Analysis
-
max time kernel
122s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:24
Static task
static1
Behavioral task
behavioral1
Sample
69703f832a2565e7be204e68e2d9ac6d_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
69703f832a2565e7be204e68e2d9ac6d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
69703f832a2565e7be204e68e2d9ac6d_JaffaCakes118.html
-
Size
25KB
-
MD5
69703f832a2565e7be204e68e2d9ac6d
-
SHA1
00499404e48d2316b93487665b22e99624c6021d
-
SHA256
363aa3ec78a73aed8b185eb0b88785068ab66e6a6374e05ed7f9bce7b9522dc1
-
SHA512
7673e6959af603039dd2c45cf9e7d28e63f1f788a77846a40305504a4d109941eea892b1484067edfe84373e025e41d5b61065e8ec2fc68107f67930ea6a9bcf
-
SSDEEP
768:fTgPK1+sepybtjtMSe+edSe+ehSe+efCe+eXNdhiQU+nx2d47AsbwIvh:fTgPK1+sepybtjtMSe+edSe+ehSe+efL
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000092ad3c57a2f2c83fe49967b1025c708c2acbf94b3a73657340cc7024d5fbdfaa000000000e8000000002000020000000cb5b2646f32878b5fd91a4e62db12a64e84330f239260d062c46e5e49411baae20000000e3bc6aa0a4f319a84372e8b14c21ce259e1411c5a88347e74e4d6ee1f98e14a240000000acbeac7cad15a1c7ad5864b751c6c19f486ce3f242a4d2db0ac5ecb2483d4ff3f5b0925e968890be87a3b56ecf5bce4b44b25993d50bb432f2ead5fa5306f28f iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8032fb5bb8acda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422592920" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8654B7E1-18AB-11EF-89B4-66A5A0AB388F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2976 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2976 iexplore.exe 2976 iexplore.exe 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
iexplore.exedescription pid process target process PID 2976 wrote to memory of 2432 2976 iexplore.exe IEXPLORE.EXE PID 2976 wrote to memory of 2432 2976 iexplore.exe IEXPLORE.EXE PID 2976 wrote to memory of 2432 2976 iexplore.exe IEXPLORE.EXE PID 2976 wrote to memory of 2432 2976 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69703f832a2565e7be204e68e2d9ac6d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2976 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2432
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5baf6093d0e5514adbf56206d5222f1
SHA1dbc8893f91207303a9e3160e632dafc6fdf920e9
SHA256f4ba1cda49624d6e30364beb0b684fdd4b2fd0bf09bceb1033f833e3f19db65f
SHA5124f3bae0b64476b826b3b3d57408bef869acde7c03b3a12fcc1cd559054a2e87ceec408a94b8eeb25e4467a68367b06a12c6bbe1b863666b2483945591d94873a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a82de988108b03e6e0a29fca7e7a986
SHA1781afc751feb28ce754a2bb94ed4128004dd9134
SHA256924ca44eaa689369308017cb64e4cece59547e6d518efa69374454a1d2fbb6f7
SHA512e032826ea7477ebfc1b414e95a91b3d6b7b3567b9047ac48e005f9356c46a3989aa4fe9b025754eb3bbf5b739c2faa1d4936f44e760440d07ed52a6f3e0c4b08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52e647f9ffb962452ea3ae8334a6432c9
SHA12524efe1919b02560d332fb38b32c6691f962538
SHA2568636da290b519a18b46de315fe2dfb3ee35da9e68ae32b96bcca2470d7c284a4
