Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 16:26
Static task
static1
Behavioral task
behavioral1
Sample
728fdae51c72518cfd43c7d88c921ac1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
728fdae51c72518cfd43c7d88c921ac1_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
728fdae51c72518cfd43c7d88c921ac1_JaffaCakes118.html
-
Size
2KB
-
MD5
728fdae51c72518cfd43c7d88c921ac1
-
SHA1
cad42b8103c690d02d44937ef81835f20c9b9be8
-
SHA256
651dace6c78368bb395ff95824dbaf0bb3492e9bb81d019374e5a818e0c526cf
-
SHA512
18e13b9c51105d13d79fb7f20f09f2957fef8da8c53dd3acc179a2b55209a70329b94d2ccf725d456598f2ac610fe7a12af90f6bdad7cd19c004483dd459eb52
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{81F31391-1AB3-11EF-B8F6-D6B84878A518} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50d78b56c0aeda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422816242" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000a4f9aaadaa7faf6b614590f340937cade63cdd041b4566aa20a79ffffba0a028000000000e800000000200002000000011e20d13acb6487db4615ef57ff4f62642f2c4a54a7e449533187a19e49c76f520000000a6512f3d12d123ec57b1168b9f2fd8a0492d8d7fa415d0158a0eb80f5a2743eb400000001680524bfcf0f76ec1af300726d233948f70d39f08ea5034d36cbdab20ac66e4897bdbe5de1d8b53052379f6a9cba1beeba392866ad8ed1bdcd9be19db913057 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2932 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2928 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2928 iexplore.exe 2928 iexplore.exe 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE 2932 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2932 2928 iexplore.exe 28 PID 2928 wrote to memory of 2932 2928 iexplore.exe 28 PID 2928 wrote to memory of 2932 2928 iexplore.exe 28 PID 2928 wrote to memory of 2932 2928 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\728fdae51c72518cfd43c7d88c921ac1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2928 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56537d327d73dd3944d35d8774e13c243
SHA12c237401484407f49342bdc089ec4b94b112d37d
SHA256ec6c7be925922fb1b93b63128dce3a5b9738011b73ce739305302b3558c50f40
SHA512c7c4e42bd1ba4f33a223e1d309a7d49c9e428ee551b1b634c82347972fda3f3456cd925e47f32cba88f5155aa3121d5b46ea8045def2b77f3c98ee5aacbd45dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d78311b47227b7f4ba6ca002c766a62d
SHA1e991f4768e1b7b984e08e9bbb4f4cedaa09e1190
SHA25674df538a7ce5ff2f28f42184fabfa5d8e5531f031815f5176f74b42b785446ac
SHA512738737fad352bfde0821063e5c1fe4ffe1d4cf6b7401c009db7bd672f4834fb23e2ee2b53ddbfac22f4dc17a410affb3f4da74ea49f4a7af826de1363aded7ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfd322dc79aed449ad933b1a7c83bbba
SHA1d56902976ae03bb3553b6de1ab811a08e0e8bb59
SHA256b7c13649f297fb3775852d2e5d23355a1cd792bc27dede1638ab75a9d187b649
SHA512bb8cbecfe43c4b0946d9f73558d5d33e153b45c792a321e3659f0f07e6d04d5db0a844c786609a660d23530347097b1633c996a994b07a2eefe1e79aff4dfbf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528898e4dff1866e6fd22fcafbb0a38ce
SHA14ea569ab260165c5ada3118a38e9cecdc017bc3d
SHA256716cc21615f09de43b3d50a8b6b7e41e12290e3d1e6f1d444e6b9ef1322dcc95
SHA512635201d59d861361dae49e087ff144b8599a0ddf4c7d0ca4ff1db540bf57d11cf2de2205ac94ca6ded007ae0860301123e61a4e59480f6ea71591fe7b87156a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57de0961ea37030afdfc87ef1540ddc5e
SHA11cca869dc59143c75c433ed1e96cdc7685cce116
SHA256e632769ee49ca235636ae24435eb1a8837ee9e058c2003b1c39ea9e7ef4277f3
SHA512e4980913a7577e43784c8bfdbf431627967b90465e2732e4476e12396f69c3df8611d84a8184fa102f9ec86665005a88f5a33edb32ed4ae709d88e2b3d96d879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e01ef191d8d314da6916e15b15b7f787
SHA1e0a649741389c079af5becaea91d7df32e3db95b
SHA256f8e1ed1f92f1bb8ba7ef640967c726497d77099873833feeefc6c8956d24b917
SHA512b5031ec70e58764ca8bde20693c66b16896561fd9a2fea0d68bb1476b4522b2434df2b2790f1fe475b0271bb149a38998dc5ddbd0ada1b333661d18d16d67d25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58b49b74a1ae576c3e4c8fd93fc5113ce
SHA1d6c3e9ba887b238700e93de496f903094fae936e
SHA256255d0b2d0ad930910490d4603856880d7b74c5a031416f24feee95bd1a91258e
SHA512740142d2aaf53285fee1010c001fb34f6abbb6ecfa98df2972f82d93220ac4d3283c2315dbd04f0e2837340274383edbf27caad249a7714d64ecbe8cfd9fab73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529e226e20619ee6ea59daafa3defc063
