Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 07:01
Static task
static1
Behavioral task
behavioral1
Sample
eda27b862bf988a2336e85d90b80b9e5f6550341b8eca61e0b971bf7cbaf20ba.exe
Resource
win7-20220901-en
General
-
Target
eda27b862bf988a2336e85d90b80b9e5f6550341b8eca61e0b971bf7cbaf20ba.exe
-
Size
898KB
-
MD5
40fa9a44c3d4a3894bcfaeb6e68ad812
-
SHA1
ccec185a58245811bf7c7a2def94b5f37bc71ef9
-
SHA256
eda27b862bf988a2336e85d90b80b9e5f6550341b8eca61e0b971bf7cbaf20ba
-
SHA512
02a9b5ca6175ad6c0c97274e185bde8f9cf1be257baf8dab5fbc4e81c9d5f8b48522d4b38177fc25be22d0bb7df1f136e0108b50f31eef65685b76e9d2a2dd02
-
SSDEEP
12288:28plQhHVWj7aBX+TLBhAuwf48ZujbT1lq8ENSKrPi81gPYwrkt+YrxWmRpfkyq:Rq2XXTLBuuKUT1VKra81Mrrkt+0x1pW
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/files/0x0004000000022e27-133.dat family_gh0strat behavioral2/files/0x0004000000022e27-134.dat family_gh0strat -
Executes dropped EXE 2 IoCs
pid Process 444 ·þÎñ¶Ë.exe 952 ×Ô¶¯ÊÕ»õV4.2.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation eda27b862bf988a2336e85d90b80b9e5f6550341b8eca61e0b971bf7cbaf20ba.exe -
Loads dropped DLL 4 IoCs
pid Process 952 ×Ô¶¯ÊÕ»õV4.2.exe 952 ×Ô¶¯ÊÕ»õV4.2.exe 952 ×Ô¶¯ÊÕ»õV4.2.exe 952 ×Ô¶¯ÊÕ»õV4.2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 62 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMVBSRoutine ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\ProgID\ = "QMDispatch.QMRoutine" ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\InprocHandler32 ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0E59F1D5-1FBE-11D0-8FF2-00A0D10038BC} ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMLibrary\ = "QMDispatch.QMLibrary" ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMLibrary\CLSID\ = "{EBEB87A6-E151-4054-AB45-A6E094C5334B}" ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\qmacro\\qdisp.dll" ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\InProcServer32\ThreadingModel = "Apartment" ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\ProgID\ = "QMDispatch.QMVBSRoutine" ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\InProcServer32 ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049} ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\LocalServer32\ = "C:\\V42~1.EXE" ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A5-E151-4054-AB45-A6E094C5334B}\InprocHandler32 ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A5-E151-4054-AB45-A6E094C5334B}\LocalServer32 ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\qmacro\\qdisp.dll" ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\InProcServer32\ThreadingModel = "Apartment" ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B} ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\LocalServer32 ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A5-E151-4054-AB45-A6E094C5334B} ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMLibrary.Inner\CLSID ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B} ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMLibrary.Inner\CLSID\ = "{EBEB87A5-E151-4054-AB45-A6E094C5334B}" ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine\CLSID\ = "{C07DB6A3-34FC-4084-BE2E-76BB9203B049}" ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMLibrary\CLSID ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\InProcServer32\ThreadingModel = "Apartment" ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMFunction\CLSID\ = "{EBEB87A4-E151-4054-AB45-A6E094C5334B}" ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMLibrary.Inner\ = "QMDispatch.QMLibrary.Inner" ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A5-E151-4054-AB45-A6E094C5334B}\LocalServer32\ = "C:\\V42~1.EXE" ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\qmacro\\qdisp.dll" ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\ProgID\ = "QMDispatch.QMLibrary" ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\ProgID ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\ProgID\ = "QMDispatch.QMFunction" ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine\CLSID ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\InprocServer32 ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMFunction ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMVBSRoutine\ = "QMDispatch.QMVBSRoutine" ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\ProgID ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\InProcServer32 ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMLibrary ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\InprocServer32 ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\InprocHandler32\ = "ole32.dll" ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A5-E151-4054-AB45-A6E094C5334B}\ProgID\ = "QMDispatch.QMLibrary.Inner" ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\ = "QMDispatch.QMRoutine" ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\InProcServer32 ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A5-E151-4054-AB45-A6E094C5334B}\ = "QMDispatch.QMLibrary.Inner" ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMVBSRoutine\CLSID ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine\ = "QMDispatch.QMRoutine" ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\ProgID ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\InprocServer32 ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMFunction\ = "QMDispatch.QMFunction" ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMLibrary.Inner ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A5-E151-4054-AB45-A6E094C5334B}\InprocHandler32\ = "ole32.dll" ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A4-E151-4054-AB45-A6E094C5334B}\ = "QMDispatch.QMFunction" ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMFunction\CLSID ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0} ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{241D7F03-9232-4024-8373-149860BE27C0}\ = "QMDispatch.QMVBSRoutine" ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMVBSRoutine\CLSID\ = "{241D7F03-9232-4024-8373-149860BE27C0}" ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\QMDispatch.QMRoutine ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C07DB6A3-34FC-4084-BE2E-76BB9203B049}\ProgID ×Ô¶¯ÊÕ»õV4.2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A6-E151-4054-AB45-A6E094C5334B}\ = "QMDispatch.QMLibrary" ×Ô¶¯ÊÕ»õV4.2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EBEB87A5-E151-4054-AB45-A6E094C5334B}\ProgID ×Ô¶¯ÊÕ»õV4.2.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 952 ×Ô¶¯ÊÕ»õV4.2.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 952 ×Ô¶¯ÊÕ»õV4.2.