Analysis
-
max time kernel
87s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 12:16
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-06_cd3d64a9c892f356b7fc6c399772b069_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-06_cd3d64a9c892f356b7fc6c399772b069_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-06_cd3d64a9c892f356b7fc6c399772b069_goldeneye.exe
-
Size
372KB
-
MD5
cd3d64a9c892f356b7fc6c399772b069
-
SHA1
68067bbdd0517a804082004e64320b4578eaa146
-
SHA256
a69cc275b3780e00d0fd2d99e69c0fa7518649c9347124f7b2131ea8432d34db
-
SHA512
b273dccb7831258d20bf15c9ed09b82701050846fd2b62e895c42d75d9a5af707895c1078a07dd7f3c95330a870346e57d01f1edafaf35371b719b9a36b72773
-
SSDEEP
3072:CEGh0oimlJOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBE:CEGFl/Oe2MUVg3vTeKcAEciTBqr3
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F4594D7D-9E88-4f6a-B207-ADFB01F3B05D}\stubpath = "C:\\Windows\\{F4594D7D-9E88-4f6a-B207-ADFB01F3B05D}.exe" 2024-01-06_cd3d64a9c892f356b7fc6c399772b069_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3EBC44FC-B225-4c22-B782-C816D568461B}\stubpath = "C:\\Windows\\{3EBC44FC-B225-4c22-B782-C816D568461B}.exe" {954A3EAD-DD67-4cc8-BF21-73411EB1723E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{72652085-1D6C-414c-86E4-5036FAFE191C}\stubpath = "C:\\Windows\\{72652085-1D6C-414c-86E4-5036FAFE191C}.exe" {F4B54E92-18A9-4bb6-9A78-9440FA2CAA4A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B1B311A0-B2F4-4976-B6C7-A78B5F204BC8} {F4594D7D-9E88-4f6a-B207-ADFB01F3B05D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3EBC44FC-B225-4c22-B782-C816D568461B} {954A3EAD-DD67-4cc8-BF21-73411EB1723E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{72652085-1D6C-414c-86E4-5036FAFE191C} {F4B54E92-18A9-4bb6-9A78-9440FA2CAA4A}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{954A3EAD-DD67-4cc8-BF21-73411EB1723E} {B1B311A0-B2F4-4976-B6C7-A78B5F204BC8}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{954A3EAD-DD67-4cc8-BF21-73411EB1723E}\stubpath = "C:\\Windows\\{954A3EAD-DD67-4cc8-BF21-73411EB1723E}.exe" {B1B311A0-B2F4-4976-B6C7-A78B5F204BC8}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F30BD44B-04C9-4b4c-94B7-5909EA407965} {72652085-1D6C-414c-86E4-5036FAFE191C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F4B54E92-18A9-4bb6-9A78-9440FA2CAA4A}\stubpath = "C:\\Windows\\{F4B54E92-18A9-4bb6-9A78-9440FA2CAA4A}.exe" {3EBC44FC-B225-4c22-B782-C816D568461B}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F30BD44B-04C9-4b4c-94B7-5909EA407965}\stubpath = "C:\\Windows\\{F30BD44B-04C9-4b4c-94B7-5909EA407965}.exe" {72652085-1D6C-414c-86E4-5036FAFE191C}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F4594D7D-9E88-4f6a-B207-ADFB01F3B05D} 2024-01-06_cd3d64a9c892f356b7fc6c399772b069_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B1B311A0-B2F4-4976-B6C7-A78B5F204BC8}\stubpath = "C:\\Windows\\{B1B311A0-B2F4-4976-B6C7-A78B5F204BC8}.exe" {F4594D7D-9E88-4f6a-B207-ADFB01F3B05D}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F4B54E92-18A9-4bb6-9A78-9440FA2CAA4A} {3EBC44FC-B225-4c22-B782-C816D568461B}.exe -
