Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:45
Static task
static1
Behavioral task
behavioral1
Sample
690a18a66748dd62fdea878dc40664a5_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
690a18a66748dd62fdea878dc40664a5_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
690a18a66748dd62fdea878dc40664a5_JaffaCakes118.html
-
Size
124KB
-
MD5
690a18a66748dd62fdea878dc40664a5
-
SHA1
fed081104bbafa0119918db2468c5def25427b76
-
SHA256
782e9891de2930ae03043eb56ef858eca6371dd4e8d0fe2cf482aa6fcf86977c
-
SHA512
0045d562874717a9cedb081d200e17999a38148554109c04f3eb2a4c2272c0e439ee791c45d7c8bef4adc62badbfe9c976602c171978702b5ac180c17b14efc5
-
SSDEEP
1536:IYOb2I6GOoXeGOD4TlOU9S5eOOCDeBwwenOuveSOIhALEeeONmREjqclspwWTAYF:IYC0fnyLTzwyN7jH2pwGe6npThxBZ
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00c7bf39a2acda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422583402" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{61E49211-1895-11EF-965F-FA9381F5F0AB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000aa06c5355173012647f6a3848f9a786083d1496304321e4c324c1a735af1fd34000000000e80000000020000200000001514df0cae9bd10acf7d62f4924c849123c2d43a7cd419d39bfbe81b7e7a221720000000bf3a5495361e4d2552a26b002ffe8fea283a3f11fc99e646a5ceea79962249de400000004e75fdbed21d94e4dfe877e7ad3edd6952f9f66082f836cbe5098113f2c6bff5798b95c213b63c8306fd48ac4d1ae2c5bdbebda81b3b6551fa79a29d08121593 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1736 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1736 iexplore.exe 1736 iexplore.exe 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE 1704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 1736 wrote to memory of 1704 1736 iexplore.exe IEXPLORE.EXE PID 1736 wrote to memory of 1704 1736 iexplore.exe IEXPLORE.EXE PID 1736 wrote to memory of 1704 1736 iexplore.exe IEXPLORE.EXE PID 1736 wrote to memory of 1704 1736 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\690a18a66748dd62fdea878dc40664a5_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6ca914d0e814d05a37573ed95ba68ac
SHA14215f00c14ef9dbd1402af96d24bf5014425cc2b
SHA256fb59485916e402a39c6ef1fbb5e137be76dcb6c47b5f0c35ded02c1827ccd557
SHA5121f45c58797e74c328451db51bfd218d8c50dc062bc72923df300d60fc75aa982de145031e3910f2581c497889151b4e578eb7c7a253e5e62c5dd79456cb8b64f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc39e36c95b2cf26d0a4c33a59929da3
SHA102ca74dbeb0be871c4764d2228bb74aead206f39
SHA25672aef1be7da54014b5b8fad67d1dcb168941e106a8dfc25b9a94957b8a321c9b
SHA51202c523ea6aa6858c911d4826e443a32a3daf9ed2e84644bbccf3c8ba4b7e43ea7945ce0c0b77e044eea7a8b4bbe7bdf6d47db08ad3e20447bb8900bd465bee77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a15c09c8967bf51fbc48c2b60fda16e0
SHA13c68a40400f47d632428298a344b731c9fa34750
SHA2567d706c27ca120e3a7e05d0b6d94246f55223199f98ae5b9243c3f73a1b60261a
SHA5124c0a4635a2054ff7eeefcc13c23c549a858c3f9f78b83a4834a36a68808f34b9073aa620eea3d78dd5b71d6bd5aec5d3fe9f648c4426fdcfca3953d44e16f3ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbc7e483271a0f29c2df7b54c0c43473
