Analysis
-
max time kernel
147s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2023, 12:33
Static task
static1
Behavioral task
behavioral1
Sample
a75f375c7b9f403bbfef37c393d1fec74a3c6f97a2f8dca185428426d30b2edc.exe
Resource
win10v2004-20230703-en
General
-
Target
a75f375c7b9f403bbfef37c393d1fec74a3c6f97a2f8dca185428426d30b2edc.exe
-
Size
832KB
-
MD5
4bd4e6043db392fbb746063fbb8778cf
-
SHA1
930d62b543b40c6c6610919ad65321d8353ebbfd
-
SHA256
a75f375c7b9f403bbfef37c393d1fec74a3c6f97a2f8dca185428426d30b2edc
-
SHA512
a876693059fd76e08ecc122db5aafa0d5a3ec8be1600a5ed85b0175bdb5a60210884d840df820bc53e740f2163616c99386d1ccc41b4bb4643aad7f30e815cea
-
SSDEEP
24576:Vy45sPbgNFNWgxRICKUY/9avD87vflUYTbuS:wIs2EmKUY/9ab8x3T
Malware Config
Extracted
amadey
S-%lu-
77.91.68.18/nice/index.php
3.87/nice/index.php
Extracted
redline
jonka
77.91.124.73:19071
-
auth_value
c95bc30cd252fa6dff2a19fd78bfab4e
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x0006000000023242-171.dat healer behavioral1/files/0x0006000000023242-172.dat healer behavioral1/memory/1980-173-0x0000000000190000-0x000000000019A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h1230628.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h1230628.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection h1230628.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h1230628.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h1230628.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h1230628.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 9 IoCs
pid Process 3972 x8628157.exe 3776 x0245511.exe 2412 x1710335.exe 2148 g4409359.exe 3868 saves.exe 1980 h1230628.exe 3784 i6207410.exe 2848 saves.exe 3396 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 3288 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" h1230628.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a75f375c7b9f403bbfef37c393d1fec74a3c6f97a2f8dca185428426d30b2edc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8628157.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x0245511.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x1710335.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 556 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1980 h1230628.exe 1980 h1230628.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1980 h1230628.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1876 wrote to memory of 3972 1876 a75f375c7b9f403bbfef37c393d1fec74a3c6f97a2f8dca185428426d30b2edc.exe 81 PID 1876 wrote to memory of 3972 1876 a75f375c7b9f403bbfef37c393d1fec74a3c6f97a2f8dca185428426d30b2edc.exe 81 PID 1876 wrote to memory of 3972 1876 a75f375c7b9f403bbfef37c393d1fec74a3c6f97a2f8dca185428426d30b2edc.exe 81 PID 3972 wrote to memory of 3776 3972 x8628157.exe 82 PID 3972 wrote to memory of 3776 3972 x8628157.exe 82 PID 3972 wrote to memory of 3776 3972 x8628157.exe 82 PID 3776 wrote to memory of 2412 3776 x0245511.exe 83 PID 3776 wrote to memory of 2412 3776 x0245511.exe 83 PID 3776 wrote to memory of 2412 3776 x0245511.exe 83 PID 2412 wrote to memory of 2148 2412 x1710335.exe 84 PID 2412 wrote to memory of 2148 2412 x1710335.exe 84 PID 2412 wrote to memory of 2148 2412 x1710335.exe 84 PID 2148 wrote to memory of 3868 2148 g4409359.exe 85 PID 2148 wrote to memory of 3868 2148 g4409359.exe 85 PID 2148 wrote to memory of 3868 2148 g4409359.exe 85 PID 2412 wrote to memory of 1980 2412 x1710335.exe 87 PID 2412 wrote to memory of 1980 2412 x1710335.exe 87 PID 3868 wrote to memory of 556 3868 saves.exe 88 PID 3868 wrote to memory of 556 3868 saves.exe 88 PID 3868 wrote to memory of 556 3868 saves.exe 88 PID 3868 wrote to memory of 4176 3868 saves.exe 90 PID 3868 wrote to memory of 4176 3868 saves.exe 90 PID 3868 wrote to memory of 4176 3868 saves.exe 90 PID 4176 wrote to memory of 4820 4176 cmd.exe 92 PID 4176 wrote to memory of 4820 4176 cmd.exe 92 PID 4176 wrote to memory of 4820 4176 cmd.exe 92 PID 4176 wrote to memory of 4240 4176 cmd.exe 93 PID 4176 wrote to memory of 4240 4176 cmd.exe 93 PID 4176 wrote to memory of 4240 4176 cmd.exe 93 PID 4176 wrote to memory of 1296 4176 cmd.exe 94 PID 4176 wrote to memory of 1296 4176 cmd.exe 94 PID 4176 wrote to memory of 1296 4176 cmd.exe 94 PID 4176 wrote to memory of 3560 4176 cmd.exe 95 PID 4176 wrote to memory of 3560 4176 cmd.exe 95 PID 4176 wrote to memory of 3560 4176 cmd.exe 95 PID 4176 wrote to memory of 4536 4176 cmd.exe 96 PID 4176 wrote to memory of 4536 4176 cmd.exe 96 PID 4176 wrote to memory of 4536 4176 cmd.exe 96 PID 4176 wrote to memory of 3196 4176 cmd.exe 97 PID 4176 wrote to memory of 3196 4176 cmd.exe 97 PID 4176 wrote to memory of 3196 4176 cmd.exe 97 PID 3776 wrote to memory of 3784 3776 x0245511.exe 102 PID 3776 wrote to memory of 3784 3776 x0245511.exe 102 PID 3776 wrote to memory of 3784 3776 x0245511.exe 102 PID 3868 wrote to memory of 3288 3868 saves.exe 109 PID 3868 wrote to memory of 3288 3868 saves.exe 109 PID 3868 wrote to memory of 3288 3868 saves.