Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
63s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 05:52
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-10_799fe906d0ecada1aa6edc07e9510556_goldeneye.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-10_799fe906d0ecada1aa6edc07e9510556_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-10_799fe906d0ecada1aa6edc07e9510556_goldeneye.exe
-
Size
380KB
-
MD5
799fe906d0ecada1aa6edc07e9510556
-
SHA1
487be1e901f1114b3ea6b929154109e7006d0873
-
SHA256
0f87f3bd178236711136b82f6433cec4ea266ad7451237a51e7f9c15724f4eae
-
SHA512
ad3ef5c9d1bca38f9ffb958c4ac95c294a4dead2defc129f68943033fcfa6020f6fd6e247c85e80693bb2129b61136b46c9d5f8f54821d72ce9a92e5341fc9f6
-
SSDEEP
3072:mEGh0oFlPOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGw:mEGbl7Oe2MUVg3v2IneKcAEcARy
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{50E30CDF-A83D-42e7-B328-6034AA778595} {73C7624C-4B01-462a-B1AA-80176A833E62}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D330DF10-DFE2-44c5-B159-8E8A75E4759F} {50E30CDF-A83D-42e7-B328-6034AA778595}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D330DF10-DFE2-44c5-B159-8E8A75E4759F}\stubpath = "C:\\Windows\\{D330DF10-DFE2-44c5-B159-8E8A75E4759F}.exe" {50E30CDF-A83D-42e7-B328-6034AA778595}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D08C0897-6D1E-4d83-9408-42843BD2EC2E}\stubpath = "C:\\Windows\\{D08C0897-6D1E-4d83-9408-42843BD2EC2E}.exe" 2024-01-10_799fe906d0ecada1aa6edc07e9510556_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{73C7624C-4B01-462a-B1AA-80176A833E62} {A482957D-15E4-45fa-BA71-4E7949BCF45C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{73C7624C-4B01-462a-B1AA-80176A833E62}\stubpath = "C:\\Windows\\{73C7624C-4B01-462a-B1AA-80176A833E62}.exe" {A482957D-15E4-45fa-BA71-4E7949BCF45C}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{50E30CDF-A83D-42e7-B328-6034AA778595}\stubpath = "C:\\Windows\\{50E30CDF-A83D-42e7-B328-6034AA778595}.exe" {73C7624C-4B01-462a-B1AA-80176A833E62}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D08C0897-6D1E-4d83-9408-42843BD2EC2E} 2024-01-10_799fe906d0ecada1aa6edc07e9510556_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A482957D-15E4-45fa-BA71-4E7949BCF45C} {D08C0897-6D1E-4d83-9408-42843BD2EC2E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A482957D-15E4-45fa-BA71-4E7949BCF45C}\stubpath = "C:\\Windows\\{A482957D-15E4-45fa-BA71-4E7949BCF45C}.exe" {D08C0897-6D1E-4d83-9408-42843BD2EC2E}.exe -
Executes dropped EXE 5 IoCs
