Analysis
-
max time kernel
299s -
max time network
301s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 06:41
Static task
static1
Behavioral task
behavioral1
Sample
eCertificate_of_Creditable_Tax.exe
Resource
win7-20240903-en
General
-
Target
eCertificate_of_Creditable_Tax.exe
-
Size
520KB
-
MD5
a012b50429830817e338ccb3ff87ee45
-
SHA1
1adc1332eea02d353fcf6e56f2ed9bfbb1bb552c
-
SHA256
2a054c380923161d18419f731c3409307f344b3a69aa1b0f3497d9f8f183da42
-
SHA512
fe23b81061276062ee997c63ea25758c845ee0de6cfba2b17d2c208b9c89170ede2a2b87d48131daeb5a9f1af372a8676934fa1670e70d9754ff5e4ebba67abe
-
SSDEEP
12288:MguY0rIobzV2KOPxGkYh+BppwW1xErml3PM5I6SWTmCxr3B9jS:IYDcBrkvr71xEofOIBw9jS
Malware Config
Extracted
remcos
HOPE21
uettw81jsq.freedynamicdns.net:6609
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-EF1FKW
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Executes dropped EXE 5 IoCs
Processes:
Gemas.exeGemas.exeGemas.exeGemas.exeGemas.exepid process 2660 Gemas.exe 2160 Gemas.exe 2528 Gemas.exe 1636 Gemas.exe 1928 Gemas.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 6 IoCs
Processes:
eCertificate_of_Creditable_Tax.exeGemas.exeGemas.exeGemas.exeGemas.exeGemas.exedescription pid process target process PID 2600 set thread context of 1868 2600 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2660 set thread context of 2568 2660 Gemas.exe vbc.exe PID 2160 set thread context of 1144 2160 Gemas.exe vbc.exe PID 2528 set thread context of 1888 2528 Gemas.exe vbc.exe PID 1636 set thread context of 1844 1636 Gemas.exe vbc.exe PID 1928 set thread context of 1552 1928 Gemas.exe vbc.exe -
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.execmd.execmd.execmd.execmd.execmd.exeschtasks.execmd.exeschtasks.execmd.exeschtasks.execmd.exeGemas.exeschtasks.execmd.execmd.exeGemas.execmd.exeGemas.execmd.exeGemas.execmd.execmd.execmd.exevbc.execmd.exeGemas.exeschtasks.exeeCertificate_of_Creditable_Tax.exeschtasks.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gemas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gemas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gemas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gemas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gemas.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eCertificate_of_Creditable_Tax.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2520 schtasks.exe 1736 schtasks.exe 2608 schtasks.exe 1148 schtasks.exe 1480 schtasks.exe 1856 schtasks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
eCertificate_of_Creditable_Tax.execmd.exetaskeng.exeGemas.execmd.exedescription pid process target process PID 2600 wrote to memory of 1868 2600 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2600 wrote to memory of 1868 2600 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2600 wrote to memory of 1868 2600 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2600 wrote to memory of 1868 2600 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2600 wrote to memory of 1868 2600 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2600 wrote to memory of 1868 2600 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2600 wrote to memory of 1868 2600 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2600 wrote to memory of 1868 2600 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2600 wrote to memory of 1868 2600 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2600 wrote to memory of 1868 2600 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2600 wrote to memory of 1868 2600 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2600 wrote to memory of 1868 2600 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2600 wrote to memory of 1868 2600 eCertificate_of_Creditable_Tax.exe vbc.exe PID 2600 wrote to memory of 1796 2600 eCertificate_of_Creditable_Tax.exe cmd.exe PID 2600 wrote to memory of 1796 2600 eCertificate_of_Creditable_Tax.exe cmd.exe PID 2600 wrote to memory of 1796 2600 eCertificate_of_Creditable_Tax.exe cmd.exe PID 2600 wrote to memory of 1796 2600 eCertificate_of_Creditable_Tax.exe cmd.exe PID 2600 wrote to memory of 1920 2600 eCertificate_of_Creditable_Tax.exe cmd.exe PID 2600 wrote to memory of 1920 2600 eCertificate_of_Creditable_Tax.exe cmd.exe PID 2600 wrote to memory of 1920 2600 eCertificate_of_Creditable_Tax.exe cmd.exe PID 2600 wrote to memory of 1920 2600 eCertificate_of_Creditable_Tax.exe cmd.exe PID 1920 wrote to memory of 2608 1920 cmd.exe schtasks.exe PID 1920 wrote to memory of 2608 1920 cmd.exe schtasks.exe PID 1920 wrote to memory of 2608 1920 cmd.exe schtasks.exe PID 1920 wrote to memory of 2608 1920 cmd.exe schtasks.exe PID 2600 wrote to memory of 2392 2600 eCertificate_of_Creditable_Tax.exe cmd.exe PID 2600 wrote to memory of 2392 2600 eCertificate_of_Creditable_Tax.exe cmd.exe PID 2600 wrote to memory of 2392 2600 eCertificate_of_Creditable_Tax.exe cmd.exe PID 2600 wrote to memory of 2392 2600 eCertificate_of_Creditable_Tax.exe cmd.exe PID 2776 wrote to memory of 2660 2776 taskeng.exe Gemas.exe PID 2776 wrote to memory of 2660 2776 taskeng.exe Gemas.exe PID 2776 wrote to memory of 2660 2776 taskeng.exe Gemas.exe PID 2776 wrote to memory of 2660 2776 taskeng.exe Gemas.exe PID 2660 wrote to memory of 2568 2660 Gemas.exe vbc.exe PID 2660 wrote to memory of 2568 2660 Gemas.exe vbc.exe PID 2660 wrote to memory of 2568 2660 Gemas.exe vbc.exe PID 2660 wrote to memory of 2568 2660 Gemas.exe vbc.exe PID 2660 wrote to memory of 2568 2660 Gemas.exe vbc.exe PID 2660 wrote to memory of 2568 2660 