Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:09
Static task
static1
Behavioral task
behavioral1
Sample
68f3954cd3ec9452377a3bf6cda89e87_JaffaCakes118.html
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
68f3954cd3ec9452377a3bf6cda89e87_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
68f3954cd3ec9452377a3bf6cda89e87_JaffaCakes118.html
-
Size
6KB
-
MD5
68f3954cd3ec9452377a3bf6cda89e87
-
SHA1
dc0232037b1deb3e800a24b48d8de1505d9bdd1c
-
SHA256
e827256f8461f2f1f84c7b2bcd815e750829516c87d2cfbc2a01e38bdfb5bf4b
-
SHA512
b25310bc2b727b93d67e95c9506647de7410fe5c9e69c344985386aea5d781991040475f29c119bef8ddd1f66f73769d7099bf3622119f669042ae578750abf7
-
SSDEEP
96:ohb3MHTnOH3gGWP+NPPiFmdflXGwWhWJZHg6b:ohb3WsQGWKiFmdZGwWonX
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000999baf2664e8bd24f593cd8d0217c79103b5c80fdacbb1658a3b08124b0d4fdf000000000e80000000020000200000003670e5319cfabd25c5c62f1e2905ecac957cca92e2045bde64f5622714c324f390000000feae48e9d93c12802480230815d3f6412aee1b2edbed771f30cd496ce8850d9a0573bbe5bba1a845bbfd7d4a4d97e65b3f2f277de9128f49db685bba00a0333e76d4073e177fe4ff7f680e85c7cf472ef9c0a3ad6636d5b3aeb70b64eeb87b4272fa337d80a210db8bb2ed0207305440b616a337b830785850cdf13650dc59deefe1dc9f0f0b286b272fb0321ff3ba5a40000000bd9d2126cd86bf01540665c7a90c28b954ded8977f141890a221204d382fdbe08487abb2417300ba2348b53171fec899dcf58c7854832233e7c3c91143a06cb1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d7c7e73b934388418857a0db8be9c1d100000000020000000000106600000001000020000000db5a4a8777c88139c46fabd0669b87d81243155946942c1e9f2e76b41070fe3b000000000e8000000002000020000000fc2435801635039c815badb3cff49ee6ffeb2229e2f68fc19f956955f3f0c2082000000023aeaf118370a8e0a5e6696a163e89fdd759443b2f0e91ee33eccdb20c8bd70e400000007846ebd3432bf6f94fe770cc9ae4715893db8a47abc77b7c52d6465441a1668fa78d4f071c5844cdac96664254dddc9513706b8ba4a181da9b02e6cd16225f47 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 001509209dacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4B83D941-1890-11EF-BBEC-C662D38FA52F} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422581217" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1704 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1704 iexplore.exe 1704 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1704 wrote to memory of 2836 1704 iexplore.exe IEXPLORE.EXE PID 1704 wrote to memory of 2836 1704 iexplore.exe IEXPLORE.EXE PID 1704 wrote to memory of 2836 1704 iexplore.exe IEXPLORE.EXE PID 1704 wrote to memory of 2836 1704 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\68f3954cd3ec9452377a3bf6cda89e87_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1704 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53244013fb5a8cddfdf750adc66077b37
SHA15b53b4f27e065d6cbfe2b02cb2bde8a89117dd06
SHA256d44e00688dd33e7f3d0cf5bc9ee8403461cf4a5afbc4bbc433d6d33227387420
SHA512abb56be3f2506bf847270909ec679907803aa54c4bb32ec261d77269e85e6036ecf7b5548aabdcc12be0b0010a09aaed3eb950868c93e61f1a598a51106df873
