Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 15:05
Static task
static1
Behavioral task
behavioral1
Sample
5fba84089c2ad27592fa48e001272977_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5fba84089c2ad27592fa48e001272977_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
5fba84089c2ad27592fa48e001272977_JaffaCakes118.html
-
Size
35KB
-
MD5
5fba84089c2ad27592fa48e001272977
-
SHA1
1232624f7b3ade4897887f4ede02bf00da4b2ead
-
SHA256
2d64e0bc6fbff8dc357ac129f1af7a5c990a53243492135b35e248333a73529b
-
SHA512
f483c226b43ab453a8c871d18908dc4ce43c86f53d1c1bf69d5f9c793bbb6c503f8066e6ffb19a30e939e25dede059bd7b21a660b42276f5cad2c4e47419e992
-
SSDEEP
768:ly2802C4+JNoR80psm8yS+04uvXKN/WIu1gc5E0O:ly280n4YNg80psm8yS+0tvXKN/WIu1gN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10109c2cc7aada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{55546891-16BA-11EF-9BF1-5630532AF2EE} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000017674bb8e226097065cda4f403855ecf7e252f3f775e87ac2a40defc0b251678000000000e80000000020000200000005bd741b392c3433b5e533f823a6fcb37ee7d03527f73dcb98a080739aa9d5d6720000000b4159502b919c619832c0247dbf6f1bfc17e5f95eef04dd272676093f884235140000000297f88f1c7bb011a71e473d855b030ca5059fdc00e17a273eb980e08d0740f3950aec824db499928d306ea22c8ab45bb1ee436984d56db37b1c1df926f55f355 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422379369" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 764 iexplore.exe 764 iexplore.exe 1260 IEXPLORE.EXE 1260 IEXPLORE.EXE 1260 IEXPLORE.EXE 1260 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 764 wrote to memory of 1260 764 iexplore.exe 29 PID 764 wrote to memory of 1260 764 iexplore.exe 29 PID 764 wrote to memory of 1260 764 iexplore.exe 29 PID 764 wrote to memory of 1260 764 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5fba84089c2ad27592fa48e001272977_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:764 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3fb488c3699e9c5be1bb9363234bdb9
SHA150ceb7cefbc718f1aef099eb38bcf129aa6d6d7a
SHA256292b0dfb565bbf7187e9578e7b9bd3a756d80f21d99292cf98a3655265b9b94f
SHA5120ea9bdb0d1b82fdbe59e8f0c81972ab3e3b59c294eff135311a68acb21aa5fb1737c8a2cb2dad63866a3dc25f66658864d72987de4d50d61f9f0e02d41a17587
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD502f8fb887f57ae2dca359161c89516d5
SHA169761e1836b39a002849d15882a63f2458cf8fad
SHA2568a8d9dd5ffa6c8580b688fbbfdac3656f615371921b1dfaa454495c61ad7deea
SHA5128b94f7b8a9838e8e4d6db73f8c49ade8e2fd1bfa8947690fab5e651e946ec3d6248e27f714689cb7e909ef64504163a55a7e416e4d5a6328975a7c05410dc6d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbcabffcc4519f101ec7ce749947198d
SHA1b599aadc266dc8c130efca5b98649a722fda7918
SHA2561b92d41ec5f25311f9adb1924139af72017501452dff6dced69ea094a61ff53d
SHA5127003b5049d46e81adf896e2d9173ef6c07ec2f58a858dbdbfb7d0bb0b6e7694485e03a424b652e648c833173bb3d4e797e1b5cd2ed28d6729152b46287cf1a94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5adfa60409fc0120acb01ee335ab4b7d8