SHA5122eeee6a2f5f3c33c06eff81d99a7edc4de4e584c526a9996f0539e6178af8ccb130bfbbf4da7ae595e656a7a19013e937ef87c0bd53a85022e0b4d27d8e39c25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2860fa9a59ded18d94e6270f5b0cf5f
SHA1a5eeefdb253475af5bedff552b7af436124d219d
SHA2566106d3827380e75bb0dd4b7e522420e8cd9bf62906f65ff94adbe35c2892b060
SHA512992c52b712cface904bea002c4cbbd63aef235645efc2fc2c498f78fdeee0ed252b50bb10d3c97d945905b3bbea775de91dc0ce57ade50cad55bdeb799ce496e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5175ca58e5c7f06db2d41a327dfa97d1a
SHA1ab1be5beeab4ffcd589f2ed3166952876b4fd570
SHA256f316b023a7eca9bc2be3739662e881b63b3163d840e85581c83e48e30edf4ee2
SHA512200d4de4c4bf2213176a1efccf13e2a70f76ada80e7ae92fe02209db089bc284cea9db8a701b6327ef177c38ffa5e527fe09acf8191f5e69a3a2fdaa27c0e1d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f23121f12377ae9a3fb37ace1b231d42
SHA1607e49ce3621a2e0d318599240a29f584c38d372
SHA256f272544d5086363e8b87608e21fe826738fc1e990d7884bf9497010e0501e5cd
SHA512e5621f3e042da543f900b4e323c47be5601ab0440d822d93a7f9e2295f04296447ead0f2688e2b808069aa458618fb027e3bf4bb24b6bb9cace8e7d76b4daebc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500fd693e3cae6dbbe7202b429f1eb375
SHA11057b0109735ba62b4e5c5146080aed333a0ec60
SHA256bd8dad59480f7de7b7ac9e1032a9d2021cbbe1fbb3d24cc3dfd195758828358f
SHA512a7481afb424b1a4d5f8b0a32fd46beb260c82f6f8e6572ec2e0e134b442ca0bf82ec78a12168fdae8aeef256b5960567ba882046b4417ae5b5284eb93330ef81
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5febf1df75b5fe13cb3b40e43196c061b
SHA1a9f5d02f6d6e042e22d54ea0f6f1879fe4591be6
SHA256da58f778cbbf108be4adfac1faa547fdf5d4c172932a9f40375fa34b428edf39
SHA512ecc72f06d80e709d819d79a11db74f7c72b535334f05f20251fb49780ba98ece34b08640a5f48bce7dac84a863e96f16953bec09e33eba123a7b1ee06c803089
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be61f54e9d7fe6cec295d5a797925008
SHA167e1c27b60e415d1ae4b0ad6bca8ba8bbd0cbc1a
SHA256ff3da6a01cf14f487aa982a43c680d0c0f1aa9a0c4a82d51721a6813b87b563f
SHA512b56c42db2a1b221cc7d90364703966e2cad7b9b8d658205dd6e819856a235b8be926a47f5acfea6a234bf3327d060345ae3cb551ed91fc39a00059af85441be2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fdeaf9fe43d388c12d95f7dcb729c040
SHA1d4467c55bd8c2824699a94ec31076fb6e06421b4
SHA256482c6c8fae69d9de5e81f6f4dbdda3784b9c63dc36098add00c2ae83f130a1f9
SHA512d29f562e2f5b9eeff1316fa94f0811d0129e17f8e102f55ff2385e2f7ce39abe7a2d3135379e3d92bbf8139e143ec426ec9913895d11325660baa630fbabd020
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cec282d260b7286dc220870b8fa333b2
SHA132885850dbc884d3b67e2e92cd0eb0ff980dde36
SHA25610b9647e0fae6cd6d68f6786b701cef750db9ba475f7765a508ad220be97503d
SHA512dce3e71d63fb8ef9701a9faa0914678dffb37545e8cd6afc6241316c668eaa5aec50545a118e0c0d08cd9395c5f8efb122e05b055c735fe8dbdbc65eafed77ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515c31abaaf5af24caf50bc6599fd83de
SHA1171726c579f2b6feca37e7b38b10b96d1953ba79
