Overview
overview
10Static
static
30fcedda988...81.exe
windows10-2004-x64
102432f37cfb...1d.exe
windows10-2004-x64
102b87c7a59a...5a.exe
windows10-2004-x64
102d0e9487b9...7c.exe
windows10-2004-x64
10305a49521a...a8.exe
windows10-2004-x64
1034eac23d05...83.exe
windows10-2004-x64
104288cf23e3...b7.exe
windows10-2004-x64
10566c1670c8...b3.exe
windows7-x64
3566c1670c8...b3.exe
windows10-2004-x64
105b49e20d68...4b.exe
windows10-2004-x64
106c3c673ed8...b1.exe
windows10-2004-x64
107ba1ecff94...00.exe
windows10-2004-x64
107fc78a2450...25.exe
windows10-2004-x64
1080c33721dd...df.exe
windows10-2004-x64
109c63b1ba60...a6.exe
windows10-2004-x64
10ad95249c96...29.exe
windows10-2004-x64
10b3b9cd87ed...59.exe
windows10-2004-x64
10c567fbb4ec...1d.exe
windows7-x64
3c567fbb4ec...1d.exe
windows10-2004-x64
10c69d581e2c...e2.exe
windows10-2004-x64
10e3c9a1721d...3b.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 17:47
Static task
static1
Behavioral task
behavioral1
Sample
0fcedda9880a4fde053b44d2ef2a6b90a87db74ea8ef6e1605822364dcd8a881.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
2432f37cfbe720ce2f627a725367676d71bb944d2306c1eab9bab6b0cab5e01d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
2b87c7a59a469adca1693ceecd7fb1ea4eb1bb095a55e316a96eafda54e2285a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
2d0e9487b9ef5db2eb0500ce9a5ed167ceb3c1f271e1a50f7283d3ed521cb67c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
305a49521aa7fa93bdb6f6a01420fcd3800a565c32194a366c1d6a22f8f00da8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
34eac23d05376694cf25e5de3b6455451ef743f0f766b72fa3e5b94726010c83.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
4288cf23e3f7079623b595c70496f28f4678e173ed25b2ef6101e66d3e99e2b7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
566c1670c8a5f43ec35b831518b15cf388fbddff2c3ba3ffc8167ac1bf0a1fb3.exe
Resource
win7-20240508-en
Behavioral task
behavioral9
Sample
566c1670c8a5f43ec35b831518b15cf388fbddff2c3ba3ffc8167ac1bf0a1fb3.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral10
Sample
5b49e20d688471002a1cc866e323e32a0e0a2f1e92fd2f057979cd27a850f44b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
6c3c673ed879b79fe56de07cf67f2547b37ddb371c94a074e9184833681145b1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
7ba1ecff945330ba39b0d1bc0a81272da1abf8acbbe727db52a09c23c16c0c00.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
7fc78a2450a642c8ab25d22c58c9792408d566a5b9043d95b64f6b407d9d8225.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
80c33721dd8916cf61ad4cfe3a1f57bd083b1adf9fdad50707739a67ee1c9bdf.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
9c63b1ba6018935ad5e5fbb92f79d2bbd6eeb9ee0520ed5cbe7b9e1213eb33a6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
ad95249c96bb70f2fde592c74bf9bfaa2f25de9282a90943574ce4e547731029.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
b3b9cd87ed117eff25ebae286512425b6d778c82802a6b097ac45b68e438e159.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
c567fbb4ecb66496889cc136a63ac18310c18ecd83880c4c83fb29e71c63d51d.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
c567fbb4ecb66496889cc136a63ac18310c18ecd83880c4c83fb29e71c63d51d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
c69d581e2c9751820b591c60023bbffd16aa66ad26d0c76b20574cdac2cc7be2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
e3c9a1721d8f0eecf6a7e81b32b9823a4952d636d4930a9cdfae0876cf293d3b.exe
Resource
win10v2004-20240508-en
General
-
Target
4288cf23e3f7079623b595c70496f28f4678e173ed25b2ef6101e66d3e99e2b7.exe
-
Size
514KB
-
MD5
553e00500d378ac6c88ebcb49f0c11b2
-
SHA1
b0640e712ebde50090ee39742411f065e998128c
-
SHA256
4288cf23e3f7079623b595c70496f28f4678e173ed25b2ef6101e66d3e99e2b7
-
SHA512
3102d0c6d812f7220f60816f48e6a4d9dc0cfa84fe4fba947e661fa03f7870edeff42fdbb3f4df82040dcf5f8c2241187bb6264c59687a2a92ace8dffbf6399c
-
SSDEEP
12288:rMrry90RaLXTfYqGozYJ/1epNJeGQ9Fyw:IyNgqGozYB1eXsGQ/d
Malware Config
Extracted
amadey
3.85
http://77.91.68.3
-
install_dir
3ec1f323b5
-
install_file
danke.exe
-
strings_key
827021be90f1e85ab27949ea7e9347e8
-
url_paths
/home/love/index.php
Extracted
redline
nasa
77.91.68.68:19071
-
auth_value
6da71218d8a9738ea3a9a78b5677589b
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4781726.exe healer behavioral7/memory/3184-21-0x0000000000900000-0x000000000090A000-memory.dmp healer -
Processes:
