Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 11:13
Static task
static1
Behavioral task
behavioral1
Sample
19e9e9f2d5dcb357aaf47955605bbe10.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
19e9e9f2d5dcb357aaf47955605bbe10.dll
Resource
win10v2004-20231215-en
General
-
Target
19e9e9f2d5dcb357aaf47955605bbe10.dll
-
Size
380KB
-
MD5
19e9e9f2d5dcb357aaf47955605bbe10
-
SHA1
2ed3b28ec1446a88dd44ffbbe17137598d854fbb
-
SHA256
7b9f6e331bd8f3002cb4b3a23dade43bc3c3465823a8e24e8dd4552de6e2ca20
-
SHA512
a8ecfc82e0174f0b7e5782ecdc1f6d408962e1b4443c3839b42ce7241b854bed260f763bda4c1c98857f9376bf01ac1e5686ffaf8fa1e82db9164c6777fc971a
-
SSDEEP
6144:49nH+nnClbLQwdTPHAxayVIZg/Z3Ft6sFaXEdzP35dWPPXx+f/NhrBBCWC+:49InCJQsTPCs0ZVt6s9dzJ48XNhrSJ+
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts 341d.exe -
Executes dropped EXE 4 IoCs
pid Process 2704 341d.exe 2604 341d.exe 2496 341d.exe 1668 mtv.exe -
Loads dropped DLL 21 IoCs
pid Process 2708 regsvr32.exe 2340 rundll32.exe 2340 rundll32.exe 2340 rundll32.exe 2340 rundll32.exe 2496 341d.exe 2340 rundll32.exe 2340 rundll32.exe 2736 rundll32.exe 2736 rundll32.exe 2736 rundll32.exe 2736 rundll32.exe 2624 rundll32.exe 2624 rundll32.exe 2624 rundll32.exe 2624 rundll32.exe 2496 341d.exe 2496 341d.exe 2496 341d.exe 2496 341d.exe 2496 341d.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{EBF93111-7A1D-4843-A998-0AFE8FE5F325} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{EBF93111-7A1D-4843-A998-0AFE8FE5F325}\ regsvr32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe File opened for modification \??\PhysicalDrive0 rundll32.exe File opened for modification \??\PhysicalDrive0 341d.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\a1l8.dlltmp rundll32.exe File opened for modification C:\Windows\SysWOW64\34ua.exe rundll32.exe File opened for modification C:\Windows\SysWOW64\b34o.dlltmp rundll32.exe File opened for modification C:\Windows\SysWOW64\s.exe mtv.exe File opened for modification C:\Windows\SysWOW64\b4cb.dlltmp rundll32.exe File opened for modification C:\Windows\SysWOW64\4f3r.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat rundll32.exe File opened for modification C:\Windows\SysWOW64\3bef.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\14rb.exe rundll32.exe File opened for modification C:\Windows\SysWOW64\1ba4.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\b4cb.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\b34o.dll rundll32.exe File created C:\Windows\SysWOW64\6610371-115 rundll32.exe File opened for modification C:\Windows\SysWOW64\a1l8.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\b3fs.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\144d.exe rundll32.exe File opened for modification C:\Windows\SysWOW64\4f3r.dlltmp rundll32.exe File opened for modification C:\Windows\SysWOW64\341e.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\341d.exe rundll32.exe File created C:\Windows\SysWOW64\27e692 rundll32.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\a34b.flv rundll32.exe File opened for modification C:\Windows\f6f.bmp rundll32.exe File opened for modification C:\Windows\a8fd.exe rundll32.exe File opened for modification C:\Windows\ba8u.bmp rundll32.exe File opened for modification C:\Windows\ba8d.exe rundll32.exe File created C:\Windows\Tasks\ms.job rundll32.exe File opened for modification C:\Windows\14ba.exe rundll32.exe File opened for modification C:\Windows\a8f.flv rundll32.exe File opened for modification C:\Windows\bf14.bmp rundll32.exe File opened for modification C:\Windows\8f6.exe rundll32.exe File opened for modification C:\Windows\6f1u.bmp rundll32.exe File opened for modification C:\Windows\4bad.flv rundll32.exe File opened for modification C:\Windows\ba8d.flv rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 47 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{92379EF0-EBF8-43AA-B33D-D05008038B36}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{92379EF0-EBF8-43AA-B33D-D05008038B36}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBF93111-7A1D-4843-A998-0AFE8FE5F325}\InprocServer32\ThreadingModel = "apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{92379EF0-EBF8-43AA-B33D-D05008038B36}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{92379EF0-EBF8-43AA-B33D-D05008038B36}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\b34o.