Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2024, 19:41
Behavioral task
behavioral1
Sample
456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe
Resource
win7-20241010-en
General
-
Target
456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe
-
Size
2.3MB
-
MD5
ad899b402ed0b7312a06655e39cad09d
-
SHA1
0dceb8f1743f3d4d927bda6ac389379dd589561c
-
SHA256
456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700
-
SHA512
026f77794c95c8f6b1fb74035f98848aab6e07c9157462c260b711ca6ebd67c0a3b1e99a917f534ad35a21d130bbe45d36f21d14ab46225ce310d408696e2861
-
SSDEEP
49152:M09XJt4HIN2H2tFvduySepEWoxvPnsHyjtk2MYC5GDW4:xZJt4HINy2LkeKZx3nsmtk2aF4
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
resource yara_rule behavioral2/memory/1908-10-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1908-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1908-6-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2208-16-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1500-25-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2208-22-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1500-31-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2208-30-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1500-38-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/2208-15-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1500-43-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 11 IoCs
resource yara_rule behavioral2/memory/1908-10-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1908-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1908-6-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2208-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1500-25-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2208-22-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1500-31-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2208-30-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1500-38-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/2208-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1500-43-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Gh0strat family
-
Purplefox family
-
Xred family
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 7 IoCs
pid Process 1908 RVN.exe 2208 TXPlatforn.exe 1500 TXPlatforn.exe 3704 HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 4468 ._cache_HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 4232 Synaptics.exe 2176 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe File created C:\Windows\SysWOW64\TXPlatforn.exe RVN.exe -
resource yara_rule behavioral2/memory/1908-5-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1908-10-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1908-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1908-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2208-13-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2208-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1500-25-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2208-22-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1500-31-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2208-30-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1500-38-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/2208-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1500-43-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RVN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TXPlatforn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2084 cmd.exe 4960 PING.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4960 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1288 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1344 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 1344 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1500 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1908 RVN.exe Token: SeLoadDriverPrivilege 1500 TXPlatforn.exe Token: 33 1500 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 1500 TXPlatforn.exe Token: 33 1500 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 1500 TXPlatforn.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 1344 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 1344 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 1288 EXCEL.EXE 1288 EXCEL.EXE 1288 EXCEL.EXE 1288 EXCEL.EXE 1288 EXCEL.EXE 1288 EXCEL.EXE 1288 EXCEL.EXE 1288 EXCEL.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1344 wrote to memory of 1908 1344 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 83 PID 1344 wrote to memory of 1908 1344 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 83 PID 1344 wrote to memory of 1908 1344 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 83 PID 2208 wrote to memory of 1500 2208 TXPlatforn.exe 85 PID 2208 wrote to memory of 1500 2208 TXPlatforn.exe 85 PID 2208 wrote to memory of 1500 2208 TXPlatforn.exe 85 PID 1908 wrote to memory of 2084 1908 RVN.exe 86 PID 1908 wrote to memory of 2084 1908 RVN.exe 86 PID 1908 wrote to memory of 2084 1908 RVN.exe 86 PID 1344 wrote to memory of 3704 1344 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 87 PID 1344 wrote to memory of 3704 1344 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 87 PID 1344 wrote to memory of 3704 1344 456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 87 PID 3704 wrote to memory of 4468 3704 HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 89 PID 3704 wrote to memory of 4468 3704 HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 89 PID 3704 wrote to memory of 4468 3704 HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 89 PID 2084 wrote to memory of 4960 2084 cmd.exe 91 PID 2084 wrote to memory of 4960 2084 cmd.exe 91 PID 2084 wrote to memory of 4960 2084 cmd.exe 91 PID 3704 wrote to memory of 4232 3704 HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 92 PID 3704 wrote to memory of 4232 3704 HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 92 PID 3704 wrote to memory of 4232 3704 HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe 92 PID 4232 wrote to memory of 2176 4232 Synaptics.exe 93 PID 4232 wrote to memory of 2176 4232 Synaptics.exe 93 PID 4232 wrote to memory of 2176 4232 Synaptics.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe"C:\Users\Admin\AppData\Local\Temp\456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\RVN.exeC:\Users\Admin\AppData\Local\Temp\\RVN.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\RVN.exe > nul3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4960
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exeC:\Users\Admin\AppData\Local\Temp\HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\._cache_HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe"C:\Users\Admin\AppData\Local\Temp\._cache_HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4468
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2176
-
-
-
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1288
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\._cache_HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe
Filesize35KB
MD50e20bfff0e17b23201c1ee8859a4e12a
SHA15969b0363421280138c65320061048b6b7036dfe
SHA256075e7ac339e22a77101d227b139a2010b2e97126bb90a6c96cbdec887443da0c
SHA51251c1dd7f970e3a91f73680e4ba8e0036e793def2f4d54476858d17e81bd105d5fc44b620f02ac0a4c66874adf8ff54fa60035eac82ff8c70b7cb902acb88b58e
-
Filesize
22KB
MD5d16db95ffd18e51c0ed578d0ac7c10ac
SHA1376a556c3dcbd9493b922a50b49c28d40589fb4d
SHA256c2fdbc80b1dcc28afeb6da1d6d9910ba634b2d26a71e30058fbe00c2b8ccaf9c
SHA5120ccf0c106d9948d97523babc2b39c23ab720f7970ebb9e8f0a2830abfcf89c7ddc4ecd50cc113f994f6881ce0b5a132342887b7b2e26b60a5238f9f08ae9f0c6
-
C:\Users\Admin\AppData\Local\Temp\HD_456c524f089c0148e37dd1df2bc52bb9de249fa0c7bf7f708b7c2138b006f700.exe
Filesize789KB
MD5515dd523ebda43dc027987f5cb27cc3a
SHA1c93ab31c28c79f71ec13c58c20571461dec9b813
SHA2567a27c6f5da069c41cd3643ed98359b976f7f548ac0f70745906f15b84cffd0b5
SHA5124763f2df8de16931d7c15e28bcc76337e5f1a4686d4613bae9c9abf13617f5803574cd065b00012d9b5e6d0642d4b828b5adcc2604c117ef2102ef52d8ffb829
-
Filesize
1.5MB
MD5d9d481674ffdea74865a6031479962b3
SHA107dbfbd87c719537e616f2347bd66efb3a9a5ae6
SHA25644e5331ce62c8de6480bf05b1c22f4c2ae0ebd7f546cb8f50d078756162f11e3
SHA51226ffff903de9f9f2e43d76648dbec786463759ff2fa5dd80a8ef47b58000682cc54e6b8c0abfce4ac22617a7a94b7fca958b0b770e1b7b5c14b53f936eac4e9a
-
Filesize
377KB
MD580ade1893dec9cab7f2e63538a464fcc
SHA1c06614da33a65eddb506db00a124a3fc3f5be02e
SHA25657a920389c044e3f5cf93dabff67070b4511e79779b6f874e08f92d8b0d7afbd
SHA512fffd4f3fccb5301b3c7a5b3bd92747f31549fbd9d0803fe5d502d1bb0ef979140988718c2ee1406ed3e755790d275185e120a56cbcb5ed2eadf62b5cdbfc4cc4
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04