a4781726.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4781726.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4781726.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4781726.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4781726.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a4781726.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4781726.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5387220.exe family_redline behavioral7/memory/3284-44-0x0000000000DF0000-0x0000000000E20000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
b2443085.exedanke.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation b2443085.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation danke.exe -
Executes dropped EXE 9 IoCs
Processes:
v3360512.exev5875187.exea4781726.exeb2443085.exedanke.exec2732462.exed5387220.exedanke.exedanke.exepid process 940 v3360512.exe 2380 v5875187.exe 3184 a4781726.exe 1208 b2443085.exe 3148 danke.exe 4980 c2732462.exe 3284 d5387220.exe 4564 danke.exe 1724 danke.exe -
Processes:
a4781726.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a4781726.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
4288cf23e3f7079623b595c70496f28f4678e173ed25b2ef6101e66d3e99e2b7.exev3360512.exev5875187.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4288cf23e3f7079623b595c70496f28f4678e173ed25b2ef6101e66d3e99e2b7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3360512.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5875187.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
c2732462.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c2732462.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c2732462.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c2732462.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a4781726.exepid process 3184 a4781726.exe 3184 a4781726.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a4781726.exedescription pid process Token: SeDebugPrivilege 3184 a4781726.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
b2443085.exepid process 1208 b2443085.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
4288cf23e3f7079623b595c70496f28f4678e173ed25b2ef6101e66d3e99e2b7.exev3360512.exev5875187.exeb2443085.exedanke.execmd.exedescription pid process target process PID 2644 wrote to memory of 940 2644 4288cf23e3f7079623b595c70496f28f4678e173ed25b2ef6101e66d3e99e2b7.exe v3360512.exe PID 2644 wrote to memory of 940 2644 4288cf23e3f7079623b595c70496f28f4678e173ed25b2ef6101e66d3e99e2b7.exe v3360512.exe PID 2644 wrote to memory of 940 2644 4288cf23e3f7079623b595c70496f28f4678e173ed25b2ef6101e66d3e99e2b7.exe v3360512.exe PID 940 wrote to memory of 2380 940 v3360512.exe v5875187.exe PID 940 wrote to memory of 2380 940 v3360512.exe v5875187.exe PID 940 wrote to memory of 2380 940 v3360512.exe v5875187.exe PID 2380 wrote to memory of 3184 2380 v5875187.exe a4781726.exe PID 2380 wrote to memory of 3184 2380 v5875187.exe a4781726.exe PID 2380 wrote to memory of 1208 2380 v5875187.exe b2443085.exe PID 2380 wrote to memory of 1208 2380 v5875187.exe b2443085.exe PID 2380 wrote to memory of 1208 2380 v5875187.exe b2443085.exe PID 1208 wrote to memory of 3148 1208 b2443085.exe danke.exe PID 1208 wrote to memory of 3148 1208 b2443085.exe danke.exe PID 1208 wrote to memory of 3148 1208 b2443085.exe danke.exe PID 940 wrote to memory of 4980 940 v3360512.exe c2732462.exe PID 940 wrote to memory of 4980 940 v3360512.exe c2732462.exe PID 940 wrote to memory of 4980 940 v3360512.exe c2732462.exe PID 2644 wrote to memory of 3284 2644 4288cf23e3f7079623b595c70496f28f4678e173ed25b2ef6101e66d3e99e2b7.exe d5387220.exe PID 2644 wrote to memory of 3284 2644 4288cf23e3f7079623b595c70496f28f4678e173ed25b2ef6101e66d3e99e2b7.exe d5387220.exe PID 2644 wrote to memory of 3284 2644 4288cf23e3f7079623b595c70496f28f4678e173ed25b2ef6101e66d3e99e2b7.exe d5387220.exe PID 3148 wrote to memory of 4828 3148 danke.exe schtasks.exe PID 3148 wrote to memory of 4828 3148 danke.exe schtasks.exe PID 3148 wrote to memory of 4828 3148 danke.exe schtasks.exe PID 3148 wrote to memory of 4636 3148 danke.exe cmd.exe PID 3148 wrote to memory of 4636 3148 danke.exe cmd.exe PID 3148 wrote to memory of 4636 3148 danke.exe cmd.exe PID 4636 wrote to memory of 4892 4636 cmd.exe cmd.exe PID 4636 wrote to memory of 4892 4636 cmd.exe cmd.exe PID 4636 wrote to memory of 4892 4636 cmd.exe cmd.exe PID 4636 wrote to memory of 4352 4636 cmd.exe cacls.exe PID 4636 wrote to memory of 4352 4636 cmd.exe cacls.exe PID 4636 wrote to memory of 4352 4636 cmd.exe cacls.exe PID 4636 wrote to memory of 4048 4636 cmd.exe cacls.exe PID 4636 wrote to memory of 4048 4636 