Overview
overview
7Static
static
78554134af5...dN.exe
windows7-x64
78554134af5...dN.exe
windows10-2004-x64
7$PLUGINSDI...nt.dll
windows7-x64
3$PLUGINSDI...nt.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...te.dll
windows7-x64
3$PLUGINSDI...te.dll
windows10-2004-x64
3$PLUGINSDI...de.dll
windows7-x64
3$PLUGINSDI...de.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...on.dll
windows7-x64
5$PLUGINSDI...on.dll
windows10-2004-x64
5enumerate_gt.dll
windows7-x64
6enumerate_gt.dll
windows10-2004-x64
6enumerate_gtu.exe
windows7-x64
3enumerate_gtu.exe
windows10-2004-x64
3enumst.exe
windows7-x64
3enumst.exe
windows10-2004-x64
3uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7$PLUGINSDI...nt.dll
windows7-x64
3$PLUGINSDI...nt.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
08-11-2024 13:00
Behavioral task
behavioral1
Sample
8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/DLLWebCount.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/DLLWebCount.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/IEKill.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/IEKill.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/SelfDelete.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/SelfDelete.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/UnProtectMode.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/UnProtectMode.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/version.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/version.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
enumerate_gt.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
enumerate_gt.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
enumerate_gtu.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
enumerate_gtu.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
enumst.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
enumst.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
uninstall.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/DLLWebCount.dll
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/DLLWebCount.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/IEKill.dll
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/IEKill.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20241007-en
General
-
Target
8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe
-
Size
776KB
-
MD5
8266de60dee21cf8fdd9995c66da4d00
-
SHA1
bdd1c5c6b8e508dffaf0ee6ff43f7a33c79edea8
-
SHA256
8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6d
-
SHA512
53d91cd9ec7da2aed1c39a39fcb47d4e3750c2e0c0a427d70a6f6d4e6fb4091bae21423a0a86a8c827d116b6180f2f37e9c46fe314660118be760986a3fe8935
-
SSDEEP
12288:C5Tn5QBJTU+o8PQe2J4qPtzbAW/rZZyo292fI8hHP0HFd7GOmDks:ClyDTUaQf4qzbNDyo294rHPy7GO9s
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0006000000016d54-51.dat acprotect -
Deletes itself 1 IoCs
pid Process 1856 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2740 enumerate_gtu.exe 2328 enumst.exe -
Loads dropped DLL 25 IoCs
pid Process 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2740 enumerate_gtu.exe 2740 enumerate_gtu.exe 2740 enumerate_gtu.exe 2328 enumst.exe 2328 enumst.exe 2328 enumst.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Enumerate_gt = "\"C:\\Program Files (x86)\\enumerate\\gt\\enumerate_gtu.exe\" subcmd" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{EB8E1EEB-EBFD-4E80-8B01-555558E0CC20} 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{EB8E1EEB-EBFD-4E80-8B01-555558E0CC20}\ = "Enumerate Top Search - GT" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{EB8E1EEB-EBFD-4E80-8B01-555558E0CC20}\NoExplorer = "1" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe -
resource yara_rule behavioral1/files/0x0006000000016d54-51.dat upx -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\enumerate\gt\enumerate_gt.dll 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe File created C:\Program Files (x86)\enumerate\gt\enumerate_gtu.exe 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe File created C:\Program Files (x86)\enumerate\gt\enumst.exe 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe File created C:\Program Files (x86)\enumerate\gt\uninstall.exe 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2356 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language enumerate_gtu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language enumst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{75AE2228-E06B-4955-8C3F-BF0D5636DC50}\AppPath = "C:\\Program Files (x86)\\enumerate\\gt\\" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{75AE2228-E06B-4955-8C3F-BF0D5636DC50}\Policy = "3" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{75AE2228-E06B-4955-8C3F-BF0D5636DC50} 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{75AE2228-E06B-4955-8C3F-BF0D5636DC50}\AppName = "enumerate_gtu.exe" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe -
Modifies registry class 51 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1E46ACB7-67F5-42BB-AECB-67203D5BAC69}\TypeLib\ = "{51C15B02-C027-49E8-B37C-F6477F6E142C}" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\enumerate_gt_fileone.DLL\AppID = "{BD40DBED-D944-4F69-80AE-97D12B265831}" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{51C15B02-C027-49E8-B37C-F6477F6E142C}\1.0 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{51C15B02-C027-49E8-B37C-F6477F6E142C}\1.0\FLAGS\ = "0" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EB8E1EEB-EBFD-4E80-8B01-555558E0CC20}\VersionIndependentProgID 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{51C15B02-C027-49E8-B37C-F6477F6E142C}\1.0\0\win32 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E46ACB7-67F5-42BB-AECB-67203D5BAC69}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\enumerate_gt_fileone.DLL 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\enumerate_gt_fileone.enumerate_gt_fil.1\ = "enumerate_gt_fileoneSO Class" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\enumerate_gt_fileone.enumerate_gt_fil.1\CLSID 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1E46ACB7-67F5-42BB-AECB-67203D5BAC69}\ = "Ienumerate_gt_fileoneSO" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E46ACB7-67F5-42BB-AECB-67203D5BAC69}\ProxyStubClsid32 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E46ACB7-67F5-42BB-AECB-67203D5BAC69}\TypeLib\Version = "1.0" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\enumerate_gt_fileone.enumerate_gt_fileo 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EB8E1EEB-EBFD-4E80-8B01-555558E0CC20}\ProgID 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{51C15B02-C027-49E8-B37C-F6477F6E142C}\1.0\FLAGS 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\enumerate_gt_fileone.enumerate_gt_fileo\CurVer 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{BD40DBED-D944-4F69-80AE-97D12B265831}\ = "enumerate_gt_fileone" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\enumerate_gt_fileone.enumerate_gt_fileo\ = "enumerate_gt_fileoneSO Class" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\enumerate_gt_fileone.enumerate_gt_fileo\CLSID\ = "{EB8E1EEB-EBFD-4E80-8B01-555558E0CC20}" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EB8E1EEB-EBFD-4E80-8B01-555558E0CC20}\VersionIndependentProgID\ = "enumerate_gt_fileone.enumerate_gt_fileo" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EB8E1EEB-EBFD-4E80-8B01-555558E0CC20}\InprocServer32\ThreadingModel = "Apartment" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EB8E1EEB-EBFD-4E80-8B01-555558E0CC20}\AppID = "{BD40DBED-D944-4F69-80AE-97D12B265831}" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{51C15B02-C027-49E8-B37C-F6477F6E142C}\1.0\0\win32\ = "C:\\Program Files (x86)\\enumerate\\gt\\enumerate_gt.dll" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E46ACB7-67F5-42BB-AECB-67203D5BAC69}\TypeLib\ = "{51C15B02-C027-49E8-B37C-F6477F6E142C}" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{BD40DBED-D944-4F69-80AE-97D12B265831} 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\enumerate_gt_fileone.enumerate_gt_fileo\CurVer\ = "enumerate_gt_fileone.enumerate_gt_fil.1" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EB8E1EEB-EBFD-4E80-8B01-555558E0CC20}\ProgID\ = "enumerate_gt_fileone.enumerate_gt_fil.1" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EB8E1EEB-EBFD-4E80-8B01-555558E0CC20}\Programmable 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EB8E1EEB-EBFD-4E80-8B01-555558E0CC20}\InprocServer32 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1E46ACB7-67F5-42BB-AECB-67203D5BAC69}\ProxyStubClsid32 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1E46ACB7-67F5-42BB-AECB-67203D5BAC69}\TypeLib\Version = "1.0" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\enumerate_gt_fileone.enumerate_gt_fileo\CLSID 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EB8E1EEB-EBFD-4E80-8B01-555558E0CC20} 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EB8E1EEB-EBFD-4E80-8B01-555558E0CC20}\ = "Enumerate Top Search - GT" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{51C15B02-C027-49E8-B37C-F6477F6E142C}\1.0\HELPDIR 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{51C15B02-C027-49E8-B37C-F6477F6E142C}\1.0\HELPDIR\ 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1E46ACB7-67F5-42BB-AECB-67203D5BAC69}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1E46ACB7-67F5-42BB-AECB-67203D5BAC69}\TypeLib 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E46ACB7-67F5-42BB-AECB-67203D5BAC69} 