Analysis
-
max time kernel
138s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 06:19
Static task
static1
Behavioral task
behavioral1
Sample
62507467a1c6a6093ef55e00d1e4cd9d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
62507467a1c6a6093ef55e00d1e4cd9d_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
62507467a1c6a6093ef55e00d1e4cd9d_JaffaCakes118.html
-
Size
70KB
-
MD5
62507467a1c6a6093ef55e00d1e4cd9d
-
SHA1
e3a5a0135b504af765e87452b6b21fbedf561895
-
SHA256
ac518609cd0be49661d738c5eabcc0f3598ea422a12dcec4aa87a280db43fe5f
-
SHA512
f7bbfd9465d026116ec52c511d96ecc0cf55570ee7fb3186934dde4f05a1a2384279935c282cae18f50f30cb714469c03384f660b0bc78bef7cecdb60f3ae6fd
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sO6VCjWboTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:J3sjHTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422440021" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000195e91329f7620411b8013509e4605748147e502f6d9c2b8aff1ee275c2e1c23000000000e8000000002000020000000b4d2db2d4b056cfc2f4ac9edcb66022573b62758ef61d32b5773a88227f5565e900000008e6a82ebb2cf5f78e326818917adf42da04a77cfa9309dc5ad8462c3939c81fd1d475954d9983fcdafb4b5bdf119ea0402e75d4fc638ed3bf7d7d235229c3c27fcbec944b5dd56cc531c6208e1541606d6f41f5f243a76c79475fea73c654612fb81f99f552ef9fa078422d4ff691477b08217f1b7ce3b212b5fb4125de793b5ba0b171603571fef9d70f78c9f5bf77940000000947a547b704d845cc87e38cf3f59997a72fb7621aa02e827b5d05f7d1a57f174b38215ca9056d11235fd32ecd72f0a00028f1c24c2cbea33f2037614d56825cc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8CB7C791-1747-11EF-A57D-4637C9E50E53} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000f7d8b12102d973b5f558ae2d1db188f1a0cdede43fa40808973bca6df8165ee4000000000e8000000002000020000000d92fda2404d48039e816d266cfe53f7522694fa5d85d15263bece13a35ff4b88200000002f8b7ed7a6c7f73ab41f8bae1eb8590a1e22572627ca71192f5931b065f4cc6840000000b5e5f56af5a3ac2be820742960d64e0787a73e149799530da3779f074d2e2654ed733b7f1d08331c5308e505c93c31e57111811abe54d0d805956e3856603250 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 207b546154abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1788 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1788 iexplore.exe 1788 iexplore.exe 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE 2140 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2140 1788 iexplore.exe 28 PID 1788 wrote to memory of 2140 1788 iexplore.exe 28 PID 1788 wrote to memory of 2140 1788 iexplore.exe 28 PID 1788 wrote to memory of 2140 1788 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\62507467a1c6a6093ef55e00d1e4cd9d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1788 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f535f3e407751e54cc7d6c06cd4fdb7b
SHA15515b149b6d46e3d7ab1012f2521cd0db36fdb1e
SHA2566bbf00d11679bb9c581aa98ef9dc1c49ea6f47d502ffa3ae68ede676a60d780d
SHA5129b90d4480ec005d13545d4f038ebefc4d9da1e72d9d47fdbad976f7895ad13cfa8dc13ee3b1642186be3a46184e3f3763539911f62fc38935c0fcaa8551aa190