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{92379EF0-EBF8-43AA-B33D-D05008038B36}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{92379EF0-EBF8-43AA-B33D-D05008038B36}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBF93111-7A1D-4843-A998-0AFE8FE5F325}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBF93111-7A1D-4843-A998-0AFE8FE5F325}\ProgID\ = "BHO.TttPlayer.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBF93111-7A1D-4843-A998-0AFE8FE5F325}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBF93111-7A1D-4843-A998-0AFE8FE5F325}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBF93111-7A1D-4843-A998-0AFE8FE5F325}\InprocServer32\ = "C:\\Windows\\SysWow64\\b34o.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{92379EF0-EBF8-43AA-B33D-D05008038B36}\1.0\ = "BHO 1.0 Type Library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBF93111-7A1D-4843-A998-0AFE8FE5F325}\AppID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBF93111-7A1D-4843-A998-0AFE8FE5F325}\TypeLib\ = "{92379EF0-EBF8-43AA-B33D-D05008038B36}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{92379EF0-EBF8-43AA-B33D-D05008038B36}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer.1 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBF93111-7A1D-4843-A998-0AFE8FE5F325} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBF93111-7A1D-4843-A998-0AFE8FE5F325}\VersionIndependentProgID\ = "BHO.TttPlayer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{92379EF0-EBF8-43AA-B33D-D05008038B36}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer.1\ = "CTttPlayer Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBF93111-7A1D-4843-A998-0AFE8FE5F325}\ = "CTttPlayer Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9}\TypeLib\ = "{92379EF0-EBF8-43AA-B33D-D05008038B36}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer.1\CLSID\ = "{EBF93111-7A1D-4843-A998-0AFE8FE5F325}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer\ = "CTttPlayer Object" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer\CLSID\ = "{EBF93111-7A1D-4843-A998-0AFE8FE5F325}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9}\ = "ITttPlayer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBF93111-7A1D-4843-A998-0AFE8FE5F325}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{92379EF0-EBF8-43AA-B33D-D05008038B36} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9}\ = "ITttPlayer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer\CurVer\ = "BHO.TttPlayer.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EBF93111-7A1D-4843-A998-0AFE8FE5F325}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F9BCCE2C-1787-4F98-A27F-D9A0CD54F9F9}\TypeLib\ = "{92379EF0-EBF8-43AA-B33D-D05008038B36}" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2496 341d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1668 mtv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1328 wrote to memory of 2340 1328 rundll32.exe 16 PID 1328 wrote to memory of 2340 1328 rundll32.exe 16 PID 1328 wrote to memory of 2340 1328 rundll32.exe 16 PID 1328 wrote to memory of 2340 1328 rundll32.exe 16 PID 1328 wrote to memory of 2340 1328 rundll32.exe 16 PID 1328 wrote to memory of 2340 1328 rundll32.exe 16 PID 1328 wrote to memory of 2340 1328 rundll32.exe 16 PID 2340 wrote to memory of 2572 2340 rundll32.exe 26 PID 2340 wrote to memory of 2572 2340 rundll32.exe 26 PID 2340 wrote to memory of 2572 2340 rundll32.exe 26 PID 2340 wrote to memory of 2572 2340 rundll32.exe 26 PID 2340 wrote to memory of 2572 2340 rundll32.exe 26 PID 2340 wrote to memory of 2572 2340 rundll32.exe 26 PID 2340 wrote to memory of 2572 2340 rundll32.exe 26 PID 2340 wrote to memory of 2560 2340 rundll32.exe 25 PID 2340 wrote to memory of 2560 2340 rundll32.exe 25 PID 2340 wrote to memory of 2560 2340 rundll32.exe 25 PID 2340 wrote to memory of 2560 2340 rundll32.exe 25 PID 2340 wrote to memory of 2560 2340 rundll32.exe 25 PID 2340 wrote to memory of 2560 2340 rundll32.exe 25 PID 2340 wrote to memory of 2560 2340 rundll32.exe 25 PID 