Overview
overview
10Static
static
4HowToBeatP...ci.pdf
windows7-x64
3HowToBeatP...ci.pdf
windows10-2004-x64
3NEW PAYPAL...14.pdf
windows7-x64
3NEW PAYPAL...14.pdf
windows10-2004-x64
3PolishPaypal.pdf
windows7-x64
3PolishPaypal.pdf
windows10-2004-x64
3Profiting ...i.html
windows7-x64
3Profiting ...i.html
windows10-2004-x64
3ScrewPaypal.pdf
windows7-x64
3ScrewPaypal.pdf
windows10-2004-x64
3StealthPaypal.pdf
windows7-x64
3StealthPaypal.pdf
windows10-2004-x64
3The Ultima...de.pdf
windows7-x64
3The Ultima...de.pdf
windows10-2004-x64
3Unlimited ...ut.pdf
windows7-x64
3Unlimited ...ut.pdf
windows10-2004-x64
3Yasuo.Payp....5.lnk
windows7-x64
10Yasuo.Payp....5.lnk
windows10-2004-x64
10files/Yasu....5.exe
windows7-x64
10files/Yasu....5.exe
windows10-2004-x64
10paypal stealth.pdf
windows7-x64
3paypal stealth.pdf
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 23:14
Behavioral task
behavioral1
Sample
HowToBeatPayPal-preci.pdf
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
HowToBeatPayPal-preci.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
NEW PAYPAL CASHOUT 2014.pdf
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
NEW PAYPAL CASHOUT 2014.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
PolishPaypal.pdf
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
PolishPaypal.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Profiting from Paypal - TCF Wiki.html
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Profiting from Paypal - TCF Wiki.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
ScrewPaypal.pdf
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
ScrewPaypal.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
StealthPaypal.pdf
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
StealthPaypal.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
The Ultimate Privacy Guide.pdf
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
The Ultimate Privacy Guide.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Unlimited Stealth PayPal Acts and how to Cash them out.pdf
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
Unlimited Stealth PayPal Acts and how to Cash them out.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Yasuo.Paypal.v4.5.5.5.lnk
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Yasuo.Paypal.v4.5.5.5.lnk
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
files/Yasuo.Paypal.v4.5.5.5.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
files/Yasuo.Paypal.v4.5.5.5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
paypal stealth.pdf
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
paypal stealth.pdf
Resource
win10v2004-20241007-en
General
-
Target
Profiting from Paypal - TCF Wiki.html
-
Size
32KB
-
MD5
f69df598aa45d488ec12cc5438030ab6
-
SHA1
5ed2d3740dd741b5a1be1d7dd0d1c43f64d9537e
-
SHA256
fe8e7883656dcdf0ff4a05c3905397aeeecd0c75cc4b5d06b80e1536e11bc989
-
SHA512
97f0d6dc1d0a51576ddbe80424898e2128d20021aea0c79265747727c645a74871178dae01cf8960baee4cb8c2fdaf3c2b18efc43d5dd85b66103420813dc325
-
SSDEEP
384:aMPfdUrfTVBFPzDsjvr9ZMFgTvGoDYCvwe4yW165e/hVOl1i3mVCDLNZpc6TU1zx:aMPfEh7LWxZoyC6OgivZpcTaCW4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3160 msedge.exe 3160 msedge.exe 4908 msedge.exe 4908 msedge.exe 2492 identity_helper.exe 2492 identity_helper.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe 4908 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4908 wrote to memory of 1324 4908 msedge.exe 82 PID 4908 wrote to memory of 1324 4908 msedge.exe 82 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 1508 4908 msedge.exe 83 PID 4908 wrote to memory of 3160 4908 msedge.exe 84 PID 4908 wrote to memory of 3160 4908 msedge.exe 84 PID 4908 wrote to memory of 2560 4908 msedge.exe 85 PID 4908 wrote to memory of 2560 4908 msedge.exe 85 PID 4908 wrote to memory of 2560 4908 msedge.exe 85 PID 4908 wrote to memory of 2560 4908 msedge.exe 85 PID 4908 wrote to memory of 2560 4908 msedge.exe 85 PID 4908 wrote to memory of 2560 4908 msedge.exe 85 PID 4908 wrote to memory of 2560 4908 msedge.exe 85 PID 4908 wrote to memory of 2560 4908 msedge.exe 85 PID 4908 wrote to memory of 2560 4908 msedge.exe 85 PID 4908 wrote to memory of 2560 4908 msedge.exe 85 PID 4908 wrote to memory of 2560 4908 msedge.exe 85 PID 4908 wrote to memory of 2560 4908 msedge.exe 85 PID 4908 wrote to memory of 2560 4908 msedge.exe 85 PID 4908 wrote to memory of 2560 4908 msedge.exe 85 PID 4908 wrote to memory of 2560 4908 msedge.exe 85 PID 4908 wrote to memory of 2560 4908 msedge.exe 85 PID 4908 wrote to memory of 2560 4908 msedge.exe 85 PID 4908 wrote to memory of 2560 4908 msedge.exe 85 PID 4908 wrote to memory of 2560 4908 msedge.exe 85 PID 4908 wrote to memory of 2560 4908 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\Profiting from Paypal - TCF Wiki.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce3c646f8,0x7ffce3c64708,0x7ffce3c647182⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,7178034941680896640,13842098130216643118,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,7178034941680896640,13842098130216643118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,7178034941680896640,13842098130216643118,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7178034941680896640,13842098130216643118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7178034941680896640,13842098130216643118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,7178034941680896640,13842098130216643118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4672 /prefetch:82⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,7178034941680896640,13842098130216643118,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4672 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7178034941680896640,13842098130216643118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7178034941680896640,13842098130216643118,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7178034941680896640,13842098130216643118,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,7178034941680896640,13842098130216643118,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,7178034941680896640,13842098130216643118,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4656 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:772
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3212
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
5KB
MD5981371715d7bb63414a3ac3e3b411cb1
SHA1d6ce56ddd7b83d6ce10d6a42e591385cc2a9bcb8
SHA256de0a029b9ceb7604d0f11401ad92610c1d48bf9d8c41b6cb49135c961899886f
SHA5121200c10e708a12aa7a6fcf7680b8d48cfdcee31378d731f314078b6b66e7517b8b176b77f0ef8f195f0bf6d47f6396e30905efa34cc9ee8074c1cb5e46111529
-
Filesize
6KB
MD56911ea32b00b0e489b2c90990a8c8efc
SHA1f7dfc292d08c0e1a9e02742c9761a2027f45c37a
SHA256284d062dfe56df5bbaa7f3a24807f3e6fa46ab21d325c65b72a70683cefef6d4
SHA51265645e326bacd39764d8fe0616f414fdc32a123d3627003b1fb9dc22d0f295363fe6af44cc864c14e845d89e663e24637d3980eb69bdef1ee4f2daf332ff323b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5f313943c3da4580bc2bbe41cccd99dad
SHA176a930aad4ed0887b09f6cafd07d889cd3a2585f
SHA25627e4cdb71fe69e1c6fa32d6eac6859d81f5fb00e8968365eb57aeb4005cf1afc
SHA512e59de0b2779cf0c2067a960adf96df3228b7c2a1ee50f5f105a027ff883cbda4ff64621bcf1c43c350d05c395fc7fccc7be4acc3adcd304069269921498a752e