Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 09:15
Static task
static1
Behavioral task
behavioral1
Sample
ef7b8a56292d9170d59b470149d38495_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ef7b8a56292d9170d59b470149d38495_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ef7b8a56292d9170d59b470149d38495_JaffaCakes118.exe
-
Size
272KB
-
MD5
ef7b8a56292d9170d59b470149d38495
-
SHA1
12f5b67f0b021f3c7420ead77b0dc83ff8679e1d
-
SHA256
a4b74be3be8dccde00ff1adbc434985cf6c1fb6cc4cae533ffcffaed9a298034
-
SHA512
2af8b0256910e5987d57342f87abbc7907c28ef981884d1fa948b651b16440cfc90f813ea0ee935b20c6e6fc74aa81feeb48f67f9bde43cf26f831aca7fdd301
-
SSDEEP
3072:KlU4/i3619cTDWXWwR27UhrtcMYKojspfdwR73+zFpEcrMxfDUk98k3CAi1mSDUf:KyIeGfR27yr/1mujEryk98k3Bicf
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2400 igfxhp32.exe -
Executes dropped EXE 42 IoCs
pid Process 2400 igfxhp32.exe 2736 igfxhp32.exe 2636 igfxhp32.exe 2612 igfxhp32.exe 1140 igfxhp32.exe 1072 igfxhp32.exe 844 igfxhp32.exe 1984 igfxhp32.exe 1972 igfxhp32.exe 2876 igfxhp32.exe 1792 igfxhp32.exe 2648 igfxhp32.exe 2832 igfxhp32.exe 956 igfxhp32.exe 292 igfxhp32.exe 688 igfxhp32.exe 2564 igfxhp32.exe 1552 igfxhp32.exe 1632 igfxhp32.exe 1780 igfxhp32.exe 2316 igfxhp32.exe 2192 igfxhp32.exe 2264 igfxhp32.exe 2364 igfxhp32.exe 2128 igfxhp32.exe 2640 igfxhp32.exe 2660 igfxhp32.exe 1540 igfxhp32.exe 1636 igfxhp32.exe 1808 igfxhp32.exe 1712 igfxhp32.exe 996 igfxhp32.exe 1216 igfxhp32.exe 1144 igfxhp32.exe 2480 igfxhp32.exe 2492 igfxhp32.exe 1792 igfxhp32.exe 1040 igfxhp32.exe 1864 igfxhp32.exe 928 igfxhp32.exe 1928 igfxhp32.exe 336 igfxhp32.exe -
Loads dropped DLL 64 IoCs
pid Process 1692 ef7b8a56292d9170d59b470149d38495_JaffaCakes118.exe 1692 ef7b8a56292d9170d59b470149d38495_JaffaCakes118.exe 2400 igfxhp32.exe 2400 igfxhp32.exe 2736 igfxhp32.exe 2736 igfxhp32.exe 2636 igfxhp32.exe 2636 igfxhp32.exe 2612 igfxhp32.exe 2612 igfxhp32.exe 1140 igfxhp32.exe 1140 igfxhp32.exe 1072 igfxhp32.exe 1072 igfxhp32.exe 844 igfxhp32.exe 844 igfxhp32.exe 1984 igfxhp32.exe 1984 igfxhp32.exe 1972 igfxhp32.exe 1972 igfxhp32.exe 2876 igfxhp32.exe 2876 igfxhp32.exe 1792 igfxhp32.exe 1792 igfxhp32.exe 2648 igfxhp32.exe 2648 igfxhp32.exe 2832 igfxhp32.exe 2832 igfxhp32.exe 956 igfxhp32.exe 956 igfxhp32.exe 292 igfxhp32.exe 292 igfxhp32.exe 688 igfxhp32.exe 688 igfxhp32.exe 2564 igfxhp32.exe 2564 igfxhp32.exe 1552 igfxhp32.exe 1552 igfxhp32.exe 1632 igfxhp32.exe 1632 igfxhp32.exe 1780 igfxhp32.exe 1780 igfxhp32.exe 2316 igfxhp32.exe 2316 igfxhp32.exe 2192 igfxhp32.exe 2192 igfxhp32.exe 2264 igfxhp32.exe 2264 igfxhp32.exe 2364 igfxhp32.exe 2364 igfxhp32.exe 2128 igfxhp32.exe 2128 igfxhp32.exe 2640 igfxhp32.exe 2640 igfxhp32.exe 2660 igfxhp32.exe 2660 igfxhp32.exe 1540 igfxhp32.exe 1540 igfxhp32.exe 1636 igfxhp32.exe 1636 igfxhp32.exe 1808 igfxhp32.exe 1808 igfxhp32.exe 1712 igfxhp32.exe 1712 igfxhp32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 ef7b8a56292d9170d59b470149d38495_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ef7b8a56292d9170d59b470149d38495_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxhp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 igfxhp32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\ igfxhp32.exe File opened for modification C:\Windows\SysWOW64\ igfxhp32.exe File created C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File created C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File created C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File created C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\ igfxhp32.exe File opened for modification C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\ igfxhp32.exe File opened for modification C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File created C:\Windows\SysWOW64\igfxhp32.exe ef7b8a56292d9170d59b470149d38495_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\ igfxhp32.exe File opened for modification C:\Windows\SysWOW64\ igfxhp32.exe File opened for modification C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File created C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\ igfxhp32.exe File created C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\ igfxhp32.exe File created C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File created C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File created C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\ igfxhp32.exe File opened for modification C:\Windows\SysWOW64\ igfxhp32.exe File created C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File created C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File created C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\ igfxhp32.exe File opened for modification C:\Windows\SysWOW64\ igfxhp32.exe File opened for modification C:\Windows\SysWOW64\ igfxhp32.exe File created C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File created C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\ igfxhp32.exe File created C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\ igfxhp32.exe File opened for modification C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File created C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\ igfxhp32.exe File opened for modification C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File created C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File created C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\ igfxhp32.exe File opened for modification C:\Windows\SysWOW64\ igfxhp32.exe File created C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\ igfxhp32.exe File created C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File created C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe File opened for modification C:\Windows\SysWOW64\ igfxhp32.exe File created C:\Windows\SysWOW64\igfxhp32.exe igfxhp32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 43 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef7b8a56292d9170d59b470149d38495_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxhp32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1692 ef7b8a56292d9170d59b470149d38495_JaffaCakes118.exe 1692 ef7b8a56292d9170d59b470149d38495_JaffaCakes118.exe 2400 igfxhp32.exe 2400 igfxhp32.exe 2736 igfxhp32.exe 2736 igfxhp32.exe 2636 igfxhp32.exe 2636 igfxhp32.exe 2612 igfxhp32.exe 2612 igfxhp32.exe 1140 igfxhp32.exe 1140 igfxhp32.exe 1072 igfxhp32.exe 1072 igfxhp32.exe 844 igfxhp32.exe 844 igfxhp32.exe 1984 igfxhp32.exe 1984 igfxhp32.exe 1972 igfxhp32.exe 1972 igfxhp32.exe 2876 igfxhp32.exe 2876 igfxhp32.exe 1792 igfxhp32.exe 1792 igfxhp32.exe 2648 igfxhp32.exe 2648 igfxhp32.exe 2832 igfxhp32.exe 2832 igfxhp32.exe 956 igfxhp32.exe 956 igfxhp32.exe 292 igfxhp32.exe 292 igfxhp32.exe 688 igfxhp32.exe 688 igfxhp32.exe 2564 igfxhp32.exe 2564 igfxhp32.exe 1552 igfxhp32.exe 1552 igfxhp32.exe 1632 igfxhp32.exe 1632 igfxhp32.exe 1780 igfxhp32.exe 1780 igfxhp32.exe 2316 igfxhp32.exe 2316 igfxhp32.exe 2192 igfxhp32.exe 2192 igfxhp32.exe 2264 igfxhp32.exe 2264 igfxhp32.exe 2364 igfxhp32.exe 2364 igfxhp32.exe 2128 igfxhp32.exe 2128 igfxhp32.exe 2640 igfxhp32.exe 2640 igfxhp32.exe 2660 igfxhp32.exe 2660 igfxhp32.exe 1540 igfxhp32.exe 1540 igfxhp32.exe 1636 igfxhp32.exe 1636 igfxhp32.exe 1808 igfxhp32.exe 1808 igfxhp32.exe 1712 igfxhp32.exe 1712 igfxhp32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1692 wrote to memory of 2400 1692 ef7b8a56292d9170d59b470149d38495_JaffaCakes118.exe 31 PID 1692 wrote to memory of 2400 1692 ef7b8a56292d9170d59b470149d38495_JaffaCakes118.exe 31 PID 1692 wrote to memory of 2400 1692 ef7b8a56292d9170d59b470149d38495_JaffaCakes118.exe 31 PID 1692 wrote to memory of 2400 1692 ef7b8a56292d9170d59b470149d38495_JaffaCakes118.exe 31 PID 2400 wrote to memory of 2736 2400 igfxhp32.exe 32 PID 2400 wrote to memory of 2736 2400 igfxhp32.exe 32 PID 2400 wrote to memory of 2736 2400 igfxhp32.exe 32 PID 2400 wrote to memory of 2736 2400 igfxhp32.exe 32 PID 2736 wrote to memory of 2636 2736 igfxhp32.exe 33 PID 2736 wrote to memory of 2636 2736 igfxhp32.exe 33 PID 2736 wrote to memory of 2636 2736 igfxhp32.exe 33 PID 2736 wrote to memory of 2636 2736 igfxhp32.exe 33 PID 2636 wrote to memory of 2612 2636 igfxhp32.exe 34 PID 2636 wrote to memory of 2612 2636 igfxhp32.exe 34 PID 2636 wrote to memory of 2612 2636 igfxhp32.exe 34 PID 2636 wrote to memory of 2612 2636 igfxhp32.exe 34 PID 2612 wrote to memory of 1140 2612 igfxhp32.exe 35 PID 2612 wrote to memory of 1140 2612 igfxhp32.exe 35 PID 2612 wrote to memory of 1140 2612 igfxhp32.exe 35 PID 2612 wrote to memory of 1140 2612 igfxhp32.exe 35 PID 1140 wrote to memory of 1072 1140 igfxhp32.exe 36 PID 1140 wrote to memory of 1072 1140 igfxhp32.exe 36 PID 1140 wrote to memory of 1072 1140 igfxhp32.exe 36 PID 1140 wrote to memory of 1072 1140 