Analysis

  • max time kernel
    55s
  • max time network
    53s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    06-11-2024 18:54

General

  • Target

    LockBit2.0.exe

  • Size

    959KB

  • MD5

    fec0ba68b3118f490dbee9dc5cc382d4

  • SHA1

    c5a76c237314d970fb5acfc118c1f1109d012704

  • SHA256

    19f7d53c4a9ba784fd4c64a06fc6a88caf5a4d9913341a625582d51b1c095ba0

  • SHA512

    4c202c11503607baa0fccc23223933eaf1ffe052607f46f3d596520ced90359d1bcf1369ce335d4b63de9c221cf137d6354ce88fead6e3164c54903c8e20f81c

  • SSDEEP

    24576:uLjr3s2nScu1i1tz3f++5kRzFxk7rMxNeR1R9qpdMF:Ujrc2So1Ff+B3k796W

Malware Config

Extracted

Path

C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\Restore-My-Files.txt

Ransom Note
LockBit 2.0 Ransomware Your data are stolen and encrypted The data will be published on TOR website http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion and https://bigblog.at if you do not pay the ransom You can contact us and decrypt one file for free on these TOR sites http://lockbitsup4yezcd5enk5unncx3zcy7kw6wllyqmiyhvanjj352jayid.onion http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion OR https://decoding.at Decryption ID: AE664DC084E03AFDBFB53ECB6BC57780
URLs