pid Process 5312 {D08C0897-6D1E-4d83-9408-42843BD2EC2E}.exe 1824 {A482957D-15E4-45fa-BA71-4E7949BCF45C}.exe 4488 {73C7624C-4B01-462a-B1AA-80176A833E62}.exe 1544 {50E30CDF-A83D-42e7-B328-6034AA778595}.exe 1360 {D330DF10-DFE2-44c5-B159-8E8A75E4759F}.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\{D08C0897-6D1E-4d83-9408-42843BD2EC2E}.exe 2024-01-10_799fe906d0ecada1aa6edc07e9510556_goldeneye.exe File created C:\Windows\{A482957D-15E4-45fa-BA71-4E7949BCF45C}.exe {D08C0897-6D1E-4d83-9408-42843BD2EC2E}.exe File created C:\Windows\{73C7624C-4B01-462a-B1AA-80176A833E62}.exe {A482957D-15E4-45fa-BA71-4E7949BCF45C}.exe File created C:\Windows\{50E30CDF-A83D-42e7-B328-6034AA778595}.exe {73C7624C-4B01-462a-B1AA-80176A833E62}.exe File created C:\Windows\{D330DF10-DFE2-44c5-B159-8E8A75E4759F}.exe {50E30CDF-A83D-42e7-B328-6034AA778595}.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3496 2024-01-10_799fe906d0ecada1aa6edc07e9510556_goldeneye.exe Token: SeIncBasePriorityPrivilege 5312 {D08C0897-6D1E-4d83-9408-42843BD2EC2E}.exe Token: SeIncBasePriorityPrivilege 1824 {A482957D-15E4-45fa-BA71-4E7949BCF45C}.exe Token: SeIncBasePriorityPrivilege 4488 {73C7624C-4B01-462a-B1AA-80176A833E62}.exe Token: SeIncBasePriorityPrivilege 1544 {50E30CDF-A83D-42e7-B328-6034AA778595}.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3496 wrote to memory of 5312 3496 2024-01-10_799fe906d0ecada1aa6edc07e9510556_goldeneye.exe 101 PID 3496 wrote to memory of 5312 3496 2024-01-10_799fe906d0ecada1aa6edc07e9510556_goldeneye.exe 101 PID 3496 wrote to memory of 5312 3496 2024-01-10_799fe906d0ecada1aa6edc07e9510556_goldeneye.exe 101 PID 3496 wrote to memory of 5788 3496 2024-01-10_799fe906d0ecada1aa6edc07e9510556_goldeneye.exe 99 PID 3496 wrote to memory of 5788 3496 2024-01-10_799fe906d0ecada1aa6edc07e9510556_goldeneye.exe 99 PID 3496 wrote to memory of 5788 3496 2024-01-10_799fe906d0ecada1aa6edc07e9510556_goldeneye.exe 99 PID 5312 wrote to memory of 1824 5312 {D08C0897-6D1E-4d83-9408-42843BD2EC2E}.exe 102 PID 5312 wrote to memory of 1824 5312 {D08C0897-6D1E-4d83-9408-42843BD2EC2E}.exe 102 PID 5312 wrote to memory of 1824 5312 {D08C0897-6D1E-4d83-9408-42843BD2EC2E}.exe 102 PID 5312 wrote to memory of 1768 5312 {D08C0897-6D1E-4d83-9408-42843BD2EC2E}.exe 103 PID 5312 wrote to memory of 1768 5312 {D08C0897-6D1E-4d83-9408-42843BD2EC2E}.exe 103 PID 5312 wrote to memory of 1768 5312 {D08C0897-6D1E-4d83-9408-42843BD2EC2E}.exe 103 PID 1824 wrote to memory of 4488 1824 {A482957D-15E4-45fa-BA71-4E7949BCF45C}.exe 107 PID 1824 wrote to memory of 4488 1824 {A482957D-15E4-45fa-BA71-4E7949BCF45C}.exe 107 PID 1824 wrote to memory of 4488 1824 {A482957D-15E4-45fa-BA71-4E7949BCF45C}.exe 107 PID 1824 wrote to memory of 6072 1824 {A482957D-15E4-45fa-BA71-4E7949BCF45C}.exe 106 PID 1824 wrote to memory of 6072 1824 {A482957D-15E4-45fa-BA71-4E7949BCF45C}.exe 106 PID 1824 wrote to memory of 6072 1824 {A482957D-15E4-45fa-BA71-4E7949BCF45C}.exe 106 PID 4488 wrote to memory of 1544 4488 {73C7624C-4B01-462a-B1AA-80176A833E62}.exe 110 PID 4488 wrote to memory of 1544 4488 {73C7624C-4B01-462a-B1AA-80176A833E62}.exe 