Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
31/03/2023, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
SKlauncher 3.0.0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SKlauncher 3.0.0.exe
Resource
win10v2004-20230220-en
General
-
Target
SKlauncher 3.0.0.exe
-
Size
1.2MB
-
MD5
32c7e3347f8e532e675d154eb07f4ccf
-
SHA1
5ca004745e2cdab497a7d6ef29c7efb25dc4046d
-
SHA256
107bb526c374d6fd9f45317c0c16e83ab50076f2bcd630caf3d6794596fae69b
-
SHA512
c82f3a01719f30cbb876a1395fda713ddba07b570bc188515b1b705e54e15a7cca5f71f741d51763f63aa5f40e00df06f63b341ed4db6b1be87b3ee59460dbe2
-
SSDEEP
24576:Dh199z42ojP6a7HJlF9eu5XFQZSIZeNGdmEE8H17UBcegl:R9zbgH3euNFQZr/oEE892cfl
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B6A80E01-CFC4-11ED-B1DF-CEF47884BE6D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0172293d163d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c8a3886e844ee04ca528537b5bc4589900000000020000000000106600000001000020000000c0961579708c1e86fa6587067373f15e491bcca6f67e964ddd67f1053a53903f000000000e8000000002000020000000588e5d6994cabedb950ead9cc6ffa886510aa105ca16b4afa7282eeabea88f15200000000b1fe6eb80d3dad4cda70414fce132b7a2385b476286688a5e9b86b2e5fc5d3740000000e3c2b69af173900daba56089a4f16e73b39a43d0893fa729de19e15839578ca3a8751181f59eea81a69c411a59a67207e99bf21b8dbfa47254fb0a9728359b53 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "387032906" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c8a3886e844ee04ca528537b5bc45899000000000200000000001066000000010000200000007d9c282c06b5d19aaa1d6b1bf606319def1ab2e6b5c65a7d3f22a4f61ab9dd92000000000e8000000002000020000000bd44a78e216bb8b98dc24fe1899b40a207d49d007e760d03cd7550aa303398409000000025792101d6b1b810e5c7fcb767f5488fb0020f56f74d38c1987ff418c15482df2b6103d98d65ec5e02d1846a6e920bd58be420be3c346d0690c567b05639f312ecf78e4e22303b38ee84546e25a1b599a744f3a227e50e979fc1474b43712a9ca77c79776fa43e25925205fa777cdc10131ff80e7fe1b9a5ce3c464628df6201341eccc8490624214d4fd19b2b99061c40000000029ebf38c6ed4d42bb00953b193c25f970a2a3fd7a9f9f010443aa75c8466c68693fff674151a7e1c1b7389e187cc11b2d868228f47ad77dacdbddedd14178ef iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1220 iexplore.exe 1220 iexplore.exe 1696 IEXPLORE.EXE 1696 IEXPLORE.EXE 1696 IEXPLORE.EXE 1696 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1348 wrote to memory of 1220 1348 SKlauncher 3.0.0.exe 27 PID 1348 wrote to memory of 1220 1348 SKlauncher 3.0.0.exe 27 PID 1348 wrote to memory of 1220 1348 SKlauncher 3.0.0.exe 27 PID 1348 wrote to memory of 1220 1348 SKlauncher 3.0.0.exe 27 PID 1220 wrote to memory of 1696 1220 iexplore.exe 29 PID 1220 wrote to memory of 1696 1220 iexplore.exe 29 PID 1220 wrote to memory of 1696 1220 iexplore.exe 29 PID 1220 wrote to memory of 1696 1220 iexplore.exe 29 PID 1220 wrote to memory of 1696 1220 iexplore.exe 29 PID 1220 wrote to memory of 1696 1220 iexplore.exe 29 PID 1220 wrote to memory of 1696 1220 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.0.exe"C:\Users\Admin\AppData\Local\Temp\SKlauncher 3.0.0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://adoptium.net/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1220 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1696