http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion

https://bigblog.at

http://lockbitsup4yezcd5enk5unncx3zcy7kw6wllyqmiyhvanjj352jayid.onion

http://lockbitsap2oaqhcun3syvbqt6n5nzt7fqosc6jdlmsfleu3ka4k2did.onion

https://decoding.at

Extracted

Path

C:\Users\Admin\Desktop\LockBit_Ransomware.hta

Ransom Note
<html><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><meta http-equiv="x-ua-compatible" content="ie=9" /><title>LockBit</title><hta:application id=LockBit applicationName=LockBit selection=no scroll=no contextmenu=no innerBorder=no windowState=maximize minimizeButton=no singleInstance=yes sysMenu=no /><meta name="viewport" content="width=device-width, initial-scale=1.0" /><style>html{font-size:100%}body{position:relative;border:0;font-family:Arial;padding:1% 0 0;margin:0;width:100vw;height:100vh;overflow:hidden}*{font-size:1rem}.g1{content:"";position:absolute;left:0;top:50%;transform:translateY(-50%);height:368px;width:150px;z-index:-1}.g2{z-index:-1;content:"";position:absolute;right:0;top:50%;transform:translateY(-50%);height:368px;width:150px}.container{width:90%;margin:auto}.container img{max-width:100%}.ht{margin-bottom:1%;position:relative;padding-left:16px;font-weight:900;font-size:1rem;line-height:100%;letter-spacing:.05em;text-transform:uppercase;color:#dedede}.hb{margin-bottom:1%}.hb img{width:850px;max-width:100%}.hi{margin-bottom:1rem;background:#fcfcfd;border:1px dashed #f71b3a;box-sizing:border-box;border-radius:4px;padding:1rem 3rem;width:100%}.hit{margin-bottom:1%;font-weight:700;font-size:.9rem;line-height:100%;color:#222}.hib{font-weight:700;font-size:.9rem;line-height:100%;color:#f71b3a}.main-p{font-weight:700;font-size:1rem;line-height:125%;color:#333160}.mn{position:absolute;width:5%;height:276px;top:3rem}.mn img{max-width:90%}.ml1{position:absolute;width:50%;height:10rem;left:0;top:0;background:#f3f3fc;border:1px solid #cfd3da;box-sizing:border-box;padding:2%}.ml2{position:absolute;width:50%;height:13rem;left:0;top:11rem;background:#f3f3fc;border:1px solid #cfd3da;box-sizing:border-box;padding:2%}.mr3{position:absolute;padding:2%;width:48%;height:24rem;left:52%;top:0;background:#ffdfdf;border:1px solid #ffa5aa;box-sizing:border-box;border-radius:4px;font-size:15px;line-height:130%}.mlb{font-size:.8rem;line-height:1.2;color:#8988a4;margin-top:2%;margin-bottom:2%}.mlb img{max-width:14px}.sp1{left:0;top:50%;position:absolute;display:block;width:6px;height:6px;background:#f71b3a;transform:translateY(-50%) rotate(135deg)}.mll{font-size:.9rem;line-height:1.2;color:#333160;margin-bottom:2%;position:relative;padding-left:20px}.mll a{font-size:.8rem}.mlt{margin-bottom:15px;font-weight:700;font-size:.9rem;line-height:1.2;color:#333160}.mlt img{max-width:14px;position:relative}.mrli{font-size:.9rem;line-height:1.2;margin-bottom:2%;position:relative;padding-left:25px;color:#222}.mrli a{font-size:.9rem}</style><script type="text/javascript">function o(c){var d=new ActiveXObject("WScript.Shell");d.run(c.href)};</script></head><body bgcolor="#F8F8F8" text="buttontext"><img class="g1" src="data:image/png;base64,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" /><img class="g2" src="data:image/png;base64,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" /><div class="container" style=""><div style="text-align:center;margin-bottom:15px"><img alt="" src="data:image/svg+xml;base64,<svg width="146" height="20" viewBox="0 0 146 20" fill="none" xmlns="http://www.w3.org/2000/svg">
