Analysis
-
max time kernel
120s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-09-2024 05:38
Static task
static1
Behavioral task
behavioral1
Sample
Roblox Account Manager.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Roblox Account Manager.exe
Resource
win10v2004-20240802-en
General
-
Target
Roblox Account Manager.exe
-
Size
5.4MB
-
MD5
334728f32a1144c893fdffc579a7709b
-
SHA1
97d2eb634d45841c1453749acb911ce1303196c0
-
SHA256
be9ddcdedf8c36c64e6b0a32d2686b74a112913c54217ccaa46675bfd1dc82f1
-
SHA512
5df9d63136098d23918eba652b44a87e979430b2ce3e78a3eb8faef3dd4bd9599d6c31980f9eaf2bd6a071e966421bc6cec950c28b3b917f90130e8a582c2a1f
-
SSDEEP
98304:42bT1Qm7d9G4/Ml61KO9bjRxMLywnrmYa0kqXf0FJ7WLhrBzcgPgL6b:/Qm59RMowO9bjRmmYiYa0kSIJ7zgPE
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Roblox Account Manager.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Roblox Account Manager.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431417399" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000fc2119155e925974dff63853be9d886a720a11785b248c6f78cca01bea691fda000000000e800000000200002000000057e134285d5825e587c9217fd10d1e02ab3d7dc2ab49c072ffbe0edfdc6d5a742000000065d7b5f84b68725f3d3ce4c6335bbd49234c1c79398c57421e518671de7ab9e140000000c280d7bfe1dacb627bbb557627fa7bcd5df7e75b8e90e9d65c7110b603ed330526e955c066b7e3c4ff997b9b11e73205490fe2bc3ce3a6a35779ecc7e2db8f79 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb47000000000200000000001066000000010000200000007778b34ba6103119fe5ee64aa001578bf48b1d6741e770e3d2f2a292fc21ecaf000000000e800000000200002000000053c211905cd02c8495f5b7813165515bb244f47cf380a71877733cf68bfe273d900000003f0d6986cae8b30c445968368586a0828a502be3dd1b4ee2c3e8b72ec9a33403d7dac3e4d8fbcdd8c621b4264b45762b4c1f4070cab71939fa39ea1284142563833955252c0c1c8b62266a926e4c038fcc819cf1de424919e212f942980b3850ed0112851b7c72714f77d5e76617d4dde7477a28a7165899b549cf1d397742ef83a11e8524d80cc9d00406c3cfdeb56940000000b219827e585a973170240e0d1512b94d10c4eee5934a530a2b98d6ff9a16d85560381d36ea0419168fec0e30db2f3b37e8596496a9203e3171af02205b6e41c3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9C8B8D81-68ED-11EF-A567-DA9ECB958399} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0606372fafcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1072 iexplore.exe 1072 iexplore.exe 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE 2852 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2596 wrote to memory of 2776 2596 Roblox Account Manager.exe 30 PID 2596 wrote to memory of 2776 2596 Roblox Account Manager.exe 30 PID 2596 wrote to memory of 2776 2596 Roblox Account Manager.exe 30 PID 2596 wrote to memory of 2776 2596 Roblox Account Manager.exe 30 PID 2776 wrote to memory of 1072 2776 Roblox Account Manager.exe 31 PID 2776 wrote to memory of 1072 2776 Roblox Account Manager.exe 31 PID 2776 wrote to memory of 1072 2776 Roblox Account Manager.exe 31 PID 2776 wrote to memory of 1072 2776 Roblox Account Manager.exe 31 PID 1072 wrote to memory of 2852 1072 iexplore.exe 32 PID 1072 wrote to memory of 2852 1072 iexplore.exe 32 PID 1072 wrote to memory of 2852 1072 iexplore.exe 32 PID 1072 wrote to memory of 2852 1072 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe"C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe"C:\Users\Admin\AppData\Local\Temp\Roblox Account Manager.exe" -restart2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch&plcid=0x409&o1=.NETFramework,Version=v4.8&processName=Roblox Account Manager.