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c82d82d25c845d87b1f932c955f3a3a7
SHA1d16613b57bc667e350328f5da4b861ceb051ed3e
SHA2567862f0c81da2e3187b3ff13d9108b6f9979d8bfa1a5d9913666f6c5e1199374e
SHA5123380eb2dd6ac24219fae61d65727b5031a0280eaabcbc5a07a5c5b55fdb6a6fbcd8f4ebf91ef290e0f2d6eac53c3ed3ac78fa6ce04b574f80bd39e211da0a5b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d301905a2753fb9484ea5644d99f7357
SHA1038547355b0cdca97c7afd23e337dd138e72312b
SHA256eb174be3a41da1e30f9bb5373b227ee6e28249f7be911c5c3147276b56ee9ad3
SHA5128e55cfffe8fc560e02be2fd42bce4020726aa44571f04210aafe37c35635e5109989a4fc72764b938253978899ee19559a9a5665901ca4abf87a01f0c2467adb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5117748165257386ad3e83231316c6ac8
SHA12467dfa685106014de34bb4d72a87f464baa6f0a
SHA25679599e8c4936949887869ea5a2f78d732971a56a8448a07811cb21e3372d4e6e
SHA51217afbc12605ea063c9716df168deb001cbae87e05417a3b20261c90954fd45a6ce05428e981883057c4821d5dbaa167ba0b6ceb370aad4f2012afa64bdb3cdc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df22da029c013174dc5718942997ddd2
SHA15ded79da2bbd5d3e4510029b7b0c16a742143fa1
SHA2568d707aeb90bc5b36e0c4478514c275a258b7ec335f7eb2ce8bf7c26469a98c04
SHA512dfba63973a2807c4424688fdde77c0ef4de0338aff9dc35157c40fb5da1e73fb5e670c7d42e8574585e713a84fe07b5f3cd57f40b14e05588032f794c389e2f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0f123376b27845303670976a847a783
SHA11198235b33b33a258f314d04a538cb5d25f180b0
SHA256c8e099580dba531dffc41e7f1414d12be6b7c0b9aef5abafc10442505f6ace32
SHA512d115401879cbe99f5482d8be9823fdebdb1d5bb16af7226adeb0af552cc0768a6a939b638b31bf1434e5077168d6c9bb79bac5763f4d37ca1517652482e9cf97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519a3db31fcd993104b116aca424cb4cc
SHA1454c303a9091e47dadc4db70fc0955e3ae90c53e
SHA256fe3dba3b80f39c52174189f6c07fab9e50e24d2fea868350c3da6e119f63aa83
SHA512b7a57f1ed9b33a567c87e407d9262aa013546c89694574b036a7a8f7361b92d4ca06d383031cc9d77f9919ad2bb0f0a3d9e76b498816b3bb8beadd0aee9bcaa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5135f0ef95afa83fd2c84139ba2fa3bc3
SHA1c8c0c759b6c4c2f2ac72fac971a5ec1cd6df16d7
SHA256182bfdd85509d0daf2964fcbb8b660f68fd80682844150dce12e3bef131af87a
SHA5120383c909a2b4314069427e4a1e1a97bd7507085d988cc574fff84ba94d939df9a981f6755986b9851094aa2bb153920d61948d71cbe83a29961c70eb6e323d31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a96095a5555f09a9bb3fbe5fee249cba
SHA149afb1a8eef1eb15c9a9feefdbc4ac6d0aa1f155
SHA2568e3415e6886ec53c9b223210f39aede6afee58da6ad72027f8eeb644d19758f9
SHA51297ef23db83ad06eb6070566bae3aeb0bbbfc0ec6da328fba6e285fc7727b29a158287d9d8723118a5610514d33b5447bc0ced817668f02a3f01c9351616b042f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa6a0bed176fd737e15837f1f79fdf82