SHA1272e2515721ceb4aafac661f1efb87333dd379fc
SHA256fe702febcbd1ba15ad5c80113906e0ef0c23195c586b13338bbdd337212756ce
SHA5120f356366941126ef5073c78c8f1714ee3b903f305212ed1cafbbfd869da7fcd5a05d7fdebde7e602b5c3ef96bf229f30833af9f1ce91d6174b233ef55e7f7ec0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d3d9083ed47018548bfab0a01b5ed43
SHA1e855db930a7d2682ecb814a0537a3bab7af76256
SHA2561fd7438145468bbabc3e1e8d1e7e33f70457c6c0f5c68ab14abf2578629c1b01
SHA512b481a6bc6329959fc5d7d177505bfd1c385574a23e147afcab96e23c04660a3b1dc3cd4757be51ca4209984f6d65e1bd3963e33d5222bb54769c51f7aa5aeac8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acb85a2d6178149ba894f9f49f05947e
SHA11596255ad18333fb27d24f9cb3f3bbbfd6a4b5b3
SHA256cddd056c5faf84eae66b5a767c1bcb6f163eda28433dea20f8802ce4dfa84175
SHA5126087b654c031bec065faba3eab92c469a9104e8ebb40958cd6c3366c1cafb24e5c22340733e0a0b586f0fe827a78ca4dadc1310baec57708e810ea5058deaddf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514bd56241874cef7e9b7d1f9542cfa98
SHA1c56b19252e3bef499b648af0cef705de3b3f95c5
SHA2560ad88c2b3b27252aaea6c8d655c1af4fd98253d0ab7dd4aae620782c452fd083
SHA51278690e2ae4a14017e37b6394182c04ccf9fa125fd4d209d0e70ca6011b1e58cb968b38197e5770489278bafe8c12e7ba0a030c9dddfb085c314e7cd068dffb99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55ae2bbee4e817d50e4575398d78fe196
SHA184b1691ed0aefb7d8cfd360999912d16fa85975e
SHA25602e92bc0179726e96646225db703e8dc048463db8ee8c294322f904d0f0445c9
SHA512f01dddc72042cb3ec88bb0505c86da7a99c7c49d2f472f37f9baf842e9d34b5725efbfc330d06af3545dad5bd13d5cbe1ba83efe0a03caac90a2676a08b2ec2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3ad9cfcf24c7b58762c546f429d209f
SHA170c301573810d1eb48f1816825744f177a97d458
SHA2566f99d6071d99cb8cb2a2f9f05b1b3e1917e3006dbfc92a4ed375084a30a6594e
SHA5129d34fdbcb21c7bc304760c0e9dc5319bf5330932f103ff02c9795b14cedecffeb681b8c8c7de8d4430c9a0cdc6bef207c1546ce86aedcb1a7996267c075b3b82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD503705cc5befa62916f9cb1a4faeb4063
SHA15161f758814f29eba4d739be84bdd7a47de14610
SHA256e2093d5ea7ad29e34435bb1202f9dedda12619ff81a8f7fce4004dcc9e48bf81
SHA5120e73ff2471a7e1b07409a84b23df9e2ca7514a9dcfce80556a4b2085af6bf451721ca1a574960b7c9a5420b1d9bd3024aa0eff000fef472ac38af10aad8b9fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bba53eed890333a2a512555293c5bdbf
SHA1af5184e375017ca4c0bc3fe4116b278220fd24d7
SHA25626b5aeb72394c1fcaa2500de14d089c2bcaa6532de01f94ffc18f9d866017f86
SHA5129b45f6dd4c2250c60842a41d4ae4980ac9edb87fa91d75bd749cf50b1499f6eaf0770af5d45bdfa501e309095cb1032356d9818aadec35f86e859144a3c9d50a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59d35017d28a381208892a81ba650dff5
SHA136614456fc49c02da24ee804e16c776ec73c5ac7
SHA2561e1b026e2c3285b23d9f4d9ed2c16cc027f8b5a28cec4d461a5bed4c9c25523c
