Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
02-05-2023 10:37
Static task
static1
Behavioral task
behavioral1
Sample
c80864ec4f40c15a4589d19a1e6cd3ca.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c80864ec4f40c15a4589d19a1e6cd3ca.exe
Resource
win10v2004-20230220-en
General
-
Target
c80864ec4f40c15a4589d19a1e6cd3ca.exe
-
Size
344KB
-
MD5
c80864ec4f40c15a4589d19a1e6cd3ca
-
SHA1
60179fed90422c2db1cefa9e05762965fa0e4283
-
SHA256
1d0853e75493b553ef3bb9c05b1b87036e07a8a29a812df6334c4c150444ddfc
-
SHA512
acd6642f29702e26ebf2831506824caf2a1c86c9cf14822c5527545844c6194fb4577c2007b2c6c62238af46f7cc92f045c13b8358e48c173e4cacda11345fa1
-
SSDEEP
6144:iru3Ja8xyrlTd03PzFcJeOwgTq9HBjf0Pc/zx9Eg5D:GGchs7l3bzx6gl
Malware Config
Extracted
amadey
3.70
tadogem.com/dF30Hn4m/index.php
Extracted
systembc
65.21.119.52:4277
localhost.exchange:4277
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 11 1684 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
Processes:
vvONiW8u.exeoneetx.exeoneetx.exerundll32.exeoneetx.exeoneetx.exepid process 320 vvONiW8u.exe 1984 oneetx.exe 756 oneetx.exe 672 rundll32.exe 464 oneetx.exe 992 oneetx.exe -
Loads dropped DLL 11 IoCs
Processes:
c80864ec4f40c15a4589d19a1e6cd3ca.exevvONiW8u.exeoneetx.exerundll32.exerundll32.exepid process 2032 c80864ec4f40c15a4589d19a1e6cd3ca.exe 320 vvONiW8u.exe 1984 oneetx.exe 1756 rundll32.exe 1756 rundll32.exe 1756 rundll32.exe 1756 rundll32.exe 1684 rundll32.exe 1684 rundll32.exe 1684 rundll32.exe 1684 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
oneetx.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows\CurrentVersion\Run\rundll32.exe = "C:\\Users\\Admin\\AppData\\Roaming\\1000020050\\rundll32.exe" oneetx.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows\CurrentVersion\Run\sc64.dll = "rundll32 C:\\Users\\Admin\\AppData\\Local\\Temp\\1000021061\\sc64.dll, rundll" oneetx.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
c80864ec4f40c15a4589d19a1e6cd3ca.exepid process 2032 c80864ec4f40c15a4589d19a1e6cd3ca.exe 2032 c80864ec4f40c15a4589d19a1e6cd3ca.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1824 2032 WerFault.exe c80864ec4f40c15a4589d19a1e6cd3ca.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c80864ec4f40c15a4589d19a1e6cd3ca.exedescription pid process Token: SeDebugPrivilege 2032 c80864ec4f40c15a4589d19a1e6cd3ca.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
vvONiW8u.exepid process 320 vvONiW8u.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
c80864ec4f40c15a4589d19a1e6cd3ca.exevvONiW8u.exeoneetx.exetaskeng.exerundll32.exedescription pid process target process PID 2032 wrote to memory of 320 2032 c80864ec4f40c15a4589d19a1e6cd3ca.exe vvONiW8u.exe PID 2032 wrote to memory of 320 2032 c80864ec4f40c15a4589d19a1e6cd3ca.exe vvONiW8u.exe PID 2032 wrote to memory of 320 2032 c80864ec4f40c15a4589d19a1e6cd3ca.exe vvONiW8u.exe PID 2032 wrote to memory of 320 2032 c80864ec4f40c15a4589d19a1e6cd3ca.exe vvONiW8u.exe PID 320 