Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
03/08/2023, 18:24
Static task
static1
General
-
Target
ba3f3254bb5f9999d36ef18c226a8897db48b282d38369dc110d0cab5eb06b22.exe
-
Size
560KB
-
MD5
5513f3d8cbb6e64ccf49bfdceeb3d961
-
SHA1
78d873c98aaca4ab4114d8a531f6881d531e5524
-
SHA256
ba3f3254bb5f9999d36ef18c226a8897db48b282d38369dc110d0cab5eb06b22
-
SHA512
b276cb3a1775a4e8de37dbbbe78148d0da25f03cb1ecdf2fa8ab5b90db7da40d25ab005a630274d61ca9e333916d6f371fcc117b1014881546ecff98cf0c1b95
-
SSDEEP
12288:RMrcy90P/w4BQBf5mNEIeISpiCx6BiazG3TQI1fB:VyQ/EvqKdpngB7GM6fB
Malware Config
Extracted
amadey
3.87
193.233.255.9/nasa/index.php
Extracted
redline
maxik
77.91.124.156:19071
-
auth_value
a7714e1bc167c67e3fc8f9e368352269
Signatures
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/files/0x000700000001afdc-140.dat healer behavioral1/files/0x000700000001afdc-139.dat healer behavioral1/memory/3944-141-0x0000000000F20000-0x0000000000F2A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" p4017539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" p4017539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" p4017539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" p4017539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" p4017539.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
pid Process 3864 z6680056.exe 4288 z7298727.exe 3944 p4017539.exe 5064 r0969493.exe 4156 legosa.exe 4104 s3291697.exe 372 bilkad.exe 1140 legosa.exe -
Loads dropped DLL 1 IoCs
pid Process 1152 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000800000001afa6-169.dat upx behavioral1/files/0x000800000001afa6-173.dat upx behavioral1/files/0x000800000001afa6-174.dat upx behavioral1/memory/372-175-0x0000000000F50000-0x0000000001DAE000-memory.dmp upx behavioral1/memory/372-176-0x0000000000F50000-0x0000000001DAE000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" p4017539.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ba3f3254bb5f9999d36ef18c226a8897db48b282d38369dc110d0cab5eb06b22.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6680056.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z7298727.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4456 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3944 p4017539.exe 3944 p4017539.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3944 p4017539.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 3112 wrote to memory of 3864 3112 ba3f3254bb5f9999d36ef18c226a8897db48b282d38369dc110d0cab5eb06b22.exe 70 PID 3112 wrote to memory of 3864 3112 ba3f3254bb5f9999d36ef18c226a8897db48b282d38369dc110d0cab5eb06b22.exe 70 PID 3112 wrote to memory of 3864 3112 ba3f3254bb5f9999d36ef18c226a8897db48b282d38369dc110d0cab5eb06b22.exe 70 PID 3864 wrote to memory of 4288 3864 z6680056.exe 71 PID 3864 wrote to memory of 4288 3864 z6680056.exe 71 PID 3864 wrote to memory of 4288 3864 z6680056.exe 71 PID 4288 wrote to memory of 3944 4288 z7298727.exe 72 PID 4288 wrote to memory of 3944 4288 z7298727.exe 72 PID 4288 wrote to memory of 5064 4288 z7298727.exe 73 PID 4288 wrote to memory of 5064 4288 z7298727.exe 73 PID 4288 wrote to memory of 5064 4288 z7298727.exe 73 PID 5064 wrote to memory of 4156 5064 r0969493.exe 74 PID 5064 wrote to memory of 4156 5064 r0969493.exe 74 PID 5064 wrote to memory of 4156 5064 r0969493.exe 74 PID 3864 wrote to memory of 4104 3864 z6680056.exe 75 PID 3864 wrote to memory of 4104 3864 z6680056.exe 75 PID 3864 wrote to memory of 4104 3864 z6680056.exe 75 PID 4156 wrote to memory of 4456 4156 legosa.exe 76 PID 4156 wrote to memory of 4456 4156 legosa.exe 76 PID 4156 wrote to memory of 4456 4156 legosa.exe 76 PID 4156 wrote to memory of 3716 4156 legosa.exe 77 PID 4156 wrote to memory of 3716 4156 legosa.exe 77 PID 4156 wrote to memory of 3716 4156 legosa.exe 77 PID 3716 wrote to memory of 5056 3716 cmd.exe 80 PID 3716 wrote to memory of 5056 3716 cmd.exe 80 PID 3716 wrote to memory of 5056 3716 cmd.exe 80 PID 3716 wrote to memory of 2340 3716 cmd.exe 81 PID 3716 wrote to memory of 2340 3716 cmd.exe 81 PID 3716 wrote to memory of 2340 3716 cmd.exe 81 PID 3716 wrote to memory of 3420 3716 cmd.exe 82 PID 3716 wrote to memory of 3420 3716 cmd.exe 82 PID 3716 