110 PID 4488 wrote to memory of 1544 4488 {73C7624C-4B01-462a-B1AA-80176A833E62}.exe 110 PID 4488 wrote to memory of 3120 4488 {73C7624C-4B01-462a-B1AA-80176A833E62}.exe 109 PID 4488 wrote to memory of 3120 4488 {73C7624C-4B01-462a-B1AA-80176A833E62}.exe 109 PID 4488 wrote to memory of 3120 4488 {73C7624C-4B01-462a-B1AA-80176A833E62}.exe 109 PID 1544 wrote to memory of 1360 1544 {50E30CDF-A83D-42e7-B328-6034AA778595}.exe 112 PID 1544 wrote to memory of 1360 1544 {50E30CDF-A83D-42e7-B328-6034AA778595}.exe 112 PID 1544 wrote to memory of 1360 1544 {50E30CDF-A83D-42e7-B328-6034AA778595}.exe 112 PID 1544 wrote to memory of 5556 1544 {50E30CDF-A83D-42e7-B328-6034AA778595}.exe 111 PID 1544 wrote to memory of 5556 1544 {50E30CDF-A83D-42e7-B328-6034AA778595}.exe 111 PID 1544 wrote to memory of 5556 1544 {50E30CDF-A83D-42e7-B328-6034AA778595}.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-10_799fe906d0ecada1aa6edc07e9510556_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-10_799fe906d0ecada1aa6edc07e9510556_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:5788
-
-
C:\Windows\{D08C0897-6D1E-4d83-9408-42843BD2EC2E}.exeC:\Windows\{D08C0897-6D1E-4d83-9408-42843BD2EC2E}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5312 -
C:\Windows\{A482957D-15E4-45fa-BA71-4E7949BCF45C}.exeC:\Windows\{A482957D-15E4-45fa-BA71-4E7949BCF45C}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A4829~1.EXE > nul4⤵PID:6072
-
-
C:\Windows\{73C7624C-4B01-462a-B1AA-80176A833E62}.exeC:\Windows\{73C7624C-4B01-462a-B1AA-80176A833E62}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{73C76~1.EXE > nul5⤵PID:3120
-
-
C:\Windows\{50E30CDF-A83D-42e7-B328-6034AA778595}.exeC:\Windows\{50E30CDF-A83D-42e7-B328-6034AA778595}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{50E30~1.EXE > nul6⤵PID:5556
-
-
C:\Windows\{D330DF10-DFE2-44c5-B159-8E8A75E4759F}.exeC:\Windows\{D330DF10-DFE2-44c5-B159-8E8A75E4759F}.exe6⤵
- Executes dropped EXE
PID:1360 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D330D~1.EXE > nul7⤵PID:5408
-
-
C:\Windows\{9DF986C9-5629-4646-A5C5-4A8D736867A0}.exeC:\Windows\{9DF986C9-5629-4646-A5C5-4A8D736867A0}.exe7⤵PID:4564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{9DF98~1.EXE > nul8⤵PID:1540
-
-
C:\Windows\{0C2A4FA4-DAA2-42d6-8B11-AA706FDFC3C7}.exeC:\Windows\{0C2A4FA4-DAA2-42d6-8B11-AA706FDFC3C7}.exe8⤵PID:5724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0C2A4~1.EXE > nul9⤵PID:4692
-
-
C:\Windows\{0806AF05-B469-40bf-9B45-9577FD6DF807}.exeC:\Windows\{0806AF05-B469-40bf-9B45-9577FD6DF807}.exe9⤵PID:5480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{0806A~1.EXE > nul10⤵PID:1512
-
-
C:\Windows\{C05D58F5-96E6-4f3a-A8AC-B8BF656C1263}.exeC:\Windows\{C05D58F5-96E6-4f3a-A8AC-B8BF656C1263}.exe10⤵PID:1836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{C05D5~1.EXE > nul11⤵PID:4928
