Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07/12/2024, 19:17 UTC
Behavioral task
behavioral1
Sample
96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe
Resource
win10v2004-20241007-en
General
-
Target
96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe
-
Size
29KB
-
MD5
32437f0ee3fe67fb548f7e45e2c30a30
-
SHA1
cfb02e162991c082423ff619a43d970876ef8430
-
SHA256
96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025e
-
SHA512
01ecb3e1105055c6e16461b4581d2b30520b5b352169521a0bd1eebb5b00df3251e78f63da1763109ba1f2813269ef03f1b3f5a234f21b01f527f5c0fd0fc376
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/J:AEwVs+0jNDY1qi/qx
Malware Config
Signatures
-
Detects MyDoom family 2 IoCs
resource yara_rule behavioral2/memory/2924-13-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral2/memory/2924-56-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom -
Mydoom family
-
Executes dropped EXE 1 IoCs
pid Process 1096 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
resource yara_rule behavioral2/memory/2924-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/files/0x000a000000023b7a-4.dat upx behavioral2/memory/1096-5-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2924-13-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/1096-15-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1096-16-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1096-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1096-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1096-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1096-33-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1096-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1096-40-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1096-45-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1096-50-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/1096-52-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/memory/2924-56-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral2/memory/1096-57-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral2/files/0x0004000000000709-67.dat upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe File opened for modification C:\Windows\java.exe 96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe File created C:\Windows\java.exe 96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2924 wrote to memory of 1096 2924 96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe 82 PID 2924 wrote to memory of 1096 2924 96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe 82 PID 2924 wrote to memory of 1096 2924 96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe"C:\Users\Admin\AppData\Local\Temp\96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1096
-
Network
-
Remote address:8.8.8.8:53Request28.118.140.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request88.210.23.2.in-addr.arpaIN PTRResponse88.210.23.2.in-addr.arpaIN PTRa2-23-210-88deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request2.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request104.219.191.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request196.249.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request56.163.245.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request206.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request92.12.20.2.in-addr.arpaIN PTRResponse92.12.20.2.in-addr.arpaIN PTRa2-20-12-92deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request20.49.80.91.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request23.236.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestm-ou.seIN MXResponsem-ou.seIN MXaspmx2 googlemailcomm-ou.seIN MXalt2aspmxlgoogle�9m-ou.seIN MX�Qm-ou.seIN MXaspmx5�.m-ou.seIN MXalt1�Qm-ou.seIN MXaspmx3�.m-ou.seIN MXaspmx4�.
-
Remote address:8.8.8.8:53Requestaspmx2.googlemail.comIN AResponseaspmx2.googlemail.comIN A142.250.150.26
-
Remote address:8.8.8.8:53Requestacm.orgIN MXResponseacm.orgIN MXmail mailroutenet
-
Remote address:8.8.8.8:53Requestmail.mailroute.netIN AResponsemail.mailroute.netIN A199.89.3.120mail.mailroute.netIN A199.89.1.120
-
Remote address:8.8.8.8:53Requestcs.stanford.eduIN MXResponsecs.stanford.eduIN MX�cs.stanford.eduIN MXsmtp1�cs.stanford.eduIN MXsmtp2�
-
Remote address:8.8.8.8:53Requestcs.stanford.eduIN AResponsecs.stanford.eduIN A171.64.64.64
-
Remote address:8.8.8.8:53Requestburtleburtle.netIN MXResponseburtleburtle.netIN MXmx�
-
Remote address:8.8.8.8:53Requestmx.burtleburtle.netIN AResponsemx.burtleburtle.netIN A65.254.254.51mx.burtleburtle.netIN A65.254.254.52mx.burtleburtle.netIN A65.254.254.50
-
