Analysis

  • max time kernel
    151s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2023, 16:15

General

  • Target

    16fc1b54814f00d0284d76b8d672bf55_goldeneye_JC.exe

  • Size

    204KB

  • MD5

    16fc1b54814f00d0284d76b8d672bf55

  • SHA1

    1bb7b9ed08747b95e92fcd1f5196a0f173480dc9

  • SHA256

    018aa2213df50fffcc96b30d175569308924c456111af887d65206388e93ba5a

  • SHA512

    bd31e0876168716d9c4da9a631ad43c44b5453dc4135f4b5706638dcfa7363d78a2ec7d8f850ee9ffd62cdb6df1aba16792e0c551d8d89380b54617752b25d26

  • SSDEEP

    1536:1EGh0oul15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0oul1OPOe2MUVg3Ve+rXfMUy

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16fc1b54814f00d0284d76b8d672bf55_goldeneye_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\16fc1b54814f00d0284d76b8d672bf55_goldeneye_JC.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Windows\{753888E7-6CD2-4d4f-B611-4A6B1F2DFBBE}.exe
      C:\Windows\{753888E7-6CD2-4d4f-B611-4A6B1F2DFBBE}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Windows\{DA8B9FB1-F1EB-4338-A709-9BFFA07A03A6}.exe
        C:\Windows\{DA8B9FB1-F1EB-4338-A709-9BFFA07A03A6}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2996
        • C:\Windows\{7DB2000E-E5C8-4885-8B08-A214EB9E4A8A}.exe
          C:\Windows\{7DB2000E-E5C8-4885-8B08-A214EB9E4A8A}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2888
          • C:\Windows\{1F0B90AA-16B1-4852-8B32-B654DB12EAB1}.exe
            C:\Windows\{1F0B90AA-16B1-4852-8B32-B654DB12EAB1}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2712
            • C:\Windows\{A68BA8D1-D085-4b98-B812-5BC00780D9B6}.exe
              C:\Windows\{A68BA8D1-D085-4b98-B812-5BC00780D9B6}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2036
              • C:\Windows\{2DDF17F9-41C3-4ca7-BFEC-4DE07C9FF6E7}.exe
                C:\Windows\{2DDF17F9-41C3-4ca7-BFEC-4DE07C9FF6E7}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:324
                • C:\Windows\{95957245-341A-4341-8AEA-888D2041DC45}.exe
                  C:\Windows\{95957245-341A-4341-8AEA-888D2041DC45}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:304
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{95957~1.EXE > nul
                    9⤵
                      PID:1356
                    • C:\Windows\{31361E19-73E5-4be4-BD15-0C54ADD07E4C}.exe
                      C:\Windows\{31361E19-73E5-4be4-BD15-0C54ADD07E4C}.exe
                      9⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1484
                      • C:\Windows\{C5725BC9-B38E-4684-A3B8-023362BB1834}.exe
                        C:\Windows\{C5725BC9-B38E-4684-A3B8-023362BB1834}.exe
                        10⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2480
                        • C:\Windows\{6AEA2E71-D57F-4ab9-AA0D-03BA59F7AEE5}.exe
                          C:\Windows\{6AEA2E71-D57F-4ab9-AA0D-03BA59F7AEE5}.exe
                          11⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2084
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{6AEA2~1.EXE > nul
                            12⤵
                              PID:3068
                            • C:\Windows\{831A226D-79EB-4500-A471-E44DB9EED467}.exe
                              C:\Windows\{831A226D-79EB-4500-A471-E44DB9EED467}.exe
                              12⤵
                              • Modifies Installed Components in the registry
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2892
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{831A2~1.EXE > nul
                                13⤵
                                  PID:3060
                                • C:\Windows\{0BA3976E-81A4-4c54-B9AF-F94725D7AF24}.exe
                                  C:\Windows\{0BA3976E-81A4-4c54-B9AF-F94725D7AF24}.exe
                                  13⤵
                                  • Executes dropped EXE
                                  PID:3056
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{C5725~1.EXE > nul
                              11⤵
                                PID:2240
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{31361~1.EXE > nul
                              10⤵
                                PID:2492
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{2DDF1~1.EXE > nul
                            8⤵
                              PID:1488
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{A68BA~1.EXE > nul
                            7⤵
                              PID:440
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{1F0B9~1.EXE > nul
                            6⤵
                              PID:2764
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{7DB20~1.EXE > nul
                            5⤵
                              PID:2744
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{DA8B9~1.EXE > nul
                            4⤵
                              PID:2760
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{75388~1.EXE > nul
                            3⤵
                              PID:2740
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\16FC1B~1.EXE > nul
                            2⤵
                            • Deletes itself
                            PID:2860