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EB8E1EEB-EBFD-4E80-8B01-555558E0CC20}\TypeLib 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EB8E1EEB-EBFD-4E80-8B01-555558E0CC20}\TypeLib\ = "{51C15B02-C027-49E8-B37C-F6477F6E142C}" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{51C15B02-C027-49E8-B37C-F6477F6E142C}\1.0\0 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E46ACB7-67F5-42BB-AECB-67203D5BAC69}\ = "Ienumerate_gt_fileoneSO" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{51C15B02-C027-49E8-B37C-F6477F6E142C} 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{51C15B02-C027-49E8-B37C-F6477F6E142C}\1.0\ = "enumerate_gt_fileone 1.0 Çü½Ä ¶óÀ̺귯¸®" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1E46ACB7-67F5-42BB-AECB-67203D5BAC69} 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E46ACB7-67F5-42BB-AECB-67203D5BAC69}\TypeLib 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\enumerate_gt_fileone.enumerate_gt_fil.1 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\enumerate_gt_fileone.enumerate_gt_fil.1\CLSID\ = "{EB8E1EEB-EBFD-4E80-8B01-555558E0CC20}" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EB8E1EEB-EBFD-4E80-8B01-555558E0CC20}\InprocServer32\ = "C:\\Program Files (x86)\\enumerate\\gt\\enumerate_gt.dll" 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2692 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 2328 enumst.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeRestorePrivilege 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Token: SeBackupPrivilege 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe Token: SeRestorePrivilege 2740 enumerate_gtu.exe Token: SeBackupPrivilege 2740 enumerate_gtu.exe Token: SeRestorePrivilege 2328 enumst.exe Token: SeBackupPrivilege 2328 enumst.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2740 enumerate_gtu.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2328 enumst.exe 2740 enumerate_gtu.exe 2328 enumst.exe 2740 enumerate_gtu.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2732 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 31 PID 2616 wrote to memory of 2732 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 31 PID 2616 wrote to memory of 2732 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 31 PID 2616 wrote to memory of 2732 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 31 PID 2616 wrote to memory of 2732 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 31 PID 2616 wrote to memory of 2732 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 31 PID 2616 wrote to memory of 2732 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 31 PID 2732 wrote to memory of 2692 2732 cmd.exe 33 PID 2732 wrote to memory of 2692 2732 cmd.exe 33 PID 2732 wrote to memory of 2692 2732 cmd.exe 33 PID 2732 wrote to memory of 2692 2732 cmd.exe 33 PID 2732 wrote to memory of 2692 2732 cmd.exe 33 PID 2732 wrote to memory of 2692 2732 cmd.exe 33 PID 2732 wrote to memory of 2692 2732 cmd.exe 33 PID 2616 wrote to memory of 2740 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 34 PID 2616 wrote to memory of 2740 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 34 PID 2616 wrote to memory of 2740 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 34 PID 2616 wrote to memory of 2740 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 34 PID 2616 wrote to memory of 2740 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 34 PID 2616 wrote to memory of 2740 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 34 PID 2616 wrote to memory of 2740 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 34 PID 2616 wrote to memory of 2328 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 35 PID 2616 wrote to memory of 2328 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 35 PID 2616 wrote to memory of 2328 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 35 PID 2616 wrote to memory of 2328 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 35 PID 2616 wrote to memory of 2328 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 35 PID 2616 wrote to memory of 2328 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 35 PID 2616 wrote to memory of 2328 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 35 PID 2616 wrote to memory of 1856 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 37 PID 2616 wrote to memory of 1856 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 37 PID 2616 wrote to memory of 1856 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 37 PID 2616 wrote to memory of 1856 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 37 PID 2616 wrote to memory of 1856 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 37 PID 2616 wrote to memory of 1856 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 37 PID 2616 wrote to memory of 1856 2616 8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe 37 PID 2328 wrote to memory of 2356 2328 enumst.exe 39 PID 2328 wrote to memory of 2356 2328 enumst.exe 39 PID 2328 wrote to memory of 2356 2328 enumst.exe 39 PID 2328 wrote to memory of 2356 2328 enumst.exe 39 PID 2328 wrote to memory of 2356 2328 enumst.exe 39 PID 2328 wrote to memory of 2356 2328 enumst.exe 39 PID 2328 wrote to memory of 2356 2328 enumst.