Remote address:8.8.8.8:53Requestalumni.caltech.eduIN MXResponsealumni.caltech.eduIN MXalumni-caltech-edumail protectionoutlookcom
-
DNSalumni-caltech-edu.mail.protection.outlook.com96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exeRemote address:8.8.8.8:53Requestalumni-caltech-edu.mail.protection.outlook.comIN AResponsealumni-caltech-edu.mail.protection.outlook.comIN A52.101.41.0alumni-caltech-edu.mail.protection.outlook.comIN A52.101.42.14alumni-caltech-edu.mail.protection.outlook.comIN A52.101.41.58alumni-caltech-edu.mail.protection.outlook.comIN A52.101.9.17
-
Remote address:8.8.8.8:53Requestgzip.orgIN MXResponsegzip.orgIN MX�
-
Remote address:8.8.8.8:53Requestgzip.orgIN AResponsegzip.orgIN A85.187.148.2
-
Remote address:8.8.8.8:53Requestwww.google.comIN AResponsewww.google.comIN A142.250.187.196
-
Remote address:8.8.8.8:53Requestwww.altavista.comIN AResponsewww.altavista.comIN CNAMEus.yhs4.search.yahoo.comus.yhs4.search.yahoo.comIN CNAMEds-global3.l7.search.ystg1.b.yahoo.comds-global3.l7.search.ystg1.b.yahoo.comIN A212.82.100.137
-
GEThttp://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=mailto+gzip.org96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exeRemote address:142.250.187.196:80RequestGET /search?hl=en&ie=UTF-8&oe=UTF-8&q=mailto+gzip.org HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: www.google.com
Connection: Keep-Alive
ResponseHTTP/1.1 302 Found
x-hallmonitor-challenge: CgsI5b_SugYQu-37MRIEtdewUw
Content-Type: text/html; charset=UTF-8
Content-Security-Policy: object-src 'none';base-uri 'self';script-src 'nonce-9iVmTNYmuwQsUwWGYfSORQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/xsrp
Date: Sat, 07 Dec 2024 19:20:05 GMT
Server: gws
Content-Length: 472
X-XSS-Protection: 0
X-Frame-Options: SAMEORIGIN
Set-Cookie: AEC=AZ6Zc-WS6-KwjV1o9t4eZ7b-KV7C35d4yfrjDUiihP5btIdCDaVq6bMO0HI; expires=Thu, 05-Jun-2025 19:20:05 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=lax
-
GEThttp://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=email+gzip.org&num=5096327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exeRemote address:142.250.187.196:80RequestGET /search?hl=en&ie=UTF-8&oe=UTF-8&q=email+gzip.org&num=50 HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: www.google.com
Connection: Keep-Alive
-
GEThttp://www.altavista.com/web/results?q=mailto+acm.org&kgs=0&kls=0&nbq=5096327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exeRemote address:212.82.100.137:80RequestGET /web/results?q=mailto+acm.org&kgs=0&kls=0&nbq=50 HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: www.altavista.com
Connection: Keep-Alive
ResponseHTTP/1.1 500 Internal Server Error
Secure_search_bypass: true
Date: Sat, 07 Dec 2024 19:20:04 GMT
Content-Encoding: gzip
Age: 0
Transfer-Encoding: chunked
Connection: keep-alive
Server: ATS
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block; report=https://csp.search.yahoo.com/xssreport
Referrer-Policy: no-referrer-when-downgrade
-
GEThttp://www.altavista.com/web/results?q=mailto+acm.org&kgs=0&kls=0&nbq=2096327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exeRemote address:212.82.100.137:80RequestGET /web/results?q=mailto+acm.org&kgs=0&kls=0&nbq=20 HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: www.altavista.com
Connection: Keep-Alive
ResponseHTTP/1.1 500 Internal Server Error
Secure_search_bypass: true
Date: Sat, 07 Dec 2024 19:20:05 GMT
Content-Encoding: gzip
Age: 0
Transfer-Encoding: chunked
Connection: keep-alive
Server: ATS
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block; report=https://csp.search.yahoo.com/xssreport
Referrer-Policy: no-referrer-when-downgrade
-
GEThttp://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=mail+burtleburtle.net&num=5096327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exeRemote address:142.250.187.196:80RequestGET /search?hl=en&ie=UTF-8&oe=UTF-8&q=mail+burtleburtle.net&num=50 HTTP/1.1
Accept: */*
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
Host: www.google.com
Connection: Keep-Alive
-
Remote address:8.8.8.8:53Requestsearch.lycos.comIN AResponsesearch.lycos.comIN CNAMEsearch-core2.bo3.lycos.comsearch-core2.bo3.lycos.comIN A209.202.254.10
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
260 B 5
-
-
142.250.150.26:25aspmx2.googlemail.com96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe104 B 2
-
199.89.3.120:25mail.mailroute.net96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe104 B 2
-
171.64.64.64:25cs.stanford.edu96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe104 B 2
-
171.64.64.64:25cs.stanford.edu96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe52 B 1
-