<path fill-rule="evenodd" clip-rule="evenodd" d="M21.8395 19.5575C23.9416 19.0412 26 17.8178 26 14.5211C26 11.6456 25.1334 10.0641 23.9778 10.0641C25.1334 10.0641 26 8.33884 26 5.46338C26 3.88187 25.2778 0 18.7779 0H12.0494L8.72711 3.30677H12.5067L14.559 1.26397L14.6314 1.19201H14.7336H17.0446H19.2114C20.0394 1.19201 21.3493 1.41471 22.4609 2.07106C23.584 2.73426 24.5136 3.84895 24.5136 5.60713C24.5136 7.54073 23.8356 8.70665 22.7931 9.37231C22.3205 9.67412 21.7822 9.86666 21.2176 9.98638C21.7913 10.1706 22.3332 10.4363 22.8061 10.7828C23.8178 11.5237 24.5136 12.6358 24.5136 14.0897C24.5136 15.3531 24.1772 16.5047 23.3199 17.3386C22.7232 17.9191 21.8938 18.3264 20.7977 18.5204L21.8395 19.5575ZM12.1376 9.90042L10.5687 8.33884H17.823L16.2541 9.90042H12.1376ZM13.8909 11.6456L12.4667 10.228H16.3222H16.3905L16.4387 10.18L18.2884 8.33884H19.3557C21.5222 8.33884 22.389 7.04488 22.389 5.75092C22.389 4.31319 21.8112 3.30677 19.3557 3.30677H13.2049L14.8358 1.68339H17.0446H19.2114C19.9721 1.68339 21.19 1.89202 22.2089 2.49368C23.2164 3.08848 24.0199 4.05852 24.0199 5.60713C24.0199 7.41161 23.398 8.40229 22.5265 8.95872C21.6325 9.52959 20.4301 9.67463 19.2114 9.67463V10.166C20.3947 10.166 21.6053 10.5133 22.5135 11.1785C23.4158 11.8393 24.0199 12.8119 24.0199 14.0897C24.0199 15.2706 23.7064 16.2755 22.9748 16.9872C22.4084 17.5381 21.5673 17.9368 20.3644 18.0891L18.9464 16.6777H19.3557C21.2334 16.6777 22.389 15.2399 22.389 14.0898C22.389 12.9396 21.8112 11.6456 19.3557 11.6456H13.8909ZM5.51315 3.30677L3.88223 1.68339H6.21153H6.31372L6.38596 1.61143L8.00487 0H11.3511L8.02907 3.30677H5.51315ZM1.98061 3.49676L3.34824 4.85805V9.11607L0 12.4487V8.25537L1.9082 6.35595L1.98061 6.28399V6.18221V3.49676ZM3.38856 1.19201H6.10918L7.30682 0H3.34824H2.19108L3.38856 1.19201ZM0.000328933 0H0V0.000261021L0.000328933 0ZM0 1.52537L1.48694 3.00537V6.08044L0 7.56045V1.52537ZM15.2087 16.6636L18.5569 19.9961C18.3442 20.0022 18.0672 20.0002 17.8307 19.9963H15.3834L12.0352 16.6636H15.2087ZM0 13.1437V19.996V19.9963H10.352L8.99814 18.6486H1.73377H1.48694V18.4029V16.1026V16.0008L1.55918 15.9288L3.34824 14.1481V9.81098L0 13.1437ZM3.34824 14.843L1.98061 16.2043V18.1572H9.10033H9.20252L9.27493 18.2291L11.0502 19.9963H14.6852L11.337 16.6636H3.34824V14.843Z" fill="#F71B3A"/>
<path d="M146 2H85V18H146V2Z" fill="#F71B3A"/>
<path d="M35 3.60105H37.9167V13.7912H41.8372V16.2581H35V3.60105ZM50.5258 3.31641C52.5207 3.31641 54.1495 3.92989 55.4122 5.15709C56.7254 6.43474 57.3818 8.02873 57.3818 9.93906C57.3818 11.8239 56.7254 13.4054 55.4122 14.6831C54.1369 15.9228 52.5081 16.5427 50.5258 16.5427C48.5308 16.5427 46.8894 15.9228 45.6015 14.6831C44.9828 14.1011 44.4967 13.4054 44.1432 12.5957C43.8023 11.7735 43.6318 10.9006 43.6318 9.97702C43.6318 9.09139 43.8086 8.21849 44.1621 7.35831C44.5283 6.48541 45.0018 5.75807 45.5826 5.17606C46.82 3.93637 48.4677 3.31641 50.5258 3.31641ZM50.5069 6.01101C49.3831 6.01101 48.4614 6.37156 47.7417 7.09265C46.9967 7.81374 46.6243 8.7688 46.6243 9.95804C46.6243 11.0966 47.0094 12.0454 47.7796 12.8045C48.5119 13.5003 49.4147 13.8481 50.4879 13.8481C51.6369 13.8481 52.5713 13.4876 53.291 12.7665C54.0233 12.0581 54.3894 11.1156 54.3894 9.93906C54.3894 8.77527 54.0233 7.82647 53.291 7.09265C52.546 6.37156 51.618 6.01101 50.5069 6.01101ZM69.817 12.5008V15.8596C68.9206 16.315 67.9926 16.5427 67.0329 16.5427C64.9748 16.5427 63.3208 15.9293 62.0708 14.7021C60.7577 13.4244 60.1011 11.8239 60.1011 9.90111C60.1011 8.0035 60.7577 6.41576 62.0708 