Resubmissions
26-11-2024 05:37
241126-gbb9latlhp 826-11-2024 05:34
241126-f9mbsatlcr 326-11-2024 05:28
241126-f6dkgatkbq 526-11-2024 05:19
241126-fzwsgasqhk 326-11-2024 05:16
241126-fx7ryswnbv 426-11-2024 05:10
241126-ft7b1sspaq 326-11-2024 05:10
241126-ft1jgawlg1 326-11-2024 05:09
241126-ftmbvasngr 326-11-2024 05:06
241126-frdxpasmhk 4Analysis
-
max time kernel
136s -
max time network
135s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-11-2024 05:16
Static task
static1
General
-
Target
sample.js
-
Size
66KB
-
MD5
871ec2c9c1f5fb35e9aeccc269714074
-
SHA1
1e74f1f8acb9dd1248996fda1b68a5a970a1ca83
-
SHA256
5a2775ce2aae72216b9aca4ab5c16fcb097f23c8d0f1698f68585ff2db64a677
-
SHA512
e56a0e5aa5614a22d0f859098410accb0c1d44fab50b9e47396dd7c36c7e1938a636643c4ab1ca99a89aafbb9931fc7f085dacee03ed019eb7eb52d0ad6926d9
-
SSDEEP
1536:U69UFLCCwNieoupehNFZuSuWtWWxSRoH1rjWAkSSpcEqN2RI6ZsnJVr+5va0Ym6C:T9UFLhwjLRoH1rjWAkSSpcEqN2RI6Zsm
Malware Config
Signatures
-
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileCoAuth.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\MuiCache BackgroundTransferHost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1996 msedge.exe 1996 msedge.exe 2748 msedge.exe 2748 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1464 helppane.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe 2748 msedge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4076 MiniSearchHost.exe 1464 helppane.exe 1464 helppane.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1464 wrote to memory of 2748 1464 helppane.exe 100 PID 1464 wrote to memory of 2748 1464 helppane.exe 100 PID 2748 wrote to memory of 3532 2748 msedge.exe 101 PID 2748 wrote to memory of 3532 2748 msedge.exe 101 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1392 2748 msedge.exe 102 PID 2748 wrote to memory of 1996 2748 msedge.exe 103 PID 2748 wrote to memory of 1996 2748 msedge.exe 103 PID 2748 wrote to memory of 3604 2748 msedge.exe 104 PID 2748 wrote to memory of 3604 2748 msedge.exe 104 PID 2748 wrote to memory of 3604 2748 msedge.exe 104 PID 2748 wrote to memory of 3604 2748 msedge.exe 104 PID 2748 wrote to memory of 3604 2748 msedge.exe 104 PID 2748 wrote to memory of 3604 2748 msedge.exe 104 PID 2748 wrote to memory of 3604 2748 msedge.exe 104 PID 2748 wrote to memory of 3604 2748 msedge.exe 104 PID 2748 wrote to memory of 3604 2748 msedge.exe 104 PID 2748 wrote to memory of 3604 2748 msedge.exe 104 PID 2748 wrote to memory of 3604 2748 msedge.exe 104 PID 2748 wrote to memory of 3604 2748 msedge.exe 104 PID 2748 wrote to memory of 3604 2748 msedge.exe 104 PID 2748 wrote to memory of 3604 2748 msedge.exe 104 PID 2748 wrote to memory of 3604 2748 msedge.exe 104 PID 2748 wrote to memory of 3604 2748 msedge.exe 104 PID 2748 wrote to memory of 3604 2748 msedge.exe 104 PID 2748 wrote to memory of 3604 2748 msedge.exe 104
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\sample.js1⤵PID:4596
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4076
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:2668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:3988
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:1996
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:1052
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DevicesFlow -s DevicesFlowUserSvc1⤵PID:4268
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:3036
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,Control_RunDLL C:\Windows\System32\srchadmin.dll ,1⤵PID:2008
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:2676
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,Control_RunDLL C:\Windows\System32\srchadmin.dll ,1⤵PID:3372
-