SHA512e6be47f666113438786769cb4bbef9343796c06f77a011fdee93fd39db2acaa9c990e48a15dc18a94b9b1c8e9006e81e08c471d8df458e6b4c1c0953df130492
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57bab572ca23301a4b65d0c614a63054d
SHA16873ddb514790fa2d55594b47e1487968f7f9c23
SHA256947bea6366cb5ef35ec41efe41cd17b6f09981574159cf78158a51f7a2ced852
SHA512e129707997e3e6ca740bd8c7e71cea6d96999552140da5b101970c0ebaa6da5be0c93934975d34222ad3340d94772eb7ae79a8858a4a3aa0d7601bccd5e7710a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4e37048b08542f8a20f9dd191af2058
SHA13e45551c977e402db490c1b60e1cf3cedf437da2
SHA2560abff622547ff5fb6aa317f711156ac6ed1e3110fdbd58b26a181698530f0105
SHA5124ebfad4968675734c6eb3eb445354b36e4e5059a9b644fb7e74a4bc933d5b1f47163823ad6ef8d1533a62041c46f04ac327ec590072a1e28a86de9b1cb97bb9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2e5e8a19d37255dc1cbd68649561bc7
SHA148a6be90956aeb4388adcead8f22a597782d84fc
SHA256b6cb24d2dc48bb32819da58dd7194732add3c52798060f36f7534ce042f1e9ad
SHA5125cade8dc2c412cf74f4982374d2493b0f79f880f8c4333da436d6b990b4b634663b44d4cc39e21ec20073f4bae13dbfd8888bb2997f59588c87cefd58aa27b42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8200572bbe9978eb3b0c60cfb3603d1
SHA1c05ef90303f5ac8588198aafef712884ef255caf
SHA2567948c24aa1ca993035ddfe7a7c9ba6241e6cc80146fbcaae14fd3ee8396383d2
SHA51269ee350ac15a43e1f3e378919dec5c64e68acebc34efb6dad08d8423b0ce827a409df610033b7fe447c654c34dc319afdde96564c788800d2f54db0037d431a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529691a3e5adb062799b0819b27e646a3
SHA1bb184883b641da5c0568aee3cfa8a3e0ff3f729d
SHA256a222fbb3896d1da54cb4330d2f27fa51c1f0b27516071c7f37f42f7d81454230
SHA512f59e7b0ba820ce5bead612f3354f428089cf33daa0c4ea0be8fc3257d7da7eb98f3183086d1bdf809a0e039fb77d66abd0eecdee17cd03c2ab16e73a383d9209
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\J8SD872Q\dnserrordiagoff[1]
Filesize1KB
MD547f581b112d58eda23ea8b2e08cf0ff0
SHA16ec1df5eaec1439573aef0fb96dabfc953305e5b
SHA256b1c947d00db5fce43314c56c663dbeae0ffa13407c9c16225c17ccefc3afa928
SHA512187383eef3d646091e9f68eff680a11c7947b3d9b54a78cc6de4a04629d7037e9c97673ac054a6f1cf591235c110ca181a6b69ecba0e5032168f56f4486fff92
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MNCIS1YI\httpErrorPagesScripts[1]
Filesize8KB
MD53f57b781cb3ef114dd0b665151571b7b
SHA1ce6a63f996df3a1cccb81720e21204b825e0238c
SHA25646e019fa34465f4ed096a9665d1827b54553931ad82e98be01edb1ddbc94d3ad
SHA5128cbf4ef582332ae7ea605f910ad6f8a4bc28513482409fa84f08943a72cac2cf0fa32b6af4c20c697e1fac2c5ba16b5a64a23af0c11eefbf69625b8f9f90c8fa
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TTL9DZJ3\errorPageStrings[1]
Filesize2KB
MD5e3e4a98353f119b80b323302f26b78fa
SHA120ee35a370cdd3a8a7d04b506410300fd0a6a864
SHA2569466d620dc57835a2475f8f71e304f54aee7160e134ba160baae0f19e5e71e66
SHA512d8e4d73c76804a5abebd5dbc3a86dcdb6e73107b873175a8de67332c113fb7c4899890bf7972e467866fa4cd100a7e2a10a770e5a9c41cbf23b54351b771dcee
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a