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59674973707184619f7f019bf34b7f24f
SHA12391a5f2c264bd24cf00d3ab099e33110bed5298
SHA25698efc94c6905cac011bb0064dfc08e97cb60e987d744ac9765b06d6a7999c15c
SHA5129c74f726d4d64de669b4ea92591cca5f8dd4a1f5816c09dc317033034f763ac5471a26c8a40dddefdf9d1e65ca28b54983e1aeb9428af38f49f7332f8824231b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e78d648f73b5dade6d8245b8f0b1cac4
SHA122b3ee204e7f75899d46b47cc9291ea9abe6aa2c
SHA25661c6f275c2a9dce08c46b741ff765805d3c24491e31fdccf5c42f5a4c41647da
SHA5121a7cb410fb71c88f92703ae37cfa12ef3353e592d9c7f631973291ffc0112d38e39c3c040cfebdc3eb6ba41f2a884e7fac0fe4ad66c2c0d5b9a0f3e44bcb9229
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541423f9183a91392b8c01222d1f32cc6
SHA12d1fe53169c954be817740c62069c58dbc7f12cb
SHA256fb2109ef4ca28e875e9764ea25dcb865b8694fc76e9271a470bec94ec041b3e4
SHA512dc7bc81288717508530e45f916d4c27840228befe58bb5b0e804602a54f5d038a5d7070f4c13acbfbf989ca71cf4ebb5392dad6a599458b811129bb5a6e97ae4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aec0518b1ead21208f6ce99d7ebfaaff
SHA164c11f8ef3cd4e07413526e3d00c74c73d79a30e
SHA256e55ec91576cf9cf4b70a795c78d5dcc6668e1e52a75cd34e6af9a90c90229159
SHA512344b667a70b7de67989fdd1df0914beed34ebcf51c37fe3a336dc61878bfaeddec91e9d899d81d04fb9c79e2df6395678f89f397f38a5490403ff47d9eef3688
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a78a8c2b1dee05ea83f7a993e0ab5a3f
SHA17aedc15b23182833eee6ebca86d93408880198c9
SHA256459c0faea82fcef7be74ccf4245c24700250cdde0ae7922f7e8b2a77f00c8588
SHA5129ed6e6ff1f615a8b22e1346e596581ac5be5dbd6bf062de53ec4f77459faa3e1f813833fe5687b7908f0f9a449e57c47a8ef5ec0f179166f076c6b31c12e6ee6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5605984f454db3a7af5b17de508c651a8
SHA154ca0275c1cb5fb5c6858772a9b23b235838c0d7
SHA256bc4d661b9c052a8381cc4d937d826eaf0b2ab5b70ac12d6c6a152404134d6dcc
SHA512221e37de31b743ec37daeb64780941a85e9e3028b44f1649f024e9d17c8d5d7c162d22568cefe24599e6457c01e58f528c75fe7fd608284712f198707911397a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577b4e7826eb19cb52287925ca9ac1991
SHA1173e839d7f6c9105792cd87fc027aed0ef99b31f
SHA256791140ada8041419a2a480ed2b3703caf5d8538d177198b9fb3777504d44e7dd
SHA5123189de1e8523c3b38b3c6a9ed65d6b47b48014b5f826d7b5ea7b182e59fc1c4520c188d18488a2423a1eac04f0d006729e582e6af43c32a3eee9d2f858e54701
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b0e8b43ab43465d0d60dd4548192e6a
SHA1203c48fdbf9847cad914f5f07df33b6f06b062ee
SHA25669318699241e247df882b698886fedf6fc71ca6861df55500ddb95a0cce872c7
SHA5128fbd1dc2ff1455a60289c6062f96d8c1b3cfd5a9be7f1960c8ed1b6243311413505fd217355cfa353fb31ad9510b3a7398de6a0d13469d3b0b90fd5a790bc044
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7d30ab344be98b13546088596225be1
SHA10eea456ebc7261fc95e445ca5e8721b6a503235d
SHA256519c97f59b4206ee3ac66abe83932e555ebdab5497be8a1350940f42106b91a9
SHA512e04f0b45bb7e589fa90e64edfb5fd1ad7122eb5d1816a76785aa351a9d9ee0135f3c61cfdab7931e2e0e6bfde7a717dd4aba895204dcbb753f39373ee93e6707
