Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:31
Static task
static1
Behavioral task
behavioral1
Sample
6926c9f8f6e5540ad657875ad4dd2d93_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6926c9f8f6e5540ad657875ad4dd2d93_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
6926c9f8f6e5540ad657875ad4dd2d93_JaffaCakes118.html
-
Size
460KB
-
MD5
6926c9f8f6e5540ad657875ad4dd2d93
-
SHA1
03dffa11f0d04d78e458bf88aa3ef7233855576e
-
SHA256
bbda63cef2153a99349ff6e1851ea6f11f3174f18194af5059905ce2bc73be48
-
SHA512
bfab9d879d443a5a8b9239499407b365e425d26b1bb7b5a5b48385ad00c326b183c61aff4b3556e9c7b17d316ebcb251dff2c12ae6d5a8465ff84d5f76b8587a
-
SSDEEP
6144:S7sMYod+X3oI+Y0sMYod+X3oI+YAsMYod+X3oI+YLsMYod+X3oI+YQ:Q5d+X345d+X3I5d+X315d+X3+
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d06361b6a8acda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b0000000002000000000010660000000100002000000016f56ad8f0e3142cac294cfa4749ff1b999c00e9e2656b1641dcbcd16278d7a2000000000e8000000002000020000000e896593143623d1ccfc6186310521423c3e582645372f785db0e2a16038eca30900000006afa5e954a6554db5ec62f403a8a2d42d8913f041c8929f87de03471a2e78e5d17030ecd41d2ebe31f743003dee588583a31aff2cd2691949573ce42b81d933e908aa150e9dd142edb104a9ea9c264a15dc3345197216198bb02eb7fd38f9671817864f0dad03bca1075e026378dca656c8983ef5e6197f145c4ae0df334d06731a3704141dee1171cadc89974a3c936400000006b307db17e155597f6398c7fdb5955572062e501f6c8521baf1bba776cfba4746f1daf30141203414e6469dad19250a4c052e10e1bb743c7ae2dd62bb132e3a2 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422586186" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DDDAF2F1-189B-11EF-94AD-7A58A1FDD547} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000d227bbe09a4b118602e12e182418f1ee7f165836d0b3a02b5b91887cfed6b9db000000000e80000000020000200000008dbb065649d8653e2323a75c903c607dd337949c8b7e6f41c6b16eb0813e14cf2000000096d0836970106aa83328e3febb86f6c2e87bba0984855d720e27225403a5244540000000e9d529c8f2e75e646c86cba30fdd674612e827f55cb122786deca397585a2c1d90b1e60d9f1ecd765ab46dade081d455d3f6064f53afbbf1d6b9a52f72b7184f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1252 iexplore.exe 1252 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1252 wrote to memory of 2476 1252 iexplore.exe IEXPLORE.EXE PID 1252 wrote to memory of 2476 1252 iexplore.exe IEXPLORE.EXE PID 1252 wrote to memory of 2476 1252 iexplore.exe IEXPLORE.EXE PID 1252 wrote to memory of 2476 1252 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\6926c9f8f6e5540ad657875ad4dd2d93_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1252 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab76b74a91c72216948f203c844e92de
SHA1a3dab0b22f208deb3b9d099531063fab759f7c58
SHA256d682afedf6f41c48cd3eac47aa55369a7620e2b6e29f0866b1c549ec7269fe04
SHA512d7e400403b1962c844a97f619736cffc72cd673a9cf264fb9930f2e850d4655c10d3c2f9401d0f29d41c0e7f82c0910ec98e18b08c144881b4fee2c4c78e62df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527df5d23d47d44ac21500c6701d6468f
