Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 03:31
Static task
static1
Behavioral task
behavioral1
Sample
65dc54af7a67cbe20f1b8bc8a6aed1e5_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
65dc54af7a67cbe20f1b8bc8a6aed1e5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
65dc54af7a67cbe20f1b8bc8a6aed1e5_JaffaCakes118.html
-
Size
461KB
-
MD5
65dc54af7a67cbe20f1b8bc8a6aed1e5
-
SHA1
860e8fa2a6815e06f15d7e115db30fb727e0bdb9
-
SHA256
3544783c4bf461790758c6984449ac8b163f62c4f42dc5c422d2d2a09036d459
-
SHA512
019f496d62faa43cac90ef37e9e6c2a28de33543e85b741e687274abd130f668950e5d96a66e136c3731c1aa46fd6f44c50adc8644f0b58d5812ed2fc8f85b66
-
SSDEEP
6144:SkesMYod+X3oI+Y5sMYod+X3oI+YWsMYod+X3oI+YLsMYod+X3oI+YQ:65d+X3D5d+X3+5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80a48caff8abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D6FB6DD1-17EB-11EF-B1D1-D2EFD46A7D0E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422510584" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000230b3b0267207842b2d525ea3260122e00000000020000000000106600000001000020000000e136a8ddb49465642d3231c34ce171c1ce084908edf4d1c2291f7ec3d0facae5000000000e800000000200002000000002b1db9c8bc821e912193eebe0f55505b162c70b70c1441841b076f291cae93220000000b2470b6b363bebcc90bb5daaf3e8a31b85239d0c113b339d66e63d7a8e172cc84000000062478e79d2208fec28955c0ddcbf5d3f576bfb3d46f82aa98636d8d4b13a39c26deae3274f7995747cfcf4975179dff5fbb58f43ce0fb2feb8d71c5484a7d00d iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000230b3b0267207842b2d525ea3260122e000000000200000000001066000000010000200000000f39e105456eee67a2e79f704cf6e756c872423b9d4dbff6226a16b95dbcb5ba000000000e80000000020000200000001179177fe765e7be6a6deccc198c6bd558a0e3b4aee72cdfb232328a580c0430900000006b49c088775b1bacca5a2cb9c30133ebe7ecf483f8ef14544e6a8e040f945827c17bfc4df9cbaf371864ab77437bfb19e464190692de3625fedf5a67f6e0612b48431a02ffd5bbb04f64dcebe4c28f295b945e5b0a9c0e3a5700cefe29d5d1e83b0d78beb8b1fa6ec6425a155ed6583b80db649c4c47ad321fb9b7942d36189d297fc13cc6ef56a4767381df78d3cae340000000c36684c78f5c74c0fa55e9b4ff166647078d91ccd24fab2723447ea81dacd0357ecc3686ee56e31915b10ecb63300c7147af368cf19362be298635e955b9eac2 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 756 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 756 iexplore.exe 756 iexplore.exe 1852 IEXPLORE.EXE 1852 IEXPLORE.EXE 1852 IEXPLORE.EXE 1852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 756 wrote to memory of 1852 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 1852 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 1852 756 iexplore.exe IEXPLORE.EXE PID 756 wrote to memory of 1852 756 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\65dc54af7a67cbe20f1b8bc8a6aed1e5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:756 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f0f9e7e1c7bf5e669e7c8592ad87c2d0
SHA1904e5fe324c0bbcd8a85f693cde3861bd9ec2982
SHA256ace28002bed279550f6f8c117829bf49d82c246bc574c5d34563266f0757330b