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.03⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1072 CREDAT:275457 /prefetch:24⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2852
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c331e2784a344ba37477fd4e17b8e346
SHA13d01e3506a70549ef235c65c73f34216b40a72d0
SHA2562e74b48130ae8cc3c26352e9a48f993b3e1512254c6ca0585f3a4432c61206b4
SHA51226f90b8fe0142f4b0004a940ddcb833ed3d67b436b6f454043a12048b4d11ee9ce80242a4f642683f523a03976d413b9c1a6e57aafba77e71bfd7d3419625920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a042676c8ad438d9502d549ff0d0324
SHA158630442b6bd32fced2cd1424fef9faab6f992ea
SHA256c37eef2be506612acce3a6b0396407f1893eec03fbe7f3278c18ef3c555020fb
SHA51295a2ec8752eabc5fe81bb5fde152cdb7fcf4402e64e7da28d863bac1c4a3b96515bcb831b58042a9a284e1f57c04e33dbcf7033504531a948a964ddff1a17eab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8327f543cb20e5866c81da2268de3ad
SHA1d230a19106892b78dfe6669a7ee8f4e4760f375c
SHA2568debd213135330fcdbf5c6947aa6b63b711df845fbbcde76ddcb8986d71007f3
SHA512eed08588a80959e0549768e0c490cb9b2ed9a7c0cf6e4242ae4f8f25b1fd6c1a20131461e2aa114b76d21b5a1492b14412f2d1303c39c798e36b4ef46aa7fa21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ba2a6e373de01421e449530df69c819
SHA1204bb8aa3491cff4e65883ff14bc8f89c10b10f8
SHA256775c58b68e8354d46693396cf7e952063c4108eefc8caa434ca8568a220d4539
SHA5122a7e780b912afe3513a6166807b74285ecec83a5662b390d6371c181ff948fb7fa06055d5b77d7c247356bfc5bfc1cbc50bf546311d7b5636663c68a34519a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f406047ec73293fde44fba19497d2ca
SHA1c74b14b386c5d23c489c54dfa3eeaa23d1ad4bd4
SHA25651a30ea79c7a327c57c5cf9e370fe36af0505e332e3e11d0b6154e5605b3f47e
SHA51298102eddfb0e2afa5533d99f44a49b1a13be96b4ea2d87c89ae570d89b543eb1d5fc41e7464a1d6c4624bcb9ea257c64516fae545c9758b1221fe36273aac9c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532a387d43cb83ef2390b5edef1e7a1b2
SHA10dc40ff8cfd9ed2bc141e0acd054057f4609f696
SHA2569db888c6041a763c8fad53c43652261cec0406daa98f95c6f35044ccddda7dbb
SHA51223df6f77d776f8f1233d50d9e4deaa57db2e18e04649f01dd7b47ca8c4296ace358510ce30795f00dd044e241031f3c5dcdc49452f9ed029ab53015760e47e1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3039169362d5b5e369e9a0c9e150c7a
SHA1916908f8c5a91980c55f04e052b71d2ce55689b4
SHA256a981856383223911125e698f6dceaeaf0ca16883e2231aa497a142737434057f
SHA512b831869e72de2190a2e3171b806771f33db39f5fe87cee5d28997cf4b2f7e1e5eb7a225fe3b9e29a73c668444f7b9e8ab4a3550f27b50ea66e8ddb2be2a9a970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e5c51619831ac2a3edf987511a5bc64
SHA1fc4bab3783c14f90e5c8845146d8188c587a387f
SHA25631e70bd8b4bab0d049bb825880a2c94a1db811d08964c7f40948dad2eadd52d4