SHA1d0df026c4c7c37fbfddbdd384aa6d9d703aa0be8
SHA256a032fe698f71f83bd81d600ff8b8656fbf879eb26f516c28a9dddd019039439f
SHA5129c67620dfc75e4f30c1b7a31012381ebf8431797a1ddbaf9adef44c26a0c78a5aec4c04e85442233f5347d47266bb4203faa0fc8d2a8a2207683a58d3d7a4ed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a629828ac7c941798b6cdc5ebc426798
SHA13590c79fac5334f5274944c78e904c89b56a047d
SHA256af2fe9e39c187aae884f530799428d9b4e3451943e517b8910cf930936899697
SHA51223338c049c23a91ab5fd3a556afc2cff6413620c18c2ce2260a573af7fe501103b88179f5af2f8120bb7ca6663c941e38734468066d3a764a22fb0ca0980d04d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ff9c0db36f99871955afb82732084641
SHA1bf206f5a5ccd8bbc18165872b829fff2dd99bf86
SHA25659f89ecea71da46a4cf0e95e187ac7db94af75a77c4ec3b2f27febcf6486244f
SHA5128cc27efcd04132e66fffc2364ee53597c203089b69000225107921e3ab0badd58eaa679e4f646818728510ea60cca6417aba41a5627537c7103da61acafeed56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e68bce9224e193c2f40be706f671bad
SHA153c9dc7211db0de246db4f9ae9dd873ca39cbeda
SHA2562c43331a76cb55ba26c976f60476c6172aeb116a416f92f61ac4e51bebd0a00d
SHA51293917a06ba7f95cf6577654e3566db456e2598faea1075952854eceae7edcc2909186b4e2db63ac88b1c33602dd189dabe068718ec8e559d3b62beb56b46e52a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a79d2e16f1d4d23ac27f3367a26c7c96
SHA1e32bfe54af7a341ae13f34f9f5dfb0ce83222366
SHA2569dcd96479a00206327a8a55ae78e8ee57414b98cfdf490000f1a44fb197a22ab
SHA512992f81f6c50d9fd180fcf6f853c67bf0b24d4dd040b7ced9e6e33f149058ad57dc795498213a2872819669dd3c8423b16cb09d1fc8e4860d43f4597ac37159a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f299ca0859cafed42ea700e37bc43a6
SHA1d2bb9051f3ededbda7447ffedcd3e0dc6ef30e68
SHA256a30182aa5e5fa0a26b838e7ec850b2f37bc3b4f00a8c02177dfde9d88c4628fc
SHA5120ae46505b1ebf7d80f63328391904151f3113098c2b29b494a0b705dc62932bda16dc81f94b21e9349db5acdffd47b72e72e39b8a8cb2b3a5e4dee4ead82b80a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559dbcef0e9319c2193422327ed5d1cf0
SHA112ad83d6a2a785abacb5a4e4d8d388b91af5ceb4
SHA2566278032fe9e38655b8b7557f43c7caf045d06a4175613e2a708b538a11253cde
SHA512f1f009e085c263112c7a342d684534c0daa3f1acb9ec4eabca3a1153b54da01e7c2f5d0fdf5fffeedd75acb561e14a396cba81fdea10cafb24bacab07c4bc52d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c88c4a6b630ab20b6dd1595ffbca064d
SHA1d5d7b644301b1ff70b265a1136eeaf7bf73a6c26
SHA256a8a8c692dd9248b940d1b56fed8d83329140982f55349eddb7fc41b4b63fc4a8
SHA5126e0f8eda0e09bbd673d58a470a54020d3fa009c423dadc2a481d775de3d432360d887a6d17cb8908c195486485b070a8b06eaa432ac74df96a14944cc83b6429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576ee6886f103a3662494243655c8f61e
SHA1cbf831a483b5e58bcaf257579ac7603d696202fb
SHA256871f7693d2bd1d937b074319f4a13353bcad6c41dc7957df66338c6a54e4e295
SHA5122e806b2c007e92c72f944a19973ae83cbd9a9644c46ee9b2d72bdf2361affa938996ffd9ffda3990216f20169e7b839d7b5fda1ff15f15efa4cd0abed01d85ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5751054cc0c88f8dabf83a98cdbc03cf6
