Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 03:25
Static task
static1
Behavioral task
behavioral1
Sample
7b882c2a3cab777811c4ec636e662980_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7b882c2a3cab777811c4ec636e662980_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7b882c2a3cab777811c4ec636e662980_JaffaCakes118.html
-
Size
2KB
-
MD5
7b882c2a3cab777811c4ec636e662980
-
SHA1
150dcb3c5209b697458c59046e7f3d1865ed2265
-
SHA256
4c26fcab39170d4c308df78d2f43661b1a66f5030f2a9757a9b8772422296f47
-
SHA512
8a5747e63a7795b62bdc98e9031cbb35e65aa71d029b919370bc2a3ec02d0622bd877d6ef2b3358c1f6dd6bb13b5f111c95afcdf6dc522e69e3c27bcaa6cfe0d
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EA076401-1CA1-11EF-931A-4205ACB4EED4} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000f0b67a72f711a89441ebe78521bfe4553e9556047cf1b9da74dac8290ba86d06000000000e800000000200002000000032b15a74b2e1eb789e6ba68d43677f46905deb4376d06694a5a93d1ea2cae1e8200000007ea6b70d67d284a4a429cda6f0a1fb3410dcd651deb17b0cb95a5f480819cd5d4000000047c15edf94b4c1ac4e6c97d12aeca56ac632331675db175eec264c54676d6369664afc01b8f47f9d393423dfff8f8d5f781ee1f940d08c1af78f5b384ca4366e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80ae2bbfaeb0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423028589" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2184 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2184 iexplore.exe 2184 iexplore.exe 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE 1836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 1836 2184 iexplore.exe 28 PID 2184 wrote to memory of 1836 2184 iexplore.exe 28 PID 2184 wrote to memory of 1836 2184 iexplore.exe 28 PID 2184 wrote to memory of 1836 2184 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7b882c2a3cab777811c4ec636e662980_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2184 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD567801a34985953782e2dfb6ffb873be0
SHA101b833b17c1d8c5bc1faca46feca9f4ca05b513a
SHA256e25bc5f2feeaa439fd689a6794af9698de89a65d324c2a5f196142a51ebb6bc6
SHA512015e60575901fa2472affab8676c2e12820fb44b3b4516124ef9224272fb8bf5d2303f77518d6778dee9e6151753a77a8e90f95aaad7f45f0967360c100f07b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59264edd6f32701e578875c181be3a7e7
SHA13ff9bd082eb916a403198e4bf1663ded8358d732
SHA2568376941579bc34d33bc1ff9c3efe8d4f8c19670ffdc27a6cafee8511c285c2d3
SHA512e5de11b4765cc63a3c652066dc7d1f4e88c5bf8eef504559f8e2b4cd60ff300893b20d1550e6624546a205a16072019037a6d2d0802aab9122d854a2b995b760
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53bfc14c1ea7b76a93f86a739ae9692be
SHA194494a05b4b647dd3f3534e557dea67fa389aef1
SHA25672ac158f06509e408a3e08d70ddf8e2b2e3ff3e3d78f53d19c4dbfa6c35e840b
SHA512ff62fbc813d63e23e1b749e958a519dda774dfed11406475c2c24701c8e9f3929ada6cf2f7a36586d34996b45afbaa0aba172a98259b70e3db0951f4439d6e53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52263756c6d23e7e024829c215fc9a2dc
SHA1c1b2967d96a297df95ea0cab34efe486b941090a