                        Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Windows\{0BA3976E-81A4-4c54-B9AF-F94725D7AF24}.exe

                                Filesize

                                204KB

                                MD5

                                9b3333a4ef713bf2d06e0eedc69249b3

                                SHA1

                                30874b8084fd0b9afc2a0257b251eebbfae39647

                                SHA256

                                6c2ffff06768802beab0e72a922e8fdaa3b6c0887c8436831df8cb8ada0ce2be

                                SHA512

                                d15a1facfde122c4627dbd2e7407e574140e570fc13d857983c77159e356d2d3821ed69b32197eb10f2e060623765318ea5a23c131e8dcd51d2e400070f379fc

                              • C:\Windows\{1F0B90AA-16B1-4852-8B32-B654DB12EAB1}.exe

                                Filesize

                                204KB

                                MD5

                                c2c55bb5fb6594701ed254bd46112076

                                SHA1

                                e07a14d699fd24220d991e219e323ef1fc345b50

                                SHA256

                                a25b3acbd3aeb6f5365e3e1b9a2361cfbe7d27fe77cddcdb13266ff6abe8509e

                                SHA512

                                4c01bee072206d7d8d3b42eecc4bdc525f5d4fd50d448c6e8cfe63587b8e3e6f746cf89edad21ad0f1a045408553cea49ae64b0705af72726d26fd14b2ca1d55

                              • C:\Windows\{1F0B90AA-16B1-4852-8B32-B654DB12EAB1}.exe

                                Filesize

                                204KB

                                MD5

                                c2c55bb5fb6594701ed254bd46112076

                                SHA1

                                e07a14d699fd24220d991e219e323ef1fc345b50

                                SHA256

                                a25b3acbd3aeb6f5365e3e1b9a2361cfbe7d27fe77cddcdb13266ff6abe8509e

                                SHA512

                                4c01bee072206d7d8d3b42eecc4bdc525f5d4fd50d448c6e8cfe63587b8e3e6f746cf89edad21ad0f1a045408553cea49ae64b0705af72726d26fd14b2ca1d55

                              • C:\Windows\{2DDF17F9-41C3-4ca7-BFEC-4DE07C9FF6E7}.exe

                                Filesize

                                204KB

                                MD5

                                a59ce266c510f889b850bad0ec38c41f

                                SHA1

                                f94b506a1e44c1b1c78f043325f1928ba710e8aa

                                SHA256

                                53477d3f0a19678584440a74563a712a810f705287139bc0289ff1ae7d6407a8

                                SHA512

                                5ed641504dc3e878071845d3fe48a215f61efc2be84cfd34e2216df222e8858d8386c222c61ba91749fd3c85b434ab225c443464d9ea89d5632d33b29531ddde

                              • C:\Windows\{2DDF17F9-41C3-4ca7-BFEC-4DE07C9FF6E7}.exe

                                Filesize

                                204KB

                                MD5

                                a59ce266c510f889b850bad0ec38c41f

                                SHA1

                                f94b506a1e44c1b1c78f043325f1928ba710e8aa

                                SHA256

                                53477d3f0a19678584440a74563a712a810f705287139bc0289ff1ae7d6407a8

                                SHA512

                                5ed641504dc3e878071845d3fe48a215f61efc2be84cfd34e2216df222e8858d8386c222c61ba91749fd3c85b434ab225c443464d9ea89d5632d33b29531ddde