Executes dropped EXE 7 IoCs
pid Process 2208 {F4594D7D-9E88-4f6a-B207-ADFB01F3B05D}.exe 2336 {B1B311A0-B2F4-4976-B6C7-A78B5F204BC8}.exe 2380 {954A3EAD-DD67-4cc8-BF21-73411EB1723E}.exe 2488 {3EBC44FC-B225-4c22-B782-C816D568461B}.exe 1504 {F4B54E92-18A9-4bb6-9A78-9440FA2CAA4A}.exe 4176 {72652085-1D6C-414c-86E4-5036FAFE191C}.exe 4888 {F30BD44B-04C9-4b4c-94B7-5909EA407965}.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\{F4594D7D-9E88-4f6a-B207-ADFB01F3B05D}.exe 2024-01-06_cd3d64a9c892f356b7fc6c399772b069_goldeneye.exe File created C:\Windows\{B1B311A0-B2F4-4976-B6C7-A78B5F204BC8}.exe {F4594D7D-9E88-4f6a-B207-ADFB01F3B05D}.exe File created C:\Windows\{954A3EAD-DD67-4cc8-BF21-73411EB1723E}.exe {B1B311A0-B2F4-4976-B6C7-A78B5F204BC8}.exe File created C:\Windows\{3EBC44FC-B225-4c22-B782-C816D568461B}.exe {954A3EAD-DD67-4cc8-BF21-73411EB1723E}.exe File created C:\Windows\{F4B54E92-18A9-4bb6-9A78-9440FA2CAA4A}.exe {3EBC44FC-B225-4c22-B782-C816D568461B}.exe File created C:\Windows\{72652085-1D6C-414c-86E4-5036FAFE191C}.exe {F4B54E92-18A9-4bb6-9A78-9440FA2CAA4A}.exe File created C:\Windows\{F30BD44B-04C9-4b4c-94B7-5909EA407965}.exe {72652085-1D6C-414c-86E4-5036FAFE191C}.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4232 2024-01-06_cd3d64a9c892f356b7fc6c399772b069_goldeneye.exe Token: SeIncBasePriorityPrivilege 2208 {F4594D7D-9E88-4f6a-B207-ADFB01F3B05D}.exe Token: SeIncBasePriorityPrivilege 2336 {B1B311A0-B2F4-4976-B6C7-A78B5F204BC8}.exe Token: SeIncBasePriorityPrivilege 2380 {954A3EAD-DD67-4cc8-BF21-73411EB1723E}.exe Token: SeIncBasePriorityPrivilege 2488 {3EBC44FC-B225-4c22-B782-C816D568461B}.exe Token: SeIncBasePriorityPrivilege 1504 {F4B54E92-18A9-4bb6-9A78-9440FA2CAA4A}.exe Token: SeIncBasePriorityPrivilege 4176 {72652085-1D6C-414c-86E4-5036FAFE191C}.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4232 wrote to memory of 2208 4232 2024-01-06_cd3d64a9c892f356b7fc6c399772b069_goldeneye.exe 99 PID 4232 wrote to memory of 2208 4232 2024-01-06_cd3d64a9c892f356b7fc6c399772b069_goldeneye.exe 99 PID 4232 wrote to memory of 2208 4232 2024-01-06_cd3d64a9c892f356b7fc6c399772b069_goldeneye.exe 99 PID 4232 wrote to memory of 2096 4232 2024-01-06_cd3d64a9c892f356b7fc6c399772b069_goldeneye.exe 100 PID 4232 wrote to memory of 2096 4232 2024-01-06_cd3d64a9c892f356b7fc6c399772b069_goldeneye.exe 100 PID 