cmd.exe cacls.exe PID 4636 wrote to memory of 4048 4636 cmd.exe cacls.exe PID 4636 wrote to memory of 2652 4636 cmd.exe cmd.exe PID 4636 wrote to memory of 2652 4636 cmd.exe cmd.exe PID 4636 wrote to memory of 2652 4636 cmd.exe cmd.exe PID 4636 wrote to memory of 3420 4636 cmd.exe cacls.exe PID 4636 wrote to memory of 3420 4636 cmd.exe cacls.exe PID 4636 wrote to memory of 3420 4636 cmd.exe cacls.exe PID 4636 wrote to memory of 2060 4636 cmd.exe cacls.exe PID 4636 wrote to memory of 2060 4636 cmd.exe cacls.exe PID 4636 wrote to memory of 2060 4636 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4288cf23e3f7079623b595c70496f28f4678e173ed25b2ef6101e66d3e99e2b7.exe"C:\Users\Admin\AppData\Local\Temp\4288cf23e3f7079623b595c70496f28f4678e173ed25b2ef6101e66d3e99e2b7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3360512.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3360512.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5875187.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5875187.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4781726.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4781726.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3184
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2443085.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2443085.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN danke.exe /TR "C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe" /F6⤵
- Creates scheduled task(s)
PID:4828
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "danke.exe" /P "Admin:N"&&CACLS "danke.exe" /P "Admin:R" /E&&echo Y|CACLS "..\3ec1f323b5" /P "Admin:N"&&CACLS "..\3ec1f323b5" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4892
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:N"7⤵PID:4352
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "danke.exe" /P "Admin:R" /E7⤵PID:4048
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2652
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:N"7⤵PID:3420
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\3ec1f323b5" /P "Admin:R" /E7⤵PID:2060
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2732462.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2732462.exe3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4980
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5387220.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5387220.exe2⤵
- Executes dropped EXE
PID:3284
-
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:4564
-
C:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exeC:\Users\Admin\AppData\Local\Temp\3ec1f323b5\danke.exe1⤵
- Executes dropped EXE
PID:1724
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174KB
MD544b079353be223f62c1d1839f5c366c0
SHA1d83df1f2fec068ffe6f7213070a691dba3a6b0ce
SHA256099d2afe51a4f5e880e605b76938da41b813f6948fceecbd341ce0ba5a45a7c1
SHA51233d2c0dd7e8fb2d4028d276143dcacb1082d52a7a3db060cd862cd96f2912e5207ceea0290431f2badb57194924a87e42ec0523703c9b9e5b4236cf2f9cb0b8c
-
Filesize
359KB
MD5ded312afa77140fe823cb44ec4485042
SHA1c279c93b58baad6c0ddb4b1ac7d0ed4ddf637057
SHA256b3b061f2b4544656453666c30d45ee2e131cb77d54b2bb8c3bd2d323d31ae5bf
SHA512c54450a35f5695b9bb91bef27d5cb18f97a5b0f2a79a179b3fb84490cf00548940e1e8205e0efe540ba15e5ca2f48b65aafca5e050f9fef8327ab4813a97cd70
-
Filesize
32KB
MD594afb8384b655860e0b77c8ca6200931
SHA1319864292e0d2bfc7526b9c035810bc5b98070ed
SHA256f6daf5683616a0354463d1033829182576d4fcdb02044323dd51cd12e07df429
SHA512168b40c74a1706e5c4eaa2bc92cba9167173bc338c87e191ccd3e1c6501e722a33b997f223d88122155fd3aa6395e81c30b366ef2d6d8c6083c9cd7804aa0458
-
Filesize
235KB
MD509d904a000f63b258e5bad10de5f1b26
SHA107e523b50c05c5eb7f2989a19c924f37ff615ee3
SHA256f6967f6c2083213475e2621df9a23d3683a65ef60451e7d6f221ea730b5b21e6
SHA5121c0277231b5fdcba54d6ff404eb4531f1f1476f1a0786ec70e34e2c33a9447180a123473cbfa53b754b6084f38ec6a3e7cfc4428d2526f9692c4fc0e651372e9
-
Filesize
15KB
MD5a18b4948b9077425fcff2f137e2177a8
SHA1feabecf64bb8c5cea8292bdab6d6ad34b33c05c2
SHA256bac5261eb318fb406e196c29e6d324af34b8f5b4ea6a6329522f88742a1a6982
SHA512221ab6c2971e38d3fe336606576a9395565cd9d03f7383fec03941a1d632d70542c7a8cf1c7ba6afb77ad975d57ace9948ee01b20df22cd7701dd438b2c289ac
-
Filesize
227KB
MD575122262d5617fea555d27b2f4cdaf22
SHA1a02a17cdba991da097d4682780c0f14bc9bf0e8c
SHA2564379ffbd5592220272d5864a401354f23700e99a576889ace92a27fe612d0179
SHA5124e2591d639161aeb82f35c4f7f6231d103a554576cc73a680a9495f57aa9c79955cc164e2b7176c5bddffb115019b594ff3c8f64dd7146e6737ad9b6241fd6f9