Analysis
-
max time kernel
134s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/05/2024, 10:51
Static task
static1
Behavioral task
behavioral1
Sample
0b9ad9c731a32807f0efa57b0cd4b733_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0b9ad9c731a32807f0efa57b0cd4b733_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
0b9ad9c731a32807f0efa57b0cd4b733_JaffaCakes118.html
-
Size
858B
-
MD5
0b9ad9c731a32807f0efa57b0cd4b733
-
SHA1
b135528769f4f6ddafad07a4fd4ff2201ae9a223
-
SHA256
71a6c64fd3a65bf2da7c11509c49927ede8d6b9014bd13fb4eedd88c2ceea892
-
SHA512
380b21e33b1e89f9f4b85e51994b4e94fe3b45148b0c022b265227b6f73bdbcd65d8ce61e2a15752a0346b4b5f5b8839302fd73fe051fafde2be944b2ee37e6c
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000a44fdbed328c45e22e35d5e0acc21592547fd5675969dd08c49a2b7c9a44af3c000000000e8000000002000020000000d1d50ead77d0d63bf7bfbacd45897e27ebc1e2537e62475b89258bf17c78854920000000549531a226783c8b0df1810e97e690b761e628eb32dcebfb666a0a6bf2a8f090400000006ccbdf788f73a296c63aa6a3442b199b508e1db19f29bb7f5950904642ae0cb02d2728ca4cb2353ce94be13a8cfd63c8e0e2819c696c72d504a48a1f06524a01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002dcc56832ee45b40af0f973e997a3e3e00000000020000000000106600000001000020000000b63d0088305c71b7f769b0f15cb6e43aaacae59849d1123f86dcf783d26b1731000000000e800000000200002000000044a1dd5c768eb61314bd683e687512da7dc34c47060575ee3c7e77ecf4f019439000000004d62766481b2d2276566ce6b1d85e686b0542d2520aa287fed770ac2e952a09b0e9d2583700ccd9eb263f0e6344234339d8d1696d2d3ea509ad948711c58da657b7fad37c0b85942dbf43ad455a4a0f71b9b435c80bf8cc6458e7c3e80513b9f8e4115ad0580d46f458bddd4c39bbffa10924d69969642e9904afaaa11babeb2a3d71174555a6a37a9d6aaba2e1093c400000000d553ec2369b3f45ca0d82951778a3cd9462968040e593e90860241dff462bbad3348a26aea83e9b772e1f2535dbd21fc139efd671ed985c522a1ff1a120ae0f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "420722552" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C0DD8D61-07A8-11EF-8442-DE62917EBCA6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d01d5e95b59bda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2752 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2752 iexplore.exe 2752 iexplore.exe 1816 IEXPLORE.EXE 1816 IEXPLORE.EXE 1816 IEXPLORE.EXE 1816 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2752 wrote to memory of 1816 2752 iexplore.exe 28 PID 2752 wrote to memory of 1816 2752 iexplore.exe 28 PID 2752 wrote to memory of 1816 2752 iexplore.exe 28 PID 2752 wrote to memory of 1816 2752 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0b9ad9c731a32807f0efa57b0cd4b733_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2752 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5513651bb2518dc72df5b70f1390a878c
SHA11d6f31887660479012f212684edc69b1ca657756
SHA256177d3d8c707546821b15de215e16d9dabc8330c94813f1422849ae719b5ef1d3
SHA5128ee71a4d94860dbf03bbb6a362a930abb806a921bc412c22cfc25df8fe0bed0da1d6880dfef90c69f799566f7a96556c1c6e448a143a5d4b27abef82e4b1b745