4232 wrote to memory of 2096 4232 2024-01-06_cd3d64a9c892f356b7fc6c399772b069_goldeneye.exe 100 PID 2208 wrote to memory of 2336 2208 {F4594D7D-9E88-4f6a-B207-ADFB01F3B05D}.exe 101 PID 2208 wrote to memory of 2336 2208 {F4594D7D-9E88-4f6a-B207-ADFB01F3B05D}.exe 101 PID 2208 wrote to memory of 2336 2208 {F4594D7D-9E88-4f6a-B207-ADFB01F3B05D}.exe 101 PID 2208 wrote to memory of 3408 2208 {F4594D7D-9E88-4f6a-B207-ADFB01F3B05D}.exe 102 PID 2208 wrote to memory of 3408 2208 {F4594D7D-9E88-4f6a-B207-ADFB01F3B05D}.exe 102 PID 2208 wrote to memory of 3408 2208 {F4594D7D-9E88-4f6a-B207-ADFB01F3B05D}.exe 102 PID 2336 wrote to memory of 2380 2336 {B1B311A0-B2F4-4976-B6C7-A78B5F204BC8}.exe 106 PID 2336 wrote to memory of 2380 2336 {B1B311A0-B2F4-4976-B6C7-A78B5F204BC8}.exe 106 PID 2336 wrote to memory of 2380 2336 {B1B311A0-B2F4-4976-B6C7-A78B5F204BC8}.exe 106 PID 2336 wrote to memory of 2328 2336 {B1B311A0-B2F4-4976-B6C7-A78B5F204BC8}.exe 107 PID 2336 wrote to memory of 2328 2336 {B1B311A0-B2F4-4976-B6C7-A78B5F204BC8}.exe 107 PID 2336 wrote to memory of 2328 2336 {B1B311A0-B2F4-4976-B6C7-A78B5F204BC8}.exe 107 PID 2380 wrote to memory of 2488 2380 {954A3EAD-DD67-4cc8-BF21-73411EB1723E}.exe 109 PID 2380 wrote to memory of 2488 2380 {954A3EAD-DD67-4cc8-BF21-73411EB1723E}.exe 109 PID 2380 wrote to memory of 2488 2380 {954A3EAD-DD67-4cc8-BF21-73411EB1723E}.exe 109 PID 2380 wrote to memory of 4176 2380 {954A3EAD-DD67-4cc8-BF21-73411EB1723E}.exe 110 PID 2380 wrote to memory of 4176 2380 {954A3EAD-DD67-4cc8-BF21-73411EB1723E}.exe 110 PID 2380 wrote to memory of 4176 2380 {954A3EAD-DD67-4cc8-BF21-73411EB1723E}.exe 110 PID 2488 wrote to memory of 1504 2488 {3EBC44FC-B225-4c22-B782-C816D568461B}.exe 111 PID 2488 wrote to memory of 1504 2488 {3EBC44FC-B225-4c22-B782-C816D568461B}.exe 111 PID 2488 wrote to memory of 1504 2488 {3EBC44FC-B225-4c22-B782-C816D568461B}.exe 111 PID 2488 wrote to memory of 2896 2488 {3EBC44FC-B225-4c22-B782-C816D568461B}.exe 113 PID 2488 wrote to memory of 2896 2488 {3EBC44FC-B225-4c22-B782-C816D568461B}.exe 113 PID 2488 wrote to memory of 2896 2488 {3EBC44FC-B225-4c22-B782-C816D568461B}.exe 113 PID 1504 wrote to memory of 4176 1504 {F4B54E92-18A9-4bb6-9A78-9440FA2CAA4A}.exe 114 PID 1504 wrote to memory of 4176 1504 {F4B54E92-18A9-4bb6-9A78-9440FA2CAA4A}.exe 114 PID 1504 wrote to memory of 4176 1504 {F4B54E92-18A9-4bb6-9A78-9440FA2CAA4A}.exe 114 PID 1504 wrote to memory of 4232 1504 {F4B54E92-18A9-4bb6-9A78-9440FA2CAA4A}.exe 121 PID 1504 wrote to memory of 4232 1504 {F4B54E92-18A9-4bb6-9A78-9440FA2CAA4A}.exe 121 PID 1504 wrote to memory of 4232 1504 {F4B54E92-18A9-4bb6-9A78-9440FA2CAA4A}.exe 121 PID 4176 wrote to memory of 4888 4176 {72652085-1D6C-414c-86E4-5036FAFE191C}.exe 