SHA1423128abcd9238c68f769de7656f65978837cd68
SHA2565f1a2f225b8205a19dde5f277906d6249910f902de60db1731c184c39cc77294
SHA51200e3c770297ef4a8f2f216e280eddcf5482b69f71e6b0b5ad6694e95698491952a258ab97a27bb512e078ca93962017f65526cf90e73bd08d36539ae0ddd802c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1c7a89c7e245482cee7ac2a86947005
SHA158890ad507eab85ccdc37fa1e12373b49b316049
SHA2569670774c11c58a5c1a1a8d4dbb2a38779e4cfcfc56d7291d1244138052614008
SHA512eb34149dea22768047295e3e5ce3743bc1b5bf073d3512f413455f07d7f82c6b93d7b0d73970d56a700c61eca2d955b6f0d0cf1608ce4a1679fa10da5bab420a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecf62e897dacb1354b565aa6e3125a8c
SHA10914e58814ddfa9444dfce62ec7e6c4e81a7f7b7
SHA256ddf3b349d8a36aa620bd6da4914674acd14a423fa36b48ec2f098204e09ecc9b
SHA512058a2253225c805d1a6301a668b2df38a2473812a0b0d226bd2e5a3696607450a59ae74a1cf6366844634a59cc83c684f98e82dc680054ba2fedb57660a3bdf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5edf2bb042aa4baa8f45cf7e39612cc67
SHA1dec171841e97de51d98daae34a438fd186be99ed
SHA2566d468e100c51eb33600ba3f8ac080d34000582e29ba8c26c5a630c196f452a9c
SHA512ee26a530efa819bb657aeab906a8846639ccdeef061d6e51f8cfe70cb4a60967940be7bd9cf68114b714e9ad37b4236b01ec26cf9c0cbf9e6ad0f8d03a18197e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD531004887c7a04f53599719cdf0700569
SHA1be390d8c91bce6b1b4d487fe3651efaeb5be42be
SHA25653e62c886b932b1f5bc43543d9bd6ab038203c5d426a92d13c886f88ab6d5e90
SHA51289f9fbd88e8623a63e64dff253cacbb94075ee4f9a7a8801d3b91802f8a685455dece39eb76e47022a8db87a1ddd207d0c1a14164130f159913c32d7cc7161bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad87b692e641084ca991e040c74bbfca
SHA17cfb85e77dc394f7cfb28eaccc2a6d16ae3dde3e
SHA256fb53013d7b551cc89f0022e8c9368cc8f8e6cc2b25266b87bf79f9899e64133d
SHA512583b7d74504f8db668346a2e2b40a6b1ec68037c947c46a152eb9de72f3a47bd247332fabd4449b042bc5c2a7765ff3dcdb8e260fafebac7d685f7117bcd9c94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543cc644e2d767376306f7bc8d9dc6c1c
SHA1e1f25aac7efa3e47883a12cf00a18f044538f449
SHA256a2ca59107161ec0152bd52df485abef0d138d5e972c0876036817b7eaefec2b7
SHA512f611797bfff61e5439838bcd602aa786c1c3edaeaf6b741220d91411196e727e847edf0f3c96939d9b6739cdf06ba61f2577ca7defeabd6cf813dc11e01e55f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd4b5e69b4259b0a3fe186685e931208
SHA188899509e290adc67819f602bcf99da5a7a8f0a0
SHA25608a795df4b064b7b23a3440f3038588432eb28762b77ea47304dcd9e2d4e7f82
SHA5129fea0fa83cfac40b87f4cf0c927f4d9ae7bfbfd32163062ad6e66310f65e4a4bf6975794e239e26ea5a5ebf0f2c78881eb04eeee52d868a0a1a7c096eaa7be36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD598680d4493fd41a2f0fb963064b6e30c
SHA1b96390d5fa3952ab3967580683ee56864684b27f
SHA25682fb98dfb5b5914697c0b661f387f3805801b6d01bcc477303849478c1b7906b
SHA5123fd887636cd543cc0a28b7a156bab2da132ad7dc69f2f14ae035232f0d4308165b6c3d99b4d6747036c67647998574875c11cabd980a214e236505639ca6bf36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562213458cc016383c876484dd1ddbe30