SHA512056d2ef5b3a6620c7a6e386fd9d6726a625a22a760d7e0667a99d6cd269cae7b50520cc1430b6e8c276524c7b160f248b0468412c8d1ad89e7defa650810fcde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0ec4c5c7cc170543f14ac4d0cdad015
SHA1d47ee1482f7a03c7f2c74820b1a853fd400726c3
SHA256791e516f8c54213652bc8f365492833f1e0d6416e510c1a108c28f558569b73d
SHA512bc8343be360eb1873314391eecd0646e15989b2cc37b2f4ff783bbf153421bb00f2e86b6b202c52626afc92e882bf1828c9859131bcb2b5cc68891d319b9c8f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b92644f5c412f31416df8e21c7addf9d
SHA1c42f0d80c19ffc0b645e70f55a812f621f835998
SHA256861d989fd6c1153145f3556407e2b29e43707e92dc4d9ed2fc49df4f33eb8620
SHA5129080f7072f6956f4d03c1c7011dc2780d5fd64aec63888b048fc944d60dda774a701a1b4dc4c70704f1daea8fd97a082e4c9e85cf534d58f59cd0d41ff74ae68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c41c3bf3f79b88d6ebdd53789542b3ad
SHA16a58a29f3cf9c3f6bdc8ee533e7f37f5e41df8fb
SHA256f567ca0343a18da2f003f76ec20c700c72104e2b2d8b4381bfdd0464759014f2
SHA512225f360d41f85a96ee89d5cb4768b66a44ac4be95394b27f7acf2fcb0cdc71701bb01817b6d4075d965dece2407c6dee3753826c35dfd7881bb17b3c333ecbde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD535abc3aad64ae4b16d8f97f48a7d0e4f
SHA13d7a1de0034e684db937bb540a6872d65a37055f
SHA256782a181c7a7d83461b5aad303c3436d0286fff7a9a49359eac18d2f55c93a2d6
SHA512be2aae2c1490aba1cc79e1adf293470a57059b784c6feefc861852b51e35815e92eb37ca5fcc0b2bee31e7002f09887cfdece1275189dc160aec467c70616963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8d79474d2393e9306c91b2e1b37dfe7
SHA17b2351f9b0b1043c838feeb677126dc5fc70b697
SHA256a0b418e171419096ebaa689a66c0f06f49f7934d62883ba4941b4161ffeba8d5
SHA5126fbd8640eb3255d8530d4fe68ed482804ff04a8970b1b5039375dda06e246f2c03cad1a386b7ef72326339fdd53006d99303b3ec4f0ed02bedaea521ef11a505
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4a73c40928a367ce6842f12854e7a81
SHA19b04b21a5c47130497c9805af16440080e5458d7
SHA256fdab28d2e02b302b903107880f3dbed3d100d66772060471665899ee46230069
SHA512491debae9034d1d351ce430dc6530518f7fbb69e92bae12e44445cca6c59a93d82457b37199c5857cbd7741101d2d872326a1bbe5fc1cc1be55d35af7d9b7fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5558860b935b5276acb4790191703aae8
SHA1c9eade0ddb63ee765e5112178bdf90df7d334204
SHA2563351a0f507142e88ae135c62ac251151ee24161e2c55e90e042169c3eeaa2f89
SHA512910c60286793b88761b5176683250291ab066d8c664e9b0c07d8ee385c7fcdd44f4d5a14f4d6e1b4e6a9aa4577bba67e81c90ce3a8586b8eb43cad4593ae2282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c47c3a5ecb2b49723893722af29224a2
SHA18070e4d748c9d938bd31dfe243773b3826ed63d3
SHA2567bdd209dd9d796d950ec692fa84c2d71b3566dfbdc78bce4ee4ae3cd3bfce8d3
SHA51255beb9202a0fe95dfebcd41c7236bf073b285bc7a30456aaab290efc09e3b74e1efb4c972cc582db08eff31268262272b4f5cda23821352197fd44d6c3733eb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58120010b9fec9fc4bcd665e2d44309f9
SHA11da243619c37e537c906191ecaa30d6c97d85e4c