igfxhp32.exe 36 PID 1072 wrote to memory of 844 1072 igfxhp32.exe 37 PID 1072 wrote to memory of 844 1072 igfxhp32.exe 37 PID 1072 wrote to memory of 844 1072 igfxhp32.exe 37 PID 1072 wrote to memory of 844 1072 igfxhp32.exe 37 PID 844 wrote to memory of 1984 844 igfxhp32.exe 38 PID 844 wrote to memory of 1984 844 igfxhp32.exe 38 PID 844 wrote to memory of 1984 844 igfxhp32.exe 38 PID 844 wrote to memory of 1984 844 igfxhp32.exe 38 PID 1984 wrote to memory of 1972 1984 igfxhp32.exe 39 PID 1984 wrote to memory of 1972 1984 igfxhp32.exe 39 PID 1984 wrote to memory of 1972 1984 igfxhp32.exe 39 PID 1984 wrote to memory of 1972 1984 igfxhp32.exe 39 PID 1972 wrote to memory of 2876 1972 igfxhp32.exe 40 PID 1972 wrote to memory of 2876 1972 igfxhp32.exe 40 PID 1972 wrote to memory of 2876 1972 igfxhp32.exe 40 PID 1972 wrote to memory of 2876 1972 igfxhp32.exe 40 PID 2876 wrote to memory of 1792 2876 igfxhp32.exe 41 PID 2876 wrote to memory of 1792 2876 igfxhp32.exe 41 PID 2876 wrote to memory of 1792 2876 igfxhp32.exe 41 PID 2876 wrote to memory of 1792 2876 igfxhp32.exe 41 PID 1792 wrote to memory of 2648 1792 igfxhp32.exe 42 PID 1792 wrote to memory of 2648 1792 igfxhp32.exe 42 PID 1792 wrote to memory of 2648 1792 igfxhp32.exe 42 PID 1792 wrote to memory of 2648 1792 igfxhp32.exe 42 PID 2648 wrote to memory of 2832 2648 igfxhp32.exe 43 PID 2648 wrote to memory of 2832 2648 igfxhp32.exe 43 PID 2648 wrote to memory of 2832 2648 igfxhp32.exe 43 PID 2648 wrote to memory of 2832 2648 igfxhp32.exe 43 PID 2832 wrote to memory of 956 2832 igfxhp32.exe 44 PID 2832 wrote to memory of 956 2832 igfxhp32.exe 44 PID 2832 wrote to memory of 956 2832 igfxhp32.exe 44 PID 2832 wrote to memory of 956 2832 igfxhp32.exe 44 PID 956 wrote to memory of 292 956 igfxhp32.exe 45 PID 956 wrote to memory of 292 956 igfxhp32.exe 45 PID 956 wrote to memory of 292 956 igfxhp32.exe 45 PID 956 wrote to memory of 292 956 igfxhp32.exe 45 PID 292 wrote to memory of 688 292 igfxhp32.exe 46 PID 292 wrote to memory of 688 292 igfxhp32.exe 46 PID 292 wrote to memory of 688 292 igfxhp32.exe 46 PID 292 wrote to memory of 688 292 igfxhp32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef7b8a56292d9170d59b470149d38495_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ef7b8a56292d9170d59b470149d38495_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Users\Admin\AppData\Local\Temp\EF7B8A~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:688 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2564 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1552 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1632 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1780 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2316 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2192 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2264 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2364 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2128 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2640 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2660 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1540 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1636 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1808 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1712 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:996 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1216 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1144 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2480 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2492 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1792 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1040 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1864 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:928 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1928 -
C:\Windows\SysWOW64\igfxhp32.exe"C:\Windows\system32\igfxhp32.exe" C:\Windows\SysWOW64\igfxhp32.exe43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:336
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272KB
MD5ef7b8a56292d9170d59b470149d38495
SHA112f5b67f0b021f3c7420ead77b0dc83ff8679e1d
SHA256a4b74be3be8dccde00ff1adbc434985cf6c1fb6cc4cae533ffcffaed9a298034
SHA5122af8b0256910e5987d57342f87abbc7907c28ef981884d1fa948b651b16440cfc90f813ea0ee935b20c6e6fc74aa81feeb48f67f9bde43cf26f831aca7fdd301