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c1a3aa30cbb14d14e21c95229fec411f
SHA1bdb7453627afb810f6a2f81b553da3b165064b2c
SHA25609b2a2d7df94b10f7773ac3c5e9c12e9b220adf54f1f20fa7c5d521b020cc1b2
SHA512972d7975f23671c81e1e053c2fd0c62f55b83247a28f311a90bdda5cbc165cb52990701d11788f32d8d0b7fdad1e119a39fa88e3c96507e6b83dc95500f30494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52873c36c1458ac1722fc3278a263f75f
SHA189a0baa9ac2199580091c6696765eeb1e28d9959
SHA256b2b4cdbff88c6e237a93938ae924a6f212d81ae0ee2b42ae7c9e6bc8dccd8117
SHA5125d40d1b81371d1ce070782e61b067555852bd10006db05878e60b938825d7fe2b6f4468d3a8270e74529d2474353d49ff063deacc3339c1fe7c38d6d4a463324
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3d89b1d3cfcfbfc24dffd76903b71e6
SHA101c8a538943e29ede9eadafce26dce60b67868e0
SHA2563c1b355323bccd503c28bd9c39b44e9d8b2c14732df14def70c40933d638afd3
SHA5120cba9508fe93994fa6253fb1e1b8cbad2fccde4af10968b3b955602cb74b9e85ff82ec4c13365ac3c5ff843e15d7897fcb7f57f88309418de024ec84c4905e56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab0ecdd948c4c89912b905b4581ded55
SHA139572cbedb8762dad992fd4e26d6bcd35230df23
SHA2562168afe79cff7c2d70f350e3a5d212008257ce8cf898f290f2d140cf40dbb8f6
SHA51274f1154729c06cbc92e84829b98e348fb9b7d23c66f8d1afce9887c58ba11d9fd2286a5e03481f9c3f4ec010efb459d24ec019ccd1e6a8f42e7ee52f3ff717c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c8c83cda29dfa37fe9d9be10994eee8
SHA11afb116ad1ff8caba4a1210eae027c0494ca72cc
SHA256ef13112770d61d96d7f6654d77cd36323686289a26ebac1d0515ee1229925454
SHA512df8c1aec95139d7579a172c4e1e4a75abc4b5f3538893e31753a71942197e4a48c3418821fd1999fe23894a7499a90848d63a505f76138afcda7c83349096aad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d6c18ae5bd293c91384fd6f82fbcabb4
SHA1088118863f5032419b296194c20bbd740a01fccb
SHA256acd26524354faf2abd65039174d76fde012eaffad957261d8bbc163d6b08e943
SHA512e5eef709484f19ff772e086e5767f717fcd7caca3fcb8817381b92eb06932c26bee7071d2ab43024d582c9de638cc1f99fe6fa327666e42828befa63d57addb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5974673c4d550c5011dd3db926e939d3c
SHA162775ed36ffc10d4a4cc2839a286a5fd4980e4b3
SHA256fe21035e886accd84d2a8353f6f3630c9c30d8c12ebe56b8031806132dac49e7
SHA512e1fc8d3973c2c2c52e4eee0c901247d8296afcec9f57ae443e5ea78d44566e0481b8b57b5ab47e0e2263f836db02b06c9285344fa07d0bf6df5e562fb6ed7c40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c13a4710f4cef6db4970a20dc8307e4
SHA1d88402e058e48cee69e21f0f82d6c92d9ee9b2f7
SHA256bd368578793dd4b3fa2cc3fa6553d4388d0cb1c4b821285a6d8d51574cc78d34
SHA51265f8b2b6669bac790bc7cd32b0b25a289fce012c680fcaac8c1b5b168f1b5cc915ef24df408654752d0a6183cc4e9e4be1ac4bc50eed3a563bfa5db089793b09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b49096f5fc2a13aea9a3ed39485086e8
SHA1546b29f0f4ef55e949affad17ae8def0aa6b0eec
SHA256b45ccee532995b48a0a66abe9d8d9568e93c2d963b4bcd8cc685c77075e1952b
SHA512d605aba329e870a8cb319d5a67aefaf12787db9231b4cb1ce1c7b4b2a660342242c3dc1e54e4f0e23f25800fdf78328e0cbd7b1dc8770e18fcdbf4e13b7c3960
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebf47ac821f21d59d1707e8613693c98