5.13811C63.3208 3.92364 64.8928 3.31641 66.7867 3.31641C67.721 3.31641 68.7312 3.55037 69.817 4.01852V7.39626C68.971 6.49814 67.9861 6.04896 66.8625 6.04896C65.827 6.04896 64.9685 6.37781 64.2867 7.03572C63.4912 7.80749 63.0935 8.78152 63.0935 9.95804C63.0935 11.1093 63.4596 12.0392 64.192 12.7475C64.899 13.4559 65.8081 13.8102 66.9193 13.8102C67.9672 13.8102 68.9331 13.3737 69.817 12.5008ZM76.2085 3.60105V8.8764L80.5267 3.60105H84.0874L78.9737 9.59749L84.4851 16.2581H80.7351L76.2085 10.6412V16.2581H73.2919V3.60105H76.2085Z" fill="#222222"/>
<path d="M87.1172 3.60156H90.9808C92.4454 3.60156 93.5187 3.92416 94.2006 4.56934C94.8066 5.15135 95.1097 5.94835 95.1097 6.96033C95.1097 7.59279 94.9708 8.1306 94.693 8.5733C94.4405 8.99077 94.0869 9.30064 93.6324 9.50313C94.3394 9.61698 94.9203 9.90163 95.3748 10.3571C95.9178 10.9011 96.1892 11.6537 96.1892 12.6152C96.1892 13.6651 95.861 14.5191 95.2044 15.177C94.4595 15.8981 93.3483 16.2586 91.871 16.2586H87.1172V3.60156ZM89.996 5.8787V8.74408H90.4695C91.1261 8.74408 91.6186 8.62398 91.9468 8.38354C92.2877 8.1431 92.4581 7.77005 92.4581 7.26395C92.4581 6.80852 92.2939 6.45423 91.9657 6.20129C91.6878 5.9863 91.1829 5.8787 90.4505 5.8787H89.996ZM89.996 10.9074V13.9815H90.6968C91.7701 13.9815 92.4898 13.8107 92.8559 13.4691C93.1337 13.2162 93.2725 12.8619 93.2725 12.4065C93.2725 11.9638 93.14 11.6222 92.8748 11.3818C92.5339 11.0654 91.8394 10.9074 90.7915 10.9074H89.996ZM99.5558 3.60156H102.472V16.2586H99.5558V3.60156ZM113.602 6.06845H110.856V16.2586H107.939V6.06845H105.193V3.60156H113.602V6.06845Z" fill="white"/>
<path d="M126.146 13.53V16H116.456L120.256 11.858C121.181 10.8193 121.871 9.958 122.327 9.274C122.834 8.46333 123.087 7.74767 123.087 7.127C123.087 6.595 122.922 6.177 122.593 5.873C122.327 5.63233 121.941 5.512 121.434 5.512C120.94 5.512 120.554 5.664 120.275 5.968C119.92 6.36067 119.743 6.88 119.743 7.526H116.817C116.931 6.20867 117.368 5.151 118.128 4.353C118.951 3.479 120.117 3.042 121.624 3.042C122.979 3.042 124.075 3.441 124.911 4.239C125.696 5.02433 126.089 6.03767 126.089 7.279C126.089 8.25433 125.772 9.18533 125.139 10.072C124.759 10.604 124.081 11.3323 123.106 12.257L121.776 13.53H126.146ZM127.849 15.81C127.519 15.468 127.355 15.0563 127.355 14.575C127.355 14.0937 127.519 13.6883 127.849 13.359C128.191 13.017 128.602 12.846 129.084 12.846C129.565 12.846 129.97 13.017 130.3 13.359C130.642 13.6883 130.813 14.0937 130.813 14.575C130.813 15.0563 130.642 15.468 130.3 15.81C129.97 16.1393 129.565 16.304 129.084 16.304C128.602 16.304 128.191 16.1393 127.849 15.81ZM141.687 9.673C141.687 12.0037 141.079 13.7707 139.863 14.974C138.963 15.848 137.83 16.285 136.462 16.285C135.119 16.285 133.998 15.848 133.099 14.974C131.883 13.7707 131.275 12.0037 131.275 9.673C131.275 7.30433 131.883 5.531 133.099 4.353C133.998 3.479 135.119 3.042 136.462 3.042C137.83 3.042 138.963 3.479 139.863 4.353C141.079 5.531 141.687 7.30433 141.687 9.673ZM137.659 6.025C137.329 5.70833 136.937 5.55 136.481 5.55C136.025 5.55 135.632 5.70833 135.303 6.025C134.593 6.72167 134.239 7.93133 134.239 9.654C134.239 11.3893 134.593 12.6053 135.303 13.302C135.632 13.6187 136.025 13.777 136.481 13.777C136.937 13.777 137.329 13.6187 137.659 13.302C138.368 12.6053 138.723 11.3893 138.723 9.654C138.723 7.93133 138.368 6.72167 137.659 6.025Z" fill="white"/>
</svg>
" /></div><div class="hb" style="text-align:center"><img alt="" src="data:image/svg+xml;base64,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
URLs

