Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 19:56
Static task
static1
Behavioral task
behavioral1
Sample
f07ffb6b980dec1a83d760ad1d112de0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f07ffb6b980dec1a83d760ad1d112de0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f07ffb6b980dec1a83d760ad1d112de0_JaffaCakes118.html
-
Size
22KB
-
MD5
f07ffb6b980dec1a83d760ad1d112de0
-
SHA1
73788039b17a26801c12ec3d1d50953cd5547086
-
SHA256
efcd8279c786bce61b985c502857b87088a2cd363e2edfd0c82095a75e785355
-
SHA512
5d1dd03762c47a6946f5ee5c9674ec5bc2cc08f01b258d324cd30a38bc1b123b194aa2314250940d8818c90ef52ba47c4ff9ec3df33295da802420ff6bf30d7a
-
SSDEEP
384:qUWuKszpaFGyH4mP6ol6k56fWPH24uJwegEuLul7:rWHst9wx156fW//swegEW+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1620 msedge.exe 1620 msedge.exe 3788 msedge.exe 3788 msedge.exe 1200 identity_helper.exe 1200 identity_helper.exe 3860 msedge.exe 3860 msedge.exe 3860 msedge.exe 3860 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3788 wrote to memory of 1096 3788 msedge.exe 82 PID 3788 wrote to memory of 1096 3788 msedge.exe 82 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1660 3788 msedge.exe 83 PID 3788 wrote to memory of 1620 3788 msedge.exe 84 PID 3788 wrote to memory of 1620 3788 msedge.exe 84 PID 3788 wrote to memory of 3412 3788 msedge.exe 85 PID 3788 wrote to memory of 3412 3788 msedge.exe 85 PID 3788 wrote to memory of 3412 3788 msedge.exe 85 PID 3788 wrote to memory of 3412 3788 msedge.exe 85 PID 3788 wrote to memory of 3412 3788 msedge.exe 85 PID 3788 wrote to memory of 3412 3788 msedge.exe 85 PID 3788 wrote to memory of 3412 3788 msedge.exe 85 PID 3788 wrote to memory of 3412 3788 msedge.exe 85 PID 3788 wrote to memory of 3412 3788 msedge.exe 85 PID 3788 wrote to memory of 3412 3788 msedge.exe 85 PID 3788 wrote to memory of 3412 3788 msedge.exe 85 PID 3788 wrote to memory of 3412 3788 msedge.exe 85 PID 3788 wrote to memory of 3412 3788 msedge.exe 85 PID 3788 wrote to memory of 3412 3788 msedge.exe 85 PID 3788 wrote to memory of 3412 3788 msedge.exe 85 PID 3788 wrote to memory of 3412 3788 msedge.exe 85 PID 3788 wrote to memory of 3412 3788 msedge.exe 85 PID 3788 wrote to memory of 3412 3788 msedge.exe 85 PID 3788 wrote to memory of 3412 3788 msedge.exe 85 PID 3788 wrote to memory of 3412 3788 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f07ffb6b980dec1a83d760ad1d112de0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc196c46f8,0x7ffc196c4708,0x7ffc196c47182⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,18000526679213986619,11344832709187559021,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,18000526679213986619,11344832709187559021,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,18000526679213986619,11344832709187559021,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18000526679213986619,11344832709187559021,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18000526679213986619,11344832709187559021,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18000526679213986619,11344832709187559021,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18000526679213986619,11344832709187559021,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,18000526679213986619,11344832709187559021,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5820 /prefetch:82⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,18000526679213986619,11344832709187559021,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5820 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18000526679213986619,11344832709187559021,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18000526679213986619,11344832709187559021,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18000526679213986619,11344832709187559021,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18000526679213986619,11344832709187559021,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,18000526679213986619,11344832709187559021,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3860
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3436
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6560dcf9-70af-4400-a79d-b59da2f98009.tmp
Filesize7KB
MD544d4784729389a0c3e9312357f629f3a
SHA1093811d390ee9812df848652d22b951d2601d9bc
SHA2565870ff6b83950346039a2bd0df0cf812349418a5d5208b997475ae9db4994307
SHA512f5057b9d1817eca3cf92d837d9afa00a4bc0e9506c146e939baad269813ef8952827e6aef66b06167f9b260a1ed03a7eaff2fe44d748a8a89c79f2393c994a4b
-
Filesize
23KB
MD52f24e0f5d2c2997a89fb4a8d943c141f
SHA199515bde1a5bf72105116ac902ccf3db1dd3df29
SHA25660c9ecaf27ba56d7c35aa78c329aa7dfa586e6c71ed3cdd0019ba7e767b18aaf
SHA5120f4c5508dfdcf0ef63141df8d29c76e219d2ec433d59d37d7f17e110b455f24235fd0bc4f539ad5adc368285536d73f57dc4e21e3201dfd5753e76789208989d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5aaca3b54d2c65ba2387e9ea0a0194d9a
SHA1b715b607eda8240e9071c0b363ab601cf902cfee
SHA2569886ea8f3fd79162a0d9238b4b885979860aa2ed34c8b70b658ad4e2f92dafbc
SHA512be02824d807c35ab0e59d86ddf84a8124739b95d133474b84952f7e3639189102ff3df12b1102246c7bcb610551f84a6edce92b86090defa4ebcf91e32773a2e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD55c24d199c0b4f8d01163e27fe400bfe8
SHA1cde455b8aa59d2471c89882da99541230cef8e72
SHA256ccf11c5c245827b24e206d8f0722b47e4fa0ee53d7f87d8420836aad1570f247
SHA5126a0515951a9dbc11b4df3fe2d1a335b3bebe4d3d2affb7ad632310045bb26fd032f469929e6e9dfad1a967bb98776a11ce7466dbef6c73097cf77c716ec637ab
-
Filesize
1KB
MD58aafbd4dfd6698a93fc41b253cd71236
SHA18a0f4e0f41fc8fc7775de346cb1378c72e268435
SHA25697a82083c0e0a56a7a33a0a9ef56501cc954240f056d64730d8d91bc3d76aca4
SHA512bfe3f0227870ae368ede18a15d7bb30e4039e0c5334e8c709ca0bc13fe2fcaed67029a604b1d04591e798e8f28dbb6be310122a74a395efe2265bebb7176f85a
-
Filesize
7KB
MD52a0ab133d3b36812ce5ca75315e91f79
SHA10036ae9b6184a7a80376d42d13adf77d44fab52b
SHA2560c8ab91efb8e5e183c742aeac469073f68cb36f6d111e95e074f19e0fca55a9c
SHA512e44a8766a82b99ea915f13af9c21bb15fa002e02c02dfc86864efffe3c13666395e34849dde772b8fb96cb9949ef6c446346ad065ef01f727586b65d7577ae44
-
Filesize
5KB
MD5df79ff91eb5c1ecd2b65aae394e49c89
SHA1101016aa3c928b334128ef38baf52739a4b6b677
SHA256fdc3787eff091fd29226aba208f4f742259f15cb60f45cf65ecfe873f935ffa2
SHA512861716356c54fe898f948710b4e8d76f7c55203917ca2d46fb09c640ee7475477ef200cbcea168e03c49ef241e3d6bef9cecb1feb53b140164628e0cc32949f5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b7f75e90aaf809899f50d93a6361e730
SHA15cc1eea74fa8c766e00c1117afe1116b2127d670
SHA2561967264861595a02eb39f18edc04ec4d620bf84fdd0f09e4b396f4ee32cdc8fc
SHA512c2e4802b672371056a8ecb5d44e44c2426e9f7fbdfef8bf91ad189bd810d099c5c3e6fcb50b5c39eeec6f3a2a18b19ec5828ec99620e95a36837421c9dff901f