wrote to memory of 1984 320 vvONiW8u.exe oneetx.exe PID 320 wrote to memory of 1984 320 vvONiW8u.exe oneetx.exe PID 320 wrote to memory of 1984 320 vvONiW8u.exe oneetx.exe PID 320 wrote to memory of 1984 320 vvONiW8u.exe oneetx.exe PID 1984 wrote to memory of 1444 1984 oneetx.exe schtasks.exe PID 1984 wrote to memory of 1444 1984 oneetx.exe schtasks.exe PID 1984 wrote to memory of 1444 1984 oneetx.exe schtasks.exe PID 1984 wrote to memory of 1444 1984 oneetx.exe schtasks.exe PID 2032 wrote to memory of 1824 2032 c80864ec4f40c15a4589d19a1e6cd3ca.exe WerFault.exe PID 2032 wrote to memory of 1824 2032 c80864ec4f40c15a4589d19a1e6cd3ca.exe WerFault.exe PID 2032 wrote to memory of 1824 2032 c80864ec4f40c15a4589d19a1e6cd3ca.exe WerFault.exe PID 2032 wrote to memory of 1824 2032 c80864ec4f40c15a4589d19a1e6cd3ca.exe WerFault.exe PID 1564 wrote to memory of 756 1564 taskeng.exe oneetx.exe PID 1564 wrote to memory of 756 1564 taskeng.exe oneetx.exe PID 1564 wrote to memory of 756 1564 taskeng.exe oneetx.exe PID 1564 wrote to memory of 756 1564 taskeng.exe oneetx.exe PID 1984 wrote to memory of 672 1984 oneetx.exe rundll32.exe PID 1984 wrote to memory of 672 1984 oneetx.exe rundll32.exe PID 1984 wrote to memory of 672 1984 oneetx.exe rundll32.exe PID 1984 wrote to memory of 672 1984 oneetx.exe rundll32.exe PID 1984 wrote to memory of 672 1984 oneetx.exe rundll32.exe PID 1984 wrote to memory of 672 1984 oneetx.exe rundll32.exe PID 1984 wrote to memory of 672 1984 oneetx.exe rundll32.exe PID 1984 wrote to memory of 1756 1984 oneetx.exe rundll32.exe PID 1984 wrote to memory of 1756 1984 oneetx.exe rundll32.exe PID 1984 wrote to memory of 1756 1984 oneetx.exe rundll32.exe PID 1984 wrote to memory of 1756 1984 oneetx.exe rundll32.exe PID 1984 wrote to memory of 1756 1984 oneetx.exe rundll32.exe PID 1984 wrote to memory of 1756 1984 oneetx.exe rundll32.exe PID 1984 wrote to memory of 1756 1984 oneetx.exe rundll32.exe PID 1756 wrote to memory of 1684 1756 rundll32.exe rundll32.exe PID 1756 wrote to memory of 1684 1756 rundll32.exe rundll32.exe PID 1756 wrote to memory of 1684 1756 rundll32.exe rundll32.exe PID 1756 wrote to memory of 1684 1756 rundll32.exe rundll32.exe PID 1564 wrote to memory of 464 1564 taskeng.exe oneetx.exe PID 1564 wrote to memory of 464 1564 taskeng.exe oneetx.exe PID 1564 wrote to memory of 464 1564 taskeng.exe oneetx.exe PID 1564 wrote to memory of 464 1564 taskeng.exe oneetx.exe PID 1564 wrote to memory of 992 1564 taskeng.exe oneetx.exe PID 1564 wrote to memory of 992 1564 taskeng.exe oneetx.exe PID 1564 wrote to memory of 992 1564 taskeng.exe oneetx.exe PID 1564 wrote to memory of 992 1564 taskeng.exe oneetx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c80864ec4f40c15a4589d19a1e6cd3ca.exe"C:\Users\Admin\AppData\Local\Temp\c80864ec4f40c15a4589d19a1e6cd3ca.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\vvONiW8u.exe"C:\Users\Admin\AppData\Local\Temp\vvONiW8u.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\9b52a1ac2c\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\9b52a1ac2c\oneetx.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\9b52a1ac2c\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1444 -