wrote to memory of 3420 3716 cmd.exe 82 PID 3716 wrote to memory of 2260 3716 cmd.exe 83 PID 3716 wrote to memory of 2260 3716 cmd.exe 83 PID 3716 wrote to memory of 2260 3716 cmd.exe 83 PID 3716 wrote to memory of 2212 3716 cmd.exe 84 PID 3716 wrote to memory of 2212 3716 cmd.exe 84 PID 3716 wrote to memory of 2212 3716 cmd.exe 84 PID 3716 wrote to memory of 3028 3716 cmd.exe 85 PID 3716 wrote to memory of 3028 3716 cmd.exe 85 PID 3716 wrote to memory of 3028 3716 cmd.exe 85 PID 4156 wrote to memory of 372 4156 legosa.exe 86 PID 4156 wrote to memory of 372 4156 legosa.exe 86 PID 372 wrote to memory of 3544 372 bilkad.exe 87 PID 372 wrote to memory of 3544 372 bilkad.exe 87 PID 3544 wrote to memory of 2936 3544 cmd.exe 89 PID 3544 wrote to memory of 2936 3544 cmd.exe 89 PID 4156 wrote to memory of 1152 4156 legosa.exe 90 PID 4156 wrote to memory of 1152 4156 legosa.exe 90 PID 4156 wrote to memory of 1152 4156 legosa.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba3f3254bb5f9999d36ef18c226a8897db48b282d38369dc110d0cab5eb06b22.exe"C:\Users\Admin\AppData\Local\Temp\ba3f3254bb5f9999d36ef18c226a8897db48b282d38369dc110d0cab5eb06b22.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6680056.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6680056.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7298727.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7298727.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p4017539.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p4017539.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r0969493.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r0969493.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe"C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legosa.exe /TR "C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe" /F6⤵
- Creates scheduled task(s)
PID:4456
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legosa.exe" /P "Admin:N"&&CACLS "legosa.exe" /P "Admin:R" /E&&echo Y|CACLS "..\ebb444342c" /P "Admin:N"&&CACLS "..\ebb444342c" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:5056
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legosa.exe" /P "Admin:N"7⤵PID:2340
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legosa.exe" /P "Admin:R" /E7⤵PID:3420
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:2260
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\ebb444342c" /P "Admin:N"7⤵PID:2212
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\ebb444342c" /P "Admin:R" /E7⤵PID:3028
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000012001\bilkad.exe"C:\Users\Admin\AppData\Local\Temp\1000012001\bilkad.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\1000012001\bilkad.exe7⤵
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 08⤵PID:2936
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main6⤵
- Loads dropped DLL
PID:1152
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s3291697.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s3291697.exe3⤵
- Executes dropped EXE
PID:4104
-
-
-
C:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exeC:\Users\Admin\AppData\Local\Temp\ebb444342c\legosa.exe1⤵
- Executes dropped EXE
PID:1140
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5c4fe973e479a2af02dce5b9888e97917
SHA14b83acbe8f078f08a2ff190ef5391d50484fa7e7
SHA2565c6e675359884a3f82edd6c3085ecc8a28b465b88e313e05915cb194aa17a0b1
SHA512b7167c54a1f186c1ea60e46035b1609c3f91dccf64c59ec8bc1a6d234ac9e10812f57b15bab99abb01a63954838797cf0a19e7f13936b6bd97b73ea793b3beee
-
Filesize
4.3MB
MD5c4fe973e479a2af02dce5b9888e97917
SHA14b83acbe8f078f08a2ff190ef5391d50484fa7e7
SHA2565c6e675359884a3f82edd6c3085ecc8a28b465b88e313e05915cb194aa17a0b1
SHA512b7167c54a1f186c1ea60e46035b1609c3f91dccf64c59ec8bc1a6d234ac9e10812f57b15bab99abb01a63954838797cf0a19e7f13936b6bd97b73ea793b3beee
-
Filesize
4.3MB
MD5c4fe973e479a2af02dce5b9888e97917
SHA14b83acbe8f078f08a2ff190ef5391d50484fa7e7
SHA2565c6e675359884a3f82edd6c3085ecc8a28b465b88e313e05915cb194aa17a0b1
SHA512b7167c54a1f186c1ea60e46035b1609c3f91dccf64c59ec8bc1a6d234ac9e10812f57b15bab99abb01a63954838797cf0a19e7f13936b6bd97b73ea793b3beee
-
Filesize
432KB
MD5dcd94e15a8c4382243193b424d00d110
