Overview
overview
6Static
static
3BetterDisc...ws.exe
windows7-x64
5BetterDisc...ws.exe
windows10-2004-x64
6$PLUGINSDI...ge.dll
windows7-x64
1$PLUGINSDI...ge.dll
windows10-2004-x64
1$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3BetterDiscord.exe
windows7-x64
5BetterDiscord.exe
windows10-2004-x64
5LICENSES.c...m.html
windows7-x64
1LICENSES.c...m.html
windows10-2004-x64
1d3dcompiler_47.dll
windows10-2004-x64
3ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
3libGLESv2.dll
windows10-2004-x64
3resources/app.js
windows7-x64
1resources/app.js
windows10-2004-x64
1swiftshade...GL.dll
windows7-x64
1swiftshade...GL.dll
windows10-2004-x64
1swiftshade...v2.dll
windows7-x64
1swiftshade...v2.dll
windows10-2004-x64
1vk_swiftshader.dll
windows7-x64
1vk_swiftshader.dll
windows10-2004-x64
1vulkan-1.dll
windows7-x64
3vulkan-1.dll
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 15:50
Static task
static1
Behavioral task
behavioral1
Sample
BetterDiscord-Windows.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
BetterDiscord-Windows.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/BgImage.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/BgImage.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
BetterDiscord.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
BetterDiscord.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
LICENSES.chromium.html
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
LICENSES.chromium.html
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
d3dcompiler_47.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral14
Sample
ffmpeg.dll
Resource
win7-20231215-en
Behavioral task
behavioral15
Sample
ffmpeg.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral16
Sample
libEGL.dll
Resource
win7-20231129-en
Behavioral task
behavioral17
Sample
libEGL.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral18
Sample
libGLESv2.dll
Resource
win7-20231215-en
Behavioral task
behavioral19
Sample
libGLESv2.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral20
Sample
resources/app.js
Resource
win7-20231215-en
Behavioral task
behavioral21
Sample
resources/app.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral22
Sample
swiftshader/libEGL.dll
Resource
win7-20231215-en
Behavioral task
behavioral23
Sample
swiftshader/libEGL.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral24
Sample
swiftshader/libGLESv2.dll
Resource
win7-20231215-en
Behavioral task
behavioral25
Sample
swiftshader/libGLESv2.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral26
Sample
vk_swiftshader.dll
Resource
win7-20231129-en
Behavioral task
behavioral27
Sample
vk_swiftshader.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral28
Sample
vulkan-1.dll
Resource
win7-20231215-en
Behavioral task
behavioral29
Sample
vulkan-1.dll
Resource
win10v2004-20231215-en
General
-
Target
LICENSES.chromium.html
-
Size
5.1MB
-
MD5
6b84319ee8a0a0af690273d3d2dcbaf4
-
SHA1
857ca353e0582d100dcbc6cb6761bb4430d0cb90
-
SHA256
fc2a256467fb4d4ff72be6c423e5961e98b418554deeec296aded0e757b9a585
-
SHA512
26f9842bfdb429ef132cc1a930da9187071a339927eda402e8d54b5eb9e03067612cdadc3a2dad3d0977f8e6af18c05eab6ac91720221c6a0104f96638f85a8a
-
SSDEEP
24576:yd97B+mnLiLsrDy2VrErjKCqzkU98wwg3QeXuh:0P+mLAqHBCuRoeS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4544 msedge.exe 4544 msedge.exe 2124 msedge.exe 2124 msedge.exe 2828 identity_helper.exe 2828 identity_helper.