SHA256596fa0f864cbc3de48a4a81fe16aab50d873054c5467848ad6d2e246162a765e
SHA512a91a076d37c0dba97bbd1bbc0682ebc9b807b9d3f5f91bbaefa43955e5e2c36ee86c183c7daf11a4361125044725d3f195edd3923809e3fbc43055a166534076
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db87ce45eed7cf4949baf9c3084ef0a2
SHA1efaab2d286d34ee27cee8744177cc7b83d5d1f93
SHA25692f017985a098dc28069eb6d09501bb58e92b1a0c6e59e8dd71cd98f695dc3e9
SHA512920cb4e589cbaece464996b6c18b289e95f8c9c1f482bbcfa7237bdf38ecb6dc773821de09e2ff41015ad4d27a8651a505e2ac23a5bb311bc32e3e9e23df346f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52485952da94eb08e333f429f3b5f28bf
SHA1e941f5091a64b876fb646c247e1e5c4b20d1c17a
SHA256970269b13104333cc97480b3228e8502f1ab51a4b7fb54b1266cd4b78cbed150
SHA51251ccb1caf76d40fd735468fb6848e21a84a43c05d8f066e1f544a0044097cde099a5d7afbc54ba1c787678f15ab85ca6c77e36e729dbf6c839131d5b23a47fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a69324d4a62a64dce802ce3d0d74901
SHA1a337d84407278f140cdc4f0a6a7f3766cdcdca8a
SHA256956b38c9c04e6aa0197c4e7f12fffb453cfc0f4281a44030ae1e89d59b64b75c
SHA512b1a0763ff2133f806ae399a9c111997280c065c2fbc163d6d2ff410d11986c7f90daaa118d49f8f59d6fb26d371c10a1462fbc460192d1443d45384b290c9183
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5742fedc15c60eb92303838133333c9c4
SHA1022995643b046728d519363851acc42e5717a50f
SHA2564310ef2770df98ee801767b97d981946bae257e2b586ec6f7988e29f0391d71e
SHA51242ccf7b476a5aa0fb6cb8a5d87676f2fc0e43e1a054c8c95f2731fdf1c99a9558226390827726d1ba9c2ac7f67d6cf0b5755ee28dc430e266b33954987adcac1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b7ece22d535e7408d89da6699e46410e
SHA16d14751d1b5ff6206d0af26148169b6ec5a91f1f
SHA256f3d2f134ebf948294a48b3e69a0410dd922430388d8a1cf36252122df3bbbce6
SHA512140a029b57b16f259a6f91459d1272704025f091fd7d2bda5d361057ed86f02a8b3e3a5b43aed6697200d3fb47ab7237eef2e0a98eda2aa56103cadb2cebada3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56690e8caf98b6c7121e08e2ce008bae4
SHA133788bbd2320434c9a40619a1ddeb1deebff2cb3
SHA25699f8cbffa9bb91b8341bf99e98c4062d67cae25c43ef6b86c273921899641f9f
SHA51218a1496ca24c273165d31e82305f017425e99f0dd3dc313b1aeab652f967c22e9c35ef5e2b546526e48749a1d21560a4c2ad1376212557e85c507f8bb148061e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD588661c68e95acd7db70c75585cfd1ff8
SHA1f92701d13de8e1681cccef7707a839d3b4e3f188
SHA2561bd90ef6f2625ce0b6c52f705a0ec412711b9e222a828303820c140a6302e4d1
SHA512b3d43e269c7aca2af6c36589b7ce5751b749160de628e96d51098385967975d460c3e18b58a0881721a37100d4d0c5acac7be7591180a0b1b38ec1b99c4a78e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9c7f4f28fb20f20ce9ab9ffa06c214e
SHA18c434edfd970628f258c9a84216616554c377d29
SHA256dca3c0f3a5a07894a4e6f09f64fc1d910b7fef0576c8737f0896aa9e4a0da515
SHA51287cd417002b9d3ead72d2978a7782f2deb3e121579ae959366a380aca573148984d61c7ee44d48d5a38304e9be77c162b9aefc0e55d0f5fffa9630a764dde848
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b7f1a9c4be83a75661b490312bbfa8e