SHA256accd899f38dfe81ea10fc609778a39126b73d807b495c7f88ff23a262e5e41e0
SHA51275eb42bfcf26974afb0ffff3db113b675807fca09b67972a1d2ef35e14e63b64129361ad36dd784d13c03174dca7021ea1056c4187ef0d4be05831f66e9cd6e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58c06baf1284686e0454715065e58c78e
SHA18cb9a28d15c5a7feb923d2b380a3e1541ad95bb9
SHA256dc78893a679e1dd961926067666895df209eee40f6b084bed3c0cf26102afafc
SHA51280f120d9883ca0ad80a938f153e096b3e4d29d1b1b17423eeffb797aaa066c9bdc47a23321e1cb6f2e1a8be702fe3e37d8756dd7c6c027daeb196e56192b0193
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c14ecaceab63001ba965d973ea37b42
SHA1e6fd60c00eae8a8b03e3fa496da02e51ee8330fa
SHA2569d2fe698aa31b4958569820342bc3874e13afda470fedca5e1b389cef3dcb3f7
SHA512a33c1f51751a6683708a70e1d5ba0d9ca1fb17b5985e70525b08d653964a91e91c06a841f5f5beaf25fb8f483829fc81d415b6c56d84c2cdc09f4f844865cffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55229cda507d293d9b9c3d3ce416c9422
SHA119b5c0e3a0dd11b30a2a1995b58a112f3b1c791c
SHA256850c807fb37ea418abda0d6ee4ea552cdf769923e464de570754d30e1706704c
SHA5121c5821df529427a01b86231041af7f90b777bd98e37e200e913a0b70b144d82b188dfdcd0f78cb964f543bbdeb8098cca77e5a9696a8991d2595b5f9ba3f933b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cfd1eb95a0504e945f9523543de709c9
SHA126d4c2243fbbe4819ce2d13d664358c1781dfb49
SHA256ec4cbd85a1877b5ceab22ade8b22880aa0a7d0d293e963c4c63ee9570889db9f
SHA512805771491ea9f2f2f41ceea6d54b06d861490055bf67c0997484dae31ce1ae557cc944106db100df32536df4a37f13c389fa1250dd48a4e70e53b64d70635703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba7a6c19b53800b5f075facad9625eeb
SHA1d4fc388e6282dfc5bd9acea09212c98165890a54
SHA2566da14bfa95c05cdc2221d15fc3c4482a63f0500f406fea60ff3b0dbfa20f4f32
SHA512effe19f28183fe065f65bb7bc2b962b05cec5e4b5b6ba0a274697adccb953635c81802c0e715b313fa2b23d670bf174ffec32caf0bfc9f48487492f95ad34e9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db9f0184697574d3812991a667558ef8
SHA10d314de7d1be56552ce04838526d075e9eed8653
SHA256df636f80fe5547bb76c025eab99271d8e78cd6e14e7ae1ae0a77a8952e0714c1
SHA5125fb1496f5d1022d138c01f67e3e86f8604a067ef2952c6fe55f06c4531a88e9752610216b38d4e03ea10629e47cc1550892be77abb158835243f2e70f9f25710
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0a7853b7f88386def4b047f3a0f1d80
SHA1bc808e8a4e063ea48f0d4a1276020de321a97e01
SHA256a1251d828137271b7bf84cb68ba6fe53eaa9c5301531b98c3c4781ad24138b69
SHA512f90ec78921189f0f1a5cb664f0462bba828ae4bdcaa8d3a5e1d9ce5e9682ecc910db3fc1cf6653cbf137d7963f75768b37d39e4a5d695a99a8a7316aa380e3b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56caf0669080a773f05f5421a647e2c63
SHA1946fa7809f8f74544aa19dd676d4bbf0f583b9bb
SHA256ccef88603f31ac03c915e891a304bfab7b9942cb3184fca51a4ba4b133aa0453
SHA512ec50ac4abe95c1274ebb247217e72bfe023d6a635a2384e31519b661441f4d3ae272022872e614c7ef96570aa986894302b82e4617f1f02ecc9323fff88b9def
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a