Analysis
-
max time kernel
119s -
max time network
85s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 02:18 UTC
Static task
static1
Behavioral task
behavioral1
Sample
4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe
-
Size
2.7MB
-
MD5
4a0d6ec6b2bdd3f6fc81cc158f0342d0
-
SHA1
ddd6340d156b0a61f38336ce4c951c383ef3ab0a
-
SHA256
d5b53869944308d199558c0f07b9a665d1bd4cdaac3816abc8c7db2c5ebf8a2d
-
SHA512
0f6f312158598afa4039d109463d56334beeab66222006ba1653cd1e514da29eb9e383aa0126188b6d194c26affdc760624b1c35ced876bcf70407d5b2092ffd
-
SSDEEP
49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBL9w4S+:+R0pI/IQlUoMPdmpSpv4X
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2604 xoptisys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\FilesLL\\xoptisys.exe" 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\Vid7I\\optidevec.exe" 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xoptisys.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 2604 xoptisys.exe 2604 xoptisys.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4556 wrote to memory of 2604 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 90 PID 4556 wrote to memory of 2604 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 90 PID 4556 wrote to memory of 2604 4556 4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe"C:\Users\Admin\AppData\Local\Temp\4a0d6ec6b2bdd3f6fc81cc158f0342d0N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\FilesLL\xoptisys.exeC:\FilesLL\xoptisys.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2604
-
Network
-
Remote address:8.8.8.8:53Request104.219.191.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request73.144.22.2.in-addr.arpaIN PTRResponse73.144.22.2.in-addr.arpaIN PTRa2-22-144-73deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request138.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.35.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request232.168.11.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request103.169.127.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requesttse1.mm.bing.netIN AResponsetse1.mm.bing.netIN CNAMEmm-mm.bing.net.trafficmanager.netmm-mm.bing.net.trafficmanager.netIN CNAMEax-0001.ax-msedge.netax-0001.ax-msedge.netIN A150.171.27.10ax-0001.ax-msedge.netIN A150.171.28.10
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301205_1OM9XZCKYFXI34HLQ&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239317301205_1OM9XZCKYFXI34HLQ&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 601541
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: B7F79C959A664EABAD7C1E63A42FBDC2 Ref B: LON04EDGE0615 Ref C: 2024-08-18T02:19:21Z
date: Sun, 18 Aug 2024 02:19:21 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340418590_1Z5SLYPYIFLU5OB7B&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239340418590_1Z5SLYPYIFLU5OB7B&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 546860
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 0366D2099E6B4497B80ACFD0827D481F Ref B: LON04EDGE0615 Ref C: 2024-08-18T02:19:21Z
date: Sun, 18 Aug 2024 02:19:21 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239339388140_1LI3WHEJIR12MEKBJ&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239339388140_1LI3WHEJIR12MEKBJ&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 646893
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: D0E32D5AD24A4DFB9A0DF7E55CBABD8B Ref B: LON04EDGE0615 Ref C: 2024-08-18T02:19:21Z
date: Sun, 18 Aug 2024 02:19:21 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239339388141_1OVD83K3ANLQD9KEG&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239339388141_1OVD83K3ANLQD9KEG&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 525311
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 04D36C7068104649AC37F4F9B86708F5 Ref B: LON04EDGE0615 Ref C: 2024-08-18T02:19:21Z
date: Sun, 18 Aug 2024 02:19:21 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239340418589_1A7GR0X7EOYKFPJ56&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239340418589_1A7GR0X7EOYKFPJ56&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 592830
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 0712DF527F3449CCA79FA5170C2CA693 Ref B: LON04EDGE0615 Ref C: 2024-08-18T02:19:21Z
date: Sun, 18 Aug 2024 02:19:21 GMT
-
GEThttps://tse1.mm.bing.net/th?id=OADD2.10239317301614_1PEIP2AXZTPQ08R0S&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90Remote address:150.171.27.10:443RequestGET /th?id=OADD2.10239317301614_1PEIP2AXZTPQ08R0S&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90 HTTP/2.0
host: tse1.mm.bing.net
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-length: 563726
content-type: image/jpeg
x-cache: TCP_HIT
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth&ndcParam=QUZE"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: AA62F6CEFAF44CCD9964AF844907D734 Ref B: LON04EDGE0615 Ref C: 2024-08-18T02:19:22Z
date: Sun, 18 Aug 2024 02:19:22 GMT
-
Remote address:8.8.8.8:53Request10.27.171.150.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request31.243.111.52.in-addr.arpaIN PTRResponse
-
1.2kB 6.9kB 15 13
-
1.2kB 6.9kB 15 13
-
1.2kB 6.9kB 15 13
-
1.2kB 6.9kB 15 13
-
150.171.27.10:443https://tse1.mm.bing.net/th?id=OADD2.10239317301614_1PEIP2AXZTPQ08R0S&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90tls, http2153.0kB 3.6MB 2631 2625
HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301205_1OM9XZCKYFXI34HLQ&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340418590_1Z5SLYPYIFLU5OB7B&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239339388140_1LI3WHEJIR12MEKBJ&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239339388141_1OVD83K3ANLQD9KEG&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239340418589_1A7GR0X7EOYKFPJ56&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=1920&h=1080&dynsize=1&qlt=90HTTP Response
200HTTP Response
200HTTP Response
200HTTP Response
200HTTP Response
200HTTP Request
GET https://tse1.mm.bing.net/th?id=OADD2.10239317301614_1PEIP2AXZTPQ08R0S&pid=21.2&c=3&w=1080&h=1920&dynsize=1&qlt=90HTTP Response
200
-
73 B 147 B 1 1
DNS Request
104.219.191.52.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
73.144.22.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
138.32.126.40.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
26.35.223.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
232.168.11.51.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
103.169.127.40.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
-
62 B 170 B 1 1
DNS Request
tse1.mm.bing.net
DNS Response
150.171.27.10150.171.28.10
-
72 B 158 B 1 1
DNS Request
10.27.171.150.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
31.243.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5d2b7bb80b3f23b712d257830bdd98444
SHA1118da259c209639ecb3efdf53693e8fe6c52c75c
SHA25651526164a5789153ae9b1ec85902492701f252ca794500906a195b1de00ca8db
SHA512229a670455ad5f859648a19a32b0b616cc59c8450f796e2c69567ad13ffa70c7c55a7072a262ad0a9caf00d54f4b0a45d979d1534b1b4d6863a4b54349a37c24
-
Filesize
204B
MD5ae17c9aa564ee1fcad9dee5de7791ce9
SHA148243ab02fa4d2323e10378481c58716ec654295
SHA256dd13b6456dafbdc9f2a4f058175111fb50b156d0fa81b11e2b0dc391d2c19dbd
SHA5127715b83e1a16dd046d79572290fe540f799a6582e983bce3170a4ab366674c05f753ad4065fb533b81134f2792b2a4bec5795c79b9acfe526ad7d1df6144efd5
-
Filesize
2.7MB
MD5ce611ab52f2eb30a24ce6c7eb9034631
SHA1552d3e59650baee7e4b67f03beb2cfcabefbe3a3
SHA256d73a75768a619a1f4e46daee3ac41795f24277e843fbce6d814c2d75697b219a
SHA512bb7987e351fe64356d62fea6a1b488c6d2195d3cd9a8e8cf05150718519ae46812f86cf4b39a12314db63a71169448f2096c28123c1063656538788121f1d200