117 PID 4176 wrote to memory of 4888 4176 {72652085-1D6C-414c-86E4-5036FAFE191C}.exe 117 PID 4176 wrote to memory of 4888 4176 {72652085-1D6C-414c-86E4-5036FAFE191C}.exe 117 PID 4176 wrote to memory of 5100 4176 {72652085-1D6C-414c-86E4-5036FAFE191C}.exe 116 PID 4176 wrote to memory of 5100 4176 {72652085-1D6C-414c-86E4-5036FAFE191C}.exe 116 PID 4176 wrote to memory of 5100 4176 {72652085-1D6C-414c-86E4-5036FAFE191C}.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-06_cd3d64a9c892f356b7fc6c399772b069_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-06_cd3d64a9c892f356b7fc6c399772b069_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\{F4594D7D-9E88-4f6a-B207-ADFB01F3B05D}.exeC:\Windows\{F4594D7D-9E88-4f6a-B207-ADFB01F3B05D}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\{B1B311A0-B2F4-4976-B6C7-A78B5F204BC8}.exeC:\Windows\{B1B311A0-B2F4-4976-B6C7-A78B5F204BC8}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\{954A3EAD-DD67-4cc8-BF21-73411EB1723E}.exeC:\Windows\{954A3EAD-DD67-4cc8-BF21-73411EB1723E}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\{3EBC44FC-B225-4c22-B782-C816D568461B}.exeC:\Windows\{3EBC44FC-B225-4c22-B782-C816D568461B}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\{F4B54E92-18A9-4bb6-9A78-9440FA2CAA4A}.exeC:\Windows\{F4B54E92-18A9-4bb6-9A78-9440FA2CAA4A}.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\{72652085-1D6C-414c-86E4-5036FAFE191C}.exeC:\Windows\{72652085-1D6C-414c-86E4-5036FAFE191C}.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{72652~1.EXE > nul8⤵PID:5100
-
-
C:\Windows\{F30BD44B-04C9-4b4c-94B7-5909EA407965}.exeC:\Windows\{F30BD44B-04C9-4b4c-94B7-5909EA407965}.exe8⤵
- Executes dropped EXE
PID:4888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F30BD~1.EXE > nul9⤵PID:4232
-
-
C:\Windows\{FD472DEF-4DF7-4564-936A-CF60E70BD423}.exeC:\Windows\{FD472DEF-4DF7-4564-936A-CF60E70BD423}.exe9⤵PID:4720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{FD472~1.EXE > nul10⤵PID:3896
-
-
C:\Windows\{DEFB6F2B-8736-4550-8704-F3E84AAC451F}.exeC:\Windows\{DEFB6F2B-8736-4550-8704-F3E84AAC451F}.exe10⤵PID:624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{DEFB6~1.EXE > nul11⤵PID:3268
-
-
C:\Windows\{CB6C532C-7C93-49e7-816A-BBDAC4B05A1C}.exeC:\Windows\{CB6C532C-7C93-49e7-816A-BBDAC4B05A1C}.exe11⤵PID:1196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{CB6C5~1.EXE > nul12⤵PID:836
-
-
C:\Windows\{D509400F-58FB-443e-9D89-7A385F5ED195}.exeC:\Windows\{D509400F-58FB-443e-9D89-7A385F5ED195}.exe12⤵PID:2092
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F4B54~1.EXE > nul7⤵PID:4232
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3EBC4~1.EXE > nul6⤵PID:2896
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{954A3~1.EXE > nul5⤵PID:4176
