Analysis
-
max time kernel
45s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 18:56
Behavioral task
behavioral1
Sample
Fluxus.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Fluxus.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
�nT��ž.pyc
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
�nT��ž.pyc
Resource
win10v2004-20231215-en
General
-
Target
Fluxus.exe
-
Size
9.2MB
-
MD5
3ab53155c4bdf2d597b01fcbed08d9f0
-
SHA1
ea5954af9b8f6002b0d9846169fd4f6e857e9edd
-
SHA256
1a2354417a8da9eb981c11a7502d04aa4414908e34eb3031bf5be70c112c72bc
-
SHA512
1b5243f2b54dd644c42c0af624af6acf7d11c92ef5d4d8258b26bbc6837b4e803b9f2c11c8c2bb34012cbf845abc732ca1e0a275385b336d191369cac2fa8fc4
-
SSDEEP
196608:QW0cDedIK36BDLjv+bhqNVoBKUh8mz4Iv9PFu1D7R0o:AiedF36JL+9qz8/b4ITuRSo
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2268 Fluxus.exe -
resource yara_rule behavioral1/files/0x0006000000018b7e-22.dat upx behavioral1/memory/2268-24-0x000007FEF5960000-0x000007FEF5F49000-memory.dmp upx -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2704 chrome.exe 2704 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2268 2436 Fluxus.exe 28 PID 2436 wrote to memory of 2268 2436 Fluxus.exe 28 PID 2436 wrote to memory of 2268 2436 Fluxus.exe 28 PID 2704 wrote to memory of 2624 2704 chrome.exe 30 PID 2704 wrote to memory of 2624 2704 chrome.exe 30 PID 2704 wrote to memory of 2624 2704 chrome.exe 30 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2208 2704 chrome.exe 32 PID 2704 wrote to memory of 2956 2704 chrome.exe 34 PID 2704 wrote to memory of 2956 2704 chrome.exe 34 PID 2704 wrote to memory of 2956 2704 chrome.exe 34 PID 2704 wrote to memory of 328 2704 chrome.exe 33 PID 2704 wrote to memory of 328 2704 chrome.exe 33 PID 2704 wrote to memory of 328 2704 chrome.exe 33 PID 2704 wrote to memory of 328 2704 chrome.exe 33 PID 2704 wrote to memory of 328 2704 chrome.exe 33 PID 2704 wrote to memory of 328 2704 chrome.exe 33 PID 2704 wrote to memory of 328 2704 chrome.exe 33 PID 2704 wrote to memory of 328 2704 chrome.exe 33 PID 2704 wrote to memory of 328 2704 chrome.exe 33 PID 2704 wrote to memory of 328 2704 chrome.exe 33 PID 2704 wrote to memory of 328 2704 chrome.exe 33 PID 2704 wrote to memory of 328 2704 chrome.exe 33 PID 2704 wrote to memory of 328 2704 chrome.exe 33 PID 2704 wrote to memory of 328 2704 chrome.exe 33 PID 2704 wrote to memory of 328 2704 chrome.exe 33 PID 2704 wrote to memory of 328 2704 chrome.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fluxus.exe"C:\Users\Admin\AppData\Local\Temp\Fluxus.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\Fluxus.exe"C:\Users\Admin\AppData\Local\Temp\Fluxus.exe"2⤵
- Loads dropped DLL
PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6a09758,0x7fef6a09768,0x7fef6a097782⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1172 --field-trial-handle=1304,i,3708267133446350930,4905050366169798879,131072 /prefetch:22⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1568 --field-trial-handle=1304,i,3708267133446350930,4905050366169798879,131072 /prefetch:82⤵PID:328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1528 --field-trial-handle=1304,i,3708267133446350930,4905050366169798879,131072 /prefetch:82⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2320 --field-trial-handle=1304,i,3708267133446350930,4905050366169798879,131072 /prefetch:12⤵PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2336 --field-trial-handle=1304,i,3708267133446350930,4905050366169798879,131072 /prefetch:12⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1484 --field-trial-handle=1304,i,3708267133446350930,4905050366169798879,131072 /prefetch:22⤵PID:764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1452 --field-trial-handle=1304,i,3708267133446350930,4905050366169798879,131072 /prefetch:12⤵PID:1048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3444 --field-trial-handle=1304,i,3708267133446350930,4905050366169798879,131072 /prefetch:82⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3468 --field-trial-handle=1304,i,3708267133446350930,4905050366169798879,131072 /prefetch:82⤵PID:1164
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:2872
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13fab7688,0x13fab7698,0x13fab76a83⤵PID:2136
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3972 --field-trial-handle=1304,i,3708267133446350930,4905050366169798879,131072 /prefetch:82⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3920 --field-trial-handle=1304,i,3708267133446350930,4905050366169798879,131072 /prefetch:12⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1772
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD555482032737022643a10c30458d0a1e2
SHA15f6a3497540095a3a84cc16e71aa2baab452cd84
SHA256d4d63c9e2d9e2a75acf62d60d02e8b40de9dbf5a75f90e61f9588a433b43adf9
SHA51237fd197cf7acc79215f9a90196cfbfbb8680ef8f543f90782427310ab0c0b973b326e3ec108add812b310f3872719b498d63059c7e861f5148f548a395830524
-
Filesize
361B
MD56a929521baa3679746a543a8067f5243
SHA1f812ae8e069b002474373075ab510a67081c768b
SHA256afe23f0856cf82e041bbfe75f87e06d7f4ef0952366466b5637389f366a83ffb
SHA512e746da8c9cd9c284ccff05a6bd59199e6830b11cd13646b89dcce3647330953f22f41af680562f31d2f28b7a01434d929049efa3f49194d47b5b972f8277635f
-
Filesize
5KB
MD516bd98921131d9a0aab051eb9257a779
SHA121e25e143aed9dfe465b83111aa88f847ce88238
SHA2564790dd79eea4e05711256756e010229b12f37f2db034b945cd9ebdd727cf00e0
SHA512d857941feb0924b95751edc87ee7579ba3dfcca40a8c913bcc76fc4cc976679947d2331e65a29108fa9dd03026de284b8c29b3b71ef413559854c04709bf65cd
-
Filesize
5KB
MD576dc9498a1c8c0e0759623dd035c2b34
SHA1da4f9d4ebb0d1253bbdf6764fb607539bea0fe10
SHA2565a1554784ed0ef107f6ea17728550ea62f4d47afc17af3337a412b31f8c1c7c3
SHA512462447ea86e5f4052f439abc4dec43e9384ab49ead9f06c58975357fab1e280b6eab8cc7f75206f9508804a8a62d089b771424e50f90eb9648a0eb350dc37c84
-
Filesize
4KB
MD547a122672c375a764446aa1293ce7f13
SHA18e238d1bee52fad2ab7a8ecd4b9c25cacdc96b3c
SHA25688b17fc51d99768e6b306d36d2573414e834340aecae90453be13bd1247d7b7e
SHA512c3073c9628c02cbdf9915b9ff55f2b30af195739339cbb50a4edb05b8135c0c110b846728f3aa3e16f23eaa88bd221fa7fe1610cfdb48d38d58fcef0147baf88
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
1.6MB
MD50b66c50e563d74188a1e96d6617261e8
SHA1cfd778b3794b4938e584078cbfac0747a8916d9e
SHA25602c665f77db6b255fc62f978aedbe2092b7ef1926836290da68fd838dbf2a9f2
SHA51237d710cb5c0ceb5957d11b61684cfbc65951c1d40ab560f3f3cb8feca42f9d43bd981a0ff44c3cb7562779264f18116723457e79e0e23852d7638b1a954a258f