Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 23:29
Static task
static1
Behavioral task
behavioral1
Sample
14f63ad599862a8e6b5ba5ffc5846607_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
14f63ad599862a8e6b5ba5ffc5846607_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
14f63ad599862a8e6b5ba5ffc5846607_JaffaCakes118.html
-
Size
23KB
-
MD5
14f63ad599862a8e6b5ba5ffc5846607
-
SHA1
b58a4bf284aa28116b29bbdb9cacbab354180214
-
SHA256
e750f75ec366ab114ae73225e041f8703f39eb2ff692cb79fd92beca4e50690a
-
SHA512
431de6b4778f9ca771824576edeb4b411a05a8ef63b78ef920f1dd1fdcb586a8d40679556f9ef4609b9f8fbcc0bb412a998d7830ff19aa31d52175cd3d3180f6
-
SSDEEP
192:uwzgb5nWenQjxn5Q/5nQieUNnWnQOkEntfjnQTbnxnQXGLnLnQtiqMB0qnYnQ7tJ:nQ/uGnOWJ
Malware Config
Signatures
-
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000abb8596cc50c0546bfda6658dcffc23300000000020000000000106600000001000020000000f8eb3cb59979e4ed9fb0a9287c0055c023cce37bd49a16389084390a3ebe0ad2000000000e80000000020000200000002cab317c912d570085aa191ea8b15a55a908b6144799f60d37b09338a699d312200000009a66426c5f59853f44a6dca2d0312f5727d2ea12cb136c1a743d58aaca58c64540000000cbc856864400d1864e7eb3feca2613ca598cdb4772a3792f3a7e3a1cb38cd7212a02a89b02cbfac45109f6384b392ae258c2c1cb7444b2adaa398f8aa9c4d8c4 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a08fbe027b9eda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421027247" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2DD27BC1-0A6E-11EF-B73D-E693E3B3207D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1120 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1120 iexplore.exe 1120 iexplore.exe 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE 2508 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1120 wrote to memory of 2508 1120 iexplore.exe 28 PID 1120 wrote to memory of 2508 1120 iexplore.exe 28 PID 1120 wrote to memory of 2508 1120 iexplore.exe 28 PID 1120 wrote to memory of 2508 1120 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\14f63ad599862a8e6b5ba5ffc5846607_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1120 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52af03d72803f924fa24f6969ae829607
SHA12e7abbeac67c150e1744b546e51fde10c1c276aa
SHA256b4aa55eeb05f69ad6c03c586a18bf3725c97c7a26624c81682ef2f85a58e751b
SHA51239f843227eec64ae39881f2c24d63c8fb7452a60c1f28f164a515123fab05802743886aef885bfcda6e1731eaaf246e05e8f70a63322e905a320b35248d2909d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5989be241f1a4864340ebba7ff2c64ac4
SHA1d866be4bcf75ac75e0df5a6c5b8fc5b8d06794cd
SHA256abea15a22196dc69a7898cacc4962aa9def24295ca0d329ccc7ed5ef449914c4
SHA5125ecc32e993eb3e628d28742293f9f5a954d8be6ed0df02cff7e9161b4c5aa497874bf1b5ddd1fe0e5f0b97b8c11efb440ed764849d1bcdd7497c66b07d7345e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4398ac7b7f988bbf258cf42518a788b
SHA186950c01056ffec29cebf4111f710ef73dd512e2
SHA256214afc30990326062a53f3b9c98fdf4d2982ff565c60afe1f9d14893fe9d9268
SHA512f99cdcacd850f7a9ee2a6f41027ef9f9955540fd570a5b24fb46adae663c3eaeb477e7fa71a35fbe8b56ccca3b8d6923663cc601728e63ee54b0b4316a9400ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f52b82f60a959fd55dd5ef27d57fc696
SHA1edb6831fa5f9831fafde568fe5a0d5afa6164397
SHA256d8d61b9ae6bf89f902fbbd78644be0977384b48e7433b6cbea9e96dd2e10c77d
SHA512e73f847bd59b72ffaf422fb70f30faa5a29ba9d68caa0b76ad50f13346c48c34169b60f3e4bc0e1b006743e80a5c816f827443adcd1fee5d5d42b78f6ee25724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51101bbb7eb20ba49bab57ff065ba56ef
SHA184fb5cb3a7e8cd6f6aad741d8d84e8b0957a3b6e
SHA25693f8b2aa1ed42363e936a4b048df18a27376b94ac2d0dd754787bacd2cefda30
SHA512b987cb63cb23ef8ebbdc3b87dac6739a37a2cfd5805e4d5dcc8aa8bc1dc3e3ca30204ca96b0822777aa5ac6bae770772498922e81209e77e1cb9b22c1c9589be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aec7c9b6dec53790c4101312f7643289
SHA18ad8ff28f1d6d0856ea34a5f80857b5d0e3b2116
SHA256a48c4262d7385acb290fcf5b93535df6e7d667f4abb43723772c241bcff470ae
SHA512e79bdc30ec390a44cf0801239ea9ed537ca9ef59001d6f020e9d3c0a60d0c1d34c330cd6bc94c2ca9131e6e9ff68e00ba6b94ed6c325785b23f042987aaa6b56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aaa2a0f9acae4028ad487fda49f63a84
