Analysis
-
max time kernel
15s -
max time network
25s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 06:23
Static task
static1
Behavioral task
behavioral1
Sample
adobe-after-effects-2023.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
adobe-after-effects-2023.html
Resource
win10v2004-20240226-en
General
-
Target
adobe-after-effects-2023.html
-
Size
96KB
-
MD5
1d02cb39b13a7714a67ab65bda9657d8
-
SHA1
c207c7b11b72a9b8c677d55c710691af7ce203ad
-
SHA256
d4af6dd60126099f172d7c5fed2a67e8f28f6a9a1f4ecbd7630d905089f62bb7
-
SHA512
43d14da8c4aa06024a8c14be34d8333370ccb370d93db3664269352f2a343713a5499dbf16111e54f681631ea66baf280c4403dde63ace305808430ec6474885
-
SSDEEP
3072:TQHMxDqItjQTAOKGtvPCKhBqy1GVKsH1msxE/:T6o+IdkAOKGtv3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "18" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "18" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F0B224D1-F702-11EE-989B-729E5AF85804} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.google.com\ = "18" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE 2812 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2812 2872 iexplore.exe 28 PID 2872 wrote to memory of 2812 2872 iexplore.exe 28 PID 2872 wrote to memory of 2812 2872 iexplore.exe 28 PID 2872 wrote to memory of 2812 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\adobe-after-effects-2023.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
Filesize
299B
MD55ae8478af8dd6eec7ad4edf162dd3df1
SHA155670b9fd39da59a9d7d0bb0aecb52324cbacc5a
SHA256fe42ac92eae3b2850370b73c3691ccf394c23ab6133de39f1697a6ebac4bedca
SHA512a5ed33ecec5eecf5437c14eba7c65c84b6f8b08a42df7f18c8123ee37f6743b0cf8116f4359efa82338b244b28938a6e0c8895fcd7f7563bf5777b7d8ee86296
-
Filesize
893B
MD5d4ae187b4574036c2d76b6df8a8c1a30
SHA1b06f409fa14bab33cbaf4a37811b8740b624d9e5
SHA256a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7
SHA5121f44a360e8bb8ada22bc5bfe001f1babb4e72005a46bc2a94c33c4bd149ff256cce6f35d65ca4f7fc2a5b9e15494155449830d2809c8cf218d0b9196ec646b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD5861ec199452405ba9410c2847e077acf
SHA112bad432e839ea855be700caa06c0dd09b614113
SHA256f6135362f65eec84d15f199177ba00481842cdaaa14bb3dea515ef3c32a099c9
SHA51289596ce7c260cdd5229c68f02309377747d7a9c85d868effcc2260abb1db31347ba1c04f9c776344728fa671b906cdc6352e9bde9a5eac0664c81a442ceb9d6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1B1495DD322A24490E2BF2FAABAE1C61
Filesize192B
MD56c43c117bbff7f4ae3336ea46f863c4d
SHA15c1193dc021916a431c2a050e9aabcc2549f08af
SHA2563a49774d8195259049d41df63841224b6762fe9fe823006af1b2392b381553a9
SHA512afb69c04b9fbeb31b5c013559aa497923075e7acc8525f265aaf9eec48415d0f3955f329a6e69418b0db6e87767dacfe1d0b976f0d04036857558e605f1ae0a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1B1495DD322A24490E2BF2FAABAE1C61
Filesize192B
MD522956f3d256c9fe0033eee3fa8f08165
SHA1c0228b963ab0af67950e28de06f404c5316999a9
SHA256a58a54b89fdaeb5c16c97ec2d4c8f628011a9044c81a2eb473aab50afe557db7
