Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
02/11/2023, 14:43
Behavioral task
behavioral1
Sample
31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe
Resource
win7-20231025-en
General
-
Target
31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe
-
Size
3.8MB
-
MD5
f0001b375b08069370b92614c6db7edb
-
SHA1
e97a7f0cef9a20269b1df3dd57c6d09e7a775ccb
-
SHA256
31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d
-
SHA512
81fc198337c1a582b063032f9434690b94a02a56c1aea18783e4adfc4528820310ec8616670d9f947d8b60b0a4e7959f801e7b275aacfa48c6c87bfb289a1aaa
-
SSDEEP
24576:pjSow1qeSJbKkKF/eMNPjyXtaSJZWh/ZWuPaG8j3acWSmrW3aDW9ZwJCcf1cg8UK:pjSto9KFeMRHp6
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1236 created 420 1236 Explorer.EXE 3 -
Drops file in Drivers directory 9 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\9sjXih2ITYTm.sys spreview.exe File opened for modification C:\Windows\system32\drivers\xj8nZljrKq7APe.sys spreview.exe File created C:\Windows\System32\drivers\46mtobac.sys spreview.exe File opened for modification C:\Windows\system32\drivers\yk6knxDHWkwvh.sys spreview.exe File opened for modification C:\Windows\system32\drivers\8SoSr7r8u7QYUY.eta spreview.exe File opened for modification C:\Windows\system32\drivers\vUTxUV743kH.xwu spreview.exe File opened for modification C:\Windows\system32\drivers\bsxo4lkqFa6pz.sys spreview.exe File opened for modification C:\Windows\system32\drivers\WiAGpQReL7ZC5.qjy spreview.exe File opened for modification C:\Windows\system32\drivers\Q7Bo2Ff4ah6u7.rbm spreview.exe -
Deletes itself 1 IoCs
pid Process 2728 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2952 spreview.exe -
Loads dropped DLL 7 IoCs
pid Process 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1212 Dwm.exe 1212 Dwm.exe 1212 Dwm.exe -
resource yara_rule behavioral1/memory/2144-0-0x0000000000100000-0x000000000016E000-memory.dmp upx behavioral1/memory/2144-20-0x0000000000100000-0x000000000016E000-memory.dmp upx behavioral1/memory/2144-49-0x0000000000100000-0x000000000016E000-memory.dmp upx behavioral1/memory/2144-88-0x0000000000100000-0x000000000016E000-memory.dmp upx -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 114.114.114.114 -
resource yara_rule behavioral1/files/0x000a000000015474-152.dat vmprotect behavioral1/files/0x0018000000015474-254.dat vmprotect behavioral1/files/0x0026000000015474-357.dat vmprotect behavioral1/files/0x0034000000015474-454.dat vmprotect -
Drops file in System32 directory 23 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AD5F118F7897046E8CA970AE6A6AB70B_ADB601E2C381343DA1163E5F08582475 spreview.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B spreview.exe File opened for modification C:\Windows\system32\2sgIX0KCntET.sys spreview.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357 spreview.exe File opened for modification C:\Windows\system32\FQlct1cp3Q.sys spreview.exe File opened for modification C:\Windows\system32\BvrJ88GUFAqXnk.sys spreview.exe File opened for modification C:\Windows\system32\TPj01vLhpKt.nin spreview.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 spreview.exe File created C:\Windows\system32\ \Windows\System32\VFcEJDRq.sys spreview.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3 spreview.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_CE21678B3713ACF5F5ED4AAA700C6173 spreview.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_CE21678B3713ACF5F5ED4AAA700C6173 spreview.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 spreview.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357 spreview.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AD5F118F7897046E8CA970AE6A6AB70B_ADB601E2C381343DA1163E5F08582475 spreview.exe File opened for modification C:\Windows\system32\FLVribBuX3k6w.dwf spreview.exe File opened for modification C:\Windows\system32\umYIDyfEOY.vhj spreview.exe File opened for modification C:\Windows\system32\AEOYHaHDbA.hys spreview.exe File opened for modification C:\Windows\system32\T3qQOnRsbZ5Lp.sys spreview.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C spreview.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3FE2BD01AB6BC312BF0DADE7F797388F_896832C6BC857CFAEA9E59E166B13E2C spreview.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_4136D3715888E22D65EBE484B233D81B spreview.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3 spreview.exe -
Drops file in Program Files directory 31 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\ewoeYncTbVY.sys spreview.exe File opened for modification C:\Program Files\Google\manifest.json spreview.exe File opened for modification C:\Program Files\Java\manifest.json Explorer.EXE File opened for modification C:\Program Files\Java\5cca744c.js Dwm.exe File opened for modification C:\Program Files\A2Dq5ofkrQn.oah spreview.exe File opened for modification C:\Program Files (x86)\MjtN2veNaTmKS.sys spreview.exe File opened for modification C:\Program Files\KxthSICv76yY4m.sys spreview.exe File opened for modification C:\Program Files (x86)\gFV8s8mWMiYvHd.sqf spreview.exe File opened for modification C:\Program Files\Java\manifest.json Dwm.exe File opened for modification C:\Program Files\Java\4d5360ea.html Dwm.exe File opened for modification C:\Program Files\Google\3ddc4960.js spreview.exe File opened for modification C:\Program Files\Google\4d535bb8.html spreview.exe