Analysis
-
max time kernel
42s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
28-03-2023 01:27
Static task
static1
Behavioral task
behavioral1
Sample
b82fcf368bda3ca3dc3909a3962c32c9b778a507b814faa4c9a7e685ab51ca21.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b82fcf368bda3ca3dc3909a3962c32c9b778a507b814faa4c9a7e685ab51ca21.exe
Resource
win10v2004-20230220-en
General
-
Target
b82fcf368bda3ca3dc3909a3962c32c9b778a507b814faa4c9a7e685ab51ca21.exe
-
Size
682KB
-
MD5
4842aafe330a4066543e094290f55d21
-
SHA1
710fdaa38e74a58a7c73de8fa70bcc0d02b9e82d
-
SHA256
b82fcf368bda3ca3dc3909a3962c32c9b778a507b814faa4c9a7e685ab51ca21
-
SHA512
d95b988b48f25169e83b515ac14fe40adad5cb55b715634af4c4357d87ca6f2500c72d16e05508ce47f5e978035b6b5226bc17e698cee36d79ccb4abf5118525
-
SSDEEP
12288:JMrmy90JiFq4Cfr2vNVhlpaktBMuhWNhtt24JqKY42mZ:jyF4fcjnpasS/j24JqKYg
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Extracted
redline
dent
193.233.20.33:4125
-
auth_value
e795368557f02e28e8aef6bcb279a3b0
Signatures
-
Processes:
pro3210.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro3210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3210.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
Processes:
resource yara_rule behavioral1/memory/1372-123-0x00000000032B0000-0x00000000032F6000-memory.dmp family_redline behavioral1/memory/1372-124-0x0000000004A10000-0x0000000004A54000-memory.dmp family_redline behavioral1/memory/1372-125-0x0000000004A10000-0x0000000004A4E000-memory.dmp family_redline behavioral1/memory/1372-126-0x0000000004A10000-0x0000000004A4E000-memory.dmp family_redline behavioral1/memory/1372-128-0x0000000004A10000-0x0000000004A4E000-memory.dmp family_redline behavioral1/memory/1372-130-0x0000000004A10000-0x0000000004A4E000-memory.dmp family_redline behavioral1/memory/1372-132-0x0000000004A10000-0x0000000004A4E000-memory.dmp family_redline behavioral1/memory/1372-134-0x0000000004A10000-0x0000000004A4E000-memory.dmp family_redline behavioral1/memory/1372-136-0x0000000004A10000-0x0000000004A4E000-memory.dmp family_redline behavioral1/memory/1372-138-0x0000000004A10000-0x0000000004A4E000-memory.dmp family_redline behavioral1/memory/1372-140-0x0000000004A10000-0x0000000004A4E000-memory.dmp family_redline behavioral1/memory/1372-142-0x0000000004A10000-0x0000000004A4E000-memory.dmp family_redline behavioral1/memory/1372-144-0x0000000004A10000-0x0000000004A4E000-memory.dmp family_redline behavioral1/memory/1372-146-0x0000000004A10000-0x0000000004A4E000-memory.dmp family_redline behavioral1/memory/1372-148-0x0000000004A10000-0x0000000004A4E000-memory.dmp family_redline behavioral1/memory/1372-150-0x0000000004A10000-0x0000000004A4E000-memory.dmp family_redline behavioral1/memory/1372-152-0x0000000004A10000-0x0000000004A4E000-memory.dmp family_redline behavioral1/memory/1372-154-0x0000000004A10000-0x0000000004A4E000-memory.dmp family_redline behavioral1/memory/1372-156-0x0000000004A10000-0x0000000004A4E000-memory.dmp family_redline behavioral1/memory/1372-158-0x0000000004A10000-0x0000000004A4E000-memory.dmp family_redline behavioral1/memory/1372-347-0x0000000007090000-0x00000000070D0000-memory.dmp family_redline behavioral1/memory/1372-1033-0x0000000007090000-0x00000000070D0000-memory.dmp family_redline -