http-equiv="Content-Type"

http-equiv="x-ua-compatible"

https://decoding.at

Signatures

  • Lockbit

    Ransomware family with multiple variants released since late 2019.

  • Lockbit family
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 6 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 18 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Interacts with shadow copies 3 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies Control Panel 2 IoCs
  • Modifies registry class 15 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 47 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\LockBit2.0.exe
    "C:\Users\Admin\AppData\Local\Temp\LockBit2.0.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Sets desktop wallpaper using registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3788
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2144
      • C:\Windows\system32\vssadmin.exe
        vssadmin delete shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:544
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic shadowcopy delete
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2656
      • C:\Windows\system32\bcdedit.exe
        bcdedit /set {default} bootstatuspolicy ignoreallfailures
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:1644
      • C:\Windows\system32\bcdedit.exe
        bcdedit /set {default} recoveryenabled no
        3⤵
        • Modifies boot configuration data using bcdedit
        PID:1568
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\LockBit_Ransomware.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1940
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 1796
        3⤵
        • Program crash
        PID:2476
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 "C:\Users\Admin\AppData\Local\Temp\LockBit2.0.exe" & Del /f /q "C:\Users\Admin\AppData\Local\Temp\LockBit2.0.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Suspicious use of WriteProcessMemory
      PID:2080
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.7 -n 3
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:4536
      • C:\Windows\SysWOW64\fsutil.exe
        fsutil file setZeroData offset=0 length=524288 "C:\Users\Admin\AppData\Local\Temp\LockBit2.0.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4940
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:772
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
    1⤵
      PID:3572
    • C:\Windows\system32\printfilterpipelinesvc.exe
      C:\Windows\system32\printfilterpipelinesvc.exe -Embedding
      1⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:3300
      • C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE
        /insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{5CB3FE24-E201-45EC-BF90-EB4F5AB19E76}.xps" 133753928995940000
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3352
        • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeC2RClient.exe
          OfficeC2RClient.exe /error PID=3352 ProcessName="Microsoft OneNote" UIType=3 ErrorSource=0x8b10082a ErrorCode=0x80004005 ShowUI=1
          3⤵
          • Process spawned unexpected child process
          • Suspicious use of SetWindowsHookEx
          PID:4276
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1940 -ip 1940
      1⤵
        PID:1580

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\Restore-My-Files.txt

        Filesize

        512B

        MD5

        1200f375096f32a380151661e3a2d862

        SHA1

        d1b2ae542f83dab9bc67f22556c52d3f775ccea2

        SHA256

        09ea15626fb5502ee7e0d72dad47f17f79709ab04bccd02c7ff5f37df82f5fb9

        SHA512

        690acaaf5038ad419cbf41551e9900dd703fb38d7fddf715497f3d575c6cd29075257c8a4d514f77d7ec145c70b5e29d4a33f59ba4e8f49d85371128371f0f8f

      • C:\Users\Admin\Desktop\LockBit_Ransomware.hta

        Filesize

        46KB

        MD5

        c15c6adc8c923ad87981f289025c37b2

        SHA1

        bfe6533f4afe3255046f7178f289a4c75ad89e76

        SHA256

        90f3a33919fdd766e90fd96f8f20a92c2d1376b7cfdc8b738c2f8e7e6c7498b1

        SHA512

        31dd03b208e00ac012fbe4189d5af1306cc8e3640d40efefab4aa1cabab3c4735eef0cb65e7750c3c77021934e145398e5e26389975cf36b193c8f622a5fde83