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50d7aede1585037a640cf9a3c8e1d4f0e
SHA161d2acfd248052713fe420c8579490af4a0f0278
SHA2562c5cb3bcb74dd5efcc0d9f7da592a41a14ebfb82aa21380c91c029736f969f9b
SHA5127295b31e82be0980e853d1e8f37352811b521d804b3068faaf95462c308ea5306060108e0a11037a5688a69b72f985eef2ec2c779953749ea1e6e33d788e922e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b7d85b392577575bbf0960bd4d8d209
SHA1baefc0cfcc2cbec3c35386c22b0a2888776368cb
SHA2560edd2227ce58d413298d18e65915c18315fe0a268755bee3adf9120cb8366b54
SHA5126e55b94c7833111611333564091babdb7d94fd2d473a1713e6595731a633a17b8d34406b8d7a39b07b6b9c5e468e3132991cde8efc4d5faf361fd0f96d96ee1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5efb6f08499194d397a671ffa2cf7045d
SHA10067a1677d14832934529689066a94dfe15bf99f
SHA256eed78ea28b65a8051545175739bb5ac1d91c3b3cdd1cb0dd9128f232d4ccd39d
SHA512bd4e9f251c786ea0c7c4e0e9e44b28d436475f70e37f115a06de3962a96547503b2cb60290fb98f15e02aa11b11167ea9b522f886001af414606a411fa39a31f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ddfb70f29a5c092f18574a0578c3f6e
SHA1f5cb18a5738b71325774f46668302d47bef507a3
SHA2567f03b1f1ec1d65ce139449c1595e312ac60a90d6d177a25e11b0fa6adf62c8f4
SHA51261d9bb1815a0654a8a7b5c38abe8393fb5769d4337d4ec03e1afe3c88af4727260f351d9b9d72c4de845ecaddc3698a1fe0022c233c2dfe41e950bfa0ef80158
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b773dac2ae8b8b43e801f9fa5866919
SHA12a736b5f04cbe9337006e594ea9fe0c16aed6df5
SHA256e3b2fdf37da96951726dfc07a16b9b9ea983ef2bf88d2c86a5b6736afd4c5259
SHA51283ebff2c879bdf408a38ded6d0561af8fc9084872ea2c8c98cc79495367e6ce2843887d0d6e017fe08ebbfed818bfe04a24f9c7358fc329fd239a2009111cc93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bcd5a0cb48ff3ab32aa066f4823e5161
SHA19316799e0a588972daf549bee5082681c6a1946d
SHA256bd32971d2f6e624f266b5cdffb62178f137d5d5c79a744dc9cedb404e5f6377e
SHA512acaa2bd4449dc678f88d166352ad4807d7c1e3e00af28ee748a8dabc6e8a91338c2195858537bda112adb01eb79952e0f7503dffa79d671ccfb3ec36d94f727c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50cbb56a544085e1e22bb379743cc135a
SHA1fbee5a8a35948674d4dd55e2edde9c4fa6b2c8fb
SHA2563dc61547cd78e0bf6e4a792c2e9ae8e3b65957691a2eecc8bee11305dc4d2b0d
SHA51245378ad7ebd9ea0764ed1a36c12d29bd8c9743c374d48aaf2802f3d82f9fe53136ce226458a295ce4d891c21fb32793877e70b475bc94c2a52595163bd47252b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3d4b38e06b37a30c1a547c75dee66dd
SHA1fa8a8954f873cf777ac3ab37665829cad553102f
SHA25697440e754f8f661d137e04e7e4a87023ff0305f20dff843d6072be67b9e88aec
SHA5129875f753c03207c7281abf3ce6c4ffa9668acf772e76227d57fb43ce1880352aa8ed9b1727d5ca358304ef5ba041bcc14128e2c19746336d69026f104478804c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1469ec0caaa42b4fc32702a6922f85f
SHA12e34e3e7a751dcb02151a2f9e65879dc248d63f6
SHA2568bdc1135a815e938fb2ee40cd6e7dabafbb6de05b09e0f4ef59530a84fa5cf9b
SHA5120adcab805822dd0f4528358580b43ee67f18d55bc55e0f80670a70e19d7714866de53d7c0bf92c96743d1e4f1f280c4222887617560907be3f407a9a47ffc4e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b42f1ac4a47cc6ead7c2d4cbf80be580