                              • C:\Windows\{31361E19-73E5-4be4-BD15-0C54ADD07E4C}.exe

                                Filesize

                                204KB

                                MD5

                                1deeafab8be4d8991a99be91d62e438f

                                SHA1

                                b4bacd62fbd940f307982d5d5a9339c42185b608

                                SHA256

                                82583873408513b8ed498123e7f294881bd139d5b461b90c553956525784debd

                                SHA512

                                1ab713dfecd4b05b0b9cf80434d2334cf36a3f26202743df7c1d258aba6b605aee53d91967dbff71fdbbd7b19a0b5a00799b4ef963c9b9cd73c4f4e339a38dbf

                              • C:\Windows\{31361E19-73E5-4be4-BD15-0C54ADD07E4C}.exe

                                Filesize

                                204KB

                                MD5

                                1deeafab8be4d8991a99be91d62e438f

                                SHA1

                                b4bacd62fbd940f307982d5d5a9339c42185b608

                                SHA256

                                82583873408513b8ed498123e7f294881bd139d5b461b90c553956525784debd

                                SHA512

                                1ab713dfecd4b05b0b9cf80434d2334cf36a3f26202743df7c1d258aba6b605aee53d91967dbff71fdbbd7b19a0b5a00799b4ef963c9b9cd73c4f4e339a38dbf

                              • C:\Windows\{6AEA2E71-D57F-4ab9-AA0D-03BA59F7AEE5}.exe

                                Filesize

                                204KB

                                MD5

                                7688e3d433fcda93a43a73d2f3271fd0

                                SHA1

                                96c4fcb03a5ba7669dc461ecbcb2ee9631194269

                                SHA256

                                cb13040fea43e46662023828ab85982290c0283ff4dc1da210bfde34f72039b5

                                SHA512

                                e13bc7ad66641dfc1c683833c0667dc6d9962e61264b71f633fb8859d6eb997fb3a78d416be3d87db2886500279afea5a5b02146b12c24e766a9011897c3212e

                              • C:\Windows\{6AEA2E71-D57F-4ab9-AA0D-03BA59F7AEE5}.exe

                                Filesize

                                204KB

                                MD5

                                7688e3d433fcda93a43a73d2f3271fd0

                                SHA1

                                96c4fcb03a5ba7669dc461ecbcb2ee9631194269

                                SHA256

                                cb13040fea43e46662023828ab85982290c0283ff4dc1da210bfde34f72039b5

                                SHA512

                                e13bc7ad66641dfc1c683833c0667dc6d9962e61264b71f633fb8859d6eb997fb3a78d416be3d87db2886500279afea5a5b02146b12c24e766a9011897c3212e

                              • C:\Windows\{753888E7-6CD2-4d4f-B611-4A6B1F2DFBBE}.exe

                                Filesize

                                204KB

                                MD5

                                03360ee5d7cef9ddb66d48d0a97cde02

                                SHA1

                                bb93a998f5e42dc756ec405b7d377d8f1a19d6a9

                                SHA256

                                ecb68ccd4999159d200b4cfa0463717523f60e33514d5543a1e5d49fb2f2ac48

                                SHA512

                                4239c4ba4e390d7ff04dfcaacf02b714c87e098d4cb6c972c9a58b68931e4d685553157b0194d3464fb1fb7f21753bc8fbce5e7eaac7c244492a666cf49a227e

                              • C:\Windows\{753888E7-6CD2-4d4f-B611-4A6B1F2DFBBE}.exe

                                Filesize

                                204KB

                                MD5

                                03360ee5d7cef9ddb66d48d0a97cde02

                                SHA1

                                bb93a998f5e42dc756ec405b7d377d8f1a19d6a9

                                SHA256

                                ecb68ccd4999159d200b4cfa0463717523f60e33514d5543a1e5d49fb2f2ac48

                                SHA512

                                4239c4ba4e390d7ff04dfcaacf02b714c87e098d4cb6c972c9a58b68931e4d685553157b0194d3464fb1fb7f21753bc8fbce5e7eaac7c244492a666cf49a227e

