Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 22:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://femboy.us
Resource
win10v2004-20240426-en
General
-
Target
http://femboy.us
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4796 msedge.exe 4796 msedge.exe 3000 msedge.exe 3000 msedge.exe 2516 identity_helper.exe 2516 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2352 3000 msedge.exe 84 PID 3000 wrote to memory of 2352 3000 msedge.exe 84 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 1404 3000 msedge.exe 85 PID 3000 wrote to memory of 4796 3000 msedge.exe 86 PID 3000 wrote to memory of 4796 3000 msedge.exe 86 PID 3000 wrote to memory of 3344 3000 msedge.exe 87 PID 3000 wrote to memory of 3344 3000 msedge.exe 87 PID 3000 wrote to memory of 3344 3000 msedge.exe 87 PID 3000 wrote to memory of 3344 3000 msedge.exe 87 PID 3000 wrote to memory of 3344 3000 msedge.exe 87 PID 3000 wrote to memory of 3344 3000 msedge.exe 87 PID 3000 wrote to memory of 3344 3000 msedge.exe 87 PID 3000 wrote to memory of 3344 3000 msedge.exe 87 PID 3000 wrote to memory of 3344 3000 msedge.exe 87 PID 3000 wrote to memory of 3344 3000 msedge.exe 87 PID 3000 wrote to memory of 3344 3000 msedge.exe 87 PID 3000 wrote to memory of 3344 3000 msedge.exe 87 PID 3000 wrote to memory of 3344 3000 msedge.exe 87 PID 3000 wrote to memory of 3344 3000 msedge.exe 87 PID 3000 wrote to memory of 3344 3000 msedge.exe 87 PID 3000 wrote to memory of 3344 3000 msedge.exe 87 PID 3000 wrote to memory of 3344 3000 msedge.exe 87 PID 3000 wrote to memory of 3344 3000 msedge.exe 87 PID 3000 wrote to memory of 3344 3000 msedge.exe 87 PID 3000 wrote to memory of 3344 3000 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://femboy.us1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa270646f8,0x7ffa27064708,0x7ffa270647182⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,8057647798419116730,17536827960640830547,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,8057647798419116730,17536827960640830547,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2580 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,8057647798419116730,17536827960640830547,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8057647798419116730,17536827960640830547,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8057647798419116730,17536827960640830547,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8057647798419116730,17536827960640830547,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8057647798419116730,17536827960640830547,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4584 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,8057647798419116730,17536827960640830547,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 /prefetch:82⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,8057647798419116730,17536827960640830547,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4872 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8057647798419116730,17536827960640830547,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8057647798419116730,17536827960640830547,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3604 /prefetch:12⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8057647798419116730,17536827960640830547,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4308 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8057647798419116730,17536827960640830547,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8057647798419116730,17536827960640830547,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,8057647798419116730,17536827960640830547,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:12⤵PID:3276