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B1B31~1.EXE > nul4⤵PID:2328
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{F4594~1.EXE > nul3⤵PID:3408
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:2096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD5c67011ae098a6b210763b82b42f05e89
SHA1c328485386bf43110bc88f6666b8e77007a5ede8
SHA256b2c682c6b2ce9dddd00dfad8a9a26729c3467a976b7198bdfd51e6c0fa05cb04
SHA512486000cc89b0ca1cde8fe6077e833a0fc4c3775ff5c623a2bdb3915fe0f21c308211fefbea007ab4ac132a3e6bb8b16e092ca1bef2b837eff477def2103d55f6
-
Filesize
372KB
MD505e06e3d83a7aad07019cc4c57427f57
SHA11c3b904a72db9c909f6f676b86f925afe024a6af
SHA256e86b1b0ef8379badd3eff60eede26ccfc5f509089cd6f684aae20c63d2d59e23
SHA5127557846b1e84700590ce3fd85a0cf291d4f8377c756943e6189f14cc73285ec69d01558eb88ce9118cf809c8500a91af421c52a6a961dc1ba75ad471fbdd2798
-
Filesize
92KB
MD59500da6f56ed539c5ebf73ad3d1fb941
SHA163dbb74421bd04f4f905059c8db9a319631cb798
SHA25657d30193e4707e3f6e4ec067c1171f4345b221d461cee34924fa5993b113db36
SHA512f10672da4aa71776b35e346404a7accc368ba40897d53ca7abe0749e886eb63d76a1788fd2471a8b7f293b3ac6155bf0b3923efa0d6d718c8868a5a62497e1e9
-
Filesize
372KB
MD5d2df04c8bedbea074eae6b12dea90918
SHA10f21ff74a970748bf02cc9303aa9170abb979a3f
SHA25611fcb4545adf014c79d671104276c7425c11ced5ad96e0ec8d1a0812971653db
SHA512ee17b4d587c4081d0c0b5975ece17f1de89ab5c52fcdcf39958846cc8d7da4608b3880d9d7151a23c0c706a92a8ae020f140ef532d8adde0778405ec4e6f3392
-
Filesize
47KB
MD59d4b73923102bd6e7746924703b5180d
SHA1484aa42b6193145123d6a5c10d66205075c7f868
SHA25682859ebfc5462b1f9fd8e46199ee90645bf5a4c0e7c781b0939236b8af3aa3f8
SHA512bfe346c8d195ccc6b9ce712f878fa4e5fb2365bb08e6087577c17aa019bc185a4e271e54414edf620d4a36ea81604eac9916671a0fd9adfff28f25feadee79c8
-
Filesize
372KB
MD557fe6eea05fce37ddd2e26b6f4c17194
SHA14f054f5f6121942592b8394406253108d1661ea0
SHA2568932e7e5dbf571f9d25c2a929d56557afd61ba3562804b3a890054fba52c01c9
SHA51219040380960a4b20715f72d3cbea8815a7f0c8102dfbbbe65a61f1b32bcf67c2e437e99a7c0db18105f6d88ef4a3b799cf8c7d7ecdfead52a38be6d129eea79c
-
Filesize
372KB
MD56a00681c1f43600cab7d54cdf0430255
SHA1b82fede5281368dbba61b9a560b9b278e977102e
SHA256403377957aea5827ccb327098b40c068ae43ce4b93dc73eb7703448b743d08f6
SHA512350d4c808bd467003cfb444d028019fcb78b068336bae59306b10ccd184345480b434e1f6a7f69063495c0210c71df10588103a43e2dd4a0ce8fe346a7c47459
-
Filesize
92KB
MD539acfcad4ba5c403a845c2f75eb98ede
SHA14e8cfb410bbf1bd2eec04bc358d2b7ef8acb3ac4
SHA256b2aad21c0852ef840783a2b1c1e53792981376d6eea2cf193d821e5e3e268197
SHA512df22c6e01665ad334e9289356213dca1972511d1550460e4f67251174669aa09813d8e55a13c5e26c9c1d1a9a391515765471382846ce5793b1a61b5d96577fb