Executes dropped EXE 4 IoCs
Processes:
un556306.exepro3210.exequ9027.exesi282906.exepid process 2024 un556306.exe 1364 pro3210.exe 1372 qu9027.exe 1056 si282906.exe -
Loads dropped DLL 10 IoCs
Processes:
b82fcf368bda3ca3dc3909a3962c32c9b778a507b814faa4c9a7e685ab51ca21.exeun556306.exepro3210.exequ9027.exesi282906.exepid process 1920 b82fcf368bda3ca3dc3909a3962c32c9b778a507b814faa4c9a7e685ab51ca21.exe 2024 un556306.exe 2024 un556306.exe 2024 un556306.exe 1364 pro3210.exe 2024 un556306.exe 2024 un556306.exe 1372 qu9027.exe 1920 b82fcf368bda3ca3dc3909a3962c32c9b778a507b814faa4c9a7e685ab51ca21.exe 1056 si282906.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pro3210.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features pro3210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3210.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
b82fcf368bda3ca3dc3909a3962c32c9b778a507b814faa4c9a7e685ab51ca21.exeun556306.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b82fcf368bda3ca3dc3909a3962c32c9b778a507b814faa4c9a7e685ab51ca21.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce un556306.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un556306.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce b82fcf368bda3ca3dc3909a3962c32c9b778a507b814faa4c9a7e685ab51ca21.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pro3210.exequ9027.exesi282906.exepid process 1364 pro3210.exe 1364 pro3210.exe 1372 qu9027.exe 1372 qu9027.exe 1056 si282906.exe 1056 si282906.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
pro3210.exequ9027.exesi282906.exedescription pid process Token: SeDebugPrivilege 1364 pro3210.exe Token: SeDebugPrivilege 1372 qu9027.exe Token: SeDebugPrivilege 1056 si282906.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
b82fcf368bda3ca3dc3909a3962c32c9b778a507b814faa4c9a7e685ab51ca21.exeun556306.exedescription pid process target process PID 1920 wrote to memory of 2024 1920 b82fcf368bda3ca3dc3909a3962c32c9b778a507b814faa4c9a7e685ab51ca21.exe un556306.exe PID 1920 wrote to memory of 2024 1920 b82fcf368bda3ca3dc3909a3962c32c9b778a507b814faa4c9a7e685ab51ca21.exe un556306.exe PID 1920 wrote to memory of 2024 1920 b82fcf368bda3ca3dc3909a3962c32c9b778a507b814faa4c9a7e685ab51ca21.exe un556306.exe PID 1920 wrote to memory of 2024 1920 b82fcf368bda3ca3dc3909a3962c32c9b778a507b814faa4c9a7e685ab51ca21.exe un556306.exe PID 1920 wrote to memory of 2024 1920 b82fcf368bda3ca3dc3909a3962c32c9b778a507b814faa4c9a7e685ab51ca21.exe un556306.exe PID 1920 wrote to memory of 2024 1920 b82fcf368bda3ca3dc3909a3962c32c9b778a507b814faa4c9a7e685ab51ca21.exe