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1700
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize330B
MD5441bec366af45b182a8fdeae9d4ca57f
SHA1397c8549be2c7a8f0144eb755193c00938d00ef8
SHA25641cf7c48e110bffb565953570daadabf1273c2df7f1cbbee91613aef4a13cb62
SHA512bdfedb3b4b4e5e9ada7dc8518b8ac1ba064f3a0e6755982053cd2903f49172f559818a5e912d34669693351a671ee4074097ebcf3339ff94744e372f04a8af3b
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize696B
MD5c9efd2748f9033aa3eccadcd1c65aa33
SHA1bb63e4872670d30dd64273e6a338aaeddae4f372
SHA256e83fded58f04420738ad15913f4b2183e809198c52883158b0bc82ab64deb550
SHA512f3742622bd0f91936c13ef971cba2800fc0ca8e99b95c60301408b613530e0f1d7a6f8ad488fe8af446324827ec8aa2020f3863fe3ca08750b0a25807de127c2
-
Filesize
1KB
MD5712baccc6cda68da473d6efbd6387bfd
SHA179969bcb006e83a4562c720a7a949cb960da02cc
SHA256de32a4ac56363c66df110613cda0bcd1ae6b8b66e5dfc37da18af9da2a259d6a
SHA51230930f003132e316d7a3f6e8f6fb8dc0ac2a3936ee4393d87549ba3a113b7ff2066b2bc89fc5e3d081a665181a697c836f44c2c2286be1e2e8caf6c6e090e1d9
-
Filesize
6KB
MD570e96281385df3ed64180c1ee244a711
SHA1168367e31f21df9f5ae54a13cf502b137f6da0ca
SHA2569844bc7396fa6e0a59270d6c53039bdf5835e2b1cf3a51b23ac9e834f135bbcb
SHA512f6beaca321a35783b1012317fdf339414aff757761cbe1f9dcc30c4ae9e155a9f2aa1013d071c1153f56bc4a7b8b7ae8a35e47038d4d59397429c0c5c28fac9b
-
Filesize
5KB
MD57967e6490215abc12956fd96c9d841d5
SHA1f7b57f3a669c7556c7be7d00d4b340b500eed736
SHA25680b604b2ecc5cd5ede88fc722c120608010360db5dcecc1bdc3adf279bc61c68
SHA5120cb4f4b4a5c329e1444651ab0f3e412f060c7b95378858bbe80f3ebb79520ed4ecefc14a7f0a802ac833862c6d6b18f15c6715bd7371f8bf7c086d69a7d5718a
-
Filesize
7KB
MD5418210c6f16686b54337fbb8e5f06703
SHA1e37f18fac8ec34582ab49b86b8fd5122970212a2
SHA256fd69d66d1f8978eada1c3f63325b79689cf9b1e8aa0177bcaa100aaed84a021e
SHA512584ae7948f5baa1f9b0248cd77a1112db086716bc695ca12a8b6eca003383f4663d053ea98372ff76d0751008fe436ab0bb1e1e31d516b397edf80dc0e02fe3a
-
Filesize
6KB
MD5db46de72b3e053821a91ab0cecad5698
SHA17d258922bf0332f45ae58b623823b6b7509cc70c
SHA256a47976669c2ddc870fb5eecb9bf20bce175f4b93c84a048daf355b83c756eb3f
SHA51286475236bb1bb7dfce205dcd7667c6dd9b2d4df03e5f6063bd3168a6c16778aab6ea9bf94bda987357e87c2c8ab653f81f8a800634ecc3bed5864ec73385a076
-
Filesize
1KB
MD55eb88e8e75c80aafa71c9d356e328da1
SHA1ea9b73006ee15739c5ac1620a2048a26a12fba3c
SHA25630f7ad80d5b978c2f2d1648f360997839135dbe5133ad19a4be5821b00fb6c4c
SHA5129dcb68b95066bab9a1d004ae29046dd1abf62b3812709c9b06c81d6d8f685f4ed2b4abbfccf2d513b1bc350e6d4f943a7f341652dcc9fecb39d6afb3b2aab59f
-
Filesize
1KB
MD52103245ec1a468f1ceceeb9f9f89da40
SHA1472db58e20f3b90b895c0a8e75a78d95ede89e08
SHA25691d6240fc8f898999a975c5a0499f59ae3f965e57901efa16ebd225f134eaaf2
SHA5122c2c958cc19fe61d138ba1de581a0f8b78206333c0179b267b179e888d0ab4777108b9e340c7a4cb0754bb773bac5cde02f3f82f03b7cff58f12db8a47fb53fa
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f1efd2b293f0e3fb95d1e9f5e7da5d30
SHA1cf6cb97b936bfc163e055a5d7352735c5b7e9208
SHA25619fb1b463176acd8f0bebea7820cbe5a9b883a9862da2e5e8939c8303a7fe731
SHA51232bb9ebfadb4845b87b3e3b85b55ff27bc79ecb8ad316d7580aa2de2c50d4c505bda821352c90f3479f209565d3c52165ba038ecf95942323c901af769341ad5
-
Filesize
11KB
MD5a54c8ae84e0c41a67ef5c0e4a4bdc7f1
SHA1a2aef0ffa564df9e599974c05b1d4a575bea6129
SHA25604a7df3722b5f917699a8f742f79c21fc8e7232a085c8a963ecbbb16f586002c
SHA512dffb4df4a74acbb0ae1c7425110ee98c01104174c15263cc1a46f6968d64bd0260a8c38028fef929cf1e96ce5174292810b1d5bc318505094da897e1c19fa8e3