File opened for modification C:\Program Files\Google\lib\6c418068.js spreview.exe File opened for modification C:\Program Files\Java\3ddc4ccc.js Explorer.EXE File opened for modification C:\Program Files\EG0iFMTF9Gs.cfb spreview.exe File opened for modification C:\Program Files (x86)\fIinb2XwrtEewc.sys spreview.exe File opened for modification C:\Program Files\Java\5cca7332.js Explorer.EXE File opened for modification C:\Program Files\6NZi0wtZismK.sys spreview.exe File opened for modification C:\Program Files (x86)\Pes01IYPXyiW3D.mne spreview.exe File opened for modification C:\Program Files\sjbz81qokAMd2.sys spreview.exe File opened for modification C:\Program Files (x86)\pcRbpDulVXK9z9.zbi spreview.exe File opened for modification C:\Program Files\Java\4d535fff.html Explorer.EXE File opened for modification C:\Program Files\Java\3ddc4d88.js Dwm.exe File opened for modification C:\Program Files\Java\lib\6c418665.js Explorer.EXE File opened for modification C:\Program Files\Java\lib\6c4187ae.js Dwm.exe File opened for modification C:\Program Files (x86)\6rZF19eiKh.coo spreview.exe File opened for modification C:\Program Files\vOCVo1FsZL.gxr spreview.exe File opened for modification C:\Program Files\uQubJIYaDQCj.sys spreview.exe File opened for modification C:\Program Files\NU7GRi9a3mRh7N.miz spreview.exe File opened for modification C:\Program Files (x86)\nR2FvYXO9uix.sys spreview.exe File opened for modification C:\Program Files\Google\5cca6e10.js spreview.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File opened for modification C:\Windows\hncHRKIrneRdF.sys spreview.exe File opened for modification C:\Windows\4NGcB0eBiP0O.sys spreview.exe File opened for modification C:\Windows\u49sgF4uB3.sys spreview.exe File opened for modification C:\Windows\di4deHRcZdHYV.gro spreview.exe File opened for modification C:\Windows\TKukMkN9pCG.eqp spreview.exe File opened for modification C:\Windows\wQnbr5kIVk1Kt.sys spreview.exe File opened for modification C:\Windows\QbzrdTakiI.kft spreview.exe File created C:\Windows\Fonts\spreview.exe Explorer.EXE File opened for modification C:\Windows\Fonts\spreview.exe Explorer.EXE File created C:\Windows\T3uACycZk.sys spreview.exe File opened for modification C:\Windows\FnMyNQ92IUocYJ.skd spreview.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 1676 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates spreview.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust spreview.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e2-d8-2a-48-88-0f\WpadDecisionReason = "1" spreview.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" tcmsetup.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" spreview.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs spreview.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root spreview.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9DBDA9D9-52C8-4161-B297-55455198B110}\e2-d8-2a-48-88-0f spreview.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0064000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 tcmsetup.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs spreview.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs spreview.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0064000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 spreview.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates spreview.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e2-d8-2a-48-88-0f spreview.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings spreview.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad spreview.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs spreview.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs spreview.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9DBDA9D9-52C8-4161-B297-55455198B110}\WpadNetworkName = "Network 2" spreview.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e2-d8-2a-48-88-0f\WpadDecision = "0" spreview.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" spreview.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" spreview.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 spreview.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix tcmsetup.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs spreview.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates spreview.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed spreview.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs spreview.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix spreview.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs spreview.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs spreview.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings tcmsetup.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates spreview.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 spreview.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9DBDA9D9-52C8-4161-B297-55455198B110} spreview.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs spreview.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople spreview.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My spreview.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA spreview.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates spreview.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople spreview.