Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 20:04
Static task
static1
Behavioral task
behavioral1
Sample
2b7787f2f15d3ba8cd134c12f74c13c9_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2b7787f2f15d3ba8cd134c12f74c13c9_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2b7787f2f15d3ba8cd134c12f74c13c9_JaffaCakes118.html
-
Size
175KB
-
MD5
2b7787f2f15d3ba8cd134c12f74c13c9
-
SHA1
888fdcac9427a7dc196d8fc50f243d6808bed7bf
-
SHA256
1c40532889cfdd9f3d7c85c7ef1362a394dd17e263f677b96f77568931cfe095
-
SHA512
d88c77fcc65d22a772e27d80d9b5787ec241afe4830d6e211ef7db314eaa1de0947c7d678df6a458241cd481e8cd68c3020cd45b21072b84446d74fc24f636c5
-
SSDEEP
1536:SqtY8hd8Wu8pI8Cd8hd8dQg0H//3oS3FGNkFpYfBCJisR+aeTH+WK/Lf1/hmnVSV:SBoT3F/FMBCJiVm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1772 msedge.exe 1772 msedge.exe 3220 msedge.exe 3220 msedge.exe 1168 identity_helper.exe 1168 identity_helper.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3220 wrote to memory of 4964 3220 msedge.exe 79 PID 3220 wrote to memory of 4964 3220 msedge.exe 79 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1084 3220 msedge.exe 80 PID 3220 wrote to memory of 1772 3220 msedge.exe 81 PID 3220 wrote to memory of 1772 3220 msedge.exe 81 PID 3220 wrote to memory of 4212 3220 msedge.exe 82 PID 3220 wrote to memory of 4212 3220 msedge.exe 82 PID 3220 wrote to memory of 4212 3220 msedge.exe 82 PID 3220 wrote to memory of 4212 3220 msedge.exe 82 PID 3220 wrote to memory of 4212 3220 msedge.exe 82 PID 3220 wrote to memory of 4212 3220 msedge.exe 82 PID 3220 wrote to memory of 4212 3220 msedge.exe 82 PID 3220 wrote to memory of 4212 3220 msedge.exe 82 PID 3220 wrote to memory of 4212 3220 msedge.exe 82 PID 3220 wrote to memory of 4212 3220 msedge.exe 82 PID 3220 wrote to memory of 4212 3220 msedge.exe 82 PID 3220 wrote to memory of 4212 3220 msedge.exe 82 PID 3220 wrote to memory of 4212 3220 msedge.exe 82 PID 3220 wrote to memory of 4212 3220 msedge.exe 82 PID 3220 wrote to memory of 4212 3220 msedge.exe 82 PID 3220 wrote to memory of 4212 3220 msedge.exe 82 PID 3220 wrote to memory of 4212 3220 msedge.exe 82 PID 3220 wrote to memory of 4212 3220 msedge.exe 82 PID 3220 wrote to memory of 4212 3220 msedge.exe 82 PID 3220 wrote to memory of 4212 3220 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2b7787f2f15d3ba8cd134c12f74c13c9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd168946f8,0x7ffd16894708,0x7ffd168947182⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,2003605211109905926,15294651446754664431,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,2003605211109905926,15294651446754664431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,2003605211109905926,15294651446754664431,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2003605211109905926,15294651446754664431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2003605211109905926,15294651446754664431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2003605211109905926,15294651446754664431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2003605211109905926,15294651446754664431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2003605211109905926,15294651446754664431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2003605211109905926,15294651446754664431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,2003605211109905926,15294651446754664431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 /prefetch:82⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,2003605211109905926,15294651446754664431,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2003605211109905926,15294651446754664431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2003605211109905926,15294651446754664431,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2003605211109905926,15294651446754664431,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2003605211109905926,15294651446754664431,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4616 /prefetch:12⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,2003605211109905926,15294651446754664431,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3268
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2636
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2000
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize360B
MD5b976749eb61140418c863bae11a8f495
SHA1c8ac9381e86deff95eea2064632c4247bbd9e1f9
SHA25670ae3ffdb3fd49d53f69c132b02dc8030676975e60ad3f789751392f6cb076fc
SHA512a6514b572ea951bf2c5cafee59d83be3880df11049716196099f1dacf887b1496f07a34f024b3973d9c7bdbe738581e6da7c4c55a2ed2ffdbe9ebab48b6009ae
-
Filesize
2KB
MD56d10412e76d2bf53972434ed6e538d57
SHA1a342ab62340e0041378195a47c334f672a3806b2
SHA256dd8c4bc54df046eae39b26b42b05ef4b09da8f4dab6616f2c96490a3054b788b
SHA5122ee3a8c7d49c40985316620cda7e7ddd056ce4fcfde4975fa6f2a59d370ef0e245fb0911498e9d18eef8c901e2e1f436c5bf27d0f084ba905ec40a41604ec809
-
Filesize
2KB
MD5a93ed15f2bdd999c5eddd35f69b1abc6
SHA19bef28260b492d66c7156bc221837b04620000a9
SHA256e40bbcbd08f7e87633ea44dc1fb6b97c13b4889ff50b82550a57b96b926fcf72
SHA512749b7e7d496ef4015a061455aa0c462cb68101c9880d2be59c218c50520e07d1fe7e778fef60de1fda5d94ba3747461b22c28cee73aa5be71912e18ca99b40b5
-
Filesize
6KB
MD51bb4120662b48e69d6e5ccab1fa91aac
SHA12dec93720a57fef43ad665847634ecbe19c6a7ad
SHA25692cfc5faa8f0dc56badb3fe5b98f534a8b1567a5b4dbf55bfd9dce21b7e58333
SHA5127cf036f6c01d7a5dffeed10a043093bb3355f5c646cdfaf599318f888622c91b6820075f71a6b067041c545b6b80045a040c1c35e535a6634fbb4da32cf6fca9
-
Filesize
7KB
MD5571b71c0db9e141343b3c93240ebcff9
SHA116a4e1f4a97c78162ae047d8f361a71dc7bf4b23
SHA2565ae871024eb7c3558454effe459514c27657cfd9ce694aa750e3c08b37fbfc00
SHA5125e9b775085083cd81c00c082cf9a8a99077df9d87f2a54397a9499ddfdee68521bbcb39eb90af5567f54fe1036aca09f8d4b6a65a05128b7157cebb1f535b7f1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52293d973db4648726f30e31cb4307fa1
SHA17eb0fac870755c1bb8f448075bb5c914bb50932f
SHA25666327e6cd0dfc08fa6cab64569f9e2d628a850616086286531f933bc84fa65c1
SHA512215338306a642472a981df9e9319eca870fa596ae500a7a2c5fe1f09a970783bca877c5330c096a7305863d20e34b4c354ae9e664eb57b811651c4827dd4e695