Analysis
-
max time kernel
299s -
max time network
284s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
25-01-2024 15:41
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133506709403675989" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 3808 chrome.exe 3808 chrome.exe 324 chrome.exe 324 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe Token: SeShutdownPrivilege 3808 chrome.exe Token: SeCreatePagefilePrivilege 3808 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe 3808 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3808 wrote to memory of 3620 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3620 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 3520 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 2796 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 2796 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 4936 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 4936 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 4936 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 4936 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 4936 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 4936 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 4936 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 4936 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 4936 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 4936 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 4936 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 4936 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 4936 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 4936 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 4936 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 4936 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 4936 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 4936 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 4936 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 4936 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 4936 3808 chrome.exe chrome.exe PID 3808 wrote to memory of 4936 3808 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://www.jksdv.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffadcac9758,0x7ffadcac9768,0x7ffadcac97782⤵PID:3620
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1576 --field-trial-handle=1852,i,7132141565997348195,9296277035564040343,131072 /prefetch:22⤵PID:3520
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1776 --field-trial-handle=1852,i,7132141565997348195,9296277035564040343,131072 /prefetch:82⤵PID:2796
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1796 --field-trial-handle=1852,i,7132141565997348195,9296277035564040343,131072 /prefetch:82⤵PID:4936
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2656 --field-trial-handle=1852,i,7132141565997348195,9296277035564040343,131072 /prefetch:12⤵PID:444
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2648 --field-trial-handle=1852,i,7132141565997348195,9296277035564040343,131072 /prefetch:12⤵PID:3104
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4604 --field-trial-handle=1852,i,7132141565997348195,9296277035564040343,131072 /prefetch:12⤵PID:2160
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4496 --field-trial-handle=1852,i,7132141565997348195,9296277035564040343,131072 /prefetch:82⤵PID:4188
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4500 --field-trial-handle=1852,i,7132141565997348195,9296277035564040343,131072 /prefetch:82⤵PID:2736
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2440 --field-trial-handle=1852,i,7132141565997348195,9296277035564040343,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:324
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
264B
MD5533c1c99a3045c9978b47db2ee65a4f7
SHA1353f19e8e71893463811722d243fa4869a198e16
SHA256697d0970d6c968ff1c9300a23bec3fc854d4477b7d8f0a7263e6f8782af3f893
SHA512c94fd4b5a4e253539649148950563bec1f9ee2f8363d76d905092e510fd9246260b4c3f5ee94ffb5612d95363373b7d30edd0fe747029a37fcdb5c81bc20fb67
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD56473c2d68cf22a5e919ff1a353b6d87a
SHA1c41645bea9789c806482f118484a916f25ad403a
SHA2564dc0f65cc529d07bb7c764fb7b1aa976e2deb7a057696c1175015d13f2c92d84
SHA51209610a12536d1a6ee53edf664c42cc76d24959ddbdef21b86c992f509e7a8e5e58b1b363cdde1957d21c50c65c099d60660619829ab74bc4a7d4ee2b865842ff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD5cdd97f71eef8cae1b272d078622db47e
SHA10020f775829029ffeee2a7d0f50c7a2b5f7b0c9a
SHA2565e6803ad543ebf5902decb61ec502561aebc53c8a79e67c8f433e925bb0db8f5
SHA512f0928e5978cddc2e148af5d0b5989fe275458a20f7216a162d855910dfd4138542234f134df04b4b5e7e74ac1e6d8f5657c26e0c007bf61af8f7f07808ffddb8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
707B
MD566f3c3d7c7604f4d2aadeef025e11d35
SHA19d8652abc51d770f2a9bdc17d9c099e9c270823e
SHA2563018cc27adc8d150856b161d193cd0da3b52540da3b8945a0df69f034e464419
SHA512b8e2413cc0e29d92849f08038ab154af3ff17c8071cf2045d80c4bee355717911b25181542115264abedd1ba014091f8342613c321810e27f40e0e23e3c10d4e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD504b4883c9e50bfc6f268ccb3cb01caad
SHA13ef20fd8896f352ba8d90af0a0a842143d21fbd5
SHA2563204352ae7b8d9bbd300e7da645fed9df726f0a893da5a8b15f813c4c301e693
SHA512d50b6ed2b8615e5f5ce55453f77d7c9e224bfc36f42703ba586589da9bb04d1c76121b5108cbc4071a3d5804854195bd759836c09a2304f9f64edf0ed55ebccf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5e99f05fe4645ae1c523e5f862dd91756
SHA16d8119d6b07f9d59b39de44d3addc8a212c8296c
SHA2560105779293e93b59c65d46f4dea7291d2b7a1adcbe246bf7edd8285b3f0e6b52
SHA5121f11200fe3699bf401431f90e305c12fc3008b60364be64abb3b9756bc7cc3c2f5f7f42dcc0009bd7d7a6ceab5852d38c251fb1172c2dd9ec3a7b9508b08d5f9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD50219c280ea40c8ed2e9f2204b756a5a2
SHA141d561b08cffb261358af1b40c94ac706d2d5c37
SHA2568c030c9ed9f193c7cdd0186bf543b99e9ecf6a58077eabda6e5b3e33c7237650
SHA51210127ee2cefdb07e8140484072b9cafd4a4a44b7a9764097c95ffd1710677b3c84246bf109649a56f5d90551a6c7ae4df5095e048b40dd0d15d559019f195c13
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
114KB
MD5bfbe4fc407457ccf4df34f036365b50d
SHA14d41be5893f8573b7d09033a7d2c08482847b634
SHA256a2cab1a0e49a5a9868bce08dbe8dde6cc4ad1a43e63812682ada5ce8166e7dad
SHA5128a6a2efbd0464d6260d4ec5ffd384cc37b414457305fee7e951032d9204fa8ffef12a93d6da2c9cd796780aee1112fd75dfbaf295503377e7bacab7053fe120f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_3808_IGLWNNEBTMZCGLBJMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e