SHA51217de4573b6982f6502882d8c268dbad76d808f8efecc70fbc03978c0954d5b55add9eac6537b26ab5cd518a1c516c5774b0166ee529a51bde6871da0fac70a9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528fbcd02570cc39ff38078f07a042604
SHA140983ca04c5a6af3929c1c1b672ccfeb9e3c0d5c
SHA2563d7e9d3bf6b192f97031eb867601a3f10f9ebb6df39a9d4b313c260737877afc
SHA5128f01a87ad95142aefec308b93564e52ee29653bf384920216f5b5f210d4d61deb170bfff88a88f34ed15bbc2786a5e6ba96d9671d38b14caea75469fc576e7c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d47d0e5ad343835ee39966c8af65390
SHA1fea37a4efc25a285dbabbe0d153f60ded78d65fd
SHA256c267a0e9f4c3f79d2c11993b82cc23fbfe04eb2aeed5de36dbb3c003a1664dbf
SHA512896bd9eafdd4ae1df6c98a4a8f9373ca4fef66ed63fbfe228b968ccb2d64c40e1de85657afe26e154452fe7e9c99dd20386aac075b05e186fdc2e07e9eaada29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58127e8e19e53d688fdf1b804de0d75f3
SHA1ad4e166fccfa75adf7962f92c4094c4ed25b9ac5
SHA25656c319ea61e627c186d34bddc02ad4c1dd335344cecc64748f720f4bfebc8e97
SHA5122cba693af96777b24c0fe417869183af071cc1c4bd409a037b4b13055d34f1952f6aaaae5ded7609202368231069bfde1accab94b1379c7fcd0f6ab3512c7494
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bb319b2053af1856da8e95869c16955
SHA114a5aaa104d7d5255435f72059e4ed64a0e3fed7
SHA256ed1d3fed371c896cbd0bc165b141ac28212c98e01920b977035bddaa49f04669
SHA512d91e1e8dc6cd20d92789f46d5e91b0ae4b78b483bae5e26a93d9c07186c33fb93c6772903a1fabba29916bb04ec71b3a0b692788cf40cf4d0126d7cb415eb1a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d9c38c4617b8a853fc66a10c6b7fd79d
SHA1bfa57b8596607fc00f27c7ac5d9d7a91b250c218
SHA25683be1e57f05ab5f33f858b281ddb389539733b0ac158de9c562f4595c705b096
SHA512b94ee37e7e7b2a49890778f7ac8936c27bee0db95d8e3004f5bc24c04b33d9f3ecc5597fbdd5486d974c50f04783ee36a7e007301f1009829b4c95349a0d6043
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e723f8dc80594a5533df37dd35b84c3
SHA1e32c8f5244f932db94e385a85460906a99062d14
SHA256989a8eec9a2732ae95ae55e7cab2373d60ca152e6f81ce8730bd7dcd0e506078
SHA512e8f9854f5d4e84e723b10f8f20da8b2c682de429640ad71179eb66d4d64d7146b9d2d50ddbfd4fabc222a914aa2ada7fd9f4a87139dfc7d96f231e3dcfcbdca3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f20f10075938b5ac3cbef80e43ca5f9f
SHA1322536656fd76e9dae4be07481576c66719f109d
SHA2568b97b9b56206f307ea28b3891ea71a3fe4375e2750e028a5c5425568624a2bc3
SHA5120c4c440e23915388c402fb85ff780c26b68988d410b30c7d7d7f237a54307c806ad5c1c1cb2e4b01e83f19e2fe1bd460770a483c70e062395094e06df28fc535
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d96eeb45579b22d8f4d0d8f050923c0a
SHA13e977edc5e41c976854bcf4bd638a44d6ba81761
SHA25612a40d6ad0fcd34b3f4796a508c6d9e3295f427a29e81755c62b3f2d9cf79ca7
SHA5128f993846dd608fe95099fe7349c93e73b8fd21fcaa55ba7e838f7080adfe965d2b99bef17192a87bcf0138a59952096265b4a2642645bccffda6e8efd41585c8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
6KB
MD50a86fa27d09e26491dbbb4fe27f4b410
SHA163e4b5afb8bdb67fc1d6f8dddeb40be20939289e
SHA2562b6d99db8369b0ff6372737d89d1c9e4101815b4168a3852c7b513f2897e7f3d
SHA512fbebc4dc0925d5d67271cac04c1ed324091442ef4c9f6243d2c1c523c9aa6b338c6a594e4987fc142dd3b2a023338a267c8a3454e47fbf0b3e0dbd7b3b65cc0d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b