0b3239f3183911ce14993614e3199d8017b9bfde25c8cb9ac0990d318bb19f3992624b39ec0f084a8df1
-
Filesize
20KB
MD543bf2037bfd3fb60e1fedac634c6f86e
SHA1959eebe41d905ad3afa4254a52628ec13613cf70
SHA256735703c0597da278af8a6359fc051b9e657627f50ad5b486185c2ef328ad571b
SHA5127042846c009efea45ca5fafdc08016eca471a8c54486ba03f212abba47467f8744e9546c8f33214620f97dbcc994e3002788ad0db65b86d8a3e4ff0d8a9d0d05
-
Filesize
19KB
MD5d51bc845c4efbfdbd68e8ccffdad7375
SHA1c82e580ec68c48e613c63a4c2f9974bb59182cf6
SHA25689d9f54e6c9ae1cb8f914da1a2993a20de588c18f1aaf4d66efb20c3a282c866
SHA5122e353cf58ad218c3e068a345d1da6743f488789ef7c6b96492d48571dc64df8a71ad2db2e5976cfd04cf4b55455e99c70c7f32bd2c0f4a8bed1d29c2dafc17b0
-
Filesize
28KB
MD5487f72d0cf7dc1d85fa18788a1b46813
SHA10aabff6d4ee9a2a56d40ee61e4591d4ba7d14c0d
SHA256560baf1b87b692c284ccbb82f2458a688757231b315b6875482e08c8f5333b3d
SHA512b7f4e32f98bfdcf799331253faebb1fb08ec24f638d8526f02a6d9371c8490b27d03db3412128ced6d2bbb11604247f3f22c8380b1bf2a11fb3bb92f18980185
-
Filesize
20KB
MD554a8fca040976f2aac779a344b275c80
SHA1ea1f01d6dcdf688eb0f21a8cb8a38f03bc777883
SHA2567e90e7acc69aca4591ce421c302c7f6cdf8e44f3b4390f66ec43dff456ffea29
SHA512cb20bed4972e56f74de1b7bc50dc1e27f2422dbb302aecb749018b9f88e3e4a67c9fc69bbbb8c4b21d49a530cc8266172e7d237650512aafb293cdfe06d02228
-
Filesize
23KB
MD521b509d048418922b92985696710afca
SHA1c499dd098aab8c7e05b8b0fd55f994472d527203
SHA256fe7336d2fb3b13a00b5b4ce055a84f0957daefdace94f21b88e692e54b678ac3
SHA512c517b02d4e94cf8360d98fd093bca25e8ae303c1b4500cf4cf01f78a7d7ef5f581b99a0371f438c6805a0b3040a0e06994ba7b541213819bd07ec8c6251cb9bb
-
Filesize
25KB
MD5120a5dc2682cd2a838e0fc0efd45506e
SHA18710be5d5e9c878669ff8b25b67fb2deb32cd77a
SHA256c14f0d929a761a4505628c4eb5754d81b88aa1fdad2154a2f2b0215b983b6d89
SHA5124330edf9b84c541e5ed3bb672548f35efa75c6b257c3215fc29ba6e152294820347517ec9bd6bde38411efa9074324a276cf0d7d905ed5dd88e906d78780760c
-
Filesize
25KB
MD5f22faca49e4d5d80ec26ed31e7ecd0e0
SHA1473bcbfb78e6a63afd720b5cbe5c55d9495a3d88
SHA2561eb30ea95dae91054a33a12b1c73601518d28e3746db552d7ce120da589d4cf4
SHA512c8090758435f02e3659d303211d78102c71754ba12b0a7e25083fd3529b3894dc3ab200b02a2899418cc6ed3b8f483d36e6c2bf86ce2a34e5fd9ad0483b73040
-
Filesize
21KB
MD52fd0da47811b8ed4a0abdf9030419381
SHA146e3f21a9bd31013a804ba45dc90cc22331a60d1
SHA256de81c4d37833380a1c71a5401de3ab4fe1f8856fc40d46d0165719a81d7f3924
SHA5122e6f900628809bfd908590fe1ea38e0e36960235f9a6bbccb73bbb95c71bfd10f75e1df5e8cf93a682e4ada962b06c278afc9123ab5a4117f77d1686ff683d6f
-
Filesize
821KB
MD5f4981249047e4b7709801a388e2965af
SHA142847b581e714a407a0b73e5dab019b104ec9af2
SHA256b191e669b1c715026d0732cbf8415f1ff5cfba5ed9d818444719d03e72d14233
SHA512e8ef3fb3c9d5ef8ae9065838b124ba4920a3a1ba2d4174269cad05c1f318bc9ff80b1c6a6c0f3493e998f0587ef59be0305bc92e009e67b82836755470bc1b13
-
Filesize
32KB
MD54424baf6ed5340df85482fa82b857b03
SHA1181b641bf21c810a486f855864cd4b8967c24c44
SHA2568c1f7f64579d01fedfde07e0906b1f8e607c34d5e6424c87abe431a2322eba79
SHA5128adb94893ada555de2e82f006ab4d571fad8a1b16ac19ca4d2efc1065677f25d2de5c981473fabd0398f6328c1be1ebd4d36668ea67f8a5d25060f1980ee7e33