SHA16009b07c44976be4144e5fe965aa051ef58d8887
SHA2566a267b106a85f7ebd26e58bfea2e737a37e82f97aa602e873a2ef9653540f8fe
SHA512cb80b8569b3a451544d6bdd416aee6ba19ba23ff5f8fd3a2f20c7a28d2a584ac25585dff914ec390fd323137539d48e5b0fef0237cf8f90ffd6c784fd30b80a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57787378f37c16e33954ca10baa93f5eb
SHA16f1ad7ec1042444a44a4b453e9289dbfef8f80fd
SHA2564af9d18f2a19dc83748d7fd652ee511188f207f969e94597fc9fe2625fb31bd8
SHA512629a5155b0c8fd5a836fd5af190c63daef63476d4cf9a06a3fc61f853deeb388ea4e18ca66cb6a1d5566808f619985e4738320fc03b01a8a17e84b51c041cd4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c36a92c44087bcd8a921bc5feea8e652
SHA18261be291ce53d6cdc92fb1b11f59ccf201a0f6d
SHA25654dc9b6bafd206fb3180d872e16df0de5014e68e08f1d744d5871d9205fdd62f
SHA512e2794a19fe3e896eaa5bb369c48910cf22fe448ea038abec10f45af1ff231d48deb48c38b797234dc60531668fbbc77e42658667f6894b074e4a852467e0f456
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cf14614aa682ea23caf914018a29071a
SHA14f37d0fc2796e746d0c2793108e1411aa2ab63a4
SHA25601a9530c2bc58ddab56d9aadae0c7647deff33b3b8f5cdd51b3e817083e9a99a
SHA512a9502f96122dd9d58f9f30a85e7d481914aa9e7a7b57b6e3050007daa065670feb96ee4380cce1576d7e51b76aeda2186905d41ca2299c3211ec3a7238517db3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f9d5478587d38ddc8321e522bc433320
SHA1baa6b007ba24ebda959a0d7801a7c2690bc58aa0
SHA2561e39534f3c0e7240e46ca94f8b8706b1f26a234941dfe0092ee8d6149a54a177
SHA512b4aaff61359f17dabc1d6486e4536af891a83e5f5d408d9b516f9c99676010862ed4ccea2b16c735cfa44b7b4f241b1e259f4c5b9ed37c5e0840923c6925419e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fedc88e3cd0696a38515846cb77d35dd
SHA18eac02c8cfd3cb2b345ff16a94ba0bb5d236dcfc
SHA25640d69941d2999d059aa59957cf3217316c976f1250467a3f157c1599d4b371c0
SHA512c0c7228847a4c6ec31b55077b763de50cd11f2ecfa39a7ac126c0c66e080153c0d35369e2e52e6a73a8b1e6a727092da1b1ff760b57cb2a95a3ecde1801981e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b75569305b4d8eba4bfc06acc114f58e
SHA10e46490158dc522c543b8ca279e93d1b47eb9061
SHA25675c40f0f09bbcf66db095ed55950ab94859126e70c17431d5f6584670d5d36ed
SHA5128b69f13899a205c60f50b74309469a7df1d6d6e44d96ee9a6946d7b36382ec621547130b7934af243ab8928c1c76b664ecd11de9acf1122bd1d801656a38d1e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54594d9e4aff69e57d6f3a802a85d507e
SHA11dc9f888db374adcfe79d001fe6806ebeebd7a9f
SHA25603a2def4eca05af1d76ebcdeb2b11bc4dc1cca9b620a373910ae25a7a1ca33c8
SHA512961c4600ee4c58640e3860c2135918898a0a1dafd909ace5d3a85c6d285030f67e71d00fa55b3f5967f7dda5b62274172a3b3d269e9f3455906040777c67589d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dd29e1bbfbd5b8705020835d7cb1049b
SHA135578d200b0c5de899372fabf407f6530e7f46cf
SHA2561d1b35fa8040cf2c2df21bb9a75d4bc1fb78d3aea5ec2a9b93a7fc579f0fa43d
SHA512b71afaa189fa1658b7be33c8fe69b39dabea960d424204e1c52bc9027766eb6463d171fc0ee33369368929d80e691bc1907e7a99f44a13f2a69c031c24da0b95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588aaaa8da7ee764774a11689dc2f0112
SHA153ac510608f29cd84bc91aa659915424d7ad5bb1
SHA2563eab1131b50907521b8a4867a01528b0988211fbeca600f68f70fe7dfcacc8ff
SHA512c248a797bd456995dae5fcfdfb8241403fdca22b452e261f087c2e58fbdd7ff487b00b9c3bcf4d7017fb0ecb2e9393d2743460f8108e99a88a2da1d04c853141
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fce1bde2eb808760325afa22d1c145a0
SHA1b0de6a90126238a81b694202404b1eea8c13bbba
SHA256386d2c8c2e2fb59653166ceba4c795c5010afa06727ab2ff69ae410a85d36278
SHA51296b3df6b74dde1d7f7e3eeb35d4eb0e721de970e03a2a8a00181253ad10e122c2b8e0fa1616a5c05723a939c9ad262910e9dbf834370c14479bbdc3b98c93c21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD558509c0c6f1c64ddd1b968a2bf197266
SHA1abe38562277efd18f71671b483a5381c4f2c710a
SHA256f76b416c71297d8384932f971571f7e3ae1870c96c6adf0d3bdfc90f52c68b5f
SHA512e9d21f1e95f41df34b456f67b415e79b3b1a05e93575456b50bef3c62517cf6ed9fc828534988eb2ccb968ef2c3d64f50ce3278e3f8cfb5ef83c6f229bf3cd46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD559beb4b71764933a9c1d461fe2cecace
SHA1980bb6702d51cce72ec8aa9359854c792dac8b4f
SHA2565542de35fbe84ccdd4af6a7b3de380b3f3c9bae98c62b1bc1c7c7368e1d36218
SHA5129be99cfae6f8d4add55afc81accca78a82ed3f73102e7f30e1ce8514f009071691ba2a6f6a739ecb1ea5cefc3c8868fed45ce0046a7793cbbc9b8ed3c7145436
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a