SHA1950e832c5f776bc739b5b184d9ef1d2ae59e953a
SHA256b226253397fe349e8b7171c7ed5b0fca33298a443231deb185e974bedd679543
SHA512ad10e4f2e6efaddca213195bdaa4a66730ee84a1d3902300daf518d9fba46f9ff96a3a181e19d0cdc8f226573d8bd40c37ae0548e348409432ca2f4651c7f9e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5945d134f47a9f72796508fdcb5e0b132
SHA1a76dce8195b2259e65d9ef30094593c63546dfdb
SHA256a130c03c0ace5f69722907e457b315eb2919f39aaaa7b41ae2bd287cc9af8812
SHA512fa7a8c3a26b2981dae3078dc1d1d533b51f798680e212d36ee2f9d3c6b328b324918eb6be6f524520f7b07348923d98ba75b8667f10ff2a21def9b4af50b4153
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2478065aacac1b9c74d9a41f44a450c
SHA1d15519a4f84bd6b83b41620bfabe63aa7589d46a
SHA256635cfca97cf63f222c55839a01f30834f880470a4336362d6ce6beb796716321
SHA51222e031a6a437ccb8c37ae0f81f34981c0ceb56beca37eac4abaad9fe3935268ad64b9f6341398b6101951f67959aaca2caa50b19abe6ef6029f371224dad2fcf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513b6e4655b3b6ad3f1f268d97fbd3574
SHA16191d63c51041fb025b4b2c15442d4cb0dba40b5
SHA2560deac66d710228cb7748f494392efa0bd5e83c1dc03fb3096312e0ad43b200fa
SHA51292c44086a14cd8efeaa181def39a18a9cbc4286d26b2d7e63c2f75d4e8a27a08dc920577ac147991a74e54f413d19acc9ba9f82e261d19642df75561243a8b11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554f0d693f6c0aa912d4a0714a941f579
SHA1a7085d55820d75b8b47eb9ab2c8984b87cf15e90
SHA256c0772b9f291b509e0aa5b854605f3d5e3e211fcd2e2e8acb29fd2e6368715f1b
SHA512cdca2e18c9eba7e41cb021f6854914ad317d849687f4bb0681f182fa21747ae2550a2595862ebee41385aaf6182f2ee87af7c051b103b53c856324aac5495852
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b712e07bdcbe95b8a99d424954da4e04
SHA1f2a3236f0fbd13596d7d61f0e34d8cee9da5c5cd
SHA25605687dda5d3ef61b75a819dbdb79bd27baf48315b663a68543563dacff0369ef
SHA512d7774e20628ba2dd098083b365cbe738a8ac1a862eff46f66d0511500edddeeed4c67c799118ee9a07fe23b3fe617be5d21c8bf5ff7735cc8e50fc0ec8d313a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD517396bd994d32effd3bdbd809e27a203
SHA1bcae2e9a08c0411514dfe9d95b9a648835e82fc6
SHA25621eb0e92bc737768be47b821299bc278e3b690136a432062cf759286870c23c9
SHA512161555e8736236aaea7f44ad91f2a84aefcb220ac61dda4cee95a237c55ad35718e32bf54d9e93a636f7462d594d81486c23ca67ca733e66423a1073ad28b41f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5697fbde2df160bd4b5904e0dbadb9ead
SHA1623713cc144a0f00c4e16fd45c954712009ca767
SHA2564b68fd01a14b41b8b1b0b43e683831fa5798e26e00a7eebc3dbe414989bb83cb
SHA51204ecc60160ec4f23f5e6468fe832c7d0173b24a24cf01e203cddd2fed136067cfb7f3941dbebb29efa8e12daba6712b7d7399ebc07433744007b000f23901136
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c9645c5aad7e2f360117807624451d2
SHA12b5224c5d1b6fed4fe99cda46add0aa8c6cec8c8
SHA25642171346c52f736e160f8ec47d8d6238f1b8a8561523914e38f2d3b63fbb5720
SHA5124ab6b011c37ada2abba4266c1ec16916209bd1d848c2a9c82ea34ad8e6fe405f899eba6bd6d05bb5cd99b06f679e4eaedfe78bc79307ac8fac79c15180b6b507
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504b363d15a762a22636f32db494296e9
SHA15ea2e4b03cf63e854b2a64d0311445db83a58ae0
SHA2568ad77c81456db1c75898140e8aae88d9432590c3bb16c4b3c687aa735cf7ddc2
SHA5126bbf07a833a7e9153cfade04a703c564f77833efc52a1c3e4ccd8e98b8f7d1d1bc7fba0b747b453af35af2f725b5445edca12501e6aebeffca05bf3021a145c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD527e5b4a72e8b132ba0ea3ef0172726c5
SHA10c3a67e85f702c7cf8a5bf607fb67d5b175c64ba
SHA2564b4ffd8536639072b4529a2997f07e4516af9c6143a91c0c9fd61e9c32edc3cd
SHA5120f30a5160364185fd03d8f44b91376aea8425ed79b48b46d86cfa8e3b3adfe2b3e7f6fbd9ca7f82015d2ec7b0220018bc91d0d70caafeadf3549cfbecb6d64d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b8bcd5fe179cda78ea86675cb41fa895
SHA171ca581ebe96a2d036d6ba89ddc43dc6811d6bb1
SHA256baba8bd48a39948bd38ad9c40dd48602d1130a701c48618a2fb9d5fbf65cbef7
SHA512c11ab60042a640583161ec1e17d28dfe44324035c7f9f03e814956cef57c751678ad79b3aa89008e4986fe80f12d9713b0e088e00e1283e49348181fe7993840
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a