Resubmissions
12-04-2024 16:53
240412-vdzdsscb74 112-04-2024 07:35
240412-jew5aagg67 112-04-2024 06:10
240412-gw843abd5x 1011-04-2024 18:54
240411-xkdf1saa36 1011-04-2024 17:07
240411-vm58psga37 8Analysis
-
max time kernel
39s -
max time network
42s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12-04-2024 07:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com
Resource
win10v2004-20240226-en
General
-
Target
https://github.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133573809541407409" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 3100 chrome.exe 3100 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe Token: SeShutdownPrivilege 3100 chrome.exe Token: SeCreatePagefilePrivilege 3100 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe 3100 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3100 wrote to memory of 1100 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1100 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1796 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1280 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 1280 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 4708 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 4708 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 4708 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 4708 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 4708 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 4708 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 4708 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 4708 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 4708 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 4708 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 4708 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 4708 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 4708 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 4708 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 4708 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 4708 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 4708 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 4708 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 4708 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 4708 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 4708 3100 chrome.exe chrome.exe PID 3100 wrote to memory of 4708 3100 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe8d859758,0x7ffe8d859768,0x7ffe8d8597782⤵PID:1100
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1856,i,13291692399998393449,4656696710351484568,131072 /prefetch:22⤵PID:1796
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 --field-trial-handle=1856,i,13291692399998393449,4656696710351484568,131072 /prefetch:82⤵PID:1280
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2176 --field-trial-handle=1856,i,13291692399998393449,4656696710351484568,131072 /prefetch:82⤵PID:4708
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2908 --field-trial-handle=1856,i,13291692399998393449,4656696710351484568,131072 /prefetch:12⤵PID:2824
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2916 --field-trial-handle=1856,i,13291692399998393449,4656696710351484568,131072 /prefetch:12⤵PID:3688
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4784 --field-trial-handle=1856,i,13291692399998393449,4656696710351484568,131072 /prefetch:82⤵PID:4400
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 --field-trial-handle=1856,i,13291692399998393449,4656696710351484568,131072 /prefetch:82⤵PID:4052
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 --field-trial-handle=1856,i,13291692399998393449,4656696710351484568,131072 /prefetch:82⤵PID:2968
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5320 --field-trial-handle=1856,i,13291692399998393449,4656696710351484568,131072 /prefetch:12⤵PID:808
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5392 --field-trial-handle=1856,i,13291692399998393449,4656696710351484568,131072 /prefetch:12⤵PID:3672
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5560 --field-trial-handle=1856,i,13291692399998393449,4656696710351484568,131072 /prefetch:82⤵PID:3424
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5412 --field-trial-handle=1856,i,13291692399998393449,4656696710351484568,131072 /prefetch:82⤵PID:3656
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d3276b36c830af15fc8e9e1d91f7a4ba
SHA120aea2146710453d3789a6de8263e1164b470974
SHA2568a3e3c081a28e23f99ed540b048b4226f5260672898fd26d9e9bdd09254edf1a
SHA512c26020898150725840ce3fd44142c828d36c64002e974c5a19beb1f4d8e1cf9febf4b72daa27f1b5fda5b99a60a22e0790e042394b19519526da8ef6e5474ddd
-
Filesize
1KB
MD5f6aa93e28d98cb849759c21a329d135a
SHA160fbb661de991aee82380a4544f6e8860e5178b5
SHA2563cd17a45b66abf5521d4f06f80dcce3fcbeb0e618a38565b9d2769949bc72645
SHA5121bdd271e1897cb7c643e43b2a2f3419fe0b05f0a9a4110da98a110000dc1a883b3a8983fb76c5a31030b0380fe0f781882d8270b547d40b7af7f8bdd9d7490e3
-
Filesize
1KB
MD5a0aefd06b19ba57e0dc07191051bd349
SHA1c1991f2b63015806e62dc643188ad48f536f727a
SHA2560b1b937b0dcff011fe536a610ca0a566238164ea450aec72cac40bc57cba1aff
SHA512f7c9932351964b4e88be6b0f67f81d562c562157466f1e8a6ab556e6f98f4b9e247099d36a394ed50c8dc61bbf133adc4313d315362252c5c8c6a56c706e056e
-
Filesize
1KB
MD5a5449e7536751dde0db83decd3ca4e47
SHA1fe992eabb120c8235f1edd479a24ba9243bbe4ff
SHA25620b414013657b8d07d919902e35f2462fe40dd23eacc39fa34bc8f279fc21848
SHA5126bbf94e2a72dc50377bd5fdf08914f7664d17574ffe15dda245c241ca308897c2ccf87a85cc07c83bcb7d84fffa0fe6071cc0b36f8eb2ae88e83cffa2ce46999
-
Filesize
6KB
MD59e777210b8858bdf86141b8591776ce0
SHA17c9d9fd9dd05603ad0027c86b979f68a63331043
SHA256ead7db58da91191326defc182d9befb468199f6f16e6e492c0c90f441e1ef3f2
SHA512e3b72adef444ccfbbd39832d72a3ebcf805027b01948a64d2263b36351614324c11cde47e3aaf1bc0f1e3cda0e874b487eac43ed55d82ab43ecade324f8e7248
-
Filesize
6KB
MD5e300657d786b8fa3887dd25909a69c34
SHA16b97954e8cb4342435ef17fa6565e729c9b3765a
SHA256fb6cc0317de5a932b8a0674e5ffa78fe9c6b0085a0330fbf0df8560c625b89a1
SHA512e716a9b33205212e628257224a0add2c4441d8436c86064be7a64205bcd9cf07a4e4578b61f86f3283d1c90c2dd0d9680eac6e2745103974b8bf4259d15a4d01
-
Filesize
128KB
MD570ba2cb01b0731084b7aa3b99616855b
SHA19fc0fe8c0082f14757a41f87e76c43036fc8d809
SHA256e80243066c0bff9da1684fac1bf2403a5ae2eda581878df3a5134546595ec0f1
SHA512065e8c2c3268f94c061635e98066333e7974f0bf1ecebea2da0872dedd7d705b62d815ef36a875b4ab0890323973afce717ad0f81947b79ddf2dbfe57936dc83
-
Filesize
128KB
MD5ca4bc36986fc0cf58629a5e636ff84d0
SHA129671aab95714993ae036f7fae093b802a08816e
SHA2567dca41521bf158f12f4aba0dca0d720788cd21480188ca40500e45da321046b5
SHA512302e9bd2ec5565ecc8ecd0824acbf010d1e54f54f7a5d46f67daf4d039f4249629ab261c761665a61e040f52e6ec4a497f3d30a6843e6a8b42d01a567281337b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e