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\a75f375c7b9f403bbfef37c393d1fec74a3c6f97a2f8dca185428426d30b2edc.exe"C:\Users\Admin\AppData\Local\Temp\a75f375c7b9f403bbfef37c393d1fec74a3c6f97a2f8dca185428426d30b2edc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8628157.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8628157.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0245511.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0245511.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1710335.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1710335.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4409359.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4409359.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:556
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4820
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:4240
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:1296
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3560
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4536
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:3196
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:3288
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1230628.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1230628.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6207410.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6207410.exe4⤵
- Executes dropped EXE
PID:3784
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2848
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3396
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598KB
MD560340e1982e6d45b3bba64b17a1edbc8
SHA1432a6552cb001f5a16f3de162ee694caf42b4869
SHA256f57659abc5a4f97df604f74bed500e1fa865ac154ee9b03b3a4c9bffb4bbc2f8
SHA5128de255c97739a8dd777837d67c2b1278a0abafcc10f0d6903f26a5f5292a6c59a5721496f2ad600b16f27c21b6ed831184e7f4178be82f715a539b7c865b8a60
-
Filesize
598KB
MD560340e1982e6d45b3bba64b17a1edbc8
SHA1432a6552cb001f5a16f3de162ee694caf42b4869
SHA256f57659abc5a4f97df604f74bed500e1fa865ac154ee9b03b3a4c9bffb4bbc2f8
SHA5128de255c97739a8dd777837d67c2b1278a0abafcc10f0d6903f26a5f5292a6c59a5721496f2ad600b16f27c21b6ed831184e7f4178be82f715a539b7c865b8a60
-
Filesize
432KB
MD5ac6507ca6a8ba28f68da0c0b8c7dfd34
SHA1b42fd346843f39233999c96300e25c422edc27f4
SHA256eefc36c51cef5ca67a417da8a96db4aacdefcf1c0234db3eb3dab8280c2e3965
SHA512582acfe9da93936ad8a546b917fd7af34904c28599bb96c4012e2780f1eac6cb3a07a294e4f0fbba7e0eaf9ccd24c23e8caf73e36caac1012dd18f0abbec2c5d
-
Filesize
432KB
MD5ac6507ca6a8ba28f68da0c0b8c7dfd34
SHA1b42fd346843f39233999c96300e25c422edc27f4
SHA256eefc36c51cef5ca67a417da8a96db4aacdefcf1c0234db3eb3dab8280c2e3965
SHA512582acfe9da93936ad8a546b917fd7af34904c28599bb96c4012e2780f1eac6cb3a07a294e4f0fbba7e0eaf9ccd24c23e8caf73e36caac1012dd18f0abbec2c5d
-
Filesize
174KB
MD5b173ce1d2b91fabc98573c127edbfcf1
SHA1cabf0b062524c04d06b2480fdcbc9d2630264cd1
SHA256e8cbceb2b828bea860a9d8c4b1383f3e381c3a6387c83fbb6fb760148eab2924
SHA5124751b877020dc69ee99b39fa3159d38dc985953ec88808ab6e214292a146eb9831fb518dacc79f36c422cc548b02f9b3bb560139d2487f47423a01fc2bb42831
-
Filesize
174KB
MD5b173ce1d2b91fabc98573c127edbfcf1
SHA1cabf0b062524c04d06b2480fdcbc9d2630264cd1
SHA256e8cbceb2b828bea860a9d8c4b1383f3e381c3a6387c83fbb6fb760148eab2924
SHA5124751b877020dc69ee99b39fa3159d38dc985953ec88808ab6e214292a146eb9831fb518dacc79f36c422cc548b02f9b3bb560139d2487f47423a01fc2bb42831
-
Filesize
276KB
MD5be1d827dcaf92e454c7f80b357c26068
SHA12ce4ab5fecac7dcb7adc8ef1c2037a44f1074f77
SHA256c9deaf12575bb5a3d5a91a2986f78aac9ff07e7bae6401530a3339d9221ebc9a
SHA51277f8b03a82ee45588824af5836417f825107e58e86abfcdc2c8e0f983ac1205893e80779e43f1bb14101ccc9f1bfc1e6a68084af644ba3ed933c50c10fc0daa0
-
Filesize
276KB
MD5be1d827dcaf92e454c7f80b357c26068
SHA12ce4ab5fecac7dcb7adc8ef1c2037a44f1074f77
SHA256c9deaf12575bb5a3d5a91a2986f78aac9ff07e7bae6401530a3339d9221ebc9a
SHA51277f8b03a82ee45588824af5836417f825107e58e86abfcdc2c8e0f983ac1205893e80779e43f1bb14101ccc9f1bfc1e6a68084af644ba3ed933c50c10fc0daa0
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
313KB
MD569b27fe3308bebb904ae9c80c0745ae3
SHA153ab89c8f91f8ece4916747db74b4d22ef6cef95
SHA2561993d56acb6625090a7cb3bf282e4a887a91bd90431df1bc88a873abf71e7c7b
SHA512e4f6d3a2dee21fd4f225df212a64d4fbdb027d3e4e1f00c6c0312dfb7dfa18309ba2b2cdf7f5f8f38bf15ee66374354cf5a26cf4896e3551d47339bf9174fb70
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7