SHA105f57f2ea049eb0aa45cefc5565c2545958adc06
SHA256fda164de08a77c33c2b26406406d6f7cf3fcf8e1b373354547b878c85fb64f44
SHA5126abd04a134c77219818d02a6309affdfce5cb0101551439f8c352e93150df7d59d4662b2ee3c2727ac0f8a1fb262d7aeaeb148267d61dc30d9a111caa03b5191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f52622ebdf902084ae3f84578d1c27b
SHA115549e57c5f1ab49e296564035d01be3e0cea11a
SHA256bac8807ff2fb7bbe05080c366208336835465770484a6519f2394c9bd77dd2eb
SHA512c58138942ab2b7d94f76cc670e06c3e20c553265d8a9bf23e2d4c2c4faaaacfea14f317ca27ae3c3d7336132700ad72442695476e269a107cb9134587f968a1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c47209d4d43ccb3ed4e3ced3b0960bb
SHA19478b75e42097097fb6ebb1308d5056eac426c14
SHA256f7472dd1d2d1d60ec4a36c4740a7cd7d8489f33971001f12c7202752c9e430a3
SHA512e90903adf6a90de827580aa5277101c7ec827ce27c17378b335ef0c08245b8288bc1c6e4a5a6c1bc17daabe8b429559aecdab522766211b4d63af2e17b9eb720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525e37741dd3e4e0413786c19f74c59e2
SHA1b61561268fb282c3c2e134d1aa9e768b6eb466e8
SHA256db59447d6aba5c7dc3010fe805e7a1881c07ba7f9b48affdd31d910d2add6c1b
SHA512bfb1c1f2f9967e4ab46a2e315c8bd82dfbb9afaa2975ee9002b55bd95f52a2eebed31e76c4dfa2048d38ce28c796af1b14e902851d4bf7d79325292fc22c076a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a562cf581fc96824fe877f50420a6304
SHA1bdb8e17f486f4681ebf97d4bbf30d7b8f637bd80
SHA256d671b5de003610b9d4482886e77b5dcecf5d1f4229bff50b17d8e9e02c1da0b2
SHA512e3fd7c7c6b06108076767014ba6e43704678ba30c93ac02c09160a129e801de84a384e768fc9513dec249cee5c9cd53be6f85a4b2bec3f6cc7ea63c78d544e3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e6c4b04e0d9645abcaa7db73a7eee69
SHA1f42fee4a3db78f3e7eaa2b8c5e5a3b81fecc66af
SHA2569117444bae4ae3366974adb69a6b0b4943a605343beb9a931508a161bcaa3db0
SHA512d5ef8f0406d257c92e46dfcb6810422d955b9c26cec1afbd54568db5c8ee91397dd548d2389802b5534989874290d0f1b9c9f1400912b8902b5ce52c4ea17327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD584a4eb4e6a0552812fdbde453ca977e7
SHA17b47797f63b10fdfbacc069597b1902f813489ba
SHA256c24275a2cb25864594376079b09b1332deb68daec4224c50f216f59c19fd77a3
SHA5127cb2f47e7882855a3e76c642d0cdd8857c32e7d5afe9d42f6732a837c75ea419c10906c111c2bc4be62857cfd40fa84a3bbe118dd8a6a672b7853f3ff860a614
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580619d067b43d19f5c3bb8e71a857220
SHA130bd90d3dda350c92eb6b574fcbd4aff6b22be0b
SHA256d6cd16312b7daa6cb2c45e9fb5ee13e1c283095872a0f5990e4bc262d4fd654a
SHA5121926a21570f83af49a86d3bfe38e53c8c850b8a81eac6ff8e040917be54faae58d7d62130436d4b9c47e6aa5f25dd10b1d59f9b062cd315368f0bb4ae18768fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b53507513ae0214fa4c2cd7d9dc9a50
SHA14626262a61dee5b1b8fb2684792b6509fd6cc0d1
SHA256c3f34662e5a62509cb7bf5748700a98f14caf51badc22c72b43fe93502ec987d
SHA512484832c66d400671927352debd65f81f20c758f807a427257217cde3d5b375c2f4e5a1e96105a98ca758fad91cd8a979e68466630fb4c0de4f8235973bd8491a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a