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe 2140 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2404 2124 msedge.exe 42 PID 2124 wrote to memory of 2404 2124 msedge.exe 42 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 1044 2124 msedge.exe 84 PID 2124 wrote to memory of 4544 2124 msedge.exe 86 PID 2124 wrote to memory of 4544 2124 msedge.exe 86 PID 2124 wrote to memory of 2448 2124 msedge.exe 85 PID 2124 wrote to memory of 2448 2124 msedge.exe 85 PID 2124 wrote to memory of 2448 2124 msedge.exe 85 PID 2124 wrote to memory of 2448 2124 msedge.exe 85 PID 2124 wrote to memory of 2448 2124 msedge.exe 85 PID 2124 wrote to memory of 2448 2124 msedge.exe 85 PID 2124 wrote to memory of 2448 2124 msedge.exe 85 PID 2124 wrote to memory of 2448 2124 msedge.exe 85 PID 2124 wrote to memory of 2448 2124 msedge.exe 85 PID 2124 wrote to memory of 2448 2124 msedge.exe 85 PID 2124 wrote to memory of 2448 2124 msedge.exe 85 PID 2124 wrote to memory of 2448 2124 msedge.exe 85 PID 2124 wrote to memory of 2448 2124 msedge.exe 85 PID 2124 wrote to memory of 2448 2124 msedge.exe 85 PID 2124 wrote to memory of 2448 2124 msedge.exe 85 PID 2124 wrote to memory of 2448 2124 msedge.exe 85 PID 2124 wrote to memory of 2448 2124 msedge.exe 85 PID 2124 wrote to memory of 2448 2124 msedge.exe 85 PID 2124 wrote to memory of 2448 2124 msedge.exe 85 PID 2124 wrote to memory of 2448 2124 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\LICENSES.chromium.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb03a46f8,0x7ffcb03a4708,0x7ffcb03a47182⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,3150305459196338679,8196583448950582972,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,3150305459196338679,8196583448950582972,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,3150305459196338679,8196583448950582972,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3150305459196338679,8196583448950582972,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3150305459196338679,8196583448950582972,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,3150305459196338679,8196583448950582972,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:82⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,3150305459196338679,8196583448950582972,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3150305459196338679,8196583448950582972,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1972 /prefetch:12⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3150305459196338679,8196583448950582972,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3150305459196338679,8196583448950582972,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3916 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3150305459196338679,8196583448950582972,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,3150305459196338679,8196583448950582972,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1968 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1508
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51386433ecc349475d39fb1e4f9e149a0
SHA1f04f71ac77cb30f1d04fd16d42852322a8b2680f
SHA256a7c79320a37d3516823f533e0ca73ed54fc4cdade9999b9827d06ea9f8916bbc
SHA512fcd5449c58ead25955d01739929c42ffc89b9007bc2c8779c05271f2d053be66e05414c410738c35572ef31811aff908e7fe3dd7a9cef33c27acb308a420280e
-
Filesize
5KB
MD54eddd7ed72a5e89e19ec52a6bc1dad34
SHA133e43db0395950f6b8917dfc2b436ea5bda90038
SHA256cd6375c043a7747d521fa862780c1daea0a748fca1762e0bcf89cf3afe05dc82
SHA512a67030e76b08ce81a9f22efad22679e28aff15d07341c5f8c5b75a6bf8fa04776af6eafe94cc324bf4d3ea8136e9b87bef6566a35d4ce03127e66482b09d4168
-
Filesize
5KB
MD531f978f5b6445817c6ac4ea9e90acad3
SHA1050665e08b5b5b0a3c8138d9051cb2fc8606f348
SHA256a4d1e237dd093522cc17508417b7292c72677438878b42b074a658757eed8a6f
SHA51241532a80f178cc648f8203960427933ae2c2a3346f41ec2b76de8ea475cbbd2f1170568f0e4b003148512fbb788fe9b28f6849fc362711a5193d0032b277a204
-
Filesize
24KB
MD5e664066e3aa135f185ed1c194b9fa1f8
SHA1358ff3c6ad0580b8ae1e5ef2a89a4e597c2efdc5
SHA25686e595be48dbc768a52d7ea62116036c024093e1302aced8c29dd6a2d9935617
SHA51258710818b5f664006a5aa418da6c8cd3f709c2265bc161f81b9dfe6cdb8304fabaa4ce9deba419fe4281623feeeaa0321f481ae5855d347c6d8cf95968ee905e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5716186d884eccdf5ae00cbb3d9890cde
SHA1a9fa06ea9265ad3732d596abccb8facba4f782b4
SHA256759a33049b7008877d3f89e0642473f7f9d5f75166f47869c497d7edd40d3764
SHA512763bb514a3e480fe3581916e77d546ccd6eab4f0f7d052a459268c37fdb4017f13875b023e73c7a36c7442cfdd3d1703928566374250c607dde5f3079ac57716