                              • C:\Windows\{753888E7-6CD2-4d4f-B611-4A6B1F2DFBBE}.exe

                                Filesize

                                204KB

                                MD5

                                03360ee5d7cef9ddb66d48d0a97cde02

                                SHA1

                                bb93a998f5e42dc756ec405b7d377d8f1a19d6a9

                                SHA256

                                ecb68ccd4999159d200b4cfa0463717523f60e33514d5543a1e5d49fb2f2ac48

                                SHA512

                                4239c4ba4e390d7ff04dfcaacf02b714c87e098d4cb6c972c9a58b68931e4d685553157b0194d3464fb1fb7f21753bc8fbce5e7eaac7c244492a666cf49a227e

                              • C:\Windows\{7DB2000E-E5C8-4885-8B08-A214EB9E4A8A}.exe

                                Filesize

                                204KB

                                MD5

                                9437e93f5acd7366cc81537927508765

                                SHA1

                                62029a8eaf6828361ce979f2e281edeb3b743084

                                SHA256

                                211c3477ca9fee96d52c0a3a3da2fd8d0b20aab5761fe1275fea1c2b88658574

                                SHA512

                                74e7bc858f071c4eece80ae8694801adbe42f0232f0fcabd4a7e3d63bf3ac5c45308170423682014dfbc0afaa828f89582f69d7c5d35475fb0bc3f852df7f8f8

                              • C:\Windows\{7DB2000E-E5C8-4885-8B08-A214EB9E4A8A}.exe

                                Filesize

                                204KB

                                MD5

                                9437e93f5acd7366cc81537927508765

                                SHA1

                                62029a8eaf6828361ce979f2e281edeb3b743084

                                SHA256

                                211c3477ca9fee96d52c0a3a3da2fd8d0b20aab5761fe1275fea1c2b88658574

                                SHA512

                                74e7bc858f071c4eece80ae8694801adbe42f0232f0fcabd4a7e3d63bf3ac5c45308170423682014dfbc0afaa828f89582f69d7c5d35475fb0bc3f852df7f8f8

                              • C:\Windows\{831A226D-79EB-4500-A471-E44DB9EED467}.exe

                                Filesize

                                204KB

                                MD5

                                3ed8efcf0ca65338e787a0a1bf27e5a0

                                SHA1

                                77648bce5e3294d05039472c1ebda09bb4aaee9d

                                SHA256

                                73a9e20432dddf227aad17326d3fa728f61cfa6c3c1b9674acf05683f72662b8

                                SHA512

                                a9596ed319911b2f3dfe7b052e0ad6566a810420c16b443ece9e00b09070c7a5f5c51beb361d1f6d3a22a17e35d592fb9c7a92eb70823cd8ef399c973e57b70e

                              • C:\Windows\{831A226D-79EB-4500-A471-E44DB9EED467}.exe

                                Filesize

                                204KB

                                MD5

                                3ed8efcf0ca65338e787a0a1bf27e5a0

                                SHA1

                                77648bce5e3294d05039472c1ebda09bb4aaee9d

                                SHA256

                                73a9e20432dddf227aad17326d3fa728f61cfa6c3c1b9674acf05683f72662b8

                                SHA512

                                a9596ed319911b2f3dfe7b052e0ad6566a810420c16b443ece9e00b09070c7a5f5c51beb361d1f6d3a22a17e35d592fb9c7a92eb70823cd8ef399c973e57b70e

                              • C:\Windows\{95957245-341A-4341-8AEA-888D2041DC45}.exe

                                Filesize

                                204KB

                                MD5

                                0f386fc3975ce5d94e922481f6773f39

                                SHA1

                                39f604385543d33b613ef5ef5d30038f2cfaa865

                                SHA256

                                074c2c469544c90e20295f1dce811c57fe262772506a196702016c08cad43097

                                SHA512

                                2cffe871d0e604abbbce5ae6c1e27fbab45c0c5ffa0ffafaeacbd716d3e66531596f6363054848db0791c42a47950c87c61907a865e136555ac090232f454d58

                              • C:\Windows\{95957245-341A-4341-8AEA-888D2041DC45}.exe

                                Filesize

                                204KB

                                MD5

                                0f386fc3975ce5d94e922481f6773f39

                                SHA1

                                39f604385543d33b613ef5ef5d30038f2cfaa865

                                SHA256

                                074c2c469544c90e20295f1dce811c57fe262772506a196702016c08cad43097

                                SHA512

                                2cffe871d0e604abbbce5ae6c1e27fbab45c0c5ffa0ffafaeacbd716d3e66531596f6363054848db0791c42a47950c87c61907a865e136555ac090232f454d58

