Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
11/02/2025, 16:44
Behavioral task
behavioral1
Sample
41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe
Resource
win10v2004-20250207-en
General
-
Target
41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe
-
Size
1.7MB
-
MD5
15d05dfa5cff0cfc86e5135155744385
-
SHA1
3eb904370ebf0bd3d4665a0f4ea80f8cc8e89dc9
-
SHA256
41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff
-
SHA512
a1990e12b1397d12d718717e46a6ffc3721a44058f499b86b11b2d163b03afd2f8d7c816633abbd6a90773369b3ecb2b3f391ceed341d39bedfea5f4c1b99efd
-
SSDEEP
24576:uGA0AhSVzjJqVR/xmx0AsQ5r2jOGJTS8KmlI+u+68+DrAmz:xAhuzc3DXJTS8KmVzeD5
Malware Config
Signatures
-
Detects Trigona ransomware 13 IoCs
resource yara_rule behavioral2/memory/3876-1-0x0000000000400000-0x00000000005CF000-memory.dmp family_trigona behavioral2/memory/3876-2-0x0000000000400000-0x00000000005CF000-memory.dmp family_trigona behavioral2/memory/3876-3-0x0000000000400000-0x00000000005CF000-memory.dmp family_trigona behavioral2/memory/3876-5-0x0000000000400000-0x00000000005CF000-memory.dmp family_trigona behavioral2/memory/3876-10-0x0000000000400000-0x00000000005CF000-memory.dmp family_trigona behavioral2/memory/3876-4579-0x0000000000400000-0x00000000005CF000-memory.dmp family_trigona behavioral2/memory/3876-4604-0x0000000000400000-0x00000000005CF000-memory.dmp family_trigona behavioral2/memory/3876-5224-0x0000000000400000-0x00000000005CF000-memory.dmp family_trigona behavioral2/memory/3876-7808-0x0000000000400000-0x00000000005CF000-memory.dmp family_trigona behavioral2/memory/3876-14493-0x0000000000400000-0x00000000005CF000-memory.dmp family_trigona behavioral2/memory/3876-21358-0x0000000000400000-0x00000000005CF000-memory.dmp family_trigona behavioral2/memory/3876-24443-0x0000000000400000-0x00000000005CF000-memory.dmp family_trigona behavioral2/memory/3876-24444-0x0000000000400000-0x00000000005CF000-memory.dmp family_trigona -
Trigona
A ransomware first seen at the beginning of the 2022.
-
Trigona family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 26 1580 Process not Found -
Drops startup file 1 IoCs
description ioc Process File created \??\c:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\how_to_decrypt.hta 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1639772215-809007892-4072230623-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4BD7BC4D1C9B441E250C428F7B301A70 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe" 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe -
Drops desktop.ini file(s) 4 IoCs
description ioc Process File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1639772215-809007892-4072230623-1000\desktop.ini 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\$Recycle.Bin\S-1-5-21-1639772215-809007892-4072230623-1000\desktop.ini 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\desktop.ini 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created \??\c:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Microsoft.Advertising\how_to_decrypt.hta 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File created \??\c:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\fr-FR\how_to_decrypt.hta 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\de\System.Windows.Forms.Primitives.resources.dll 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogoSmall.contrast-white_scale-100.png 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File created \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\root\how_to_decrypt.hta 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File created \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\ca-es\how_to_decrypt.hta 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\VideoLAN\VLC\locale\sk\LC_MESSAGES\vlc.mo 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File created \??\c:\Program Files\VideoLAN\VLC\locale\ach\LC_MESSAGES\how_to_decrypt.hta 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File created \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\nl-nl\how_to_decrypt.hta 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File created \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\css\how_to_decrypt.hta 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Reflection.dll 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\ta.pak 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019XC2RVL_KMS_ClientC2R-ul.xrm-ms 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\MSIPC\sr-Latn-RS\msipc.dll.mui 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File created \??\c:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\contrast-black\how_to_decrypt.hta 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-file-l2-1-0.dll 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.WebProxy.dll 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\mr.pak 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_Grace-ul-oob.xrm-ms 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\rsod\powerpointmui.msi.16.en-us.tree.dat 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\VideoLAN\VLC\plugins\video_filter\libmotionblur_plugin.dll 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File created \??