C:\Windows\helppane.exeC:\Windows\helppane.exe -Embedding1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument microsoft-edge:https://go.microsoft.com/fwlink/p/?linkid=8522462⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc3d043cb8,0x7ffc3d043cc8,0x7ffc3d043cd83⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,2326241063855298803,8655179754604269714,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2012 /prefetch:23⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,2326241063855298803,8655179754604269714,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,2326241063855298803,8655179754604269714,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2588 /prefetch:83⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,2326241063855298803,8655179754604269714,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:13⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,2326241063855298803,8655179754604269714,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:13⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,2326241063855298803,8655179754604269714,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:13⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,2326241063855298803,8655179754604269714,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:13⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,2326241063855298803,8655179754604269714,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:13⤵PID:4916
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1188
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4904
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d91478312beae099b8ed57e547611ba2
SHA14b927559aedbde267a6193e3e480fb18e75c43d7
SHA256df43cd7779d9fc91fd0416155d6771bc81565e98be38689cb17caece256bf043
SHA5124086c4ebe410a37d0124fc8bd00c58775e70ab2b7b5a39b4e49b332ce5b4866c6775707436395467aff9596507c96fb4896f3bf0249c5b9c99a927f31dcc1a96
-
Filesize
152B
MD5d7145ec3fa29a4f2df900d1418974538
SHA11368d579635ba1a53d7af0ed89bf0b001f149f9d
SHA256efc56eb46cf3352bf706c0309d5d740bca6ac06142f9bdc5e8344b81d4d83d59
SHA5125bb663ede88f8b7c96b09c1214aac68eda99bc09525ac383baa96914ff7d553ea1aed09e3c9d16893d791c81ddb164c682dfbb4759ac0bc751221f3e36558a91
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD5d33a76b08ad532f00ea25b223b1e48ef
SHA126de691ae5cb298ce0fd7c45a9c8c87c78f0e76e
SHA2563f7ed645c286e8a1f6284e9e99ee8b3f9a149f2e8d2af62f8999a0c2deaf3a14
SHA51218c97c27bc7a0b967c46cb84b179364215fe375d123d335ce5e208cea1741ec6bd71b5289a58e71ad4be802c945c29982eddb075f2f749679907c5656eec76db
-
Filesize
1KB
MD5f620a42c6bc934f9fd853931ae1a3a7c
SHA19bdb604c02d1129ba534b05550183ff830008a8b
SHA2562044bc90b7f002289b501f2629c7372e347af2c01fbb518687946c478f86487b
SHA5126ceeb66da1edadaedae387db5ca1e8dce08d1017ed15865b61bacd59254e28023853dacfa8163010437531a1bd1fd91f7ba6117bbeaa7230350f8f9baf548e43
-
Filesize
5KB
MD57b59183d6a13d8f5882ea90f03465a0c
SHA12db04ab5a38bb8cb4de5b557f5ca1d8a60835e29
SHA256e8bf71ee38bfdac195dd8c7bfa98ce6a818974928524c7e1fbbacb4b8916630f
SHA512e318fa7ad4d4dc6c6b68540fc5d5cd055cbb34566c58109d69946c5a63da5d0f4be76211b9d5ec1235734a5e2e98b50624a33fdf01f59a23b1a57077eebd506c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f42737a5-5a4e-4944-ade9-a96feafa51c6.tmp
Filesize6KB
MD56045b12e477cfec95f6e725b8ae0516d
SHA1d5d595b1c0f5054153a9bce86f76ef94bd0acc8f
SHA256cff535131348be07341f20580a2c4fff3b3dee300f77508833a19204d1f262b4
SHA5128480364f3d85bf211d450a195bd7309ff1c497a0e92217d5d0b273fa7bd5c8e51cf5391d736d3379a1094df353a7fd7421e1a0bf76125ec994a62b5b17917f7e
-
Filesize
10KB
MD596a4afe2a2bc44d720c897807d6413d2
SHA1636c6f5f3fff1075471ec7ce0763a31c198346dd
SHA256411bf3606deccbda47de4e4e0ff12fe781924006292b6379f8bf2ce204eaf66f
SHA5121da3f0ea4c93a304e171406a8c7abe03efd22fc9e465b3dff96a8868f674ccffce3895e5f9d5ee4af8411333d15c611348d5ff7ad966e3675c07ae288e524ab6
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\d2295e64-d219-45d5-b82d-24be6ab131ba.down_data
Filesize555KB
MD55683c0028832cae4ef93ca39c8ac5029
SHA1248755e4e1db552e0b6f8651b04ca6d1b31a86fb
SHA256855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e
SHA512aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3