SHA1e798c3da994911f19fc4d1ee96c7e0804717a77c
SHA2568f0f8eff0b8370b585e16c38ce584f892a728d215eca8769742d80ac99e347e3
SHA512d67fbb373c9433f6d564c7236cd39fce7022770bc891621967aa16e026f0f3dfc9fbc8dc65e2023dc7c05789c134e9912f8c5d28b411352c0b3efb4b67bb77a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a9029c57054b5c0202ee45cff72e22a5
SHA1adb1beb9b738c3399d5b797b8f7cdd1d8d7c180e
SHA2567176cae80a90bd60e9aaa662b9d3dcde4959763ceb94d8d04b679918b2e8a28e
SHA51247d92dd26333d2d7bd18144d6d5fc71e49786743b61954debb8d86077b01fe2d6b07f6b40fa0e38c89b5b500e032954a3a2dd2cb029ca219b168855fbd35b2af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD511fe4f9064d84ce08753eac4fc373372
SHA10530336786a1edae5e48015008202029ba20ed0c
SHA256efaa524eee8d0ff5142f7cb02f58af3e50cc0a9f25c57960ba415863d3f034a6
SHA5129036f635f9613c067bef1577ae52d0c071504a73718291ae36d31c74bc308908c5418c59ed028bc49a1abe0ef237bc4a31ce294cfe812379a7d355462985a488
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543c2c04d7f62538e10a23351c972e1ce
SHA1599265ff48445ac556c4c67daeaa7363e310672d
SHA256ab2382087daab3821f661d00f80f03c8365fe519dd60d474ee823631475adcca
SHA51249726a22353180666f02610db642be69f34618298081f866cfb90353ce5cfb8b57e0474f6a9f92cc7b287cf10327e44fb911d3b3b0877f6f7c619adbe0d7e5fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3f0c9d2372d9f2024be4c104f272272
SHA145849e1e6bb8ae656c5a4d8ca7d0ac62f2744684
SHA256520d5f21e20739311d0fc2e7062cbd98c0563166c9415dab896fc965d544017a
SHA512dd12f28d31bc3a8c844839ef19c829f0cfca04ae8a95ae35a0c36bc5d5d3ff25aa0705323ac03fa42327c4ce83f5a55f30178f7dbcff0da6570483bee47a3d9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f93eba4c5ef7481620104d91292a4a35
SHA1130499bd34d179a4d69caea03adf52d5f181e9e2
SHA256dcd38cf8c2ba00a8e79c8c865ffe8e9c83b40d56d347654ef2f34cd283237563
SHA51271d2f34d130b40f890bfb6b382657776273cba4167bab8d5b34257927c912378826d4d3e285c2a7404c18138db0708b85a1fb6a99309022136fa38cb47b37a9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f291a672c02faada7d3c33c756d45ced
SHA191f78f512eae8c1cd6b46476fed4c5948fb7e62a
SHA256988983ff68192ff3985c1c40971be0e63529beb0606c66fe796d6304ef9d2963
SHA5128f96cc7d3cd78d1c2dd8273209793444cf69a00fde5ecbbd95de5311ed8ee6e04b0307fcab52ba40bf96a2a4ca291d2c1f2c96d6172143056c8ea98e0b5f7c95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50dd5f83addffe79a98e0dcdef2dd82cc
SHA1d36037cb0cf145349627931d25907c8937371b19
SHA2562013ef336fd587c4047b147532655b09051409ba6e0e76de21e578295ac453b9
SHA5127ff4850362369dc0e99e792afdd67ccdf2bc043d50ec540e648059c4c43af31840e6af323583bdec37e45c1bba196d7d41f5168d9483be57e891dec65df59b43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57792f5b29c7002b359c958d704785f55
SHA1a975cff361d5140a0754a7e34881c86d99f13d87
SHA25605a5fcf34688d8f0c9ab470ebe91a665b105a9bc74b7e8caa7da05ddbff1cbd7
SHA512b7d9c9d73d7574dc2b038cf53c3d894508d7c494ace33a74f38d4b82ce7c92c2c10c679911f78056c348879e68508210fa4f93e5a9f6dd09a0747b8ce824b1fe
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a