Analysis
-
max time kernel
133s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2024 03:36
Behavioral task
behavioral1
Sample
30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe
-
Size
91KB
-
MD5
30a050e49a3f567fc2c7983056cdc820
-
SHA1
10b845aaeda73a3142106ab367889a5d475b4b34
-
SHA256
8454c949cbdca36e697202efd9fa718c67dcd03453ef69487ca11ccb21a14a6c
-
SHA512
7de5df64bce0c55182af9933c251541864fee8a3daaa0c2ba1f81c89c01effed5f59ef57072475f89a1b99ab9c7ff315a08c59de1526a5bc5856b6ecf3f588f8
-
SSDEEP
1536:jRsjdEIUFC2p79OCnouy8VDbRsjdEIUFC2p79OCnouy8VD/:jOm9CshoutdbOm9Cshoutd/
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 1016 xk.exe 432 IExplorer.exe 5076 WINLOGON.EXE 1516 CSRSS.EXE 4024 SERVICES.EXE 3312 LSASS.EXE 636 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe -
resource yara_rule behavioral2/memory/2248-0-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000233f7-8.dat upx behavioral2/files/0x00070000000233fb-106.dat upx behavioral2/memory/1016-111-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x00070000000233ff-112.dat upx behavioral2/memory/432-114-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x0007000000023401-120.dat upx behavioral2/memory/432-119-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/5076-124-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x0007000000023402-126.dat upx behavioral2/memory/1516-130-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x0007000000023403-132.dat upx behavioral2/memory/4024-138-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x0007000000023404-139.dat upx behavioral2/memory/3312-144-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x0007000000023405-147.dat upx behavioral2/memory/636-151-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/2248-152-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell.exe 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Mig2.scr 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe File created C:\Windows\SysWOW64\IExplorer.exe 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\shell.exe 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe File created C:\Windows\xk.exe 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\Desktop\ 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2248 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe 2248 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2248 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe 1016 xk.exe 432 IExplorer.exe 5076 WINLOGON.EXE 1516 CSRSS.EXE 4024 SERVICES.EXE 3312 LSASS.EXE 636 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2248 wrote to memory of 1016 2248 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe 82 PID 2248 wrote to memory of 1016 2248 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe 82 PID 2248 wrote to memory of 1016 2248 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe 82 PID 2248 wrote to memory of 432 2248 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe 83 PID 2248 wrote to memory of 432 2248 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe 83 PID 2248 wrote to memory of 432 2248 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe 83 PID 2248 wrote to memory of 5076 2248 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe 84 PID 2248 wrote to memory of 5076 2248 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe 84 PID 2248 wrote to memory of 5076 2248 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe 84 PID 2248 wrote to memory of 1516 2248 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe 85 PID 2248 wrote to memory of 1516 2248 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe 85 PID 2248 wrote to memory of 1516 2248 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe 85 PID 2248 wrote to memory of 4024 2248 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe 86 PID 2248 wrote to memory of 4024 2248 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe 86 PID 2248 wrote to memory of 4024 2248 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe 86 PID 2248 wrote to memory of 3312 2248 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe 87 PID 2248 wrote to memory of 3312 2248 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe 87 PID 2248 wrote to memory of 3312 2248 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe 87 PID 2248 wrote to memory of 636 2248 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe 88 PID 2248 wrote to memory of 636 2248 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe 88 PID 2248 wrote to memory of 636 2248 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe 88 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\30a050e49a3f567fc2c7983056cdc820_NeikiAnalytics.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2248 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1016
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:432
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5076
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1516
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4024
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3312
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:636
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD52d7c3a875b1c9f702358cbbb2b9e4c76
SHA10cb26ae8296c5bf4f9d084cb91c3addbc42be9db
SHA2560b0fe8f63476e601549431c8b4edc6e24081600703f9e80a5c36b516d7699707
SHA51247ff714cd6be64232c4edae4d5ace88e212210dc10df6c13b88306b5de32ecf2780b9e4dd11633931d997d3e79b05f1d747150574e33e8f4ce82915b94b35df0
-
Filesize
91KB
MD575c8e1e480e84204623fb403f6c0b1ff
SHA1affff9cd0d7af4a1b5cbaadba0fe04cf78c2ed80
SHA256a18663d9b439fe9c1248653f8d45a38691fdff5c9eceee86fcb5a8a182ee09f2
SHA51270a6349396c8c2bf1d2fb7a62c7263e557cc72ddfd731bb7860bb8374e44a02c5345af591c33791908f4dcbf522ed4445478afe022c8f8ab7f64a640729268f3
-
Filesize
91KB
MD5ca12256529faae087f940f7faec699b7
SHA171bad9f51e6540b164abf1f49e9fd57f4c996cef
SHA2560a4c7c982b62e0ec6f46123a43661e65f82638d31b7bc4a3cbf16affdfb3557a
SHA512bc302fc930e4bd024ae77f2312f0aa8fa3c9df336626a1793682b2198bf3bf33debb42a71bed4bbb8f20d044db78f6a77a9f845de9918061b49c5d80cee18c40
-
Filesize
91KB
MD5e6b26211aec787ccf0f93117c97f4faa
SHA1bcef0d1cb46080d85694e1c7542b29471dbeab8b
SHA25601d2f2b4d6731f5e92c191ba052b1b381cd96b818a189d8a62611beda50b6242
SHA51252c74d7ffb69c10525c9f31c02af2757146d2153c5add3ffe0ff9cfc39f2db55fcc6f07ae3d5a09cc85eacedc380667802dc57109a6df82224f0317be3b0710c
-
Filesize
91KB
MD530a050e49a3f567fc2c7983056cdc820
SHA110b845aaeda73a3142106ab367889a5d475b4b34
SHA2568454c949cbdca36e697202efd9fa718c67dcd03453ef69487ca11ccb21a14a6c
SHA5127de5df64bce0c55182af9933c251541864fee8a3daaa0c2ba1f81c89c01effed5f59ef57072475f89a1b99ab9c7ff315a08c59de1526a5bc5856b6ecf3f588f8
-
Filesize
91KB
MD513c7bf1f03123d45bbcce6e7c6046fd2
SHA132938a401112ec218c43dc7760220756f4210556
SHA25662da19a6a6793e195f76f26829f0753e77d4c91a3d29b1db640c30638175f68b
SHA512a1fe7ad3c40df51cf99e18824b526c6b4fccf0fbcc658251787fdd1a6d1e4484c5b2109fae0879936e8e95df848f795c992d3e75ed5957b037cfe2f644ee4d8b
-
Filesize
91KB
MD5cd1f33734cc1d4f2a40e62439488cf28
SHA1308f259cf8068dd9465ad87822985e688aa22538
SHA2563af6e517948f3feaccfb8eb98d7c6080442b9f0579245220a211b225622168d4
SHA5129c89c7d9fa181ab6f9dfc912528c5d234a4c4792159be0eacbebec08890afceedeb63b6e5b009d3eed8c89716717ebcc2e69dea372f8fbea7689f6ebe922d38b
-
Filesize
91KB
MD5facfc1c43f218ac3c39acc85caabf3d2
SHA1ca71428bbeeb6a134ea105e6cb049fe94080c7d9
SHA256a7ef0ca2424afe8495dbb4ad5e858b9343b29adb45f305b8804c0af068445e2e
SHA512518f87f04f4d3f95998091fac4c0aa2ab104ae9bbe42a9a09027bcafbbb27f4d25a60a4572be2e2910892f9788a9a91c3ed2b9b99838362a1dca26a4aa787c12