SHA1442c9d4508e0143df32e9f13da2593d9660f4473
SHA256c758a8e250538f3a4afa482345c1eaffdcc5e1527ee7b125ef785292f8c98358
SHA512755f8b17dad9481fd799ba8b81af2e87e4e5fd79768c7a015ef8148a70ffdab93191151d7caca8a2f2bebb0607359a516b28d51ad7d7cb964785955446972b2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549bb5829cc86e31da77c268519f8f36b
SHA155e7e27f1ffcf88f2fae78d7c5f679096a377185
SHA25693dd2301338ec596b28227942a9a78df4b23af4a22d5dda9443fc379280272ca
SHA51278c2966fcd9efe37478f30ed068d6d3d5f44771e8e7bfc2f2d07d93e524baad70531ecde392d2e9ed523108183cb70918908846b6d8bb877551d3be1f067aa5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f63b1e45955e93d9385dda5fa9b7972b
SHA139eadcd4dad3ce929e7763c5cba8475a8dc00c9a
SHA2560fbb92f348b6a417f38098270ae0fca492c01fc38e70589db460d0f567e19512
SHA512d00a950e30d72c2707db4b54d653beb3b2564dcd6331e16ba0290b1eaf36881236bfa929cde9982a8e4cc28791d3f77336d201da58f5dd479feb0fdedd869113
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e044539e49a7c409e6c9d1352aa36a3
SHA150d5bb1db40a61939af13bb42367902f84604591
SHA25697bd4c32d7eec8d8ca215f3461d2b7df754f37d1f1b3e71bd9efa7e62b5d8781
SHA512fe6f029399919249c48c6ea0d7ea73aff62130cffadcb4601dc27d24398f7f460bd12b78c5969d61e7b90878453f2e65fbfbbd63c2ffe3307970d53cc37cfb75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3d1d95e9b993f702fe901588284729b
SHA1117675ef1a4abe0e7ae56dc6baf55e7aefa2fb7f
SHA256d044ef2c2fe923773c51d22dddb69d7e67ef9c325753523729c606ed7bd9cf5b
SHA51299139865892da4c9e933107ec573365c41f71d1fbeea4d2b10964a2a308cc99fb00cd0a97e3a7ba6758bd00c420c688d646dcca86caaa5a1015764bdd9f986c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536061a9bfa73022c5863e64d32039fe2
SHA12fb00eb1c08c18bfb6f22492df6e64fe8dc2adf9
SHA256dfe091da095ea6afa21f264eb9d76b2bcff95a6f4636b9cf07fe15443d1923d5
SHA512d35a7ff81bad7c6a2ef8250aaed8bb6c6192f83455c5fffe55af698c2d44bf23cf733774fcf0f2a4affc1fc82af0783eaf9a3b703d8ec42e298fadb6e46b54ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ecf369c99fde800b7a89aee1a7c735a8
SHA101d2d27276cb2f32ce8f56c2233eaa8f9e1db23f
SHA256cffe36fa029918b67499da0595e8c546c7ada0f23929421f7ff1f9327894ae63
SHA512b39d54657cf67456afc2f1f43638ba4b5f6e26c196762475be237cb04b0c6716c56231fa9ff85286c4b15b7e2528a12c64a4c3f34ac8f25c329fa2ee6c682692
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a93809f8974caee2af53f08fa7754061
SHA15a2fc816f77322540ac29238bed2a55d4ca4da86
SHA256260d089dbeb0d55cd8b5b0bd59c925cb8b8fdc342832971994ec80c36c4eca30
SHA51224605caca76dbbe3799da2c9171c5245619d528e8691c06a4ef81da8c6af24a439403a3af1b5bf6978f8cf4f5336f108b21a13ddf44daf3d6b65f771de77054f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f837f38f8ea333ce6a3b5c165e37a880
SHA1bba8793fdc8ae05422eb27e5822c5e3cf680554b
SHA256e1492e3c30e728072ddd91afe71d6391bd6bcceb40f668810cfa92608eda0ff6
SHA5128fba62342c78a24134a8a2770da1d286417f23febfed10699f8cee64193b689cdfc27ac8601e109c87745024ff79243518cf5909082242d7a2607f172e0ae5f7
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a