SHA512a7bf2f202ff25c41e8f3c5c3fd0af9ddd484d002895f720419933201d1d757d3a524b45709d0bc126a20393dbd5698888efd6bd9d40ad2db098d9283d2d00817
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD56bb19cf2424b00f3286ccbcdb058987c
SHA17cd8a94a6805dafb6404b5f3545c7c7ede3b3eee
SHA256058615acc221240305902570f0ed51d65429284aae444a7eab5c4eb8b27b34c8
SHA512e98cfe14aac94e562a3068c0630862a2dc71c1c5e9f26d1e632bc062598d78c7c5094807f88c616d4724f6854609d78c7a88d0dd604fbee343dc7bef1c0f229a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524097206efd2c0e823f38c51956df062
SHA149d6ecaf2e50065af342dc36d38b3cb87dc67910
SHA256a12bfe95f21f349e126212cc90659b453b4c2a9e9d45dc7260aebbcc59ecdca4
SHA512c89e841104eb3002cb7c632361ed98fbb0b9b934118661d1dec0ac77ede0103f6f76173c2aea6e78f435effe5a67be8aae077fd9190d5e0e30d935a342a27a0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51af09f4ff47ca6d21c4e0367ce0391e0
SHA1774885b21c5b7fd81869979386703a011fe8215d
SHA256da43e74c1c46d69bca29af9df0165523282e5e7ce51c3ec4871d952153e1d694
SHA51216911ef1e0f7f971fde6f26a661ddaa563d565d59917905de860f14275a9f8e5f560dbc4191d84cc4b984a278595f4bb2192e62c28a49c13c6c968e4d565aa2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597a5060ec29d972e691e90767ea2c5b7
SHA1829ebe11ecae4601531d36e543cf4fdd003f9141
SHA256f79f39a4340552cd7719295061380ef399f7eb8ed2cf5abec106a551342fca46
SHA5123035b7fbf3402c99ff05e9f4e4057d3e37556eb6b6ff17fa7a076a4c4ff4719c2163c30b114026ba7694a5208193f69127da20c826240e93b1edc2db92e002d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e84c7fc92effef0c784b1f5bdbe22d9a
SHA1694d729d8690d7d1988fcb65846d0cf607f00ca3
SHA256feeec4eb6e82f8b203b4f4c4df392b94a8f5510e502173430b0a3c687ab13340
SHA512a3f338e50240c70707a2616d7c13d8188c12f39512401bcb5bd5907ec39103c877c825e08eb16837095cfed6e169a2e92f4a22c778598e1c9f826495c2da22bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cd9a9f73d76ff933790d51e2958d940b
SHA109791d9e39aff0794a49ba195a787b457ce25221
SHA2567c986cc2e43908aa61681d400c1a45b515ef1a7fdf92f420c8e19b182521efb0
SHA512f7d621dc8fdef08d6fef6e3d4bfa69e651f6b9dd1bd7c5f5fbc44a50a4e2e25184dfbf850228a5015b84b772591687e1a8291a84c6e794b30cb6e6cdcc7b7f61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56ebdf5fcbcec1784da89a490a89139f0
SHA1f1fc937d3a086f44c8c5cfc03f69c0387f584941
SHA256c97aa9934ce991f4411c75911efcfdb48edc3593ae9d0211d37062bda25b005f
SHA5120809f44242e1cd05f1ec915e735e5b1fadca104d11b31ef0893abd0c6ee72c0d21922c36933e6e6a066ffa4bb53b8fbad13c7a91d9ea158198b62d4802271960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD596fabff12bc801b293a48a259f055b20
SHA12563046a751ac551d6c5cbf3fbcb51f3fb352485
SHA2566fd30a4aec9646dfb8bf76f0486697ffbf056707a0e5dc200487eb3b49674327
SHA512a1cbd0630cb58b36979dac8194bd23ac9d5651f0d64418231d0f7dc46c39a07a915fa0e10b98ca43e0258c6ac939f9d4223529f294de79180b5f15460c1fd8c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fb546b46285450cf60738bd84a964afc
SHA163777ca828135c27f35065ce425e6cf01a2e27e6
