Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 21:46
Behavioral task
behavioral1
Sample
cyhxwaigua/cyhxwaigua.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cyhxwaigua/cyhxwaigua.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
cyhxwaigua/必看说明.htm
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
cyhxwaigua/必看说明.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
cyhxwaigua/河源下载站.url
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
cyhxwaigua/河源下载站.url
Resource
win10v2004-20240802-en
General
-
Target
cyhxwaigua/必看说明.htm
-
Size
5KB
-
MD5
4c5a1df62d9fa491906f01105da24648
-
SHA1
489883df69e9e78f7fd3ea4909716410495f3020
-
SHA256
4d61d970fa30d1e7465275a002d020e3cc4659f73c968e235ef703c85c14a4d0
-
SHA512
e159d47e08470ac0ecc38d1974fe84433c4a1b3c74a7e447afc00ec1eaf49c5a5341999fdac87ab70de5ede9729587c0c44d9dba5a60b7158e05e8e3aa469ecb
-
SSDEEP
96:eugWlXZktTuDndkYWuokAbVXHISaQN1exgemaQNA5FaQNGmaQNNgA:e3iXFDzeXdxfx2Fx9xP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50677ac32611db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb9000000000200000000001066000000010000200000006f802822a8b177747d2768ac9ba767d06e4b00509799f2caebf0b0b8e59b55a0000000000e80000000020000200000007de911e9306090d378f56b1bb4a92a3130b838f081b06166ebc119fcd0e339eb90000000b2f648bc7c063414a38f6460cec5a571bd1b1535901a838b403af07633c6561f83fc405c1bac10414c3e5863b277c8e58275097e35bb111ac13169d86cd2164c6a4772db7ff5525502964482447178294dc6b3796cf12dd9bef5d3589e3228afb1897186dc379e974a7d496f559287f988f343d567a9db3289a864321ec33c5246a749510406395345639f26c94e7bce400000003701bfb42e23ecccf1f348b6ba7788d3985b6e42ecd710090a81e1cb233133cb4af34c2473ea99ed3b0fd88e59421db61307af6ad715eabeea86fe218bfee02d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004961a9603b5d8740891a04601e8b8fb900000000020000000000106600000001000020000000429bb6bba4846cb4b0d94a4a406d2a9dbe68e2e4a2e606ad00920ff851986d2a000000000e80000000020000200000000a92a59bfa4f6c496b638dff7cef894f2d7ad3fae504916ad713aef816984102200000006b8b335b072fe63780e62ccc2da1c4f7975e1920311094e5d631f30abc659a8640000000699e27110c265fdaf55621441b871752103408b392df3b46b366ab1d9124cc63e9afb1f23f8d648a96369a91bdc3ffe30985f6f2829b3012374d81929db683a1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433635447" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EE9FC061-7D19-11EF-9B6B-D681211CE335} = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1456 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1456 iexplore.exe 1456 iexplore.exe 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE 2304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1456 wrote to memory of 2304 1456 iexplore.exe 29 PID 1456 wrote to memory of 2304 1456 iexplore.exe 29 PID 1456 wrote to memory of 2304 1456 iexplore.exe 29 PID 1456 wrote to memory of 2304 1456 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\cyhxwaigua\必看说明.htm1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1456 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5790ddd924172f70f7fb647dc9e30f3ee
SHA1e9265e780472d4e698dd051163b533228925cd15
SHA25631ac05620e4626b6a9c98e7b63a21c18676963d627b520ec6cb59c513826e5db
SHA512b432a5f513f1328064a9e0e8de0f7f5d028e98accd7ba96da40e8e91ef046e6ac2e1c2dc5e03a53e53a6a210f86f341471cfbddcc120f0f0434974291e74fb95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5044a8036b45b4ee353af33c51de78186
SHA191ba685e0727bc15fef37191504cd05898591231
SHA256f4a7f5e4f9000dcdcfa1c2c6b560e4a67e652f1f4af24862ca67f1f897a7d6df
SHA512e7af5348c397f1697418859f0792d1d4c756cdf2aa278c2a98d724efbcd4b43843f35d1467c3279859bc92e0c4e7a75bbdbbbac129bb3b0a40d5057270d26493
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548996c265d387b3c5dfb9a7b080d65fa
SHA1202832f7bd568f4023b365c6420aff9af381d4d2
SHA2566a85448874a1c1b63a1da16dc7b183ca4952aba312c79184d0c4046e8dfe820f
SHA5123591a315de4bb810e539ac6904e2229e21bf5057a00795cb4baf32ea1a0c49dbf8a2ceecf9275743cc0bbcbfbc040ab5d9c4ec43a7725abda0a75b6789497e68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffce9400170d94b2f9e5198b01857c3d
SHA11bce55618fdf289d1b9d3d10220bbc12f4c5e530
SHA256d1ac09b0bb0a89f2ef437ad322ff7b300ba64d89aa6b0f44f8e685e6563e6e1d
SHA5124068bb86d47c8110fcafda95b447258724e99b86703fff1669a014f98ad9f09c235ddf5bd44195b93c51c653cf184f18ddeb268c72a7cb76e3ac7d98a4b3fcb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b93b105046f5dbf0bbbdefff8a443bee