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7522586263d48f5a1a300ec95e9209d
SHA1b7cc33a275427744e8018031fd2a7004ea1936de
SHA256586b3de9a5c30262272a01ff6a19a4f4f9edac5c509c1cf611f1cd39e14a658c
SHA512ac5ccffcb82216d838894d10454a8753c86740fe96f043bf288d73f9c3f0c7142e69dbef669b9293e0830049b6fcdd10979cad03b954b2b6615460331607f84d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0dbae612613644c88c9a9038025ec7a
SHA14eb7c5b4894fb5001fed62c3ebd704ad508fcd28
SHA256915a675ae6d4900f5aede13008be77ae9a86d9af13edee8011a7bb9c6233f2d5
SHA512ad9a68a6839f26322033132737e5b5aafe77e1472ecdc0cb0df6c1117025738e808a7840bd8ccd89167e173d29f58da3c10dcb6c4ac82b2fbde1996b1b883599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5757a356a5b429fa7e5fd479e87770aa6
SHA18702902c18337281534f036a30d9b464d00a0c8c
SHA256f2015e3a090fbe4468445aec81401f67f2eefa15e0df134b013df3b743d015fa
SHA512dfe2fc805904fdb2e52e7e1e876e9f96136f3989148db03a25ab8909b3aacbcfc06f75b8ac6a19d243b3fb157ab1b184dacb0e2be909e32edb85cc656e64acad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d126c134e68c1a6aee870828a2041a0
SHA193d0e7363f1e5f64071739f5171ad2d7f79ea4bb
SHA256a739761615e7f11d8a1b1f294291d8d76fba7a035f2ff48026111fda2c6e22e4
SHA512d90d51687734f6aaecc48378ae764b695011eb9935c35f0b1626072e48b63774dc55aa68a83d7a32cfd1d0cc7955a4b356ab2776771e96f4294d565f79a07715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1718168430541e2c05d20d0fb501e57
SHA1a0018196b298decda25161b521491bbf5072057c
SHA2560a9d57ed2545c1f3dd772f924a52bcb17efdef290d56921a4ee9338628d9247b
SHA5124337b63e6b8cc10848455aed6193a6ace635fe7fef6577c06220ebd98b208de3fcd0119f70a10c43785266d80a53fca01445cd8101263e520b29511978d6d6f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5471f3b0f804edf0e4a6d52a4bc2e7b8d
SHA10cbfe0a9012b76f2a015e6ee8fb0f86fe3b38a03
SHA2568dd0de8ab33571483061afd47efb8f0a96989805c51c692182ca50e3e32d3f11
SHA512cbbe478d8474137abc6afc0ccc377863286ebba46e446f57f2163ea90b42eea9f44d1c0b2bf4e4f2b33940f63921679df4f7a5bdc44e593802df241646897e03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5406c0408d92105b625283a33e60cebb4
SHA15c8932c6b2c6b108a9441c01450c9e76ba18f1f3
SHA2564dfeec6ce25f929c455f53d96821229dcdbb77049b1e1bad7f603693a281fb17
SHA51264dde11f7f1ecd1505682c1064d7868949df1bc8330cae12caa1b7ff16e8a8685cb146046091afd59abe07e228a2db43ab8a7fde9967ce467bc0af23fa7f0845
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52ee1ffa91697bcb2e3c00bf2fbf011d9
SHA11ed7c3822d0b8b383cf99c3523480184bbb923e6
SHA2567baf87df6ba5a5f55dd41a96568194a7041b7f93ce4f9230ebb2e99d775c0876
SHA512fafd07b80fa78e8b0283bb7d31c77769a6a079ea47199b5389d57de8b7e4ed61a41b2ad61678d082ff1f7593b9fe1552ff348270325759dd1c06ccbe73b5f5d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56eb5d6d018314bfe1b32bf55478c4e4b
SHA1aaa115521b0b9acd48765804dbb0b9636141ed4b
SHA256b20858043c43b223ecf7b246ffd1dca4c87244de963d6583f20e88deadd8ab97
SHA512fae05c824da4af1ef75e1dc1a489c58f3fe3466578b3677023a25a98c1ffe7a4f6165ade18c2b271aa919d90796ab34bf0db3e6424847eeed4f38b44eee778ad
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a