SHA25696080bc85e9b093736f1fb222144de3934ab8d7978b4a800533b6ab633b5966d
SHA5126453b522ebb9b395d4eb99e6c69bf06413ea8e9661c8f7dd8618be89589d4b1dd0550a36efa7200a5537e140a8f14c62fa7ed6bc8927a8b3f1161c89fe3f25f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543823f1bcbb296248ed6fe60a9575d4a
SHA1afa1f503528b1a8ae66ecaa81b470f4186bfff4a
SHA25681340115a4e255bf243861c808acd8d09546bcf343edf5bc8be880dbfaf39d61
SHA512a5d208fc3f11790a24dfcf7fa37217e4d2f5eccf72a45f0fbb7fc505835132cde069cd64fb675d855f8fc1a2904e77d5b1c89420e0d90fd9a3e7bbc5e8239514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7c2c81eec4c9941c5e1a09c3f2cbcf4
SHA1f91fc33548e6d7e0fefe8ca97eb236ce7305d6df
SHA256686d1883875ef8f06490c3eba3bac4ecd3a67efbd79d91868a6efe547b4a07cb
SHA512898cd314c8aaaf31ca0ba548fbeb0551a89126d4d870f5f8e32fbb3e497a9a72512ba698daa2aa110e706c1de6a2491d0a741b8d8baed53facf24a2dde3bac03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59cd366d107d023a06eed56b7c3c30f77
SHA1e1c4c13eb435421f0925ba7b1939bde9ad7c81cf
SHA2563694b2533817052f93692510111b2cc8c38c46853108ac25707cd1a6b52720a2
SHA5128003114f426f06a8daf90157edf0363a899fd4d401dfae22748ef9ef0adbe6e2f221f672f5fb03be802cc1cf4c3313f91d8e7df75a62f10901b3fe8387f8acd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e46697d468d94ed7dea179f7b8f0ce29
SHA1a26be38ad73b33c2868cfe19f184026babc363ec
SHA256fc2a947279ff8d75d97e0c192464e0b0c176654cb4f2cee8700443ee31688846
SHA512d8047a717975f0ed730eeadc0eaa6adb7e79b2df5a963815a1cb9c53fb35af7a72094ca92c1837fc835246c7702374864c1a46ca9ecaae5615315b4f2d4f2aba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e725158588b16d56ae74cd75dab0be5
SHA1c89ead2523ba24d794907c9db8204258412c2d66
SHA256f04c3f200c9a4f7b3721343cb8f919b647a64a667ed14c5bc8f768cfb23f15be
SHA51227357d45cccd6573f71adb2d55fccf2077801e55ebcd21e7f85fa7c328453ee1ba706e73b96e9a1ccf6dbc842d9cb7f2a4185292b266bc129ab69c6bd12172b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52d41202569d255f9908584d2c5855998
SHA1d465f77a04dfcd17736f2bb89ad39f15a39d08a2
SHA25698c4ddcde74a1cddb77d7e0f97f7a925d54b4d2cd0127a72c788cec1ec59a986
SHA512b69183bcc9470119cc4bc9b754459ba29673073632ce9a406f96dfa5c869bef75f45b498ee07bd4736f36d4428b8988cc1000fe7b4344aa01ba272f010bcdb03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD545d80e15788d0149be23d6b4dec1953d
SHA1c44544b73ad7e26c304b5c87cf0a9cda23330c65
SHA256ffb36c7d943e1873c82f6211a445d64bc7d1d782b80e6255a5cdb9a3a492ab41
SHA512e73cdb51133e44d445527f6c0fd0111ae89b7db8339a42382fd64e27b1b54ffecd34c0e27dc7cb1869e51b31d8e51d35705e9237df20541b918b1f0ef3d474ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cc958030bd9edb8732c8508f8104f7bb
SHA17d01af37c83625bf126152ff35df3fab1325935e
SHA256adceebe5f5c83ca05420e5ba1fa3ee4c84ffe2bd9a79450e65ec7b2f3482235b
SHA512d46511f5003f4ad8fdc43b29bb159fc993df8592f53376e8db819ca5fa9787a32b077ddbb16f208e0123e12666e7b06bfd59fbca9be0b851a26a43935a27f36f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a