Analysis
-
max time kernel
627s -
max time network
611s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 09:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://networthandsalary.com/grace-wethor/
Resource
win10v2004-20240802-en
General
-
Target
http://networthandsalary.com/grace-wethor/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4916 msedge.exe 4916 msedge.exe 448 msedge.exe 448 msedge.exe 5152 identity_helper.exe 5152 identity_helper.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 448 wrote to memory of 1468 448 msedge.exe 84 PID 448 wrote to memory of 1468 448 msedge.exe 84 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 1952 448 msedge.exe 85 PID 448 wrote to memory of 4916 448 msedge.exe 86 PID 448 wrote to memory of 4916 448 msedge.exe 86 PID 448 wrote to memory of 756 448 msedge.exe 87 PID 448 wrote to memory of 756 448 msedge.exe 87 PID 448 wrote to memory of 756 448 msedge.exe 87 PID 448 wrote to memory of 756 448 msedge.exe 87 PID 448 wrote to memory of 756 448 msedge.exe 87 PID 448 wrote to memory of 756 448 msedge.exe 87 PID 448 wrote to memory of 756 448 msedge.exe 87 PID 448 wrote to memory of 756 448 msedge.exe 87 PID 448 wrote to memory of 756 448 msedge.exe 87 PID 448 wrote to memory of 756 448 msedge.exe 87 PID 448 wrote to memory of 756 448 msedge.exe 87 PID 448 wrote to memory of 756 448 msedge.exe 87 PID 448 wrote to memory of 756 448 msedge.exe 87 PID 448 wrote to memory of 756 448 msedge.exe 87 PID 448 wrote to memory of 756 448 msedge.exe 87 PID 448 wrote to memory of 756 448 msedge.exe 87 PID 448 wrote to memory of 756 448 msedge.exe 87 PID 448 wrote to memory of 756 448 msedge.exe 87 PID 448 wrote to memory of 756 448 msedge.exe 87 PID 448 wrote to memory of 756 448 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://networthandsalary.com/grace-wethor/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb50146f8,0x7ffbb5014708,0x7ffbb50147182⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,5445295352166397109,17416837227913557948,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,5445295352166397109,17416837227913557948,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,5445295352166397109,17416837227913557948,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5445295352166397109,17416837227913557948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5445295352166397109,17416837227913557948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5445295352166397109,17416837227913557948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5445295352166397109,17416837227913557948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5445295352166397109,17416837227913557948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2108,5445295352166397109,17416837227913557948,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5668 /prefetch:82⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,5445295352166397109,17416837227913557948,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6292 /prefetch:82⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,5445295352166397109,17416837227913557948,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6292 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5445295352166397109,17416837227913557948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:5496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5445295352166397109,17416837227913557948,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:12⤵PID:5504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5445295352166397109,17416837227913557948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:5728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5445295352166397109,17416837227913557948,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:5736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,5445295352166397109,17416837227913557948,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3580
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4412
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x380 0x1501⤵PID:2848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD581adf0b243652275fb481a59596cfa60
SHA1f5563662cf8ea4e41ca74f3a9912a924b98b6ec3
SHA256b3ac67aa2cd57a6759f35c4446ed86f8191ebe8880d02a2d09fbd1a00949d238
SHA512a7ad23d11a5b8dc2d806ef5af7f8b7d0d72d155a194a5756b130f3a31779cb9596ad87bbef2032dd9e3a4cd1c25fb6988d04e2218ba9c9821ab873c07dd65268
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize672B
MD5256bbd2c71c80dd35be2e302efcd79b5
SHA1068578cbfe42b10dc8cd8d0d4f9fce5e08dcc7af
SHA2564785c3351f18e704eedc84a712bf3654408cf813bd6dfd76e47bb612d4f66449
SHA5126007531f031e2917eed455e510e1651c35ff15e0ab610e3e76a417df51dbc9f49990dd10e12e311eefba30223ab062640f3896545f2f6c094e3760f015689fb1
-
Filesize
2KB
MD50f2b2ef25c66b38447119ed505935e71
SHA15637db1396570c8dca2e1e274fac08fd1e1fd88a
SHA256ac0866bbe2e686a32a730a9d396e3976708a337498284ac357109f0cd0299cb1
SHA51289419c31b72b6d9860d065bfe3f661e1ac1a4ef186876316d220d1cf12d006af2a54528dd14ef87eb658eb77056a841f1b1022bf5355a5cf5868e4d5fa3322d0
-
Filesize
5KB
MD5f82eb493d7cd322ba45c6d172ecf6d05
SHA15198d9a8336cbae9c1586c875f65b0e9f465bcb3
SHA256933e8a43088d85a0c6bdd2dda44a56efe11b9b8285b89d0978305cd3043d4832
SHA512de772dce73c936cac441b4b8c333d411cb6cf2b6d392029bdfcc72983cffadc569dfd48ff01218a4fbd171ed78fcf0adbb2c0cf83927f9e4657df0b3c78538f8
-
Filesize
6KB
MD55b7c996332335af1885eaa595d8d68a6
SHA189025161a2099cef0f71bef5b58ede6063bd68b0
SHA256ffcd739e6650c7457453c2bc8499e303c13391d5025ea695ce9b31d3e89e2655
SHA5129fadeb921b04231f68e7ef193a9635ce672a8781c3d97d265ab446e67a24742168d88a2dcde4caefe792d17a919b24f4538e4846b2853cfc6eed090553acab2f
-
Filesize
7KB
MD552da22e30d70168bf5cbde098e48519e
SHA15318f9eabeee078f2b75f2c11316dcf898a90b0e
SHA256509442682894add9ecb76b3eb48508c32695c3ecb90482c3ba1c3734c8ad154a
SHA512bd49b155b0de4b568bd462563dde007b2356353bd979bb15303f146d2290a787a98247dca70ace14dbd9aeb7701c965fe52681ef2776f8e9b1a8656600bd3dc0
-
Filesize
2KB
MD5e7514c424998f7a5aea89ac58cf9f559
SHA1f771a28ebe338240a504798766f890826786b94f
SHA256edf7adb0b15934ac28f1aee82e7fd904f964fa67eee03cc799c251b04de6156f
SHA512b46198ab4e97afabf8a5c82e008a981d3d4fc0473d92912a12ee464db8c006e27be3a8d3b6fc8960f0c9cac9e9c2a2d4b6a07b7fffa33003ee53270438b6c214
-
Filesize
1KB
MD5f582aadb0f594ee6af0cd423361b8f88
SHA10fc12d5c599b5c010dfe2eee2cab129e47fb5375
SHA256e68cc410f7ab32714e7a050fe0f847482750da7774d9b85e10591cf012c7e6e8
SHA5120d8e515cc8c337e30e55043a89a12be91f5cf5818f8d1284ad09d4f49633e59fc4c6a734aa4f9b5a8c56c485c1a124e2ecba38248ecd4c795a52ac64cff3ffd1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59115b0058fa0875c2800a30ac3e54a2f
SHA1f6719487b4dd8a7bdfec3c90f6f75805f11aaced
SHA256c1a27c2e9191eadb56a5c27b7059c83f828734f13cb5cd988a39c35017dcec54
SHA51216b447adbb622325eb3b46c04dcb7b6698bbec9dbf1ffe0a4df4619680e5b31f562f42e439312168780209a78666b9999672cc54dcf225e12bbb21437acb0d58