Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2023, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.6c0fadc9ec46bdf0ab9ec275aac33300.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.6c0fadc9ec46bdf0ab9ec275aac33300.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.6c0fadc9ec46bdf0ab9ec275aac33300.exe
-
Size
124KB
-
MD5
6c0fadc9ec46bdf0ab9ec275aac33300
-
SHA1
f32117ea054a7bb5759f668ecb21a60e457ffe5d
-
SHA256
960800ecb310686d911d791a858cd9c6129f4a850bd64d2ad956adeb54943996
-
SHA512
9d93cd872891de4aa7a3aa5f558609e8a06c87ce8e7b89daebf728473e14370df0f617fec07b634e5e03d26617c8f282828aff6611ace9ec59f7fb02a07778aa
-
SSDEEP
1536:5j9QfZhvgM/AQmSNFONMlszAjUk3nrKNvvDNTXrtG1NcJ:v4Xgf1AnrKN3DNTRPJ
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" teayoew.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation NEAS.6c0fadc9ec46bdf0ab9ec275aac33300.exe -
Executes dropped EXE 1 IoCs
pid Process 5052 teayoew.exe -
Adds Run key to start application 2 TTPs 51 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /B" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /m" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /u" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /P" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /g" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /Z" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /E" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /Q" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /c" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /N" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /q" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /J" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /A" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /L" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /r" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /V" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /t" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /l" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /X" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /z" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /n" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /j" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /D" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /K" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /W" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /I" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /S" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /F" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /y" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /O" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /v" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /H" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /M" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /b" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /x" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /w" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /Y" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /G" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /U" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /h" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /C" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /T" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /i" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /p" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /k" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /o" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /e" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /f" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /R" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /s" teayoew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\teayoew = "C:\\Users\\Admin\\teayoew.exe /a" teayoew.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe 5052 teayoew.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3704 NEAS.6c0fadc9ec46bdf0ab9ec275aac33300.exe 5052 teayoew.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3704 wrote to memory of 5052 3704 NEAS.6c0fadc9ec46bdf0ab9ec275aac33300.exe 90 PID 3704 wrote to memory of 5052 3704 NEAS.6c0fadc9ec46bdf0ab9ec275aac33300.exe 90 PID 3704 wrote to memory of 5052 3704 NEAS.6c0fadc9ec46bdf0ab9ec275aac33300.exe 90 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83 PID 5052 wrote to memory of 3704 5052 teayoew.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6c0fadc9ec46bdf0ab9ec275aac33300.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6c0fadc9ec46bdf0ab9ec275aac33300.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\teayoew.exe"C:\Users\Admin\teayoew.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD56ea5e75a3ac15e68f8e1d787502600a2
SHA1152d50e9957fbfec3b7de629c390383a9de9ad3b
SHA2567f64f3c9a2837acf381348aba2790bb48fd79412f0cbd4eec26dcd309f42225c
SHA512137d606b17404f1c9300ff0950e81bf3e14ed7df31a67d36776a4c06cbb9159b9bf88d72dbfba5f6e359fc4f6b5f3d706c01156621b98bb09ab4347159dd72f7
-
Filesize
124KB
MD56ea5e75a3ac15e68f8e1d787502600a2
SHA1152d50e9957fbfec3b7de629c390383a9de9ad3b
SHA2567f64f3c9a2837acf381348aba2790bb48fd79412f0cbd4eec26dcd309f42225c
SHA512137d606b17404f1c9300ff0950e81bf3e14ed7df31a67d36776a4c06cbb9159b9bf88d72dbfba5f6e359fc4f6b5f3d706c01156621b98bb09ab4347159dd72f7
-
Filesize
124KB
MD56ea5e75a3ac15e68f8e1d787502600a2
SHA1152d50e9957fbfec3b7de629c390383a9de9ad3b
SHA2567f64f3c9a2837acf381348aba2790bb48fd79412f0cbd4eec26dcd309f42225c
SHA512137d606b17404f1c9300ff0950e81bf3e14ed7df31a67d36776a4c06cbb9159b9bf88d72dbfba5f6e359fc4f6b5f3d706c01156621b98bb09ab4347159dd72f7