un556306.exe PID 1920 wrote to memory of 2024 1920 b82fcf368bda3ca3dc3909a3962c32c9b778a507b814faa4c9a7e685ab51ca21.exe un556306.exe PID 2024 wrote to memory of 1364 2024 un556306.exe pro3210.exe PID 2024 wrote to memory of 1364 2024 un556306.exe pro3210.exe PID 2024 wrote to memory of 1364 2024 un556306.exe pro3210.exe PID 2024 wrote to memory of 1364 2024 un556306.exe pro3210.exe PID 2024 wrote to memory of 1364 2024 un556306.exe pro3210.exe PID 2024 wrote to memory of 1364 2024 un556306.exe pro3210.exe PID 2024 wrote to memory of 1364 2024 un556306.exe pro3210.exe PID 2024 wrote to memory of 1372 2024 un556306.exe qu9027.exe PID 2024 wrote to memory of 1372 2024 un556306.exe qu9027.exe PID 2024 wrote to memory of 1372 2024 un556306.exe qu9027.exe PID 2024 wrote to memory of 1372 2024 un556306.exe qu9027.exe PID 2024 wrote to memory of 1372 2024 un556306.exe qu9027.exe PID 2024 wrote to memory of 1372 2024 un556306.exe qu9027.exe PID 2024 wrote to memory of 1372 2024 un556306.exe qu9027.exe PID 1920 wrote to memory of 1056 1920 b82fcf368bda3ca3dc3909a3962c32c9b778a507b814faa4c9a7e685ab51ca21.exe si282906.exe PID 1920 wrote to memory of 1056 1920 b82fcf368bda3ca3dc3909a3962c32c9b778a507b814faa4c9a7e685ab51ca21.exe si282906.exe PID 1920 wrote to memory of 1056 1920 b82fcf368bda3ca3dc3909a3962c32c9b778a507b814faa4c9a7e685ab51ca21.exe si282906.exe PID 1920 wrote to memory of 1056 1920 b82fcf368bda3ca3dc3909a3962c32c9b778a507b814faa4c9a7e685ab51ca21.exe si282906.exe PID 1920 wrote to memory of 1056 1920 b82fcf368bda3ca3dc3909a3962c32c9b778a507b814faa4c9a7e685ab51ca21.exe si282906.exe PID 1920 wrote to memory of 1056 1920 b82fcf368bda3ca3dc3909a3962c32c9b778a507b814faa4c9a7e685ab51ca21.exe si282906.exe PID 1920 wrote to memory of 1056 1920 b82fcf368bda3ca3dc3909a3962c32c9b778a507b814faa4c9a7e685ab51ca21.exe si282906.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b82fcf368bda3ca3dc3909a3962c32c9b778a507b814faa4c9a7e685ab51ca21.exe"C:\Users\Admin\AppData\Local\Temp\b82fcf368bda3ca3dc3909a3962c32c9b778a507b814faa4c9a7e685ab51ca21.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un556306.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un556306.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3210.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3210.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1364
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9027.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9027.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si282906.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si282906.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD541dae7877d8ea31ae106f1da78e97f16
SHA1f3b65c258217446c152aabac7c29373d8b8cf3b9
SHA25670dc531779ac27d91729dc9246fd396b5a051011233627e826a0f3d19e76e318
SHA512d70ac4fc3fc9a9cb14e6bc7deab511e4bdc6a1af80a44006fce41cdd844930a2587c4533a0e83db703cab2130ae0396ec186c1c95d3f2113f3e972d04ae3500e