SHA12ec5a52e54b34c782338735868db4d8e3f2c2482
SHA256eeb00d949e67865ffeed205906930c7f03aa6d5c9c20c7aa71ce6276a8cff7f6
SHA512610673cf3e3a6c87b705ec24237bdd14acf266e9101aba3fffdde14d82e68a0debef109477acafa5b9b27a5ff2f0c4205afc81115cd6ed1555418c990c7d4edd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bbe4bd6779d70fc51b8e2ce56a35f4cf
SHA1a69d7911feeef02c876a71afbb515e9abccbd240
SHA2568b14f6dd93602d7fb9d081226356fc51a84385960464228d25512f5bcad151f3
SHA51225dab210875a2e540680bd68e089eae5793e8254260226488237ccb0907aedfdf0eac0f9412c1c009d82cea3b804278fd113c8e6eee660fe6d7e4b8d7fefc175
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577545b73dc07383a9e3ebfe2913eef87
SHA11020a30412dd0ac65c7219d6945604acc5cb3880
SHA2561dcc409f3b39bd75f1f802bc155c12e4b8cc0318696a4e707a0182c20189c605
SHA512cac31dbfc8aa9d7bc9bfc4fb15885cafa02b47e3c7932240958637c597c31ad4088778ba612f355ffc96c100cae81e0414336b857fe91e0e2a7d131e7a153088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e4c89a91ef93b276a68f57d2d481150c
SHA112407a50be8be7c26d64db530128959ed37078e4
SHA256165d8bfb3084280e43d00ddee4c4d8a59e0eac4acb64fe5fa82466e40ea5733f
SHA512c79e1421d63039154c55f10c23bc9d12904305d81bcbff04ae40d5050a021bc8ed85ed1c14c750874d82a0b4fb548fe657ddcf96c4654c730e80b3f9eb8638bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e582820440ab996f8e0b5c9a0f5b1e0d
SHA16bb7a4fcd85c781ee416904e0d7a3e18189cfc73
SHA25635ef4476a9a8f1b3290e9217e2365c7fdf7db82bd8a9c020fbe76259235b786f
SHA512f9cf6b2c58cfe4e3079077f53bc68790c93e4d1d86554942806206e8f5b04f60fffc5594397ede09775e994a6e51414a47c496e5b278d7c9f634c6e1022f08a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD523d71c2ff716c3f430b7bb10a978f259
SHA15a37bd19e7a7761885fae9ad620412a1dacc5687
SHA25613bb91e9e04fe87862ace269b1f4abb5711fbd1b8d36b31d86587ba9bd7dd8a0
SHA512c81c2ba1a5d6831510ec3fe08ca102878d0f1c5710ec8af209483749fc61773fa3b2aa4ff0f0e19ce1788f56b3ff350cf738b73e1f635a16a5b4d9106160a50c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52595da3d1791f1fef601925418fb36f8
SHA15a99787d2a0c155f5ecb54e5e37deb40a0a979d0
SHA256b30f5319619bb277d02b6d49fa8bbb2b153c537a919a369c816da8c865ab1b62
SHA512026793565fb37eec5f648fa135d819654bd5da518dd1968d3be9e9328adc64c066c1c04894efc87cca511b16cf1558a43b6c5fcd79f9e9a90c1b2e4410261097
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5048119683ad34f50f14b792ac54812
SHA16eaca7df37492023fe96e429f328cd452e838cc5
SHA2566f926ea0f2c7f4083f7f94e7e474a54a1dcbf22cceaac94aef17d9f8660c9b47
SHA512708f9818890f41eaee28116b372fe926ca1d3058483622eb10e58593f5b9a6fadfb3cbd8830f8bd430311d3b0c74eb464ea2a6dfa88ee4c61911f634ea01c3f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5490fd4c1c88d50de1cc84510e99fe9f7
SHA1de4f5a8a19576ab57fbce21399472de879d3e873
SHA256bbb52fa250a98dd52e7bb7266de522e7d968605ae414aded712dc35a3af23c54
SHA512c28791c3a28c3e0c5a9d4a91a359ccb61c6d2d96fa4d43bf51bdc6f86862535ef4e2523470b669813375d561bd3a94a262f9f5590b7cc05600cedb9cf409ac19
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a