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe"C:\Users\Admin\AppData\Local\Temp\8554134af5bff5ce0ded7b59df4ba8fdd5817bdea0cfc4885b9e512b1c503c6dN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\cmd.execmd /C schtasks /Create /F /TN "enumerategt" /SC ONLOGON /TR "'C:\Program Files (x86)\enumerate\gt\enumerate_gtu.exe' schcmd" /rL HIGHEST2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /F /TN "enumerategt" /SC ONLOGON /TR "'C:\Program Files (x86)\enumerate\gt\enumerate_gtu.exe' schcmd" /rL HIGHEST3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2692
-
-
-
C:\Program Files (x86)\enumerate\gt\enumerate_gtu.exe"C:\Program Files (x86)\enumerate\gt\enumerate_gtu.exe" Updatecmd2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2740
-
-
C:\Program Files (x86)\enumerate\gt\enumst.exe"C:\Program Files (x86)\enumerate\gt\enumst.exe" Updatecmd2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\sc.exesc query npf3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2356
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c \DelUS.bat2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1856
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266B
MD52e472f065fa23d2bce27b06c9750e69b
SHA16b27f0e63189c9033e06a3a79e0b1b31f8a4579e
SHA256822a99939b203fe246f1dead9f43ae2402347de836b84f6558468fb45981811a
SHA512fa2b8f450cef97d5fc2f90576b24d728491cb9b2a808ef0159af5a8333ec0496cecf4f4997030c3e4d3d9a88b89fd35d985e3bbf5e85900233b7d8c6e23613ae
-
Filesize
1.2MB
MD55d9dcfde4bf008764a64951b4b6b8d4d
SHA13880a422e0ee1b62038e01b3147108a3c4fa13f6
SHA2563a4daee62a78f3fd0a6ce92037071ea49680d682ca5c3fb353686bd4f962126f
SHA512902408c56aba96743839aa7bda79cce48b5710fa190454a0edfb5f8b528fdab02151b60223c129d9fbbeba619b88889f3053ed4e7e518e3d5367668af6043dfb
-
Filesize
212KB
MD5f6118553c91b465310c9bb4518df7dc2
SHA18ca6eb680435d6d295e3aa3d448b6e5f98619650
SHA256a12457b93fde731d24eae3361ab9ff9a1b13fdb5d81d08df4af4bcd88823d3c1
SHA5127f3d40aebe63484ba9a8d641967adf8e5fd54d4ec8bf0c8ef3ad0626a8d15ca13960a0842dfc4e38f4100f26a6cb2636ee9f760289c8818a41bb7c430e3aa5e5
-
Filesize
952KB
MD590bcb9a27ee951a4c14aebfc9e1705e5
SHA13813d0878b2df1fe54050ea2280252df5bc15969
SHA256ec70c5810a29a6e4039f47d969896a64cbf926682cfa8b7c5da080918575f0a5
SHA5122676fea3be40fedd3aaa67db585f867ada3ff111eb892652d83dfea0404fb0107e3388b651d09ef4cec3c899699e8009ab44a88b4abd33a273728642177f8bce
-
Filesize
32KB
MD5248536afcb6f59c1797f079a0da15b63
SHA17fa238f871b357c66168728ab1bb38addcfba3f8
SHA2569c5f4eeadc9c2881bc02b45d757b35d3bfd2dc7d917d2e8fde2917fabf48908f
SHA512b82accc8530650ebae8d4f8752002c2d23ab7b29e958e6c14731ad186a0fcdbbab937723a540de62d58f4659580843191fd53cb415e07167d7b55cd174a79652
-
Filesize
28KB
MD5090f0ab18996feae6c0a62d83b2149c6
SHA15292898561ad88630088ae22fb877dfc7146ee77
SHA256914536dd97645de7789666da5dc03d02f4fbe0593214678e6e1982a02a8a1c4d
SHA5122fccda2cb95583fdb184b7edaa7ae088ca484e06d020159bf9776e36b660c6672812b7e821b111fa52d63ad5e2ce70602dc117edc2eba3c46029653c5ef5ffc6
-
Filesize
32KB
MD583142eac84475f4ca889c73f10d9c179
SHA1dbe43c0de8ef881466bd74861b2e5b17598b5ce8
SHA256ae2f1658656e554f37e6eac896475a3862841a18ffc6fad2754e2d3525770729
SHA5121c66eab21f0c9e0b99ecc3844516a6978f52e0c7f489405a427532ecbe78947c37dac5b4c8b722cc8bc1edfb74ba4824519d56099e587e754e5c668701e83bd1
-
Filesize
24KB
MD5ddc0d6806073a5b034104c88288ca762
SHA19663cc10c496f05d6167e19c3920245040e5e431
SHA2562f4767da9dc7e720d910d32d451674cd08b7892ca753ec5c10b11fe85e12f06b
SHA512545ca797a397cfcbd9b5d3bd2da2e3219ba7a294e541831655c5763a7f17480fd0b990d0c2e58ba8c71f81d85472b2da6d079b8211b44c40c8c36d21168ec054
-
Filesize
200KB
MD5d37323d733078a8da425ad71a51d1462
SHA17061f1f388c6fa0159d614ded01251da4e4b7e4b
SHA256e1a0b1168a87ac0d140b3a394efda23148a8907093898e0a2549079009d318e3
SHA512f7e0780aa18785c1402d7233b67fabb61cefa8568e71cd4ca37405eafc7a340053836b16fdebc2ce351b7ddeac28d17a43091904ba443269cac1e7e4f46bd929
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
22KB
MD5fbe588b15eb1bd86defade69f796b56f
SHA12f63cf44039addddb22c2c0497673b49e6b3ad7a
SHA25631144e8b156fe87317073c48a09abcb033fda8dbdd96986c4abea8c00c00355f
SHA512e1a9e29e4c62e77a2ec2c539344f0b5a8cd67ca3fd8dfefb0b0666a992eb2fabadb0034d439c4adbbdffd9c9439f23ee5757fac0ed669d3c9db48f50c677143d