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 952 ×Ô¶¯ÊÕ»õV4.2.exe 952 ×Ô¶¯ÊÕ»õV4.2.exe 952 ×Ô¶¯ÊÕ»õV4.2.exe 952 ×Ô¶¯ÊÕ»õV4.2.exe 952 ×Ô¶¯ÊÕ»õV4.2.exe 952 ×Ô¶¯ÊÕ»õV4.2.exe 952 ×Ô¶¯ÊÕ»õV4.2.exe 952 ×Ô¶¯ÊÕ»õV4.2.exe 952 ×Ô¶¯ÊÕ»õV4.2.exe 952 ×Ô¶¯ÊÕ»õV4.2.exe 952 ×Ô¶¯ÊÕ»õV4.2.exe 952 ×Ô¶¯ÊÕ»õV4.2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3868 wrote to memory of 444 3868 eda27b862bf988a2336e85d90b80b9e5f6550341b8eca61e0b971bf7cbaf20ba.exe 81 PID 3868 wrote to memory of 444 3868 eda27b862bf988a2336e85d90b80b9e5f6550341b8eca61e0b971bf7cbaf20ba.exe 81 PID 3868 wrote to memory of 444 3868 eda27b862bf988a2336e85d90b80b9e5f6550341b8eca61e0b971bf7cbaf20ba.exe 81 PID 3868 wrote to memory of 952 3868 eda27b862bf988a2336e85d90b80b9e5f6550341b8eca61e0b971bf7cbaf20ba.exe 82 PID 3868 wrote to memory of 952 3868 eda27b862bf988a2336e85d90b80b9e5f6550341b8eca61e0b971bf7cbaf20ba.exe 82 PID 3868 wrote to memory of 952 3868 eda27b862bf988a2336e85d90b80b9e5f6550341b8eca61e0b971bf7cbaf20ba.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\eda27b862bf988a2336e85d90b80b9e5f6550341b8eca61e0b971bf7cbaf20ba.exe"C:\Users\Admin\AppData\Local\Temp\eda27b862bf988a2336e85d90b80b9e5f6550341b8eca61e0b971bf7cbaf20ba.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\·þÎñ¶Ë.exe"C:\·þÎñ¶Ë.exe"2⤵
- Executes dropped EXE
PID:444
-
-
C:\×Ô¶¯ÊÕ»õV4.2.exe"C:\×Ô¶¯ÊÕ»õV4.2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:952
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5a20de3836893f50f73c61ec0a2e45ad7
SHA1eee63ff2190d6e2ed3eb4041c51075b4ed961c88
SHA2562bcdf199d79f40191ba92513021f99390a8e07abdb151975e5df739b46d97473
SHA512cab618b4b07bbdc36e5b679da9afa2d9e3f5ebdfef11c10e461dc9a588db2cabf1589ce10898dae8a9a12a0b5f571a6dffeb4faff504ea31eed9eba0c6b76f40
-
Filesize
41KB
MD5a20de3836893f50f73c61ec0a2e45ad7
SHA1eee63ff2190d6e2ed3eb4041c51075b4ed961c88
SHA2562bcdf199d79f40191ba92513021f99390a8e07abdb151975e5df739b46d97473
SHA512cab618b4b07bbdc36e5b679da9afa2d9e3f5ebdfef11c10e461dc9a588db2cabf1589ce10898dae8a9a12a0b5f571a6dffeb4faff504ea31eed9eba0c6b76f40
-
Filesize
45KB
MD51479c26076bb69ef920b567bbe166fb5
SHA1725b96c0aa4d3ed117ab4f9ddedc5243b1b5b489
SHA256ec4f7a4bce0407f7d04492e036b149b5db0224231b8ecbb77eb88cf94507be3a
SHA512afad589f9c512ba40149a25055ec9beba761933a64aed3b10aa4263150adcfad7b0c93e94c173a97e446117f2b4006861914944856be1bf227b04ce6704068b3
-
Filesize
45KB
MD51479c26076bb69ef920b567bbe166fb5
SHA1725b96c0aa4d3ed117ab4f9ddedc5243b1b5b489
SHA256ec4f7a4bce0407f7d04492e036b149b5db0224231b8ecbb77eb88cf94507be3a
SHA512afad589f9c512ba40149a25055ec9beba761933a64aed3b10aa4263150adcfad7b0c93e94c173a97e446117f2b4006861914944856be1bf227b04ce6704068b3
-
Filesize
4.2MB
MD5e268162762e76498c6b5bf61ccd354d7
SHA14f5965f81ff49ab8eb3e68ab50a18c118d43a185
SHA2565c0b24fd9dada4064792411dbb2a9086e9c0a699ee087113bc2284b6cb03df07
SHA5127908ba543cb1b5332dd199c29cd64252559a26706955d3d561bb2f0c834d7eef8b2998ab4cc85c489039a6a4646acd0c5524e028eca8ae31aacc29604149e391
-
Filesize
4.2MB
MD5e268162762e76498c6b5bf61ccd354d7
SHA14f5965f81ff49ab8eb3e68ab50a18c118d43a185
SHA2565c0b24fd9dada4064792411dbb2a9086e9c0a699ee087113bc2284b6cb03df07
SHA5127908ba543cb1b5332dd199c29cd64252559a26706955d3d561bb2f0c834d7eef8b2998ab4cc85c489039a6a4646acd0c5524e028eca8ae31aacc29604149e391
-
Filesize
2.6MB
MD5ea876590fdca0140fcc0ce41ed1a0e85
SHA189ba3d800ac5f1e0b3249e04c16431b50b6b4c31
SHA25677b435c34300d4d387bc0b02b108fa70d421a22e9fa37ae6e705c1edb9430e38
SHA512bcda1b9c0c56fa5e4768061b8200a481cbbd5682d92e45f74d5ffd25693060cf6c7bd0de1f7baf1db05b988078eba7ffaf27fadb3d045a2c878f3faa7fc9d975
-
Filesize
2.6MB
MD5ea876590fdca0140fcc0ce41ed1a0e85
SHA189ba3d800ac5f1e0b3249e04c16431b50b6b4c31
SHA25677b435c34300d4d387bc0b02b108fa70d421a22e9fa37ae6e705c1edb9430e38
SHA512bcda1b9c0c56fa5e4768061b8200a481cbbd5682d92e45f74d5ffd25693060cf6c7bd0de1f7baf1db05b988078eba7ffaf27fadb3d045a2c878f3faa7fc9d975