-
Filesize
175KB
MD541dae7877d8ea31ae106f1da78e97f16
SHA1f3b65c258217446c152aabac7c29373d8b8cf3b9
SHA25670dc531779ac27d91729dc9246fd396b5a051011233627e826a0f3d19e76e318
SHA512d70ac4fc3fc9a9cb14e6bc7deab511e4bdc6a1af80a44006fce41cdd844930a2587c4533a0e83db703cab2130ae0396ec186c1c95d3f2113f3e972d04ae3500e
-
Filesize
540KB
MD57dfd68aabe5aa201ec8626b62ee3f320
SHA18810138e1d503929d77dba550f7e24c86a19d2dd
SHA2568e54b92db30cdf88ab5a2630fcf8105ba9340bd40d0c20fb19d6e3795a59d47f
SHA5123fd55b08524613e46301e6c7f66b4d53fb846a27bddda33d4c6e5e08b3bca719fcf19c91201d0a5d5c9a6db719cdd4cb5100eac91daa8e034e7229030f0d2955
-
Filesize
540KB
MD57dfd68aabe5aa201ec8626b62ee3f320
SHA18810138e1d503929d77dba550f7e24c86a19d2dd
SHA2568e54b92db30cdf88ab5a2630fcf8105ba9340bd40d0c20fb19d6e3795a59d47f
SHA5123fd55b08524613e46301e6c7f66b4d53fb846a27bddda33d4c6e5e08b3bca719fcf19c91201d0a5d5c9a6db719cdd4cb5100eac91daa8e034e7229030f0d2955
-
Filesize
322KB
MD57d13e1f77a8a0dde60ebc72d903c1de3
SHA1304529222e1abb4f33cc362cd6407ecc9d7236e9
SHA2561af99da183bcda829d8b7da71d0b7f90c3a67790e20d094087ce50de2a8218b4
SHA5128368d5cae596e55c2ef9cff3fec11bbca54eadd245f2ae672a66986bc0f4ba2796b54c14c58640948ece8664fc7ce7ede19051522657cdc9f1bb6be7c0d3161f
-
Filesize
322KB
MD57d13e1f77a8a0dde60ebc72d903c1de3
SHA1304529222e1abb4f33cc362cd6407ecc9d7236e9
SHA2561af99da183bcda829d8b7da71d0b7f90c3a67790e20d094087ce50de2a8218b4
SHA5128368d5cae596e55c2ef9cff3fec11bbca54eadd245f2ae672a66986bc0f4ba2796b54c14c58640948ece8664fc7ce7ede19051522657cdc9f1bb6be7c0d3161f
-
Filesize
322KB
MD57d13e1f77a8a0dde60ebc72d903c1de3
SHA1304529222e1abb4f33cc362cd6407ecc9d7236e9
SHA2561af99da183bcda829d8b7da71d0b7f90c3a67790e20d094087ce50de2a8218b4
SHA5128368d5cae596e55c2ef9cff3fec11bbca54eadd245f2ae672a66986bc0f4ba2796b54c14c58640948ece8664fc7ce7ede19051522657cdc9f1bb6be7c0d3161f
-
Filesize
379KB
MD5d1286043891cfbb979a4f2b1dfb4bb84
SHA1d3b87690656277bf1112f134929692268a4648df
SHA256e68090e86974202dfc9d96f18c89dbfc3467b7c364eb93968221cd508e1b4f5e
SHA5122488aa2eced35af10e92f437801969dc0bd262ce6b42dee5801b98cad620025e163c6f7c153ae746d95b28653e4a83e5be87b3ecbf3d8fad93198d2732a6ffa4
-
Filesize
379KB
MD5d1286043891cfbb979a4f2b1dfb4bb84
SHA1d3b87690656277bf1112f134929692268a4648df
SHA256e68090e86974202dfc9d96f18c89dbfc3467b7c364eb93968221cd508e1b4f5e
SHA5122488aa2eced35af10e92f437801969dc0bd262ce6b42dee5801b98cad620025e163c6f7c153ae746d95b28653e4a83e5be87b3ecbf3d8fad93198d2732a6ffa4
-
Filesize
379KB
MD5d1286043891cfbb979a4f2b1dfb4bb84
SHA1d3b87690656277bf1112f134929692268a4648df
SHA256e68090e86974202dfc9d96f18c89dbfc3467b7c364eb93968221cd508e1b4f5e
SHA5122488aa2eced35af10e92f437801969dc0bd262ce6b42dee5801b98cad620025e163c6f7c153ae746d95b28653e4a83e5be87b3ecbf3d8fad93198d2732a6ffa4
-
Filesize
175KB
MD541dae7877d8ea31ae106f1da78e97f16
SHA1f3b65c258217446c152aabac7c29373d8b8cf3b9