\c:\Program Files\VideoLAN\VLC\locale\sv\how_to_decrypt.hta 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File created \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\fr-fr\how_to_decrypt.hta 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Client\api-ms-win-crt-string-l1-1-0.dll 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\Fonts\private\NIRMALAB.TTF 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\OFFICE16\api-ms-win-core-timezone-l1-1-0.dll 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\PhotosMedTile.contrast-black_scale-100.png 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_neutral_~_8wekyb3d8bbwe\AppxBlockMap.xml 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\en\DatabaseCompare.HxS 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File created \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\hr-hr\how_to_decrypt.hta 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File created \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\zh-tw\how_to_decrypt.hta 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\7-Zip\Lang\ba.txt 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\de\System.Windows.Input.Manipulations.resources.dll 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Google\Chrome\Application\123.0.6312.123\123.0.6312.122.manifest 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\legal\jdk\cryptix.md 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\PSRCHSRN.DAT 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\VideoLAN\VLC\plugins\audio_filter\libsimple_channel_mixer_plugin.dll 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Common Files\System\ado\msado28.tlb 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hant\System.Windows.Forms.Primitives.resources.dll 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\1033\BHOINTL.DLL 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL065.XML 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File created \??\c:\Program Files\WindowsApps\Microsoft.ZuneMusic_2019.19071.19011.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\how_to_decrypt.hta 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Google\Chrome\Application\123.0.6312.123\libGLESv2.dll 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\HomeStudentDemoR_BypassTrial180-ul-oob.xrm-ms 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Resources\1033\msmdsrvi_xl.rll 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File created \??\c:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\nb-no\how_to_decrypt.hta 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File created \??\c:\Program Files (x86)\Common Files\Microsoft Shared\ink\es-ES\how_to_decrypt.hta 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\es\PresentationUI.resources.dll 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Java\jdk-1.8\jre\lib\jfr.jar 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Java\jre-1.8\lib\deploy\splash_11-lic.gif 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\client-issuance-root.xrm-ms 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\rsod\onenotemui.msi.16.en-us.tree.dat 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\VideoLAN\VLC\locale\th\LC_MESSAGES\vlc.mo 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-file-l2-1-0.dll 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Licenses16\OneNoteR_Retail-ppd.xrm-ms 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\1033\ODBCMESSAGES.XML 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DWTRIG20.EXE 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Help\Keywords.HxK 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\210x173\28.jpg 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-20.png 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File opened for modification \??\c:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CANYON\CANYON.ELM 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File created \??\c:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_split.scale-125_8wekyb3d8bbwe\how_to_decrypt.hta 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe File created \??\c:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\TCUI-Toolkit\how_to_decrypt.hta 41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3360 MicrosoftEdgeUpdate.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe"C:\Users\Admin\AppData\Local\Temp\41c9080f9c90e00a431b2fb04b461584abe68576996379a97469a71be42fc6ff.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
PID:3876
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIzIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY4ODkiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTM2NTgwOTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI0OTM5NDk4MjQzIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3360
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD512af4fcc20e48819dc62f5a1e0251e35
SHA1b702c055c815f164ca4fbf8f2bee372734345e04
SHA2560d7eea7cce0910aee3f6040d4ba336dcc79ba8aa4a9a9bac9496a61c0b5b5166
SHA512ddbf5588d3889361f139f9095f940656c20b2520e39fcf261b9f8af7ab67d79211c24c0d5f4caa27bc2e56c5392c3ddbad85fed3b62db519139b6138771a8dfe
-
Filesize
12KB
MD5a65037c3dd288d22b898be8fb034f8a2
SHA13897fb33d1a2aeb5c8a7966ccc397859b3a35986
SHA25643a25dcc657dba75b9f48f59800caa14f9ded3850e10485d971e88f5150ec1d9
SHA512c2e572ee67b060c5b85e07868202facb9b53c49eb47180c8329ceeea6d53761e53ac3a20a2f052599f747eb2ba628aa688cc422e4fbb841216aef7629be8e16d