Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 07:25
Behavioral task
behavioral1
Sample
693bad3183098db3806caec884dd5170_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
693bad3183098db3806caec884dd5170_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
693bad3183098db3806caec884dd5170_NeikiAnalytics.exe
-
Size
91KB
-
MD5
693bad3183098db3806caec884dd5170
-
SHA1
0482612ac3ff27137d95e3d9f6fc6db2a98f516f
-
SHA256
3fd648fbfae214851ce8a7293a30c02807096b18fc3c9e2b79194ee3002a5aa1
-
SHA512
0874eafc0720dfc46b7f05e47621e62a5f759395c800c5f755b2218a5fdfc3857fa9d052a4be4d4852f43fac4279d209201851419b43cbf8c3185822be8129e5
-
SSDEEP
1536:kRsjd3GR2Dxy387Lnouy8VTSRsjd3GR2Dxy387Lnouy8VTb:kOgUXoutNSOgUXoutNb
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Set value (int) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 2496 xk.exe 3520 IExplorer.exe 1432 WINLOGON.EXE 3140 CSRSS.EXE 4408 SERVICES.EXE 1060 LSASS.EXE 540 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe -
resource yara_rule behavioral2/memory/1472-0-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x0007000000023548-8.dat upx behavioral2/files/0x000700000002354c-106.dat upx behavioral2/memory/2496-112-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x0007000000023552-118.dat upx behavioral2/memory/3520-116-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x0007000000023553-123.dat upx behavioral2/memory/1432-125-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/3140-129-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x0007000000023554-131.dat upx behavioral2/memory/4408-135-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x0007000000023555-137.dat upx behavioral2/memory/1060-139-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/1060-142-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/files/0x0007000000023556-144.dat upx behavioral2/memory/540-146-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/540-150-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/1472-152-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\IExplorer.exe 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\shell.exe 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe File created C:\Windows\SysWOW64\shell.exe 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe File created C:\Windows\SysWOW64\Mig2.scr 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\xk.exe 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe File opened for modification C:\Windows\xk.exe 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\Desktop\ 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1472 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe 1472 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1472 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe 2496 xk.exe 3520 IExplorer.exe 1432 WINLOGON.EXE 3140 CSRSS.EXE 4408 SERVICES.EXE 1060 LSASS.EXE 540 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1472 wrote to memory of 2496 1472 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe 82 PID 1472 wrote to memory of 2496 1472 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe 82 PID 1472 wrote to memory of 2496 1472 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe 82 PID 1472 wrote to memory of 3520 1472 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe 83 PID 1472 wrote to memory of 3520 1472 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe 83 PID 1472 wrote to memory of 3520 1472 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe 83 PID 1472 wrote to memory of 1432 1472 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe 84 PID 1472 wrote to memory of 1432 1472 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe 84 PID 1472 wrote to memory of 1432 1472 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe 84 PID 1472 wrote to memory of 3140 1472 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe 85 PID 1472 wrote to memory of 3140 1472 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe 85 PID 1472 wrote to memory of 3140 1472 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe 85 PID 1472 wrote to memory of 4408 1472 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe 86 PID 1472 wrote to memory of 4408 1472 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe 86 PID 1472 wrote to memory of 4408 1472 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe 86 PID 1472 wrote to memory of 1060 1472 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe 87 PID 1472 wrote to memory of 1060 1472 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe 87 PID 1472 wrote to memory of 1060 1472 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe 87 PID 1472 wrote to memory of 540 1472 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe 88 PID 1472 wrote to memory of 540 1472 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe 88 PID 1472 wrote to memory of 540 1472 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe 88 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 693bad3183098db3806caec884dd5170_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\693bad3183098db3806caec884dd5170_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\693bad3183098db3806caec884dd5170_NeikiAnalytics.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1472 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2496
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3520
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1432
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3140
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4408
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1060
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:540
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD506f64771b5154fe0c790a9b51f975bba
SHA147770b2df2e3eec75db4f4981b1b8c5a9bda1ddc
SHA2563d11110362b091344e90683c577fcb25ac830cd795b991b55b26a0b96a13aee9
SHA512db89f99b0174c23468cf73ee1b7f12b1c65017aaf1fb76efe526b5e9f189e5da79838f268be57c65476265a0cdc349199b23bb919d43815956f416464e52f81f
-
Filesize
91KB
MD5817e9c167a9c2df68d86e89f8942fc66
SHA13dfcbbcb5b9cd238fa20d73da71099d485f106ef
SHA256457bf302aa7bf0bd979aad0cdadc9a416985d2c0b2cab3e35a9c056c66523b61
SHA512f9050baa41ff360aac9ac5ffccf8f896439cfe1d5359086b0851aa737921d47a912584823d620d3f6ae537bf490c0e43fefc6f09fe12fe4cfe7a96e83d0b0d07
-
Filesize
91KB
MD5d33d271b395bb7b4fdc6d00cfb5ece20
SHA10bfb1d921879bd5c270f46df970db39ed9fc22c3
SHA256260b06ef225b69197b2c20ff6381a2cc218f14a8202f91cce6728a7c55122e0d
SHA51281968ff0beaf262602deded53d6c8899515c0310df387a40fa2d51f6acc3909fc4442b0f1443eee77ba52dec809b439dc7ce9dc82c8c7d4d6b0d9996959944f8
-
Filesize
91KB
MD55d9bead946619d6393b8ddab2b481391
SHA1bda759c64d436baa19371b12bb1d59ee30d98169
SHA2567b197bacbed2d606b8149c8c74af2eced7a7db7386edd778b172c30ccf5b4d4d
SHA5122133e846cf13f57e20f559facd4b3bfdea6382d5848cb0f622d1b29807aa58fa9387be684e36e57133baf126af30d4678eaa648311343c2e6e316fef2599b966
-
Filesize
91KB
MD54b1c0a7ebac8274eecde0bca0b34382c
SHA1d479979e8f2eeecb9cc44de0f4e3ac7dd85ce571
SHA2568618e10f9ea4e0e7ee98971e5c0d7ddcefb392983012ca09ba09035129263e34
SHA5126754c98362f74aa8bff237892b21cf4d29226d777e0a4ceb648dccf4c33c367c1d99d209f46a0633dcf8e346ecb38719d0cd3f9d05d8b0721918e5a51c00f28a
-
Filesize
91KB
MD5693bad3183098db3806caec884dd5170
SHA10482612ac3ff27137d95e3d9f6fc6db2a98f516f
SHA2563fd648fbfae214851ce8a7293a30c02807096b18fc3c9e2b79194ee3002a5aa1
SHA5120874eafc0720dfc46b7f05e47621e62a5f759395c800c5f755b2218a5fdfc3857fa9d052a4be4d4852f43fac4279d209201851419b43cbf8c3185822be8129e5
-
Filesize
91KB
MD528be59642850d9595e37d34965958100
SHA1d03aba5247e8997fd975f659773bbbfd5d0d2fe6
SHA256cbdbc1b31686acd069b769fcf1e618d2effc3d04c636479f50e787b06fe5c9f3
SHA5121259c6f71bb03e64154b9f9c9e1e156a3d63b339e0d33dec36b176138f92eca56f0078a1632db459c28a66ab3710bb82e18402e3025c734410ede002d854e288