                              • C:\Windows\{A68BA8D1-D085-4b98-B812-5BC00780D9B6}.exe

                                Filesize

                                204KB

                                MD5

                                ec43439358b4787d65d920ec37b0a8bc

                                SHA1

                                81a78bbfb69401a0418428049ca1ab4ce942d223

                                SHA256

                                cbce72b4ff7287eca154db480fd6f925c124a9b69da5d3f392c55754f6e5d9ca

                                SHA512

                                1f6792e406ad6f7fccc1e4e71218f02afaa691521e97b18c0cbb5cb49c4c8dc72a4972a762ed234c34e66ecf30ce94ddd0fc9d2bb1e88c299da80390b2c31f13

                              • C:\Windows\{A68BA8D1-D085-4b98-B812-5BC00780D9B6}.exe

                                Filesize

                                204KB

                                MD5

                                ec43439358b4787d65d920ec37b0a8bc

                                SHA1

                                81a78bbfb69401a0418428049ca1ab4ce942d223

                                SHA256

                                cbce72b4ff7287eca154db480fd6f925c124a9b69da5d3f392c55754f6e5d9ca

                                SHA512

                                1f6792e406ad6f7fccc1e4e71218f02afaa691521e97b18c0cbb5cb49c4c8dc72a4972a762ed234c34e66ecf30ce94ddd0fc9d2bb1e88c299da80390b2c31f13

                              • C:\Windows\{C5725BC9-B38E-4684-A3B8-023362BB1834}.exe

                                Filesize

                                204KB

                                MD5

                                e820b31e9132da5315356194c31e38ff

                                SHA1

                                a2a73707d8fa9a97d0c9d3ae6d9d134a7ec80ce0

                                SHA256

                                d98b539335c906a4ab2b5956c50ffbdf97aa6aa8581bde2c7489361d824928b4

                                SHA512

                                8af202fcd65d327fd05ee66825bb103cd2050da7e9b631b5002f3244c5b79709eaac58e39e353a90137656443f9e43c4ff891ddf07f74e4458fb33957b98cc5a

                              • C:\Windows\{C5725BC9-B38E-4684-A3B8-023362BB1834}.exe

                                Filesize

                                204KB

                                MD5

                                e820b31e9132da5315356194c31e38ff

                                SHA1

                                a2a73707d8fa9a97d0c9d3ae6d9d134a7ec80ce0

                                SHA256

                                d98b539335c906a4ab2b5956c50ffbdf97aa6aa8581bde2c7489361d824928b4

                                SHA512

                                8af202fcd65d327fd05ee66825bb103cd2050da7e9b631b5002f3244c5b79709eaac58e39e353a90137656443f9e43c4ff891ddf07f74e4458fb33957b98cc5a

                              • C:\Windows\{DA8B9FB1-F1EB-4338-A709-9BFFA07A03A6}.exe

                                Filesize

                                204KB

                                MD5

                                2fb8c9260622354246c6f7a4037a9406

                                SHA1

                                ad32f7143df90c5061ac1c0192e25a32965ca81c

                                SHA256

                                dd79a884d6acc0804445ef0217982245f23963138afc13bb501e01e313cb31b7

                                SHA512

                                1369c94272904e0ccb73a63addfe05e3ea000060366edec76444676841a7c078e8fe296431bb1078efb5ae19c4495415ba880f7c57b8aeb61c74440062058828

                              • C:\Windows\{DA8B9FB1-F1EB-4338-A709-9BFFA07A03A6}.exe

                                Filesize

                                204KB

                                MD5

                                2fb8c9260622354246c6f7a4037a9406

                                SHA1

                                ad32f7143df90c5061ac1c0192e25a32965ca81c

                                SHA256

                                dd79a884d6acc0804445ef0217982245f23963138afc13bb501e01e313cb31b7

                                SHA512

                                1369c94272904e0ccb73a63addfe05e3ea000060366edec76444676841a7c078e8fe296431bb1078efb5ae19c4495415ba880f7c57b8aeb61c74440062058828