SHA1ce9a6bf3cb076fcc17ad37ad2286b3522d468f88
SHA256e81b0e1e254023505ab7966951d66812a4d9044b11dfdaf277501b19eeb180d8
SHA512656bf09738f054573cce1228da2b4c09b470185c2926a19513094715e18ff3dbfcb673435c02c56b29cd5ace3c1d38499c6b00f7044fbac88b0ed027bbfc83e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577b2e562223225772ae726f7766ce86c
SHA15e1b5f64c1e5429f4bc91b2c122fbbd4fe870df9
SHA256d6d2ed5d5f7515fc0936f97ef073c5993a8aab8239972987d91f2e953969693a
SHA5122e58a0282691d73c29f87a4f2ced4ed2d8f7a46c719501fd1bdade90ba7b650757c76ca0c556193946cae447b453ad73fe3e96d3b46d455fc48a11aeb701e5e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e62638ade89b989c983bac49cf4f7400
SHA1987d014cfbd706131dde37ba1f24487c92bd98eb
SHA256c3bd495a01dc0859bfaa822ead07d5d68494c2cde9d583a7859873ec50de1a23
SHA51222a688093e2149d09c5d4d48a4d63c7b3b8a2b75a3bc8da0641d45ebafe3ac7a2922781f536df2f97db5388771965f82a962d5ff4ce02ed49ce9783878f5b410
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d391ea79c4cb0c8c75a5e756948a4fbb
SHA1c10a02b76b3a827bc441405745bf5a47d2fc5f8a
SHA256fe0a01c07f3f6b4faba485d9b98e79955e34bc8115dfde5a61bd5d9779e88c61
SHA512c8823c8afbe38b187067198a99ec0d19e41a74a42ac1610d1433e597187d6bb4f8b623d12a9740da0768626d9fea094312419253eedd29ff455938e5432fd262
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe52fc9871eb7ba9daf967fa5072bb81
SHA16e71c0b8ac74cd979a14ebb1e055ee4ce9890443
SHA256544661fa2fbdc99c222d561101de1b42af8ab8f45dfd6346e34212b4aa441953
SHA512488676e25d338c348ad223661e4b54c22c724b8dca920fb5afd2a204188c4dfde1abe879e998af8ea3b470d567ed8bffd69502fd45a7dd9c00801f696379ce7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de8ec9d241bfe6d7ac86a0124e6b34e3
SHA106eb917c0bb8323ac3da375d4b23385284053826
SHA256ae812217d0cc302e0fb51b5006b799566aae4603a75386ffc9bf2f4cc3a2b1af
SHA512aa03ea8a14737aec2751d4f4ec484598c4698199414a79a2f5e784b20ef6cf07208630444872b0addf12a7874259fd2bb2373dbd0087536f4029732ff657bd24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ebb200f2b122092f10c92c54377fb49
SHA109ac275f8e03ba215270cf697977f322decdf332
SHA25672aed85e3cc6d8e30000899608e383811e8d7f3c66fc28a8597245dd48713a47
SHA512fa6c242fa2fd5367380e3fed0a9c5397b61ca3b223bf7f22949e5d908b235d3afab9c7b26fdd8a3f7139692ce299bb2be1558d5f6669ffd7f3dfc1397400cd95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b72b10c4e41efc8361d066f5563ece74
SHA19623ae47a8a92abab2e5998566b3a6d70648f0d1
SHA256d78fe7c89a460088d2348dde59d058de16b9fe3c3cac2aa9a415ad65dd4b1645
SHA5121c22fd1474a89b02ae163f27a81428fda07cfd3818be7fac5b7a5e74dc2f63e83b9d4a87e2ed02a2530d3ef74d458472da3f5e723f46378248a6a3e7fa67b697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512467ef84b5e91747dd652ffc69f94ae
SHA17b209a877d7b286606417ae0fdd2b22c9b84672f
SHA25679ac8bd8260c9e2ee1dc93ee6c07abb817af043a1e5e2a2bdecd6e6f478ebf47
SHA512f35b15a0ce4bf45d08e9fb9342db0b8d14184bf934234716c49c0bd9fe73f301cf68096d323b98f07b5ceef6f1a682839cb84833d8e052052e7c25b8aeb2e61c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ca5f5d80d6fc5f795878bdd942d7bf2
SHA19b9f61f59d171991e729a00b977056bb130e02c5
SHA256b49e00f62ea96434ee1f2a5e7c0943eefac5a5905127cec95a19b8d2b521c78e
SHA5124c2415e63d19acf983aa4db85892b391336042ab4e0083cd185dfc79cfb1a232925c5199c68d138deaaa0665a271f9ecec30a52e8bb7028ec12006327cb64898
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfb494c3312212e06dd47b35633adf08
SHA1bc33b41d41eddb0fb8eb874ba70ceceff44b075d
SHA25696d834339b227fe62019aff1a57e8b0d3065f2faec33983c2971f459c67e2382
SHA512aa52d26fdd62f57dea7a6c29c409ab3401c95fa123b0af749bf607d1f97d806b9801a0ec739ff55c21c1764d30c71f6ef60eede4ce76522bd175ba25bd7dad27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f3020c524abf03c06d6cff408984ee0
SHA136e36a03c3d4b47d5aefcef97d2299c37b1721c4
SHA256c8d227a800ed70451f2a9e009d57f42ebfab405fced2d1f6148225e6a8874279
SHA512effd4bbead5cedb01e516cc58e2a3ac3d9f6e75509d65fed8f0572cac4d604e554100b6bee3783dc241d9b34703f16016b0a3fd84c7c28ad5b87c18934b599d2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\40WV1DY9\count[1].htm
Filesize4KB
MD52feccc713b174182c2483b643d0dcf28
SHA18efa35bcefd2b8d9e5a1549fef9ed18f6700cc53
SHA2563470b8344c2e054bf129663d4e159d26d1a0595a15f21bd0f06c2abaed4684fe
SHA51264eb16e2a116851c68cf16a820d817d8bc3735a1fab1c0f444c559fb425d39de4f8b716de2d0d1e16c2d1e87d61a95af4e6312f297ae44c1e971f97024c459a5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b