Analysis
-
max time kernel
147s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 12:22
Static task
static1
Behavioral task
behavioral1
Sample
29f3124d3deddcc46ee901469148d19c_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
29f3124d3deddcc46ee901469148d19c_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
29f3124d3deddcc46ee901469148d19c_JaffaCakes118.html
-
Size
175KB
-
MD5
29f3124d3deddcc46ee901469148d19c
-
SHA1
22f821e9d1df14f17d8547d2ae7169b7bce28986
-
SHA256
e5a3160dc5e54e001373100dd4554979454b4c3588f65bf7e33e329265c60c06
-
SHA512
86ab4fd24aca06a8b8968ec10780df24886ae4aba3569c08944d50fde891c4320f0ded07e5b3cc208548811a3098674dfd1cf6e0b1d74b6011c327bb0cf8e393
-
SSDEEP
1536:SqtH8gd8Wu8pI8Cd8hd8dQgbH//WoS3/GNkF8YfBCJiZX+aeTH+WK/Lf1/hpnVSV:S9CT3//FZBCJiWB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4004 msedge.exe 4004 msedge.exe 1504 msedge.exe 1504 msedge.exe 4712 identity_helper.exe 4712 identity_helper.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe 3476 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2332 1504 msedge.exe 85 PID 1504 wrote to memory of 2332 1504 msedge.exe 85 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4160 1504 msedge.exe 86 PID 1504 wrote to memory of 4004 1504 msedge.exe 87 PID 1504 wrote to memory of 4004 1504 msedge.exe 87 PID 1504 wrote to memory of 1916 1504 msedge.exe 88 PID 1504 wrote to memory of 1916 1504 msedge.exe 88 PID 1504 wrote to memory of 1916 1504 msedge.exe 88 PID 1504 wrote to memory of 1916 1504 msedge.exe 88 PID 1504 wrote to memory of 1916 1504 msedge.exe 88 PID 1504 wrote to memory of 1916 1504 msedge.exe 88 PID 1504 wrote to memory of 1916 1504 msedge.exe 88 PID 1504 wrote to memory of 1916 1504 msedge.exe 88 PID 1504 wrote to memory of 1916 1504 msedge.exe 88 PID 1504 wrote to memory of 1916 1504 msedge.exe 88 PID 1504 wrote to memory of 1916 1504 msedge.exe 88 PID 1504 wrote to memory of 1916 1504 msedge.exe 88 PID 1504 wrote to memory of 1916 1504 msedge.exe 88 PID 1504 wrote to memory of 1916 1504 msedge.exe 88 PID 1504 wrote to memory of 1916 1504 msedge.exe 88 PID 1504 wrote to memory of 1916 1504 msedge.exe 88 PID 1504 wrote to memory of 1916 1504 msedge.exe 88 PID 1504 wrote to memory of 1916 1504 msedge.exe 88 PID 1504 wrote to memory of 1916 1504 msedge.exe 88 PID 1504 wrote to memory of 1916 1504 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\29f3124d3deddcc46ee901469148d19c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa597346f8,0x7ffa59734708,0x7ffa597347182⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,3056829732532888277,14983855390660809895,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,3056829732532888277,14983855390660809895,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,3056829732532888277,14983855390660809895,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3056829732532888277,14983855390660809895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3056829732532888277,14983855390660809895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3056829732532888277,14983855390660809895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3056829732532888277,14983855390660809895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3056829732532888277,14983855390660809895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3056829732532888277,14983855390660809895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,3056829732532888277,14983855390660809895,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5932 /prefetch:82⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,3056829732532888277,14983855390660809895,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5932 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3056829732532888277,14983855390660809895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3056829732532888277,14983855390660809895,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3056829732532888277,14983855390660809895,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,3056829732532888277,14983855390660809895,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,3056829732532888277,14983855390660809895,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6140 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3476
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4520
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD539c8613ea02a43c5ce96e3af22180d6e
SHA113f30d41555c0282c8f77927c18342ad5e61138a
SHA2563b81558a9737f6d5467b552be8c3e4f981d700b5a96bdd0d6a20d28bc4bf4f0e
SHA512536d7a82ff050d9e038d83837172b3408b3f11514e418f7cb8bb736fdcbe0306b1e805b46f431f07539fa24b12aec7479e0efd72ad78370a262220329c5ae509
-
Filesize
2KB
MD5e86393d173205ec3c4ec19d93fc013e9
SHA13371f574be9fe1e2d7be162c98fb572cad991985
SHA2562b367395293ece81fc94793953f804759b1c08c86fad977e472ae40ce1084008
SHA51215b2e1ef9848950e1bed6a5a0cae4258a448f4c00439f1cd0f794628a8b48f037e0c9eba56f56d3e6a58cc5fab9083257977371ccf3192df8445898029158fb1
-
Filesize
2KB
MD599a3459cb7a7cd1536a92c416b4a9e3d
SHA150b26cea2d9cf457a27e1a286d9fea2fa0f5efc5
SHA256e1810d08a3ceaa52287764394f94e7b1255718bb1902939eb969378eef751b32
SHA512db27d8bd77d7261b9f9add0de9ac2f3dd0b3ce28101255072af6c07dc3a70ecda843af3d6482ae4e27b21de456b9cf21e34162f436f35061be3efe660e618943
-
Filesize
5KB
MD51839a0bd3e92eee931b4d5f13ed3893a
SHA1a1728a46c92a07b8a688879e297b12a2cd08a763
SHA25663bd480e33adfcf0987892ab6494b0041096fd0903b67319584bb12ef7787604
SHA5127b7484663cb4acb17092a929a9b18119c52c334820ba422b98810dfde07b4c0f7598b6f265d09846f214c5d264018eb19c2ab0482289e86dbbbd41b7adff0c3f
-
Filesize
7KB
MD55fccaf69c3bbef6a68db97939ccedc1c
SHA1d87fd805b4f0cf2dacb1fd8e8dc596c15b5f4010
SHA256c5adf2e701c671ae0d8a5b544c9c554b68428e5505c5baf0d6a797d374efa6a6
SHA5128b38266c8539bdecc36588390aa2e6430e4c0e3ef2b70411f1ff50ed9451c95c47632478aa8e3f1eb2e2aa6bd3dc71d53b71873077c7aad4e712574308dc5b46
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD547dda2991d6d6ec91818bd04b65e87f6
SHA102728ead03784c3f95d4ff4448a2ea76724134fe
SHA2568af74c199641ed75cb29f88a8f1346328b33be02410f2bfca8e98131019475ea
SHA5124f88a03ac12542839fae9a967b83ac5c2be270570b34926dc41d53d30561d5c42eb78a56d0a621a52cbf9c2559188030207497badb716be4c268e0950ea17888