C:\Users\Admin\AppData\Roaming\1000020050\rundll32.exe"C:\Users\Admin\AppData\Roaming\1000020050\rundll32.exe"4⤵
- Executes dropped EXE
PID:672 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\1000021061\sc64.dll, rundll4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Local\Temp\1000021061\sc64.dll, rundll5⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 15362⤵
- Program crash
PID:1824
-
C:\Windows\system32\taskeng.exetaskeng.exe {779797E3-DEA3-4FDB-A471-F600AD35E990} S-1-5-21-1283023626-844874658-3193756055-1000:THEQWNRW\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\9b52a1ac2c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\9b52a1ac2c\oneetx.exe2⤵
- Executes dropped EXE
PID:756 -
C:\Users\Admin\AppData\Local\Temp\9b52a1ac2c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\9b52a1ac2c\oneetx.exe2⤵
- Executes dropped EXE
PID:464 -
C:\Users\Admin\AppData\Local\Temp\9b52a1ac2c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\9b52a1ac2c\oneetx.exe2⤵
- Executes dropped EXE
PID:992
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD54c09e8e3a1d837f125ea9f9c0c2c5380
SHA10221f489cdef441afad424b5954d07b432d0b8e8
SHA25644d91bcc9c29ea92d933095d707a0040e39b08d1c52099014d58eceecbbe3ace
SHA512d4d80d2e0280e675ab86862b975dea298facc19f2e51533ab257ef2003a33a3fc60b0b0cc6c73059657f3599420cd0df8976278c47614641362c4832c40736d0
-
Filesize
17KB
MD54c09e8e3a1d837f125ea9f9c0c2c5380
SHA10221f489cdef441afad424b5954d07b432d0b8e8
SHA25644d91bcc9c29ea92d933095d707a0040e39b08d1c52099014d58eceecbbe3ace
SHA512d4d80d2e0280e675ab86862b975dea298facc19f2e51533ab257ef2003a33a3fc60b0b0cc6c73059657f3599420cd0df8976278c47614641362c4832c40736d0
-
Filesize
58KB
MD5a1af582ff46ed757e818165cc9f843e2
SHA104bc54c0ffa7a5b6c0d612787f3ea8f38fb9e0c3
SHA2566e4e2d3774ed4f8a62bde60e847f347dd38c9899a631599b2d6f9e0096dc7a8a
SHA51253bde686241687f99129994978787e6f2c2a2df50baa68dca1c6609195bf7df6d5131500f90ed83753c776c6ba76be0ee5b250c8f9924db7a957a1fbce178712
-
Filesize
238KB
MD5c23d62c9166ae248fe9fe078328182f9
SHA1ce684054121205b1cd7befc016644680fd5b29d5
SHA25690fd1a34bfc130e0d23555bf7f57a4e7d1cd49ae035b29c02aa76eef28b07a9e
SHA5121f53f739c5cd8ff3ebd197081d1f6a9e3b29458c2ad5ffa767342aebaed812eaa2546ee1977ed544980acb27fb0178eb1acbff857ccc24ddae6bb734f0aefe57
-
Filesize
238KB
MD5c23d62c9166ae248fe9fe078328182f9
SHA1ce684054121205b1cd7befc016644680fd5b29d5
SHA25690fd1a34bfc130e0d23555bf7f57a4e7d1cd49ae035b29c02aa76eef28b07a9e
SHA5121f53f739c5cd8ff3ebd197081d1f6a9e3b29458c2ad5ffa767342aebaed812eaa2546ee1977ed544980acb27fb0178eb1acbff857ccc24ddae6bb734f0aefe57
-
Filesize
238KB
MD5c23d62c9166ae248fe9fe078328182f9
SHA1ce684054121205b1cd7befc016644680fd5b29d5
SHA25690fd1a34bfc130e0d23555bf7f57a4e7d1cd49ae035b29c02aa76eef28b07a9e