SHA1a003a7284766e9fb4f5f5ccdeb83a8ac92f21313
SHA256ec07166faf105b795e54c2fc3c7584b1e1b25e7358adfefe023f6f417bdbd228
SHA5120c211ebbe4850d2d9e8aa4efe5ed3466bf9f355379604bb4b0ad5b452647f7bb4acdba3f507f22b4eb1dca5e1c9b8b4966df9eb9cfb6ea1bab96dc15fdf64c6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f952192f3cb6dfa6b888e1fa6ea3828
SHA116bb618cc3fd196de18eed223a422157172414bf
SHA25622bcde0bd624683f235f0e0de8270d2bd14959f9c0db040e0358a2fbe7dcf93a
SHA51231f630cacd2479c826b12d9fbc320c7a29b6bf66cc01051ce858fd4a1b1b1a4a80cb5f30a932631f5f012ec40996a72fca065dee3f556ddabf4713a303ae7ccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9feece55bc8c1f4578b7f59b7601d91
SHA1739e19b9a3ae430d56ed3f8b9808af8104cfa5f1
SHA256d94a981103896c96876b6611d50cf97ac6f505461a6d88bb3c28d7266c249ec4
SHA512f174bfa7156ca18693ba8d971d1cab86cfa5084f158e30377ad62e12e56c332992c1c8825c025fd0f0b66a1aff8a8c9303b478994abfaa71a0f208482296a072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b52c6806073650f041bbfb5c47bd6575
SHA1bd8d19dbe76eb1c8593dbf47ca1273cff50829b8
SHA256295dff0e2463bcd03073c93d00ff79d3252eecd99f1b361f54463db4487f8046
SHA5126df40c53fe123bfab5451a5a0524da31a6cd102dd48f90bda6158bd13d38f986e14a57146af05894b3c21257a27f34c1c0e4b3c38644c34db8abc39827adc001
-
Filesize
7KB
MD5f3d0ce5da4bce216130a96a6f4cf6eb8
SHA1b1eafb8afcb531ab35e68b12ea4b435144461abf
SHA25699d0ba5735a0453f8a359bbdf857921e01af5b2050c4f1f466a49c16ab203b1d
SHA5126db86852bb7dbf45eeb6d7984c0f20f3c3c5aaad3c7b16d31329da8347582ebc72c9a51cd2bfb33c0729005278205dd0010032a070b8b3904512f7ecb1b38f01
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BA5D7P93\favicon-32x32[1].png
Filesize2KB
MD5dfb98b35bec083cddf7e575ccbc12efc
SHA1f77c5e6f37aec582c5977a76691f992e3ebc3a05
SHA256f053cec8f37df661ce13646ff5ecad7050bd50c4afb4f7ad12cd252577207e66
SHA51217d2d675bc677f126fabab826b4fc79a05eece52cf586a97b7d8093dc402d0160f273fbf9d38978f01befc9f85a979208c2355cc0a4c129a2232ffa4554961ef
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SKXYVKI3\suggestions[1].en-US
Filesize17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
61KB
MD5fc4666cbca561e864e7fdf883a9e6661
SHA12f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5
SHA25610f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b
SHA512c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
Filesize
161KB
MD573b4b714b42fc9a6aaefd0ae59adb009
SHA1efdaffd5b0ad21913d22001d91bf6c19ecb4ac41
SHA256c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd
SHA51273af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
Filesize
608B
MD5a70b8219b6819cf4717daf196f2a8b65
SHA1f4af465ef6ea2cd91e4d42b7b3420b950f6eca42
SHA25659aa41be748af369a781a5a27e5e5efdaa178b3d454871a44cfd303d7f147a3a
SHA5123eca22d67cd61fb45377930cc5ac541ab0e51bcf1cc2788365346be94f6068f25fa55974442d8005a8ba7d4f798ed39eab518fba00ba994055db6d12f80d3fe2