SHA25638060c2666e4fabf54225e779a4357ebc230ff822e22b10a5f9867db45ad159c
SHA512f198ec0ddbd6d9284c9cef7e8113f895676dfb161a7373cd5bccfa63e38da189f374698c358d41a712d9f91f48c52d38abe52f67e5bcfe23214bb8c585b531ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD548d808e22100152bff3a6bd020aef5dc
SHA15b5f2f8ac4504d7853a18646d2dbe8a28d276734
SHA256d7e859ab10b518e309b671e810dd62d0f1f9dace2172898b4752540fcce59d4f
SHA512b29f1190e8c57576226d49086219d4832c437c6f07f5a30d6c8f08844e859083e6f73728934b21607bc6ed732a0c6467acb16bca815da7099f13641004cc721e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd577b5221bb478971b976c9c317b8c5
SHA19b881c5c4c7d351d7de730195052756cfa972a92
SHA256b66dd6507efa49397bc4d85aad0638cfce94613980c0e1be1bbbe48a53aa7438
SHA51287094b5b304996e8bbb752e4cda787fd9a3ac5c4634fb33bd385e321dd9d4ab6bff9b9c623263eee43e94d16205e21b4eb4655d1b23cefcbaed3f3efeb573982
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5532e635e01e6cdd659a476b548b2a1b2
SHA198126a248b549fff4e2bbc2d03c05f03f74f4f96
SHA256ce11aa643576e25f404b82bb2570b84163c17e3de8e8c571a17e2f929682ab6a
SHA5122e66deabf9e35372dba2f9f249c121aa03b47e800d4f72c99ffb23edcbebd74f0de3031391d3ce9c8d276a2562d2e3676813ab68cdc5a27da1ca2add3ead0674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d00b00d1edf5b7d6664164afb9df347
SHA194c6d916167b8ff675f55d8352005f9a37c9473c
SHA2561eb54186e6b9df075162b2cd29594a5150de693c8f9fa9e07ac99546c0d62638
SHA512ce296c1a71732bac418eb897dbbe4fe8a921f232313eb5bad7b23f7271adda48fb8ee3cc101b30426fb5482fa93ce17080f6f192c60deed261d656fc077e53aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aedebafa39bb1d714717958548bc1ed3
SHA1df35a736b3d376986a9b1f4a30f0f9e4d4fc110f
SHA2565dc32aa035148e55ed9ed2f504e664c100eaab0b5c505d4765997cc10f0e9c82
SHA512c6b787930109dd7f1f901f2c19d76a21768433e4105f72504b78aa860f6ea8860600ea3eeb0bf2a86c8b994ffef1198ce22b9f0547c41e24c53b62e874e9175e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5300cb349b6f0568fb599601a151c7eda
SHA137fe8871f8a683ca8eb54c85ddf9bcbe67c534af
SHA25612e3d0e97eed90468f7440f3f07cb7650be8d963ff38a33c7056e0235d4cff34
SHA51296fc4d9060931f57d14554cd494eda3b8a3e8f4bff393bf2846d170c38e67998d50349935d2e0e7cbd266b27556515d0f22dea47e3030edee8c4d6e627406580
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514dfe5c90080cd1f734effdeb94a22e5
SHA1efc972c0fe2be4f44132bacefc99f8c7fa32d5cb
SHA256a1b6c2c178c31d0011162220bd95d8a87505867d501cd2a506a0a2c8e22a95db
SHA51239b058597cd03a64437a83c6ff5f368323d2a3db87ec25581aeb9bc9ec5ae81b3421a1e896e933838378093e2c700aa0a57ffa5f6b01e3a096b337863f5c59a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
Filesize252B
MD511341216de9d1fca62d94a6e5e861d7d
SHA1de7d5703c388d8b3b4f02f1ec8842ca1938b3702
SHA2564e6f55e737696c64884cefb9bccb1870558df07d66b6915b52e587082cdf9b6d
SHA512ba1acf388913506492cda72f4cf78d553c738b4e7b9abb35aa2d4f19b1357b5b71dacbc2cafae90eb562ff642527a5b2139a2e54bc9f7199b22b45441b4f870b
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a