65.254.254.51:25mx.burtleburtle.net96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe52 B 1
-
52.101.41.0:25alumni-caltech-edu.mail.protection.outlook.com96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe52 B 1
-
52 B 1
-
142.250.187.196:80http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=email+gzip.org&num=50http96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe918 B 1.6kB 6 5
HTTP Request
GET http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=mailto+gzip.orgHTTP Response
302HTTP Request
GET http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=email+gzip.org&num=50 -
212.82.100.137:80http://www.altavista.com/web/results?q=mailto+acm.org&kgs=0&kls=0&nbq=20http96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe916 B 982 B 6 4
HTTP Request
GET http://www.altavista.com/web/results?q=mailto+acm.org&kgs=0&kls=0&nbq=50HTTP Response
500HTTP Request
GET http://www.altavista.com/web/results?q=mailto+acm.org&kgs=0&kls=0&nbq=20HTTP Response
500 -
142.250.187.196:80http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=mail+burtleburtle.net&num=50http96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe472 B 92 B 3 2
HTTP Request
GET http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=mail+burtleburtle.net&num=50 -
209.202.254.10:80search.lycos.com96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe52 B 1
-
-
-
-
-
-
-
-
-
-
-
-
-
-
72 B 158 B 1 1
DNS Request
28.118.140.52.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
88.210.23.2.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
2.159.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
104.219.191.52.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
196.249.167.52.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
56.163.245.4.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
206.23.85.13.in-addr.arpa
-
69 B 131 B 1 1
DNS Request
92.12.20.2.in-addr.arpa
-
70 B 145 B 1 1
DNS Request
20.49.80.91.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
23.236.111.52.in-addr.arpa
-
53 B 232 B 1 1
DNS Request
m-ou.se
-
8.8.8.8:53aspmx2.googlemail.comdns96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe67 B 83 B 1 1
DNS Request
aspmx2.googlemail.com
DNS Response
142.250.150.26
-
53 B 87 B 1 1
DNS Request
acm.org
-
8.8.8.8:53mail.mailroute.netdns96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe64 B 96 B 1 1
DNS Request
mail.mailroute.net
DNS Response
199.89.3.120199.89.1.120
-
8.8.8.8:53cs.stanford.edudns96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe61 B 121 B 1 1
DNS Request
cs.stanford.edu
-
8.8.8.8:53cs.stanford.edudns96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe61 B 77 B 1 1
DNS Request
cs.stanford.edu
DNS Response
171.64.64.64
-
8.8.8.8:53burtleburtle.netdns96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe62 B 81 B 1 1
DNS Request
burtleburtle.net
-
8.8.8.8:53mx.burtleburtle.netdns96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe65 B 113 B 1 1
DNS Request
mx.burtleburtle.net
DNS Response
65.254.254.5165.254.254.5265.254.254.50
-
8.8.8.8:53alumni.caltech.edudns96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe64 B 126 B 1 1
DNS Request
alumni.caltech.edu
-
8.8.8.8:53alumni-caltech-edu.mail.protection.outlook.comdns96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe92 B 156 B 1 1
DNS Request
alumni-caltech-edu.mail.protection.outlook.com
DNS Response
52.101.41.052.101.42.1452.101.41.5852.101.9.17
-
54 B 70 B 1 1
DNS Request
gzip.org
-
54 B 70 B 1 1
DNS Request
gzip.org
DNS Response
85.187.148.2
-
60 B 76 B 1 1
DNS Request
www.google.com
DNS Response
142.250.187.196
-
8.8.8.8:53www.altavista.comdns96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe63 B 157 B 1 1
DNS Request
www.altavista.com
DNS Response
212.82.100.137
-
8.8.8.8:53search.lycos.comdns96327da8a9e501eb3b578019475004e274fdf7a98f34102c13b37eb5d98d025eN.exe62 B 109 B 1 1
DNS Request
search.lycos.com
DNS Response
209.202.254.10
-
-
-
-
-
-
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5fae9ddcfb0520a4d7b0d8797a0caca3c
SHA1d7f31c41ca77d450283324242dc31f3af5f203b4
SHA25629e771e4d27c94ed2906aabe3b6cf7dbd90a44b5efb1c482daf225e272351dee
SHA5126d66015d6d4625d5232ba42aab0d5dec3c8bed341c490cf50a91d8a86a7d62893c5b1d3bdbba7b5ff3086c7737762d8714ff969fdd52d74638af85334e9e4430
-
Filesize
352B
MD58dba887a558723d945309ffc16ba0790
SHA11cbe0f8bc7cd012cafe2919e6b3c9d78e184a6b9
SHA25639098dfd767cacc5f50542057b2d1ad5986a8a79e82db248e1ae79c13b62b492
SHA5123244224dbf123cb9d334be9ed666d5c1f55e9ed9e653ed98e84a34fb23f14edece0366de3a75a8bea50ea99e1f14891e6c01eb6ddac2674d427509717539d8ee
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2