2340 wrote to memory of 2580 2340 rundll32.exe 24 PID 2340 wrote to memory of 2580 2340 rundll32.exe 24 PID 2340 wrote to memory of 2580 2340 rundll32.exe 24 PID 2340 wrote to memory of 2580 2340 rundll32.exe 24 PID 2340 wrote to memory of 2580 2340 rundll32.exe 24 PID 2340 wrote to memory of 2580 2340 rundll32.exe 24 PID 2340 wrote to memory of 2580 2340 rundll32.exe 24 PID 2340 wrote to memory of 2632 2340 rundll32.exe 17 PID 2340 wrote to memory of 2632 2340 rundll32.exe 17 PID 2340 wrote to memory of 2632 2340 rundll32.exe 17 PID 2340 wrote to memory of 2632 2340 rundll32.exe 17 PID 2340 wrote to memory of 2632 2340 rundll32.exe 17 PID 2340 wrote to memory of 2632 2340 rundll32.exe 17 PID 2340 wrote to memory of 2632 2340 rundll32.exe 17 PID 2340 wrote to memory of 2708 2340 rundll32.exe 18 PID 2340 wrote to memory of 2708 2340 rundll32.exe 18 PID 2340 wrote to memory of 2708 2340 rundll32.exe 18 PID 2340 wrote to memory of 2708 2340 rundll32.exe 18 PID 2340 wrote to memory of 2708 2340 rundll32.exe 18 PID 2340 wrote to memory of 2708 2340 rundll32.exe 18 PID 2340 wrote to memory of 2708 2340 rundll32.exe 18 PID 2340 wrote to memory of 2704 2340 rundll32.exe 23 PID 2340 wrote to memory of 2704 2340 rundll32.exe 23 PID 2340 wrote to memory of 2704 2340 rundll32.exe 23 PID 2340 wrote to memory of 2704 2340 rundll32.exe 23 PID 2340 wrote to memory of 2604 2340 rundll32.exe 22 PID 2340 wrote to memory of 2604 2340 rundll32.exe 22 PID 2340 wrote to memory of 2604 2340 rundll32.exe 22 PID 2340 wrote to memory of 2604 2340 rundll32.exe 22 PID 2340 wrote to memory of 1668 2340 rundll32.exe 29 PID 2340 wrote to memory of 1668 2340 rundll32.exe 29 PID 2340 wrote to memory of 1668 2340 rundll32.exe 29 PID 2340 wrote to memory of 1668 2340 rundll32.exe 29 PID 2496 wrote to memory of 2736 2496 341d.exe 28 PID 2496 wrote to memory of 2736 2496 341d.exe 28 PID 2496 wrote to memory of 2736 2496 341d.exe 28 PID 2496 wrote to memory of 2736 2496 341d.exe 28 PID 2496 wrote to memory of 2736 2496 341d.exe 28 PID 2496 wrote to memory of 2736 2496 341d.exe 28 PID 2496 wrote to memory of 2736 2496 341d.exe 28 PID 2340 wrote to memory of 2624 2340 rundll32.exe 27 PID 2340 wrote to memory of 2624 2340 rundll32.exe 27 PID 2340 wrote to memory of 2624 2340 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\19e9e9f2d5dcb357aaf47955605bbe10.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\19e9e9f2d5dcb357aaf47955605bbe10.dll,#12⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/b34o.dll"3⤵PID:2632
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Windows\system32/b34o.dll"3⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies registry class
PID:2708
-
-
C:\Windows\SysWOW64\341d.exeC:\Windows\system32/341d.exe -s3⤵
- Executes dropped EXE
PID:2604
-
-
C:\Windows\SysWOW64\341d.exeC:\Windows\system32/341d.exe -i3⤵
- Executes dropped EXE
PID:2704
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/4f3r.dll"3⤵PID:2580
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/b4cb.dll"3⤵PID:2560
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/a1l8.dll"3⤵PID:2572
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32 C:\Windows\system32/341e.dll, Always3⤵
- Loads dropped DLL
PID:2624
-
-
C:\Users\Admin\AppData\Local\Temp\h8nil4o8\mtv.exeC:\Users\Admin\AppData\Local\Temp\h8nil4o8\mtv.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1668
-
-
-
C:\Windows\SysWOW64\341d.exeC:\Windows\SysWOW64\341d.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32 C:\Windows\system32/341e.dll,Always2⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151KB
MD5da9b956a6093638af38f31bb4be027ab
SHA153840ce481f0134e3703a8076286e254e523942a
SHA25657e8e383c8c6b3e438ae4a99be9d238fcf5d75b589385fce3dd95c1dbacdfe24
SHA512f7f64055d33293d968540c281872b8f29b71a7c14b748c537711d1724b235d933955e41617ceaa4bb5744bcdc2fd227dc97d7903465fc7340a46fdc55004d844
-
Filesize
105KB
MD529246c528907fe6124fdf906f04fb857
SHA11e5749aac43f1964c874d9a9d4a9e7f9db08dc8b
SHA256656033bfe00bd011b1d8e1c1304a77e3953c631f715de4747296bdf8f94d6898
SHA5121a21b506f8c95c2ba9946db15d7f70f3cbf025cc4a9aa550bb730efb641cab2cb801025a227ed84a88f698c2b63ba608d2c39e09268ea4e02c89d4ba0d893305