SHA5121f53f739c5cd8ff3ebd197081d1f6a9e3b29458c2ad5ffa767342aebaed812eaa2546ee1977ed544980acb27fb0178eb1acbff857ccc24ddae6bb734f0aefe57
-
Filesize
238KB
MD5c23d62c9166ae248fe9fe078328182f9
SHA1ce684054121205b1cd7befc016644680fd5b29d5
SHA25690fd1a34bfc130e0d23555bf7f57a4e7d1cd49ae035b29c02aa76eef28b07a9e
SHA5121f53f739c5cd8ff3ebd197081d1f6a9e3b29458c2ad5ffa767342aebaed812eaa2546ee1977ed544980acb27fb0178eb1acbff857ccc24ddae6bb734f0aefe57
-
Filesize
238KB
MD5c23d62c9166ae248fe9fe078328182f9
SHA1ce684054121205b1cd7befc016644680fd5b29d5
SHA25690fd1a34bfc130e0d23555bf7f57a4e7d1cd49ae035b29c02aa76eef28b07a9e
SHA5121f53f739c5cd8ff3ebd197081d1f6a9e3b29458c2ad5ffa767342aebaed812eaa2546ee1977ed544980acb27fb0178eb1acbff857ccc24ddae6bb734f0aefe57
-
Filesize
238KB
MD5c23d62c9166ae248fe9fe078328182f9
SHA1ce684054121205b1cd7befc016644680fd5b29d5
SHA25690fd1a34bfc130e0d23555bf7f57a4e7d1cd49ae035b29c02aa76eef28b07a9e
SHA5121f53f739c5cd8ff3ebd197081d1f6a9e3b29458c2ad5ffa767342aebaed812eaa2546ee1977ed544980acb27fb0178eb1acbff857ccc24ddae6bb734f0aefe57
-
Filesize
238KB
MD5c23d62c9166ae248fe9fe078328182f9
SHA1ce684054121205b1cd7befc016644680fd5b29d5
SHA25690fd1a34bfc130e0d23555bf7f57a4e7d1cd49ae035b29c02aa76eef28b07a9e
SHA5121f53f739c5cd8ff3ebd197081d1f6a9e3b29458c2ad5ffa767342aebaed812eaa2546ee1977ed544980acb27fb0178eb1acbff857ccc24ddae6bb734f0aefe57
-
Filesize
238KB
MD5c23d62c9166ae248fe9fe078328182f9
SHA1ce684054121205b1cd7befc016644680fd5b29d5
SHA25690fd1a34bfc130e0d23555bf7f57a4e7d1cd49ae035b29c02aa76eef28b07a9e
SHA5121f53f739c5cd8ff3ebd197081d1f6a9e3b29458c2ad5ffa767342aebaed812eaa2546ee1977ed544980acb27fb0178eb1acbff857ccc24ddae6bb734f0aefe57
-
Filesize
211KB
MD51d81057710dc737ffee88f7f8b0ef90c
SHA18a13b1fe68d5010e5e9b14719a279c4037d7c446
SHA256c16037f4aa5a4e8405ee97b1fe2fdc84213a7a4b908ce64e8fe23f5c2a123abc
SHA512a5a1e06c2d4bcdd1eb12a57dc32c95bf0ea97af409ef6d756ace4e796ffd5bc8c14501bd49f74a5b840fedb6e66f4e4db8c6f887117f6e1037f5f5bd262edd49
-
Filesize
211KB
MD51d81057710dc737ffee88f7f8b0ef90c
SHA18a13b1fe68d5010e5e9b14719a279c4037d7c446
SHA256c16037f4aa5a4e8405ee97b1fe2fdc84213a7a4b908ce64e8fe23f5c2a123abc
SHA512a5a1e06c2d4bcdd1eb12a57dc32c95bf0ea97af409ef6d756ace4e796ffd5bc8c14501bd49f74a5b840fedb6e66f4e4db8c6f887117f6e1037f5f5bd262edd49
-
Filesize
211KB
MD51d81057710dc737ffee88f7f8b0ef90c
SHA18a13b1fe68d5010e5e9b14719a279c4037d7c446
SHA256c16037f4aa5a4e8405ee97b1fe2fdc84213a7a4b908ce64e8fe23f5c2a123abc
SHA512a5a1e06c2d4bcdd1eb12a57dc32c95bf0ea97af409ef6d756ace4e796ffd5bc8c14501bd49f74a5b840fedb6e66f4e4db8c6f887117f6e1037f5f5bd262edd49
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
17KB
MD54c09e8e3a1d837f125ea9f9c0c2c5380
SHA10221f489cdef441afad424b5954d07b432d0b8e8
SHA25644d91bcc9c29ea92d933095d707a0040e39b08d1c52099014d58eceecbbe3ace
SHA512d4d80d2e0280e675ab86862b975dea298facc19f2e51533ab257ef2003a33a3fc60b0b0cc6c73059657f3599420cd0df8976278c47614641362c4832c40736d0
-
Filesize
17KB
MD54c09e8e3a1d837f125ea9f9c0c2c5380
