Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 00:42
Static task
static1
Behavioral task
behavioral1
Sample
437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe
-
Size
91KB
-
MD5
437059b382e4dea5f0bb27c988d1f040
-
SHA1
bb20aa51489dab0338c3f04db7aeee038bd2a387
-
SHA256
727066fb55f328fb92f99d0134414d164e078d56cd25803fa5c4721c456ae683
-
SHA512
6d6e57e911700ddb38f0bfd120d84da30624836bec92b2881edf5827af4ffbd95f25eeb3e8fd6e8a7cfe7c6129f0b62fa3688ff301e3dfe8dcc0abac14a43e9d
-
SSDEEP
1536:zAwEmBZ04faWmtN4nic+6GUAwEmBZ04faWmtN4nic+6GU:zGms4Eton0UGms4Eton0U
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 1520 xk.exe 4192 IExplorer.exe 1076 WINLOGON.EXE 4268 CSRSS.EXE 1640 SERVICES.EXE 2616 LSASS.EXE 3828 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell.exe 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Mig2.scr 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe File created C:\Windows\SysWOW64\IExplorer.exe 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\shell.exe 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe File created C:\Windows\xk.exe 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\ 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 900 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe 900 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 900 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe 1520 xk.exe 4192 IExplorer.exe 1076 WINLOGON.EXE 4268 CSRSS.EXE 1640 SERVICES.EXE 2616 LSASS.EXE 3828 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 900 wrote to memory of 1520 900 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe 82 PID 900 wrote to memory of 1520 900 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe 82 PID 900 wrote to memory of 1520 900 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe 82 PID 900 wrote to memory of 4192 900 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe 83 PID 900 wrote to memory of 4192 900 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe 83 PID 900 wrote to memory of 4192 900 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe 83 PID 900 wrote to memory of 1076 900 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe 84 PID 900 wrote to memory of 1076 900 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe 84 PID 900 wrote to memory of 1076 900 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe 84 PID 900 wrote to memory of 4268 900 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe 85 PID 900 wrote to memory of 4268 900 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe 85 PID 900 wrote to memory of 4268 900 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe 85 PID 900 wrote to memory of 1640 900 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe 86 PID 900 wrote to memory of 1640 900 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe 86 PID 900 wrote to memory of 1640 900 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe 86 PID 900 wrote to memory of 2616 900 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe 88 PID 900 wrote to memory of 2616 900 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe 88 PID 900 wrote to memory of 2616 900 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe 88 PID 900 wrote to memory of 3828 900 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe 89 PID 900 wrote to memory of 3828 900 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe 89 PID 900 wrote to memory of 3828 900 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe 89 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\437059b382e4dea5f0bb27c988d1f040_NeikiAnalytics.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:900 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1520
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4192
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1076
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4268
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1640
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2616
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3828
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5341d69761a7872e5b713489e430a5bf4
SHA182035c50fcf0fded460a3f69f3c4b85e37e4e408
SHA256110174f473391b39b826c788a58fc92fc2d2a92aee90755d24401d303933c845
SHA5125790ce7f135a52b74095bec9f902d40b782f66defcaec16987762d4a635114e35798a5a867b134d7d65a1b7a38e4c746708fccb910919d1b7aca693ad2ebebc7
-
Filesize
91KB
MD5437059b382e4dea5f0bb27c988d1f040
SHA1bb20aa51489dab0338c3f04db7aeee038bd2a387
SHA256727066fb55f328fb92f99d0134414d164e078d56cd25803fa5c4721c456ae683
SHA5126d6e57e911700ddb38f0bfd120d84da30624836bec92b2881edf5827af4ffbd95f25eeb3e8fd6e8a7cfe7c6129f0b62fa3688ff301e3dfe8dcc0abac14a43e9d
-
Filesize
91KB
MD5425f864650ce8da95b372d8caf88e2f5
SHA112b9f268d45aa719a2d4e82fc0eb7335b92acf45
SHA256ff62d8e5af4f3f9cc9a64ed928b50f74a483dee3c612ecda84dea4fe4fed18e5
SHA512094403512d2bd4db58d02e96dee27b8f01f00ca3f4092517c3c1c69a08a36a198130ceadb94305e677e8e1f02f3bb3d77f19038f6ec429800ef6cef352d82163
-
Filesize
91KB
MD546f9f1243c75f30c550be2d04f2abe24
SHA1c89925ce81a6a33c191fba88d076865fe8d1e59f
SHA256574e973106c0e5e5e1fa9f2676d8a8c09344b6e0017c55bfa0ac57961b8a467d
SHA5125d9f65cf091cc5fb132f7364264d1fa3542bf1c6b5b62be330f906c0f02615e589c071ddbebde6b0e59c6984b2234dc92647c9e98639e8146740b91d7f76afd4
-
Filesize
91KB
MD5ebdc12f2781858aa8cb96f1b5fc8a812
SHA134faff2bc4ba7eaafe57ad885fbfbc09d934816e
SHA256c664f71d1839a50a01463299cc9b1fc9da3bdfc92f468cb3d54aa7640ecb898f
SHA512f5fb975d897e31356cedfc95bf6f05c71bb6c2628e1770f33a7fbaaa7e5d388ce1acfbf2816ab5f84b776402eec3c0c7705106e5ec45b0b85589ca3b4cf7b197
-
Filesize
91KB
MD53422714035198ba7387b32f8e13b9ade
SHA170ebc128b0d9ef908503de3e7e2e99cd3dd03335
SHA256df555c11e6a6ad8edc780bce99b8e91ad13ada9a5bb583cab5f63e4d3f94123a
SHA5126f416213ae6a46f5e8b671abb5b720d3b81df3d195760405a68e80e3b7a6008acb32eecdc2613590feeeb8bd55946b317cf5447d441a13634a3d6fbf076c149a
-
Filesize
91KB
MD5e3a77f0c8f2d89e69dee36a13736f8a4
SHA129ff993ff7e562101e5887104e57cd4ce0d31a68
SHA256ca6e813bd3aa415a0ec699696dc56f642cf494e45a1d4cbe8078e6d04c389943
SHA51240bab3a4d11e7805631bc95f9feebd60c90434ecf00c201741aea733177d72014821c6beba21722f0a94e2c161d72e31096a99722235605753ae7208590b1ef1
-
Filesize
91KB
MD52dfef8b2093da8f6a1251948193a6067
SHA13218da4df5784c8c91e8b322c1245ca2cc88937d
SHA2562398dcd4bc8254a7aa75a6a5dac8463940bf534153210aa1fe0514871c8a47c5
SHA5126b5f0583a9d1afd616b8242f8b35fe1bdd1cebf6cc39a5e17755f1b6bcabd095217ccadb9696a3854782fa8d8d8e26bc3760f14ebe6e58fb99aa372248af9aa7