SHA14f2dde917403706cae3eec1a58b0b1fd22561202
SHA25662b879db78a79463db14b08f6c5dbe1d1fcc3394d1aa3d606ee1b033e02e54de
SHA512f6ac5e1d2756326b2d2f2368e5d601025f742aed347ca0a17c5403ac2dc6d2247ec8f036a214f361e6dd9df9b2a47765a5ff4d415eb56bc7ac406bdb51251332
-
Filesize
432KB
MD5dcd94e15a8c4382243193b424d00d110
SHA14f2dde917403706cae3eec1a58b0b1fd22561202
SHA25662b879db78a79463db14b08f6c5dbe1d1fcc3394d1aa3d606ee1b033e02e54de
SHA512f6ac5e1d2756326b2d2f2368e5d601025f742aed347ca0a17c5403ac2dc6d2247ec8f036a214f361e6dd9df9b2a47765a5ff4d415eb56bc7ac406bdb51251332
-
Filesize
176KB
MD527a8c491b0bd9ab9259de7ceec947358
SHA1439e4d10f99fc3ecd2ef2fbd152db0b8b833bb10
SHA25687f4980cb9ed50d4968b8ecffcb1b8ed406ee5be11d2cb98ebd2ae81d0aef451
SHA512ce5846bb59f664d361559104d39bc2a98d1be88665cb87449ef980b481f73190fdd0f988b4fda00e79b58ce8949edb00316289ebd159392715b1d12ca68e75ff
-
Filesize
176KB
MD527a8c491b0bd9ab9259de7ceec947358
SHA1439e4d10f99fc3ecd2ef2fbd152db0b8b833bb10
SHA25687f4980cb9ed50d4968b8ecffcb1b8ed406ee5be11d2cb98ebd2ae81d0aef451
SHA512ce5846bb59f664d361559104d39bc2a98d1be88665cb87449ef980b481f73190fdd0f988b4fda00e79b58ce8949edb00316289ebd159392715b1d12ca68e75ff
-
Filesize
277KB
MD5cdb500d55c4d08e23179e2d61ef554f4
SHA1adf4990d24fc8a2fe6c0d2abea3ed0afa20cc7a2
SHA2567e2c317a6c2fd9dab87e087262f4ec0abba0d4dce86c8d31b4f5053aa1334473
SHA512d77287f841df302646d54d65e3ffc474ab81f4630d09b6844f48ab7feb27a806f152f6d73571298fd34253b5c416125827cabee8cfd15088b0e0d3a70a463f62
-
Filesize
277KB
MD5cdb500d55c4d08e23179e2d61ef554f4
SHA1adf4990d24fc8a2fe6c0d2abea3ed0afa20cc7a2
SHA2567e2c317a6c2fd9dab87e087262f4ec0abba0d4dce86c8d31b4f5053aa1334473
SHA512d77287f841df302646d54d65e3ffc474ab81f4630d09b6844f48ab7feb27a806f152f6d73571298fd34253b5c416125827cabee8cfd15088b0e0d3a70a463f62
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
313KB
MD52c1528a6992ce0ac3a41d0da5cf846ba
SHA1c315a74e85861b7abd2b9f213982f536a018a63d
SHA256b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742
SHA512f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341
-
Filesize
313KB
MD52c1528a6992ce0ac3a41d0da5cf846ba
SHA1c315a74e85861b7abd2b9f213982f536a018a63d
SHA256b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742
SHA512f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341
-
Filesize
313KB
MD52c1528a6992ce0ac3a41d0da5cf846ba
SHA1c315a74e85861b7abd2b9f213982f536a018a63d
SHA256b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742
SHA512f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341
-
Filesize
313KB
MD52c1528a6992ce0ac3a41d0da5cf846ba
SHA1c315a74e85861b7abd2b9f213982f536a018a63d
SHA256b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742
SHA512f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341
-
Filesize
313KB
MD52c1528a6992ce0ac3a41d0da5cf846ba
SHA1c315a74e85861b7abd2b9f213982f536a018a63d
SHA256b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742
SHA512f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341
-
Filesize
313KB
MD52c1528a6992ce0ac3a41d0da5cf846ba
SHA1c315a74e85861b7abd2b9f213982f536a018a63d
SHA256b269720acebdba99f8294306dfe575089c8e915af45556e49f82a9d7f1460742
SHA512f6675f6260e335f7e8001808070e446cefa84460ef3b9d6dd6b9dbee5db6276af510944823a9de3ea23f9c879340772625b10e0fcfd6b6d9ba1c288dc0fa1341
-
Filesize
89KB
MD543762ddccb9db44ea9914e448ba3e43e
SHA187e5766061740cf4a570133af6108399a11dbd1b
SHA256459b0a16d82e7150ad3fa2cbc740a2b6a33606894669f5febe5d15c20b4cc0ef
SHA512ea0ef8d32c3776baf2e1bd2456797d64ff8214810af41b3a59ee649ecd67e1fffeebe2f4b21c4e2671909a2d1ab8071d8eac261c4233662a686a575c1145d651
-
Filesize
89KB
MD543762ddccb9db44ea9914e448ba3e43e
SHA187e5766061740cf4a570133af6108399a11dbd1b
SHA256459b0a16d82e7150ad3fa2cbc740a2b6a33606894669f5febe5d15c20b4cc0ef
SHA512ea0ef8d32c3776baf2e1bd2456797d64ff8214810af41b3a59ee649ecd67e1fffeebe2f4b21c4e2671909a2d1ab8071d8eac261c4233662a686a575c1145d651
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD543762ddccb9db44ea9914e448ba3e43e
SHA187e5766061740cf4a570133af6108399a11dbd1b
SHA256459b0a16d82e7150ad3fa2cbc740a2b6a33606894669f5febe5d15c20b4cc0ef
SHA512ea0ef8d32c3776baf2e1bd2456797d64ff8214810af41b3a59ee649ecd67e1fffeebe2f4b21c4e2671909a2d1ab8071d8eac261c4233662a686a575c1145d651