Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16/06/2024, 03:50
Static task
static1
Behavioral task
behavioral1
Sample
d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe
-
Size
91KB
-
MD5
d3384cf6237ec8a696e5324009ae84e0
-
SHA1
59d03d3207e5a16f7851a1163057e24f65f6be40
-
SHA256
9f9eac48cef9394d1da1051f9d426e2c58b829beb87f5db9f3130b4831f5fa9c
-
SHA512
71523b14d0dd8f1b0f86d45abc007a3c0f15ea3db55a014bc439ba0faa6bb5a105ee3929c78d6bb75b72fbec209bcdaf1c417220480d40a4960d190bcb715b42
-
SSDEEP
768:E3gRYjXbUeHORIC4ZxBMldNKm8Mxm8I+IxrjPfAQ4o3ImuT3gRYjXbUeHORIC4ZG:uT3OA3+KQsxfS4iT3OA3+KQsxfS4mV
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 3432 xk.exe 4896 IExplorer.exe 2528 WINLOGON.EXE 3596 CSRSS.EXE 5076 SERVICES.EXE 3484 LSASS.EXE 4428 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\Mig2.scr d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\IExplorer.exe d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\shell.exe d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe File created C:\Windows\SysWOW64\shell.exe d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe File created C:\Windows\xk.exe d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe -
Modifies Control Panel 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\Desktop\ d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Set value (str) \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4268 d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe 4268 d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4268 d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe 3432 xk.exe 4896 IExplorer.exe 2528 WINLOGON.EXE 3596 CSRSS.EXE 5076 SERVICES.EXE 3484 LSASS.EXE 4428 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4268 wrote to memory of 3432 4268 d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe 89 PID 4268 wrote to memory of 3432 4268 d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe 89 PID 4268 wrote to memory of 3432 4268 d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe 89 PID 4268 wrote to memory of 4896 4268 d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe 90 PID 4268 wrote to memory of 4896 4268 d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe 90 PID 4268 wrote to memory of 4896 4268 d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe 90 PID 4268 wrote to memory of 2528 4268 d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe 91 PID 4268 wrote to memory of 2528 4268 d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe 91 PID 4268 wrote to memory of 2528 4268 d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe 91 PID 4268 wrote to memory of 3596 4268 d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe 93 PID 4268 wrote to memory of 3596 4268 d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe 93 PID 4268 wrote to memory of 3596 4268 d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe 93 PID 4268 wrote to memory of 5076 4268 d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe 95 PID 4268 wrote to memory of 5076 4268 d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe 95 PID 4268 wrote to memory of 5076 4268 d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe 95 PID 4268 wrote to memory of 3484 4268 d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe 96 PID 4268 wrote to memory of 3484 4268 d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe 96 PID 4268 wrote to memory of 3484 4268 d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe 96 PID 4268 wrote to memory of 4428 4268 d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe 97 PID 4268 wrote to memory of 4428 4268 d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe 97 PID 4268 wrote to memory of 4428 4268 d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe 97 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\d3384cf6237ec8a696e5324009ae84e0_NeikiAnalytics.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4268 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3432
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4896
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2528
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3596
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5076
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3484
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4160,i,3595107284059830391,18018199024659337217,262144 --variations-seed-version --mojo-platform-channel-handle=4064 /prefetch:81⤵PID:3888
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD5895050d863dd54493155943d30cb3d99
SHA10df150d4fb4f6adafc282c337f5484972dc45d20
SHA25628c11dfb0089fe02652c802a983634eb3fd4f69b10e524f2346716e49482d6e8
SHA51222cf177cea592db56bd1a6ae1ade40ced583c92fe203b262cc8b59146f5519e0a39cc040c55688204fbc03ee09142e096cc57b69051318b6bf9b248773f769d9
-
Filesize
91KB
MD55fcee384f195076d48e43988a11d700d
SHA1638429a9089826712269a597e06b18e072b819e6
SHA2565e97a0925d5a48752d1eb5b083b07979f3694e712f0e0a241f4cc3b7ceb83147
SHA512bcfa01dbb7b76d67536f4fbd374c16f23da43339552f2ca83f866c2454878eb2304b47d2d023659acc83dc51971802fc25e270ffb63b75148d0e2ad12986c2c6
-
Filesize
91KB
MD524fbfa6ac8e0513fe2913cd10e5e9d42
SHA176d55e1fe00bc474e9fea6482903fc1903a03e2b
SHA256ab92aeec369709d18d5b1e6d1412e575d686ab1e8ab7cb62396648e349811a4d
SHA5123b7a5d70c31b1986a43c109acbe0b660c1332e8baf8d1d6bce59175463eba0b4e2802ff6eb572b871ec82b9b0839038a2613147339fe537421032856b1cb0f96
-
Filesize
91KB
MD500125d30d094caef42d32f184410d17b
SHA1ded8fedb7630812a20c68e586c5974fdfc84235a
SHA2566b7ec5da2b7801e674db4e7fb169541b56aff929620db7da4e3334f8f571371f
SHA512df101c50dd09c56258cd24417483574fbcc2f3c839cbcfdbf56eee047d8e2a7747fae33bf3e699ef1d1c79ad812b59b994cecac1eeeaf607c073dba35cee2db6
-
Filesize
91KB
MD5582d6eb7ef47110c3ed5638f49e4ae5c
SHA19ba35a16b9b6fdd006eb7726b844f2f9ff30ced0
SHA256d9417f5af1a1850e1e2c69c0e98d345773510b98cb564db870f4435d8123ecf9
SHA512ce0338b26c8be1b175d555077c5f461eef7ef05e766d5b046fb10539efa456375632c5a7b90aaeb951af3ed44bb2d6097170b090e5ab0b51a5ea6133b00349fe
-
Filesize
91KB
MD5d3384cf6237ec8a696e5324009ae84e0
SHA159d03d3207e5a16f7851a1163057e24f65f6be40
SHA2569f9eac48cef9394d1da1051f9d426e2c58b829beb87f5db9f3130b4831f5fa9c
SHA51271523b14d0dd8f1b0f86d45abc007a3c0f15ea3db55a014bc439ba0faa6bb5a105ee3929c78d6bb75b72fbec209bcdaf1c417220480d40a4960d190bcb715b42
-
Filesize
91KB
MD5da241acd24ccfa3132cb4665794a0ad2
SHA12ab9ae4957d5c02c68f344bcd980b1bf92cb57e4
SHA256028b89cbc38617930b5353bd8ce1a8d1d920e0d02ca352ac4486ced185dd80a1
SHA5123f9d2b693d0791efca7e0ccf43a1673d7bff27cd48d2bd3b1be959c641053f1bc7ae7827a209956a0704530a4897319b6478b51653055b609c4ddac75e158cf0
-
Filesize
91KB
MD5f1a87aa84ae7abc096768391df670cb7
SHA1d0334ad236de6c6a8036c39cfdd7d49e760aa96f
SHA256b18ce28fd4eeb11756aae7507a8f93f77cb9d612de0e134d986ef8cbaecf8fa8
SHA5127f5ee0901c55f551a78f1b3e35a824ea7e4b9f79a4b35356fa8c7ecb4a345a4a2f123a06f965bbc963e34650b2ac8e4a48d9b2ba8dc0e31cce47421c9ac46e2f