Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 01:48
Static task
static1
Behavioral task
behavioral1
Sample
440b2544f79479de7b395e7de180cdeb_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
440b2544f79479de7b395e7de180cdeb_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
440b2544f79479de7b395e7de180cdeb_JaffaCakes118.html
-
Size
26KB
-
MD5
440b2544f79479de7b395e7de180cdeb
-
SHA1
123a8ea0a4f199a56cb92c685115a85e5a2851ef
-
SHA256
a3cd7a65cef5b5b206e1a7e387a92d4c4e03b0aea7c5507c97b8f0af118ad0fc
-
SHA512
45c0cffcd4caf36d58c870ecd774520ca521c53e34593fae1f5c59615cb15899b87b2c503e941811624de017bfe61820214ed4e2b87307b1022fadb187113299
-
SSDEEP
192:uqyzjMb5nmV8nQjxn5Q/pnQie0Nn5nQOkEntnrnQTbnBnQ2CJVevo7NtDFo+NzQi:nExQ/MygcY6eC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a096bd006aa6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000d14cf0a3791be54cc3b905b0485613ad2b886982601989bacbafb74a1b3b7a3f000000000e8000000002000020000000f9fd2f937a6b5aec4ed5a365246e04ef83040fdd8e508537c8449449c29a9eee20000000d744f13b33f462f477c5bcb4dd37e00225981a313222e989dac22dfd27798887400000006ca83d70a8a12224f7ecb0949f763496b7831c532ef7e979d73fbd6fd2f7ff3759bdd2eb526ef16c3d35b4fd729f327e8ed85aa9c8afc2290e9aaabccc3e7141 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421899553" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2C1B5531-125D-11EF-8C71-D684AC6A5058} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2268 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2268 iexplore.exe 2268 iexplore.exe 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE 2740 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2740 2268 iexplore.exe 28 PID 2268 wrote to memory of 2740 2268 iexplore.exe 28 PID 2268 wrote to memory of 2740 2268 iexplore.exe 28 PID 2268 wrote to memory of 2740 2268 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\440b2544f79479de7b395e7de180cdeb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2268 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54af7d8e9b8213d27280e67781288976a
SHA13fa89a55c55f18a0b951ed4b6cf757a87fe042f0
SHA256c0c4fe62fe5a362892c4972a0eeb3efacd0316dc9a930507493fbd1b693ac653
SHA512dcb97d6fcb0aa4fe924573efed8e86a26c3f8782abf9ecaed72e91f38acbac4d856d7936d9e9531551bd02f24f4b7bbd84471aa6e0f77eaf29d1a1270ff8c0ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e41e422082173ff144fa13e0481c91ad
SHA109f546789f3ddedaa1c305822203aa5f47078d31
SHA256eb0f5099e9fccfacf0e56403b55ac6a30688a435027bf24a7bfb3cc3f3ccab45
SHA512a0b2fa1db98e22bd8acce6a68a56989e822a3d2e8328f96f6994e52175ef87d38b36ba157ffd011ebd650d9049ca554bd9a8855db596b4d6d623ebf429dd48bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50901f18f369f5112d73d7c3285d61ee2
SHA15488565889b50e4db4da642b47f3c872ffffdecc
SHA256d9f87bac3e1d204a72502c311c09315153c4ff8243b97ce8ee9c2e0f76e32f07
SHA5125c02c59f369e29007723c26348cfca42ee3ee2dd6b31d063c4787776ba84748292b9728eeab630d5b88861887c52628e9db522f291ac301aec9be5d243571d5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed33e1308a5297cce1ffb1c9efc4e9ec
SHA17751b3d5b4a23095a3cdbcd85ff3ebd6611b1601
SHA256c8ff90a24577275cb98325e5c80341efddf474979c8b458d367d806af2712f3e
SHA51245b059f4a655957901e8c7c0a6b35f8dbfb1541dc44575966b5106e931d649814bc4c02bba770a8a3d3a2fa04a8f353d4f058d0543fcde8b651afcb984c49fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58e3da4867cfa40a824b86cbc97f68748
SHA1e9d9d1ec7f3b949553b67ba44770bb3c428613c7
SHA25627d0704765eb1424a25000c9186ed8ff80bab0ad3152369ee2ac2c485e2af3bc
SHA512afa5746240ccdfc6c0bada57c3219676b5060646d98e67c32c4b8dd983cbefe39f3966dd1e6725b9a1009a55970fa8e6ca1ef67b0553f5ba9649be3358c34992
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b05599900b98c83a351e6c2db6a1c89b
SHA1c7e05e441ee2b82c6ad79324d6cd0c2d167c6f94
SHA25681945bf4389bb285368e2e7f1005af14c67be236e49f6144ab5f7bb36ee64f78
SHA51237da0c6cefde02c8f67d732bb5293949a7d375c25df4ab9c0081266f3f04aea24204a21dd7ff514dd0d9df5e7e700f2d3a6a6d4400e1bd77a3617ad6a9522d09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d4e4b7a51cffe114fd90979a6d7cd10
SHA183a56455e697dc0407ee3d8dd70c8d74006e4545
SHA256415374b7bf955acaeb4abbe9e462b1e7f012b6aa4630b15bf4de29c562a743b4
