Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2023 01:57
Static task
static1
Behavioral task
behavioral1
Sample
646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe
Resource
win10v2004-20230915-en
General
-
Target
646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe
-
Size
2.7MB
-
MD5
e2fe292a8e565e5cd70e0464cf4d448f
-
SHA1
f1bce048971b051983fd2b19d12de642b72be3a0
-
SHA256
646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714
-
SHA512
413df4d0679467f47c2f366a792d09103476a92e2290141488d104055b01201754405ea9e30c21ba464a9700d965d08c817cf9532c4c645ad3fef528a4110d6b
-
SSDEEP
49152:Ax0zsq3OZnoNGg8pmEdJBSfFc+cZh80ydKsagsd2bQmBBxzaCzwmM:rsqUcdQmBBNLz6
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4284 Logo1_.exe 4700 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe 3368 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\7z.exe Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ar\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\mn\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\ringless_calls\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsSoundRecorder_10.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\capture\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Viewer\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\lib\deployed\jdk16\windows-amd64\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\an\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\packetizer\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ast\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\contrast-black\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Views\Utilities\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\it-IT\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-100_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\.settings\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\lib\deployed\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\contrast-white\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\fi-FI\View3d\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\ja-JP\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jarsigner.exe Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ps\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\HoloAssets\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\LTR\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\RTL\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Text\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\core\locale\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\control\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\pt-PT\View3d\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Functions\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_output\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bg\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\br\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sl\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxIdentityProvider_12.50.6001.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-white\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\en_GB\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\reader\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\microsoft.system.package.metadata\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\configuration\org.eclipse.update\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\winsdkfb\Images\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_x64__8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\kk\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\WinMetadata\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ms\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.Wallet_2.4.18324.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_neutral_~_8wekyb3d8bbwe\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\rundl132.exe 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe File created C:\Windows\Logo1_.exe 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4284 Logo1_.exe 4284 Logo1_.exe 4284 Logo1_.exe 4284 Logo1_.exe 4284 Logo1_.exe 4284 Logo1_.exe 4284 Logo1_.exe 4284 Logo1_.exe 4284 Logo1_.exe 4284 Logo1_.exe 4284 Logo1_.exe 4284 Logo1_.exe 4284 Logo1_.exe 4284 Logo1_.exe 4284 Logo1_.exe 4284 Logo1_.exe 4284 Logo1_.exe 4284 Logo1_.exe 4284 Logo1_.exe 4284 Logo1_.