-
-
C:\Windows\{A84F0A03-6CD2-44cb-B3E8-36C7244FCEBA}.exeC:\Windows\{A84F0A03-6CD2-44cb-B3E8-36C7244FCEBA}.exe11⤵PID:4932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{A84F0~1.EXE > nul12⤵PID:4632
-
-
C:\Windows\{46DFFEA5-FA16-486d-B0DF-BE78DBED12DC}.exeC:\Windows\{46DFFEA5-FA16-486d-B0DF-BE78DBED12DC}.exe12⤵PID:3752
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{D08C0~1.EXE > nul3⤵PID:1768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD55c1b2a3a987ab3fee89392ff07b093bb
SHA1aa3a507fa42602668a18224c264734c84b2804db
SHA256cdc26449467c23d394c032bab30c07c0d1da52ed779c3950ad70e2f3f78fc603
SHA5121f587df5a57259c2487e4d1fc15f7d56f4582a3bf252d5cda0e08a38f6996b69c2558190d5f7c09980fbf946cda249f94d95707d271bf7fcdaa8038f9b4ef355
-
Filesize
89KB
MD5582fa207a3eb8407c893dddfe40dd044
SHA137d7c7c227ffa593dd972c1d53264198358ae87c
SHA256b0298a4ae2cfd3f832ce6a631083941c22eebf7cb1246a1f73722dc074499e9c
SHA5129ac488ee868e6e885679e00d878c424e347b99c28a4f515b0b86f6c695de25da216e675f3dcc0c1578516f0873357d152fffe7b4e3de992f0e922d7a0eb26076
-
Filesize
92KB
MD5aeb498ef7ca01d4d764d85583300e5ce
SHA1ea064c73d61b6fb9093a958a79fe960a33138c59
SHA256c03130130351a53ac87ffa81b0155f4fe73a4472f6174da94edec83a62db93fa
SHA51277999964d46238e7146689a963d4ca107c16e9beade5ed0d4ab02ae29ae28284656aed6e870e8ebb4c6b48231349bc9ff4ae053ea59055c4762de073d04de7ca
-
Filesize
48KB
MD5a766f8119c41c8b3ea6d50aa2731a21d
SHA1f62c72b282867bbc063a6424b4af4e643c50bcf8
SHA256f1781eac74f2c8450beda3ddd05d22545b113c4ccb4f2064794797ce637c6839
SHA5127e13e49ddab64aa6630e869911c197fe31dc349ca5cf26751f2a36b4ef1531796c99edfc70233ce84ec5f9cb702a20fc6e0636ef113c1eb7181110f21dc5e3d0
-
Filesize
147KB
MD5f3534a16d56495a4f5efc4e3ecb15dba
SHA12013df9fe9b807f8933726e4c0bf4b8c8b7b2af4
SHA2565697aa68fc79edeacf03cf49928a54898306437b27487c1c5bf570001bda4c97
SHA512ae936bfae5886bdf30b731cc87a11cb8286182753776756f3d1694c7bdb6af647d9f7016769b42a1e5c69e8fb6981a4038110ba8bb1ea2645387936257f9787e
-
Filesize
277KB
MD521e0667b8c28ab08b5d8392b7c1f7db5
SHA1b734af7b32346c2d56bd95870ccc67aa074d8dba
SHA25626e142c1e326a50e550436a6f10cbd2b515bf3138a7f7c6f5b9415ac41c73282
SHA51262f7d3cfebcaea21596903653249be958c775707aed29cfa3fae91f1b641932821c46a93b2ee4766b4e336e79f788bf431b319a121c0d271c984f08976eea6f5
-
Filesize
18KB
MD56a0b26bb0d650919f6138a75b9171845
SHA1005ce168b82a9f563752c790a9628ff93e97f322
SHA2566dfd1e58185a93b321416d5b30a4288c3123e7500928b213c659f0c24676368f
SHA5127226b36bb9b22cd5bbbbea5eda0b37b1d926b1583920078bed08d1d9dd075629ab10d85b140a3136027b68cd575bf6e7ab28fd385bf93f6c23efab5fea846349
-
Filesize
51KB
MD5b23c2ffd2030e5b6c21ac5427f770fb5
SHA1ab2dfb91707ec5064025a031bec03182c71b2887
SHA2568208469952975881cf422470e97d98b9e618a77168682319346e95c75fb4e756