SHA25670dc531779ac27d91729dc9246fd396b5a051011233627e826a0f3d19e76e318
SHA512d70ac4fc3fc9a9cb14e6bc7deab511e4bdc6a1af80a44006fce41cdd844930a2587c4533a0e83db703cab2130ae0396ec186c1c95d3f2113f3e972d04ae3500e
-
Filesize
175KB
MD541dae7877d8ea31ae106f1da78e97f16
SHA1f3b65c258217446c152aabac7c29373d8b8cf3b9
SHA25670dc531779ac27d91729dc9246fd396b5a051011233627e826a0f3d19e76e318
SHA512d70ac4fc3fc9a9cb14e6bc7deab511e4bdc6a1af80a44006fce41cdd844930a2587c4533a0e83db703cab2130ae0396ec186c1c95d3f2113f3e972d04ae3500e
-
Filesize
540KB
MD57dfd68aabe5aa201ec8626b62ee3f320
SHA18810138e1d503929d77dba550f7e24c86a19d2dd
SHA2568e54b92db30cdf88ab5a2630fcf8105ba9340bd40d0c20fb19d6e3795a59d47f
SHA5123fd55b08524613e46301e6c7f66b4d53fb846a27bddda33d4c6e5e08b3bca719fcf19c91201d0a5d5c9a6db719cdd4cb5100eac91daa8e034e7229030f0d2955
-
Filesize
540KB
MD57dfd68aabe5aa201ec8626b62ee3f320
SHA18810138e1d503929d77dba550f7e24c86a19d2dd
SHA2568e54b92db30cdf88ab5a2630fcf8105ba9340bd40d0c20fb19d6e3795a59d47f
SHA5123fd55b08524613e46301e6c7f66b4d53fb846a27bddda33d4c6e5e08b3bca719fcf19c91201d0a5d5c9a6db719cdd4cb5100eac91daa8e034e7229030f0d2955
-
Filesize
322KB
MD57d13e1f77a8a0dde60ebc72d903c1de3
SHA1304529222e1abb4f33cc362cd6407ecc9d7236e9
SHA2561af99da183bcda829d8b7da71d0b7f90c3a67790e20d094087ce50de2a8218b4
SHA5128368d5cae596e55c2ef9cff3fec11bbca54eadd245f2ae672a66986bc0f4ba2796b54c14c58640948ece8664fc7ce7ede19051522657cdc9f1bb6be7c0d3161f
-
Filesize
322KB
MD57d13e1f77a8a0dde60ebc72d903c1de3
SHA1304529222e1abb4f33cc362cd6407ecc9d7236e9
SHA2561af99da183bcda829d8b7da71d0b7f90c3a67790e20d094087ce50de2a8218b4
SHA5128368d5cae596e55c2ef9cff3fec11bbca54eadd245f2ae672a66986bc0f4ba2796b54c14c58640948ece8664fc7ce7ede19051522657cdc9f1bb6be7c0d3161f
-
Filesize
322KB
MD57d13e1f77a8a0dde60ebc72d903c1de3
SHA1304529222e1abb4f33cc362cd6407ecc9d7236e9
SHA2561af99da183bcda829d8b7da71d0b7f90c3a67790e20d094087ce50de2a8218b4
SHA5128368d5cae596e55c2ef9cff3fec11bbca54eadd245f2ae672a66986bc0f4ba2796b54c14c58640948ece8664fc7ce7ede19051522657cdc9f1bb6be7c0d3161f
-
Filesize
379KB
MD5d1286043891cfbb979a4f2b1dfb4bb84
SHA1d3b87690656277bf1112f134929692268a4648df
SHA256e68090e86974202dfc9d96f18c89dbfc3467b7c364eb93968221cd508e1b4f5e
SHA5122488aa2eced35af10e92f437801969dc0bd262ce6b42dee5801b98cad620025e163c6f7c153ae746d95b28653e4a83e5be87b3ecbf3d8fad93198d2732a6ffa4
-
Filesize
379KB
MD5d1286043891cfbb979a4f2b1dfb4bb84
SHA1d3b87690656277bf1112f134929692268a4648df
SHA256e68090e86974202dfc9d96f18c89dbfc3467b7c364eb93968221cd508e1b4f5e
SHA5122488aa2eced35af10e92f437801969dc0bd262ce6b42dee5801b98cad620025e163c6f7c153ae746d95b28653e4a83e5be87b3ecbf3d8fad93198d2732a6ffa4
-
Filesize
379KB
MD5d1286043891cfbb979a4f2b1dfb4bb84
SHA1d3b87690656277bf1112f134929692268a4648df
SHA256e68090e86974202dfc9d96f18c89dbfc3467b7c364eb93968221cd508e1b4f5e
SHA5122488aa2eced35af10e92f437801969dc0bd262ce6b42dee5801b98cad620025e163c6f7c153ae746d95b28653e4a83e5be87b3ecbf3d8fad93198d2732a6ffa4