SHA10221f489cdef441afad424b5954d07b432d0b8e8
SHA25644d91bcc9c29ea92d933095d707a0040e39b08d1c52099014d58eceecbbe3ace
SHA512d4d80d2e0280e675ab86862b975dea298facc19f2e51533ab257ef2003a33a3fc60b0b0cc6c73059657f3599420cd0df8976278c47614641362c4832c40736d0
-
Filesize
17KB
MD54c09e8e3a1d837f125ea9f9c0c2c5380
SHA10221f489cdef441afad424b5954d07b432d0b8e8
SHA25644d91bcc9c29ea92d933095d707a0040e39b08d1c52099014d58eceecbbe3ace
SHA512d4d80d2e0280e675ab86862b975dea298facc19f2e51533ab257ef2003a33a3fc60b0b0cc6c73059657f3599420cd0df8976278c47614641362c4832c40736d0
-
Filesize
17KB
MD54c09e8e3a1d837f125ea9f9c0c2c5380
SHA10221f489cdef441afad424b5954d07b432d0b8e8
SHA25644d91bcc9c29ea92d933095d707a0040e39b08d1c52099014d58eceecbbe3ace
SHA512d4d80d2e0280e675ab86862b975dea298facc19f2e51533ab257ef2003a33a3fc60b0b0cc6c73059657f3599420cd0df8976278c47614641362c4832c40736d0
-
Filesize
17KB
MD54c09e8e3a1d837f125ea9f9c0c2c5380
SHA10221f489cdef441afad424b5954d07b432d0b8e8
SHA25644d91bcc9c29ea92d933095d707a0040e39b08d1c52099014d58eceecbbe3ace
SHA512d4d80d2e0280e675ab86862b975dea298facc19f2e51533ab257ef2003a33a3fc60b0b0cc6c73059657f3599420cd0df8976278c47614641362c4832c40736d0
-
Filesize
17KB
MD54c09e8e3a1d837f125ea9f9c0c2c5380
SHA10221f489cdef441afad424b5954d07b432d0b8e8
SHA25644d91bcc9c29ea92d933095d707a0040e39b08d1c52099014d58eceecbbe3ace
SHA512d4d80d2e0280e675ab86862b975dea298facc19f2e51533ab257ef2003a33a3fc60b0b0cc6c73059657f3599420cd0df8976278c47614641362c4832c40736d0
-
Filesize
17KB
MD54c09e8e3a1d837f125ea9f9c0c2c5380
SHA10221f489cdef441afad424b5954d07b432d0b8e8
SHA25644d91bcc9c29ea92d933095d707a0040e39b08d1c52099014d58eceecbbe3ace
SHA512d4d80d2e0280e675ab86862b975dea298facc19f2e51533ab257ef2003a33a3fc60b0b0cc6c73059657f3599420cd0df8976278c47614641362c4832c40736d0
-
Filesize
17KB
MD54c09e8e3a1d837f125ea9f9c0c2c5380
SHA10221f489cdef441afad424b5954d07b432d0b8e8
SHA25644d91bcc9c29ea92d933095d707a0040e39b08d1c52099014d58eceecbbe3ace
SHA512d4d80d2e0280e675ab86862b975dea298facc19f2e51533ab257ef2003a33a3fc60b0b0cc6c73059657f3599420cd0df8976278c47614641362c4832c40736d0
-
Filesize
238KB
MD5c23d62c9166ae248fe9fe078328182f9
SHA1ce684054121205b1cd7befc016644680fd5b29d5
SHA25690fd1a34bfc130e0d23555bf7f57a4e7d1cd49ae035b29c02aa76eef28b07a9e
SHA5121f53f739c5cd8ff3ebd197081d1f6a9e3b29458c2ad5ffa767342aebaed812eaa2546ee1977ed544980acb27fb0178eb1acbff857ccc24ddae6bb734f0aefe57
-
Filesize
238KB
MD5c23d62c9166ae248fe9fe078328182f9
SHA1ce684054121205b1cd7befc016644680fd5b29d5
SHA25690fd1a34bfc130e0d23555bf7f57a4e7d1cd49ae035b29c02aa76eef28b07a9e
SHA5121f53f739c5cd8ff3ebd197081d1f6a9e3b29458c2ad5ffa767342aebaed812eaa2546ee1977ed544980acb27fb0178eb1acbff857ccc24ddae6bb734f0aefe57
-
Filesize
211KB
MD51d81057710dc737ffee88f7f8b0ef90c
SHA18a13b1fe68d5010e5e9b14719a279c4037d7c446
SHA256c16037f4aa5a4e8405ee97b1fe2fdc84213a7a4b908ce64e8fe23f5c2a123abc
SHA512a5a1e06c2d4bcdd1eb12a57dc32c95bf0ea97af409ef6d756ace4e796ffd5bc8c14501bd49f74a5b840fedb6e66f4e4db8c6f887117f6e1037f5f5bd262edd49