Gemas.exe vbc.exe PID 2660 wrote to memory of 2568 2660 Gemas.exe vbc.exe PID 2660 wrote to memory of 2568 2660 Gemas.exe vbc.exe PID 2660 wrote to memory of 2568 2660 Gemas.exe vbc.exe PID 2660 wrote to memory of 2568 2660 Gemas.exe vbc.exe PID 2660 wrote to memory of 2568 2660 Gemas.exe vbc.exe PID 2660 wrote to memory of 2568 2660 Gemas.exe vbc.exe PID 2660 wrote to memory of 2568 2660 Gemas.exe vbc.exe PID 2660 wrote to memory of 3032 2660 Gemas.exe cmd.exe PID 2660 wrote to memory of 3032 2660 Gemas.exe cmd.exe PID 2660 wrote to memory of 3032 2660 Gemas.exe cmd.exe PID 2660 wrote to memory of 3032 2660 Gemas.exe cmd.exe PID 2660 wrote to memory of 2516 2660 Gemas.exe cmd.exe PID 2660 wrote to memory of 2516 2660 Gemas.exe cmd.exe PID 2660 wrote to memory of 2516 2660 Gemas.exe cmd.exe PID 2660 wrote to memory of 2516 2660 Gemas.exe cmd.exe PID 2516 wrote to memory of 1148 2516 cmd.exe schtasks.exe PID 2516 wrote to memory of 1148 2516 cmd.exe schtasks.exe PID 2516 wrote to memory of 1148 2516 cmd.exe schtasks.exe PID 2516 wrote to memory of 1148 2516 cmd.exe schtasks.exe PID 2660 wrote to memory of 2736 2660 Gemas.exe cmd.exe PID 2660 wrote to memory of 2736 2660 Gemas.exe cmd.exe PID 2660 wrote to memory of 2736 2660 Gemas.exe cmd.exe PID 2660 wrote to memory of 2736 2660 Gemas.exe cmd.exe PID 2776 wrote to memory of 2160 2776 taskeng.exe Gemas.exe PID 2776 wrote to memory of 2160 2776 taskeng.exe Gemas.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eCertificate_of_Creditable_Tax.exe"C:\Users\Admin\AppData\Local\Temp\eCertificate_of_Creditable_Tax.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1868
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Local\Temp\Gemas"2⤵
- System Location Discovery: System Language Discovery
PID:1796
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2608
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\eCertificate_of_Creditable_Tax.exe" "C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2392
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {458C9925-1CA3-4BD9-AEC2-6F024E66D7E8} S-1-5-21-2872745919-2748461613-2989606286-1000:CCJBVTGQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exeC:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵PID:2568
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Local\Temp\Gemas"3⤵
- System Location Discovery: System Language Discovery
PID:3032
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1148
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe" "C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2736
-
-
-
C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exeC:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2160 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵PID:1144
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Local\Temp\Gemas"3⤵
- System Location Discovery: System Language Discovery
PID:1844
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f3⤵
- System Location Discovery: System Language Discovery
PID:1472 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1480
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe" "C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe"3⤵
- System Location Discovery: System Language Discovery
PID:916
-
-
-
C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exeC:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2528 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵PID:1888
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Local\Temp\Gemas"3⤵
- System Location Discovery: System Language Discovery
PID:2380
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f3⤵
- System Location Discovery: System Language Discovery
PID:3060 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1856
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe" "C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2848
-
-
-
C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exeC:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1636 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵PID:1844
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Local\Temp\Gemas"3⤵
- System Location Discovery: System Language Discovery
PID:2436
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f3⤵
- System Location Discovery: System Language Discovery
PID:1428 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2520
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe" "C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1924
-
-
-
C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exeC:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵PID:1552
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C mkdir "C:\Users\Admin\AppData\Local\Temp\Gemas"3⤵
- System Location Discovery: System Language Discovery
PID:2260
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f3⤵
- System Location Discovery: System Language Discovery
PID:2332 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe'" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1736
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe" "C:\Users\Admin\AppData\Local\Temp\Gemas\Gemas.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2872
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520KB
MD5a012b50429830817e338ccb3ff87ee45
SHA11adc1332eea02d353fcf6e56f2ed9bfbb1bb552c
SHA2562a054c380923161d18419f731c3409307f344b3a69aa1b0f3497d9f8f183da42
SHA512fe23b81061276062ee997c63ea25758c845ee0de6cfba2b17d2c208b9c89170ede2a2b87d48131daeb5a9f1af372a8676934fa1670e70d9754ff5e4ebba67abe