SHA115670e27dd683b6216a487dfe3a7b0cd28369a6d
SHA256f077ae1cebfdcfc06867e79dd2044374d3ac27047202e2816a3f43e354df67fc
SHA512d8721b7dc3798b100f4b6dd09428eeb0af9296e599dea8cf1caf245dfb46bedfda29fac4c619ebf2346db8baaca09cee4ea3e2ffdb106f0a1560203ef9923180
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2b36ca0aa106ac30d82829d630807a9
SHA1861c0c88842d535aeb75ef6d03de907f78ade7da
SHA25646e04e4bdfbede1dddf03c3abd4d9da7f738da0f6e96e6dbd288f2b7f2229e79
SHA5121d9071bb50ad1b3919445bfb9d4079e9c2963fed938f29af108e6d20b6a6637bfa2f2cbcf8d9de00cbda6d61f1ba958b82e0568c35e12fd92bc5ee33c780fa8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a622d8a6c5e992d0fa608cb2c219a45c
SHA1891cb94bf9c01b209d561a65d9555a3dbb847a1e
SHA2564b08c70d79e344829ee22912a41a9ed70268dd06900b003f02b354eeca29ea91
SHA512e9524c601a28780c7844edce845bd4725be64212c495de858d99a62c2c95236cfbcb820f64f3dcf2f47398e5def7015f6849600f70248c9460a2cb8b19527348
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c86e44344a92d812ee9d42d98415be6a
SHA152ff4f5371235821e3cdda2a34f64c549deeeb94
SHA256645d35509a93d19f3b5af19333c72bab18bfbf2a445920b74c04d0cef022e421
SHA5129c40d2c56a0e063f947f325568c15cef3c0931a8138d0baf51d8fb7be6e1debb37099990ad2d9333d49ae101eea3de0add0c353e588bb6981aa98434ed940084
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbab58eb1cd9cbb20e54d9a60ef24699
SHA1d1d1da0db166a0ff13202df212edfcfc553dd04a
SHA256359af70ba9e94adfa3dd4d8e976c8fd39094d845b8725ee3e562b8072a885973
SHA51234e6efeed785c8e2390ee5602587ee5cc3331150097aae240325b1817656cf7183bb6ce35fea06b7eb69f26ad3009e10823f85ac522146770258bf76cd7abe52
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553505a6c2bdcd6cc4a5d1ab8b0228107
SHA15038e39ee56da2b27f17185373643334cbfefe46
SHA2564eaeb00434f25a03fe42c754d90de2a3b02cdfc43d65b890a8c0272b74cb2103
SHA512b46d16a3a86cab4a4afa0e5383e1298f3c5574cc8836022d8e54003187fe5e32ad6be99a4d4afe2431dce9a566390911ae891cbb15d1c93a0c7e4af94adabcce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b73692a6e9362d39e15471b25f82354a
SHA12be2d94c6eab8740463b97efe7bb92a112e4e00c
SHA256f49dca0671f71bafa6d2bbae911ae962ba29f805d94d142f12ec0bda004f4998
SHA512c8b58f29156e8c5146543f8af203e29dda063fa945e25cb87fb6b8989de22f88b709901bfb77fd2885775afdcc6a80d439308491505b3e8cf815bd2d3220aea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5181183881d41a015d1e20319d31c5a55
SHA1c8a32c551bddea5a697bef41ea1b7ec6f45ef6a9
SHA256b425d1ed50566c11ed5bae05517e766e0bfa451c3a8d2eaee84688a541fdcdb5
SHA51290c2b8c6111aaead98b43e2539f4427572b7990f136e0a83461e664667ddac7f8847d1d692f4cbedbdd092e6cbbba4e3a592673cba5328b93429f71f122f5f56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525b3db4c902ab38529895f087276bba7
SHA1db7cd9e564aa2efd001e4b67fe5dd874bcd843a4
SHA2566bc10f0ece4362a9f8c102b6030e32213c0cd83345fc4e94baab822a7828645b
SHA512a7668d5e8d96ff7cfbdc33b8afc738629ff778b049c72b7b7e5db53bedb807b52f31eadb175258415c826ae55e466b2b69295f59cb175d8671ca28cfaea4bd17
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a