Overview
overview
10Static
static
4HowToBeatP...ci.pdf
windows7-x64
3HowToBeatP...ci.pdf
windows10-2004-x64
3NEW PAYPAL...14.pdf
windows7-x64
3NEW PAYPAL...14.pdf
windows10-2004-x64
3PolishPaypal.pdf
windows7-x64
3PolishPaypal.pdf
windows10-2004-x64
3Profiting ...i.html
windows7-x64
3Profiting ...i.html
windows10-2004-x64
3ScrewPaypal.pdf
windows7-x64
3ScrewPaypal.pdf
windows10-2004-x64
3StealthPaypal.pdf
windows7-x64
3StealthPaypal.pdf
windows10-2004-x64
3The Ultima...de.pdf
windows7-x64
3The Ultima...de.pdf
windows10-2004-x64
3Unlimited ...ut.pdf
windows7-x64
3Unlimited ...ut.pdf
windows10-2004-x64
3Yasuo.Payp....5.lnk
windows7-x64
10Yasuo.Payp....5.lnk
windows10-2004-x64
10files/Yasu....5.exe
windows7-x64
10files/Yasu....5.exe
windows10-2004-x64
10paypal stealth.pdf
windows7-x64
3paypal stealth.pdf
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 23:14
Behavioral task
behavioral1
Sample
HowToBeatPayPal-preci.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
HowToBeatPayPal-preci.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
NEW PAYPAL CASHOUT 2014.pdf
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
NEW PAYPAL CASHOUT 2014.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
PolishPaypal.pdf
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
PolishPaypal.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Profiting from Paypal - TCF Wiki.html
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
Profiting from Paypal - TCF Wiki.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
ScrewPaypal.pdf
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
ScrewPaypal.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
StealthPaypal.pdf
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
StealthPaypal.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
The Ultimate Privacy Guide.pdf
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
The Ultimate Privacy Guide.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Unlimited Stealth PayPal Acts and how to Cash them out.pdf
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Unlimited Stealth PayPal Acts and how to Cash them out.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Yasuo.Paypal.v4.5.5.5.lnk
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Yasuo.Paypal.v4.5.5.5.lnk
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
files/Yasuo.Paypal.v4.5.5.5.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
files/Yasuo.Paypal.v4.5.5.5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
paypal stealth.pdf
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
paypal stealth.pdf
Resource
win10v2004-20241007-en
General
-
Target
Profiting from Paypal - TCF Wiki.html
-
Size
32KB
-
MD5
f69df598aa45d488ec12cc5438030ab6
-
SHA1
5ed2d3740dd741b5a1be1d7dd0d1c43f64d9537e
-
SHA256
fe8e7883656dcdf0ff4a05c3905397aeeecd0c75cc4b5d06b80e1536e11bc989
-
SHA512
97f0d6dc1d0a51576ddbe80424898e2128d20021aea0c79265747727c645a74871178dae01cf8960baee4cb8c2fdaf3c2b18efc43d5dd85b66103420813dc325
-
SSDEEP
384:aMPfdUrfTVBFPzDsjvr9ZMFgTvGoDYCvwe4yW165e/hVOl1i3mVCDLNZpc6TU1zx:aMPfEh7LWxZoyC6OgivZpcTaCW4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3764 msedge.exe 3764 msedge.exe 1848 msedge.exe 1848 msedge.exe 8 identity_helper.exe 8 identity_helper.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2892 1848 msedge.exe 82 PID 1848 wrote to memory of 2892 1848 msedge.exe 82 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 4036 1848 msedge.exe 83 PID 1848 wrote to memory of 3764 1848 msedge.exe 84 PID 1848 wrote to memory of 3764 1848 msedge.exe 84 PID 1848 wrote to memory of 1600 1848 msedge.exe 85 PID 1848 wrote to memory of 1600 1848 msedge.exe 85 PID 1848 wrote to memory of 1600 1848 msedge.exe 85 PID 1848 wrote to memory of 1600 1848 msedge.exe 85 PID 1848 wrote to memory of 1600 1848 msedge.exe 85 PID 1848 wrote to memory of 1600 1848 msedge.exe 85 PID 1848 wrote to memory of 1600 1848 msedge.exe 85 PID 1848 wrote to memory of 1600 1848 msedge.exe 85 PID 1848 wrote to memory of 1600 1848 msedge.exe 85 PID 1848 wrote to memory of 1600 1848 msedge.exe 85 PID 1848 wrote to memory of 1600 1848 msedge.exe 85 PID 1848 wrote to memory of 1600 1848 msedge.exe 85 PID 1848 wrote to memory of 1600 1848 msedge.exe 85 PID 1848 wrote to memory of 1600 1848 msedge.exe 85 PID 1848 wrote to memory of 1600 1848 msedge.exe 85 PID 1848 wrote to memory of 1600 1848 msedge.exe 85 PID 1848 wrote to memory of 1600 1848 msedge.exe 85 PID 1848 wrote to memory of 1600 1848 msedge.exe 85 PID 1848 wrote to memory of 1600 1848 msedge.exe 85 PID 1848 wrote to memory of 1600 1848 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\Profiting from Paypal - TCF Wiki.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff87d4646f8,0x7ff87d464708,0x7ff87d4647182⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,17641078568726808438,2923795054052153123,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,17641078568726808438,2923795054052153123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,17641078568726808438,2923795054052153123,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17641078568726808438,2923795054052153123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17641078568726808438,2923795054052153123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,17641078568726808438,2923795054052153123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 /prefetch:82⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,17641078568726808438,2923795054052153123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17641078568726808438,2923795054052153123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17641078568726808438,2923795054052153123,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17641078568726808438,2923795054052153123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17641078568726808438,2923795054052153123,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3980 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,17641078568726808438,2923795054052153123,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3780 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4216
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
5KB
MD545634c70626b16ecd272c75027a57245
SHA1f0d6245b950a3846b2e5edc5c9c829b5bbc3a7d1
SHA256524ebec0e37d771f3374831a4d7bc568fa7db2c1afaabb0d6835c90ece3cc5fc
SHA512116527dd88da8470431e9072b1bba13b4d3f1d4255c36191e748c40d31a5483dbad5f197f3a5ad3d7461550b842e352424f84d3ee53972b56b0bf01c76aacecc
-
Filesize
6KB
MD50eb443ae44b0aafa5e9793f14cc19557
SHA16c0642d7d367bec5719c0562e33c80a5e17b64bf
SHA2568514d50de2ba1cd6407e8e6436a5a5cf4f90d64807000429fbf4817ea53d2b8b
SHA5128a8709e36dd0c812a46f2c5973e9c081d9ad59d6d62b341e6ed8a60ecf0a8bda66a5b4b1a50c617a372c13c27f565ecf4864f53aace5a2b13e0401ec433046b9
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5545b78ab6016c38e8c5b25961d6c846d
SHA12bccce736c268065458714fba49a3e4e6bcbdce6
SHA256b55aa8e4193e19d8aa6d9ade5cd1537ab8f90bfbf5459cfae1370c05aad6b456
SHA5124f5a1999ec5e779bbe545be970254fb056200ffa933bd06ae2c3c0b43fa128cbb949d73bc687b0c733d91fc885f0513df5bb64315bca864d21b2e16e5fbe01ac