-
Filesize
4.0MB
MD5d2a8a5e7380d5f4716016777818a32c5
SHA1fb12f31d1d0758fe3e056875461186056121ed0c
SHA25659ab345c565304f638effa7c0236f26041fd06e35041a75988e13995cd28ace9
SHA512ad1269d1367f587809e3fbe44af703c464a88fa3b2ae0bf2ad6544b8ed938e4265aab7e308d999e6c8297c0c85c608e3160796325286db3188a3edf040a02ab7
-
Filesize
1021KB
MD54e326feeb3ebf1e3eb21eeb224345727
SHA1f156a272dbc6695cc170b6091ef8cd41db7ba040
SHA2563c60056371f82e4744185b6f2fa0c69042b1e78804685944132974dd13f3b6d9
SHA512be9420a85c82eeee685e18913a7ff152fcead72a90ddcc2bcc8ab53a4a1743ae98f49354023c0a32b3a1d919bda64b5d455f6c3a49d4842bbba4aa37c1d05d67
-
Filesize
431KB
MD54962575a2378d5c72e7a836ea766e2ad
SHA1549964178b12017622d3cbdda6dbfdef0904e7e2
SHA256eff5fad47b9c739b09e760813b2bcbb0788eb35598f72e64ff95c794e72e6676
SHA512911a59f7a6785dd09a57dcd6d977b8abd5e160bd613786e871a1e92377c9e6f3b85fe3037431754bbdb1212e153776efca5fadac1de6b2ad474253da176e8e53
-
Filesize
124KB
MD5c2f3fbbbe6d5f48a71b6b168b1485866
SHA11cd56cfc2dc07880b65bd8a1f5b7147633f5d553
SHA256c7ed512058bc924045144daa16701da10f244ac12a5ea2de901e59dce6470839
SHA512e211f18c2850987529336e0d20aa894533c1f6a8ae6745e320fd394a9481d3a956c719ac29627afd783e36e5429c0325b98e60aee2a830e75323c276c72f845a
-
Filesize
1.2MB
MD5c6aabb27450f1a9939a417e86bf53217
SHA1b8ef3bb7575139fd6997379415d7119e452b5fc4
SHA256b91a3743c7399aee454491862e015ef6fc668a25d1aa2816e065a86a03f6be35
SHA512e5fe205cb0f419e0a320488d6fa4a70e5ed58f25b570b41412ebd4f32bbe504ff75acb20bfea22513102630cf653a41e5090051f20af2ed3aadb53ce16a05944
-
Filesize
300KB
MD51bbc3bff13812c25d47cd84bca3da2dc
SHA1d3406bf8d0e9ac246c272fa284a35a3560bdbff5
SHA2560a17e2ca8f223de67c0864fac1d24c7bb2d0c796c46e9ce04e4dff374c577ea1
SHA512181b1e2bd08978b6ee3da2b48e0b113623b85c42ab8cec2a23bd5119aba7105fdeef9b7b00343d37b0c8344494640ce0a51615393def8242334420134f75871f
-
Filesize
301KB
MD5dd1e3f38ae7711d270748012af613950
SHA1b3b90eec3507f523aa63802cc16e5248c8ef0ea8
SHA2562997292293c332e73b11fa28126b6fbefea75a6bb02001eb017de46797d4e4ec
SHA5120eff0cba972b6622fb59683fe4d15d1b6c1ef106166189f60dcd7b4c76b6ceb82fd5c71433dc61394f03eff03575f2be27dec6ac8ab064491710263879b11bca
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\02C3FNDY86GEPGJOMQM1.temp
Filesize7KB
MD5424d0522bc6c4b6d4e074a7c955dff12
SHA11691177f3b1c8fa13e292cd5c2596335b3b31571
SHA2562b260300b5d3440afda58709dea569c8bf87042026a126519b397a6e67f75d15
SHA51241f290720ac50df9923a757ee53f1d57196288251b47369ce8666daa7a5ea5a45b13c2be8a3e15c3d8e5a425327d983aaa4d55419c795877f6e6167f0fdc42e4
-
Filesize
5.6MB
MD5ae2a4249c8389603933df4f806546c96
SHA1a71ad1c875e0282b84451095e01d9c1709129643
SHA256cbe157a18df07d512f3e4939d048f6419163892bf0cc5d5694eaadc7809d2477
SHA5121c40ef124087b8ff3b66ddbcdbef1cd7ffcd112d137dbf0a5ff3b636642cae35b8d4f12eb38506da86ab81984edd6552dc395f072fed37d120daf064ba468cd2
-
Filesize
20KB
MD522bfe210b767a667b0f3ed692a536e4e
SHA188e0ff9c141d8484b5e34eaaa5e4be0b414b8adf
SHA256f1a2499cc238e52d69c63a43d1e61847cf852173fe95c155056cfbd2cb76abc3
SHA512cbea3c690049a73b1a713a2183ff15d13b09982f8dd128546fd3db264af4252ccd390021dee54435f06827450da4bd388bd6ff11b084c0b43d50b181c928fd25