Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 11:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Strozer2002/sparrow-linux/releases/download/v1.0.1/sparrow-wallet-1.0.0.tar.xz
Resource
win10v2004-20240226-en
General
-
Target
https://github.com/Strozer2002/sparrow-linux/releases/download/v1.0.1/sparrow-wallet-1.0.0.tar.xz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 844 msedge.exe 844 msedge.exe 764 msedge.exe 764 msedge.exe 1672 identity_helper.exe 1672 identity_helper.exe 4792 msedge.exe 4792 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4212 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 764 wrote to memory of 3304 764 msedge.exe 89 PID 764 wrote to memory of 3304 764 msedge.exe 89 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 1100 764 msedge.exe 90 PID 764 wrote to memory of 844 764 msedge.exe 91 PID 764 wrote to memory of 844 764 msedge.exe 91 PID 764 wrote to memory of 4432 764 msedge.exe 92 PID 764 wrote to memory of 4432 764 msedge.exe 92 PID 764 wrote to memory of 4432 764 msedge.exe 92 PID 764 wrote to memory of 4432 764 msedge.exe 92 PID 764 wrote to memory of 4432 764 msedge.exe 92 PID 764 wrote to memory of 4432 764 msedge.exe 92 PID 764 wrote to memory of 4432 764 msedge.exe 92 PID 764 wrote to memory of 4432 764 msedge.exe 92 PID 764 wrote to memory of 4432 764 msedge.exe 92 PID 764 wrote to memory of 4432 764 msedge.exe 92 PID 764 wrote to memory of 4432 764 msedge.exe 92 PID 764 wrote to memory of 4432 764 msedge.exe 92 PID 764 wrote to memory of 4432 764 msedge.exe 92 PID 764 wrote to memory of 4432 764 msedge.exe 92 PID 764 wrote to memory of 4432 764 msedge.exe 92 PID 764 wrote to memory of 4432 764 msedge.exe 92 PID 764 wrote to memory of 4432 764 msedge.exe 92 PID 764 wrote to memory of 4432 764 msedge.exe 92 PID 764 wrote to memory of 4432 764 msedge.exe 92 PID 764 wrote to memory of 4432 764 msedge.exe 92
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Strozer2002/sparrow-linux/releases/download/v1.0.1/sparrow-wallet-1.0.0.tar.xz1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8650546f8,0x7ff865054708,0x7ff8650547182⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,14192678761216014595,6126681343640504749,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,14192678761216014595,6126681343640504749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,14192678761216014595,6126681343640504749,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14192678761216014595,6126681343640504749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14192678761216014595,6126681343640504749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,14192678761216014595,6126681343640504749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,14192678761216014595,6126681343640504749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14192678761216014595,6126681343640504749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14192678761216014595,6126681343640504749,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2040,14192678761216014595,6126681343640504749,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4700 /prefetch:82⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14192678761216014595,6126681343640504749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14192678761216014595,6126681343640504749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6212 /prefetch:12⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14192678761216014595,6126681343640504749,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6204 /prefetch:12⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2040,14192678761216014595,6126681343640504749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4904 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14192678761216014595,6126681343640504749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,14192678761216014595,6126681343640504749,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3008 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3908
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3140
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5080
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4212
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f35bb0615bb9816f562b83304e456294
SHA11049e2bd3e1bbb4cea572467d7c4a96648659cb4
SHA25605e80abd624454e5b860a08f40ddf33d672c3fed319aac180b7de5754bc07b71
SHA512db9100f3e324e74a9c58c7d9f50c25eaa4c6c4553c93bab9b80c6f7bef777db04111ebcd679f94015203b240fe9f4f371cae0d4290ec891a4173c746ff4b11c1
-
Filesize
152B
MD51eb86108cb8f5a956fdf48efbd5d06fe
SHA17b2b299f753798e4891df2d9cbf30f94b39ef924
SHA2561b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40
SHA512e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\0dea8bf6-8001-475c-8445-b2a50fa3ef7e.tmp
Filesize6KB
MD522f50a820c596ce4ef8b28cedbbb45ee
SHA12c282f8dac38477de13d3bc004f7de4ad886b284
SHA2567d90890e60af9e47c7d25045416ebf6ee00586f79c9a7d41bbf915ca17722b9b
SHA5127fadfa0b7d3c5cf9c7deb813b4e8cb8f928b7693d7d4f97bc9697d88afcbe3ac7d18d95c153e22d41efc2716f812c4f8d6a1afa5af921ac3330331c319f6268d
-
Filesize
265B
MD5f5cd008cf465804d0e6f39a8d81f9a2d
SHA16b2907356472ed4a719e5675cc08969f30adc855
SHA256fcea95cc39dc6c2a925f5aed739dbedaa405ee4ce127f535fcf1c751b2b8fb5d
SHA512dc97034546a4c94bdaa6f644b5cfd1e477209de9a03a5b02a360c254a406c1d647d6f90860f385e27387b35631c41f0886cb543ede9116436941b9af6cd3285d
-
Filesize
6KB
MD503854a6e16298bde37c8e49002f7ef92
SHA1648950a94f45ababc36e37153754233bcaa8d03a
SHA256bbd7c0f4d7b234cb0216fda1b412d12a89514c6d984496567b47566b001e4b86
SHA5128fd59b7e1ab3e7b23b767550a142bb953653cbba9d0e33a8df70373b1f97a1ee9cef8b3c9b5d552c443e2b4a3f5ba211f97d961311e572d86ba5630df42be137
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5dd721ebc7be822040d5ae9607007702a
SHA1e323272f7e48c443bfcfd027e7e2f635c2071653
SHA256266c19a5a477e14b09854ef496ea6d77bcfad649dc998cdc7d01e7b491427ff8
SHA512650157d9e774f24d34e73ba3a0150fb2c26970799ed86ae000f748338072e10a2f61261407bc03f531ab7aee5f58af49cb8bcda16d5c50a2aea0836f7b37f6a5
-
Filesize
12KB
MD57388536f0e3f5b8554ed62c5487ca79a
SHA12d28b0d217997d264fc278918a5fe02670c5b8e8
SHA256c037c1b432fd84a89a72f7a3365316a2e315178eb1b7977e8999a60524e69038
SHA512d3ad4498bea8eaf977713f9bc4ee680ea12e02029c727071b9f862d36f257a9d98e8f967ce2e368f0b4a1a0872fdde3b78968330c43490aa2765a293dd5201f0
-
Filesize
12.6MB
MD5cdd3af760dc0d3e417d337d5ad72b2d4
SHA182ef90e70adc9479d296daecb2d6ec979c4c1088
SHA256129b4ce191de50afd3ea2bfb109dcc32a28d8ba2b47515a0f85faeb295bc6ade
SHA5123e0b83fc9eed315759a50f997ba6e628df4b6809dacbc43dba0bd53fb38066e55675f184cc5b7a5361a9f552d58c577d8f7c9eece8b0e626a1b9c7a8fc18d743