SHA512a5677d9b7a327d24819aca7422751472483e3a3cd21f22c40fa062506cdcb46f3d1cd50b069ddc175f4625eb630af23dc16cc92d67fee1657fbe4cc6b18cd267
-
Filesize
5KB
MD5af75349bfb89825b89a6cfd8d18f4808
SHA1e6b61e3dff8e92a5c1017b13c2a1b74af9127ffd
SHA2561da91de177c376c53b09ac3b3de21615fbf9de178a340f32fa041a71aeeb8764
SHA51225e9f28e210fb67d08f1ffb59491748b03a7820493e3fe8ab53e623f854a9c57f7d9d2c130ed972879f1c14f741c74ab46628f85989212b1b55e402163566ae4
-
Filesize
27KB
MD53442fc3c23d2cc19ea12ea3b19a5836b
SHA1eb1e66578165f5bd9def03099b4855b67ad20663
SHA256812ccbc9eba4c940d36d8d827b4d1e47e6d6e77b6bfab25b39cdea0983f9f42e
SHA51210fc64b5f8e5637844e5bbf50aa97579df06bc47785a2c1a230d9efc029bbd138db04ec4b4a562f3ab775f3381297a5f2afb6ce77d0b991c087e4e0783d24c9b
-
Filesize
75KB
MD5f839b347290bf3669306ee48331d2299
SHA1936a5c92b71ca5c3b350175091f993d0f9fce869
SHA256594fad8d975c31a00531d97765fe87d8286a896b9e824f6c8428ad048ed733e1
SHA512aadd44ea64faebdf4c1865992ff15142a0813098941105099160e2a15fb9e34e20de6da5c7a2634c226d6863a690923a0c081900025c1ebeb18c2844eec615fc
-
Filesize
38KB
MD566b1358ecd5607137cd09ab825872008
SHA1fcacd00896f14d1525bd69ec4ca8d70c792be540
SHA2567bbdc233e00161590b8e56c64962a66961606c7f52bbfa76abbe63210c7ebfba
SHA51211c95a2854d78fa081f3e7c44a30d1477124d5d7b606643f5e886005c263ef4939615d05943c8791a24f7e220cf9e054ae3401c11db7662574a29791b6a8b79d
-
Filesize
92KB
MD5817ed908de88773ee3fd5c2d755b1d57
SHA125655bfa66fd3eab8adee9d7d4ec84aedeace527
SHA25634a37ae98296f4a8e1d6b30a62d3a80872a0fb8da4c9d4edb4e4d7e71f5700df
SHA5124638624a0389fdf29011f809414f62f35535687f6b57f9f7ee83836dad0425bcb78e027165593a243cb418bd4f4a8f21c565206c5939558da326f98e01211f21
-
Filesize
124KB
MD510164ac05ca8ea40193e96f397653200
SHA1b4380e9c5477ffb117e1a6ece2d5e2eb64f4eab3
SHA25678722a43d97a6890eb9bd78ee825fe57404966eea631a44215dec74958842bea
SHA51285703a8eb94604cd0987859e8f1c2d65917aca33288262339b6f4bf2952fb39818d948ea4c03bcafa8b42d656d2aa69b7774b884353a70cf53c9471d0637a29a
-
Filesize
117KB
MD59338f407f0bc49a2ecae9a06f6582212
SHA1221857d5085d88cabb36ee60751fc8c373cbf6d2
SHA256ba4d267a36283d8c51a7ad7bd921fd7fa37a4edec424ddfd1cbef45d39dd282a
SHA512a69caa5330a2eefbb2aa87a53e8531c3da9fba8300bd639f112ebbdee66269679aee54cb2081bcb5a3bcee02a7dbc2e805e9a47c44fd3b53f1e5637cee4aa57a
-
Filesize
119KB
MD56a95bc42dd1784ae26141b28e32e6a96
SHA1cb9854333d07226c9c203238feee808f304eff70
SHA256bafe445a3dbbcdb681e1ef4d9d1520b2ee5d703fbe9afa8fad26ca42e01dc163
SHA512b48834c388214344cfde6acbaf3ac47250cee3ec5ae4d574ebd4695e75633cf9d92e9d6b4f778a57d31ab88a02883082c6ded03635ba8491921bd01528c0c488
-
Filesize
380KB
MD5ef2d9e60d1e5cbdc41fbd80e1ef1c4b6
SHA18089b2f9ace0e081dc974a5a109512699faed854
SHA256ca8be3f32e10319392ecc4b40564f06b2c3c4100c7475b368dc692bdeeb972e3
SHA512f8110c44005a46597a3e5b9b0da495238ad579f3d335d2937bab2e1d63727a4f3563fc38f4bdbf8af256e14d9e0e57a114bf6b41228093cd844165c69ea0d737