SHA51284f92270698c5ac9a94da7001db13c8928d06cad504d507ce3488571c4611890bb16e5c29b3141695436663cfe7f0470a137059d4226f3b85de292ae4c90ba1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5363a10b741a1be1a53d9175b612c1171
SHA190f40f36f7ac9e15074a515f9db9a20c45cf1a60
SHA256f61938ee47601c1b3b3bf83df73fefe30a7a150dfeb0d1d339486ac35c2d5c60
SHA5126f764fd1931b5bb1bfa33c6b7ab9c5e0797444d100fa7d631a333d33896595fc3942042c2fb35f92ee861e38204731ec61bfadb6676ec79cd126928e98c0f721
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510f31d25bdd7ad15eb305dd6d6f0aeff
SHA1450b2a5538594c1eb5ae8ee612fe4ea26196c549
SHA256c4d403caf589d4fc4593e26354c0b4f693ca464ec7f4713c2e7d4da751031df6
SHA5129d1eab8d6c0caa469cc8850b0cc8c714cc6be3ad687c8b6310b9780f6955ad49d16a14543977182a97f551e2e25474d21c0e7c8311cb027a47688fd837b2f543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a83697986789d5bd41038e0ef855212f
SHA1e704d7f92758d4e255059526e641e5c47668794c
SHA2569923cb34f53e2386a6286d49640be4ebd481c68b526adea4dd9b7e8f2310e4a7
SHA512081b54a3ecbadbe676e4c634fd2000deaa427becf4408ac6aa6e6588121ec55ad5cd21f4e49b97b92e79a6ae36867d0d8256e659cf20fcbe713510df50112493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53578bf286aa7a6c37f9c8fe4fbab1dea
SHA116f90bc1e6b017d52f83813a86b8298a190565c3
SHA256cf4f13f48c71687f5c12de06fb3747a63a1b06adc6e1d61bd4cac8606ae985ef
SHA5129105b623f61cce245aaf117cae061a81c381d56b78dba919376258bb277b66b614d828a1a00331ba1ec07cf7c0775beddf77597a651a7d3d1c668afd0a141b5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD582a39bd2d7138c43e1d6c74118ddbcd5
SHA19c3abc0aeadf6bb545865396ea476eadb27a9423
SHA25621e086909f7c765fc8a5e8bf2a7b94e3d486bebd899a5f50c11d526081f7a495
SHA512c0778347c10fd17ecac032ffbd7e7ec494fc678b4082da4cf96179864a268287a3880a9680642bb4668d27d924b992d099dfeab1d46a8b666c63fedda28217cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d50f4843f809373daf3076c5a8ad009
SHA166c0e42f20bcc0f12e734ac5dee80d57171c040b
SHA256115bff693244f65191c619cb7d499370a166676e1b88eeb9a52eb1a6643e5e00
SHA512d7c14c7f8d6be6205fb704b5917408acfa4865c202b8446de96fc41bfd160cb8cbaf8bf6d4d237836b62ba46ed66f21c10c98d1e70c83590b477920ef9c07889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515d754d9e057800015ada0c6ff7b0239
SHA1bb09dd6259bcbd310074ca3d877bfb02e2f01723
SHA256eeffc49d5247446a0ef993644a30f9680c53245469f29c6afb83c3a5883fd43b
SHA512debb4419010485b2a6b4a37b0c1be15460b9e1f2b983af2e3d1f92dfc26ca06dfe18112bd465ad1f51e6a68beccf825c844330189ec68a257211c5c6dfea8624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ffd254531c7cb55875b4ffacef048100
SHA17c831e0772b0eb53eabb60fba7cbf747abfce0ab
SHA25696ce94008c49a4709219702282d04d6ee85a287c9ea88aa9323c8882a8c1a208
SHA512328cc1c6067b45fe423409403d30ed762ca11d1f2749cbb6ebc9516d2b047abca34b5576491e8906d6d8abf207800d1299111f5c3e456b9913e5aac2e301b399
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2c500d82b4b711ff8a082842952b593
SHA1e1ab9bf9f106c9b281d7f105201cd0f76ea7d183
SHA2562b7fa530b44c88f7a9f9e09e4253b44fe982c45c3a6767f2836c4a44b4d75d94
SHA512978a9e946ff7ca173cec032dc5343d8f2d8a0abe636d5f4e9c849d75586c88d973d76a3a75eaf8b02cc17ece9b6fff32500a7a7a971c5eb7b108c759449f7fba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f901c78a1cde466fe20a88fd28f704d3
SHA156f0030673b53cbe03717aa736c5e7ff5d87c0c9
SHA256838a4a030547cc4b3980ca5684de9aa1ead8a6b9e0d6b260556cb9bd32409e1c
SHA512cc8dfd74238ffeba4a712924a1315a7d0713b891906c0aac167a34e7e1967847a5523be8d890bf868bf39f7123e2754eb718f3b3759901c4fa86433fb318b092
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad5487923e48aa69cac30f0067b9d235
SHA167c40d711cfc239ae89e4ed993dd459168d5e4d1
SHA256ceb8ac1467163020806c0bdae620a606a36dde1134fca09df778e862fc112ab1
SHA51271359248da0d574d129fa71d90008329a0002ce87c2ceed87886097c871bcc2c7412b8d9bd438a307c8cd41f6df866593160ef58e1edc63a9dd085579bfaada2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58a873270a0c1cc72daf84d52f93e7edd
SHA1a6a016768c857e0a876a915d5e6c878da33c90fc
SHA256a9e5eb5c81d69b992e609de01a8040a94b95757588ae6e4fed8de35b077cbdc9
SHA512ab21c36a31d9fe3cb652cf42b723a96a4ecaa88edb0fa9c9c7ef5ce1c81f84adfe0cb2327a02dca0f29a094537233612d755a2a341ced418bb512684a1b4cd3d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a