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2940 1688 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe 86 PID 1688 wrote to memory of 2940 1688 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe 86 PID 1688 wrote to memory of 2940 1688 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe 86 PID 1688 wrote to memory of 4284 1688 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe 88 PID 1688 wrote to memory of 4284 1688 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe 88 PID 1688 wrote to memory of 4284 1688 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe 88 PID 4284 wrote to memory of 4108 4284 Logo1_.exe 89 PID 4284 wrote to memory of 4108 4284 Logo1_.exe 89 PID 4284 wrote to memory of 4108 4284 Logo1_.exe 89 PID 4108 wrote to memory of 2624 4108 net.exe 91 PID 4108 wrote to memory of 2624 4108 net.exe 91 PID 4108 wrote to memory of 2624 4108 net.exe 91 PID 2940 wrote to memory of 4700 2940 cmd.exe 92 PID 2940 wrote to memory of 4700 2940 cmd.exe 92 PID 4700 wrote to memory of 3368 4700 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe 93 PID 4700 wrote to memory of 3368 4700 646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe 93 PID 4284 wrote to memory of 3176 4284 Logo1_.exe 53 PID 4284 wrote to memory of 3176 4284 Logo1_.exe 53
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe"C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a7407.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe"C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exeC:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --no-rate-limit --no-upload-gzip "--database=C:\Users\Admin\AppData\Local\123Browser\User Data\Crashpad" --url=https://123llq.com/dump/upload/ --annotation=plat=Win64 --annotation=prod=123Browser --annotation=ver=2.1.28.3 --initial-client-data=0x25c,0x260,0x264,0x238,0x268,0x7ff69f24bbc0,0x7ff69f24bbd0,0x7ff69f24bbe05⤵
- Executes dropped EXE
PID:3368
-
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵PID:2624
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
484KB
MD53eb5d61205d59f189d836085f29d6cce
SHA1db4833e42aff151aeffd16692b89d7bb8ce9f4c1
SHA256449ce629cada08f8bbaf26748133ccac218a3363696da6ce3b065e1795b0f79b
SHA512d90d6f70583e883466524be82b75d23679859a88f1d7215200483b8e07247848160a03a75f3078df18eb35416fbc3430fb4b219ee6b144027cb3b1a7cc2fdb1e
-
Filesize
40B
MD5dc5a89282eff3c866c34a11509b061df
SHA1648f6b35615dbf04d806b2749f91f00087931a3f
SHA25644f731a1e315fe18f277cb96e0a7f195714123a8099c460ef02f76ce431f45f0
SHA51277b83bd81a53c6fa9cd47c85822ce8c11a2f581727e4d16c202e1acf7afd21e67690410a31eefe4fe16a20c08b07a402b333fabb316187b99c2005e2507892ec
-
Filesize
722B
MD5bd3456329d160bebc50a0966f3151456
SHA1ebacaf609760c9ab1cab7310589a0d11294b65ff
SHA256e9db9d4861f9a4b6e61bf07d057e96f32dac9e58f099c64c7855ea2524e5e0f3
SHA5128902c6c14c9128cc2bf95179914782cf48479322e71d6ecc6f74e871766e9923c348d7924b2f139aaef9175e48b02c696bbafdb2507cc27c50f80910ffe3d688
-
C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe
Filesize2.7MB
MD560ab0daed9d1aabc9dddbe1ff9ce19ca
SHA173eaf43a6a935feed8bf6a89471ff116c41e9688
SHA256a01a6190b778982a7225c2a50325d9063f9eed8bbaeda410472610643bfb2f0a
SHA5120dd9f8c1676ffb4df5bc7e5448dd3bd70df6589aac338c865cf888d4ecb01c96d6a3078e03bcc4678cdb673b71ea8ca2a64e5cf720bed68845fed22485945283
-
C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe
Filesize2.7MB
MD560ab0daed9d1aabc9dddbe1ff9ce19ca
SHA173eaf43a6a935feed8bf6a89471ff116c41e9688
SHA256a01a6190b778982a7225c2a50325d9063f9eed8bbaeda410472610643bfb2f0a
SHA5120dd9f8c1676ffb4df5bc7e5448dd3bd70df6589aac338c865cf888d4ecb01c96d6a3078e03bcc4678cdb673b71ea8ca2a64e5cf720bed68845fed22485945283
-
C:\Users\Admin\AppData\Local\Temp\646502f9091773085cbf4cc9651f6292f0ee25d973c267b5af84a2742350c714.exe.exe
Filesize2.7MB
MD560ab0daed9d1aabc9dddbe1ff9ce19ca
SHA173eaf43a6a935feed8bf6a89471ff116c41e9688
SHA256a01a6190b778982a7225c2a50325d9063f9eed8bbaeda410472610643bfb2f0a
SHA5120dd9f8c1676ffb4df5bc7e5448dd3bd70df6589aac338c865cf888d4ecb01c96d6a3078e03bcc4678cdb673b71ea8ca2a64e5cf720bed68845fed22485945283
-
Filesize
26KB
MD5ef3256717d6b0edc9776e10d8a519313
SHA1c7629324ead6c72e3aaec3c4715ecafb752e305c
SHA25671fdb7e7308c8cc0b0287ab175de70c1110bc506198983a7ee341951f07328a5
SHA512eeb5fc7cb46ffb4d261da3c1626a83da7a10d8a0b51147e74e594341d5c0b383d5dc2ae43133c28656dfc63f1ea98c513ceaf622c9036a206716509d14748c77
-
Filesize
26KB
MD5ef3256717d6b0edc9776e10d8a519313
SHA1c7629324ead6c72e3aaec3c4715ecafb752e305c
SHA25671fdb7e7308c8cc0b0287ab175de70c1110bc506198983a7ee341951f07328a5
SHA512eeb5fc7cb46ffb4d261da3c1626a83da7a10d8a0b51147e74e594341d5c0b383d5dc2ae43133c28656dfc63f1ea98c513ceaf622c9036a206716509d14748c77
-
Filesize
26KB
MD5ef3256717d6b0edc9776e10d8a519313
SHA1c7629324ead6c72e3aaec3c4715ecafb752e305c
SHA25671fdb7e7308c8cc0b0287ab175de70c1110bc506198983a7ee341951f07328a5
SHA512eeb5fc7cb46ffb4d261da3c1626a83da7a10d8a0b51147e74e594341d5c0b383d5dc2ae43133c28656dfc63f1ea98c513ceaf622c9036a206716509d14748c77
-
Filesize
10B
MD53fa5f43b227b96d6334e4649982d21b7
SHA1aaca225fe44f532099d2d7d7b00d80ebc3dd003b
SHA256d8fdb800da5ad9cc8b64df32df8c6006127fb46c590ee39f84bfd8b4f8912358
SHA5122bf18238a4b94cb61fdd22c61007bc5cbb7fc712b69685cc03efc548622dc365f07159a6599192b1aed0c2ffa9911fbeb321323f7bf24c8706d52adff07e432e