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs spreview.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust spreview.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs spreview.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA spreview.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed spreview.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 spreview.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ spreview.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9DBDA9D9-52C8-4161-B297-55455198B110}\WpadDecisionTime = 40eafd079b0dda01 spreview.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates spreview.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9DBDA9D9-52C8-4161-B297-55455198B110}\WpadDecisionReason = "1" spreview.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings tcmsetup.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" tcmsetup.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates spreview.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot spreview.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates spreview.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections tcmsetup.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" tcmsetup.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" spreview.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs spreview.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs spreview.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" spreview.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs spreview.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e2-d8-2a-48-88-0f\WpadDecisionTime = 40eafd079b0dda01 spreview.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 spreview.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 spreview.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\C092B1178351B12CE356EBAB43D46F2FE4EE4262 spreview.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\C092B1178351B12CE356EBAB43D46F2FE4EE4262\Blob = 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 spreview.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\C092B1178351B12CE356EBAB43D46F2FE4EE4262\Blob = 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 spreview.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\C092B1178351B12CE356EBAB43D46F2FE4EE4262\Blob = 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 spreview.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2144 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe 2144 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe 2144 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe 2144 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe 2144 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 2144 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe 2952 spreview.exe 1992 tcmsetup.exe 2952 spreview.exe 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 2952 spreview.exe 1236 Explorer.EXE 2952 spreview.exe 2952 spreview.exe 2952 spreview.exe 2952 spreview.exe 1236 Explorer.EXE 1236 Explorer.EXE 2952 spreview.exe 1236 Explorer.EXE 2952 spreview.exe 1236 Explorer.EXE 1236 Explorer.EXE 2952 spreview.exe 1236 Explorer.EXE 1236 Explorer.EXE 2952 spreview.exe 1236 Explorer.EXE 2952 spreview.exe 1236 Explorer.EXE 2952 spreview.exe 1236 Explorer.EXE 2952 spreview.exe 1236 Explorer.EXE 1236 Explorer.EXE 2952 spreview.exe 1236 Explorer.EXE 2952 spreview.exe 1236 Explorer.EXE 2952 spreview.exe 1236 Explorer.EXE 2952 spreview.exe 1236 Explorer.EXE 1236 Explorer.EXE 2952 spreview.exe 1236 Explorer.EXE 2952 spreview.exe 1236 Explorer.EXE 2952 spreview.exe 1236 Explorer.EXE 1236 Explorer.EXE 2952 spreview.exe 1236 Explorer.EXE 2952 spreview.exe 1236 Explorer.EXE 2952 spreview.exe 1236 Explorer.EXE 1236 Explorer.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1236 Explorer.EXE -
Suspicious behavior: LoadsDriver 59 IoCs
pid Process 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 2144 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe Token: SeTcbPrivilege 2144 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe Token: SeDebugPrivilege 2144 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe Token: SeDebugPrivilege 1236 Explorer.EXE Token: SeDebugPrivilege 1236 Explorer.EXE Token: SeDebugPrivilege 2144 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe Token: SeDebugPrivilege 2952 spreview.exe Token: SeDebugPrivilege 2952 spreview.exe Token: SeDebugPrivilege 2952 spreview.exe Token: SeIncBasePriorityPrivilege 2144 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe Token: SeDebugPrivilege 2952 spreview.exe Token: SeDebugPrivilege 2952 spreview.exe Token: SeBackupPrivilege 2952 spreview.exe Token: SeDebugPrivilege 2952 spreview.exe Token: SeDebugPrivilege 2952 spreview.exe Token: SeDebugPrivilege 2952 spreview.exe Token: SeDebugPrivilege 1236 Explorer.EXE Token: SeBackupPrivilege 1236 Explorer.EXE Token: SeDebugPrivilege 1212 Dwm.exe Token: SeBackupPrivilege 1212 Dwm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1236 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2144 wrote to memory of 1236 2144 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe 13 PID 2144 wrote to memory of 1236 2144 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe 13 PID 2144 wrote to memory of 1236 2144 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe 13 PID 2144 wrote to memory of 1236 2144 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe 13 PID 2144 wrote to memory of 1236 2144 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe 13 PID 1236 wrote to memory of 2952 1236 Explorer.EXE 28 PID 1236 wrote to memory of 2952 1236 Explorer.EXE 28 PID 1236 wrote to memory of 2952 1236 Explorer.EXE 28 PID 1236 wrote to memory of 2952 1236 Explorer.EXE 28 PID 1236 wrote to memory of 2952 1236 Explorer.EXE 28 PID 1236 wrote to memory of 2952 1236 Explorer.EXE 28 PID 1236 wrote to memory of 2952 1236 Explorer.EXE 28 PID 1236 wrote to memory of 2952 1236 Explorer.EXE 28 PID 2144 wrote to memory of 420 2144 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe 3 PID 2144 wrote to memory of 420 2144 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe 3 PID 2144 wrote to memory of 420 2144 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe 3 PID 2144 wrote to memory of 420 2144 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe 3 PID 2144 wrote to memory of 420 2144 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe 3 PID 2144 wrote to memory of 2728 2144 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe 30 PID 2144 wrote to memory of 2728 2144 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe 30 PID 2144 wrote to memory of 2728 2144 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe 30 PID 2144 wrote to memory of 2728 2144 31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe 30 PID 2728 wrote to memory of 1676 2728 cmd.exe 32 PID 2728 wrote to memory of 1676 2728 cmd.exe 32 PID 2728 wrote to memory of 1676 2728 cmd.exe 32 PID 2728 wrote to memory of 1676 2728 cmd.exe 32 PID 2952 wrote to memory of 1992 2952 spreview.exe 34 PID 2952 wrote to memory of 1992 2952 spreview.exe 34 PID 2952 wrote to memory of 1992 2952 spreview.exe 34 PID 2952 wrote to memory of 1992 2952 spreview.exe 34 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1992 2952 spreview.exe 34 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1992 2952 spreview.exe 34 PID 2952 wrote to memory of 1992 2952 spreview.exe 34 PID 2952 wrote to memory of 1992 2952 spreview.exe 34 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1236 2952 spreview.exe 13 PID 2952 wrote to memory of 1236 2952 spreview.exe 13
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:420
-
C:\Windows\Fonts\spreview.exe"C:\Windows\Fonts\spreview.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\system32\tcmsetup.exe"C:\Windows\system32\tcmsetup.exe"3⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1992
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe"C:\Users\Admin\AppData\Local\Temp\31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe"2⤵
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\31e51317061c1205e8454bbcfc77ed1fd6e3ee28b68f1cf2de0160ec13000f0d.exe"3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\timeout.exetimeout /t 14⤵
- Delays execution with timeout.exe
PID:1676
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
29KB
MD5d59a6b36c5a94916241a3ead50222b6f
SHA1e274e9486d318c383bc4b9812844ba56f0cff3c6
SHA256a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53
SHA51217012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
81KB
MD5b13f51572f55a2d31ed9f266d581e9ea
SHA17eef3111b878e159e520f34410ad87adecf0ca92
SHA256725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15
SHA512f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c
-
Filesize
447KB
MD5d6ea2832720a5ccd719a818ec387fe72
SHA1db59f5defefb02f30d1eec8bfe86c6463b90bc18
SHA25642fed42eece811cb0b174f67aa1bd36b4df45cc1ac6e2c3824e371c03afa4a12
SHA512bdff3c003e210aa694ab8391536113d765f7cfa28b76c81ba82c2f60001c78363ef71176733880e2186585345edce5149542a1d45b1ec00441e1e12a3055ddf6
-
Filesize
294KB
MD5704cd4cac010e8e6d8de9b778ed17773
SHA181856abf70640f102b8b3defe2cf65669fe8e165
SHA2564307f21d3ec3b51cba6a905a80045314ffccb4c60c11d99a3d77cc8103014208
SHA512b380264276bad01d619a5f1f112791d6bf73dc52cdd5cca0cc1f726a6f66eefc5a78a37646792987c508f9cb5049f0eb86c71fb4c7a2d3e670c0c8623f0522ee
-
Filesize
294KB
MD5704cd4cac010e8e6d8de9b778ed17773
SHA181856abf70640f102b8b3defe2cf65669fe8e165
SHA2564307f21d3ec3b51cba6a905a80045314ffccb4c60c11d99a3d77cc8103014208
SHA512b380264276bad01d619a5f1f112791d6bf73dc52cdd5cca0cc1f726a6f66eefc5a78a37646792987c508f9cb5049f0eb86c71fb4c7a2d3e670c0c8623f0522ee
-
Filesize
294KB
MD5704cd4cac010e8e6d8de9b778ed17773
SHA181856abf70640f102b8b3defe2cf65669fe8e165
SHA2564307f21d3ec3b51cba6a905a80045314ffccb4c60c11d99a3d77cc8103014208
SHA512b380264276bad01d619a5f1f112791d6bf73dc52cdd5cca0cc1f726a6f66eefc5a78a37646792987c508f9cb5049f0eb86c71fb4c7a2d3e670c0c8623f0522ee
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5df1393b32e4144ed8ca0b4edf3bbe493
SHA1a3abf8371e36a33efd15cec29f36cd5d071bdfb3
SHA256e73c9bf214c4e385c650a0e5d4a402a33c5badc0ee38bd5812228f04789ba195
SHA512beef868b8f66602d85120285ef2e98733fd6b403ecae7e122ef03cf1de205739387d7c71292701b38408719fb678bac368eeecb5b0f775a9983fca98240fce74
-
Filesize
447KB
MD5d15f5f23df8036bd5089ce8d151b0e0d
SHA14066ff4d92ae189d92fcdfb8c11a82cc9db56bb2
SHA256f2c40dde6f40beaa3c283b66791ff27e6f06d66c8dd6eff5262f51e02ee26520
SHA512feaec8a00346b0a74c530859785e1b280da5833bf3113083bf4664ebee85b14ceca648499f36d266d329d602349f9ad0fc21a10e605377b3a2c24b456f3a9bd9
-
Filesize
415KB
MD533791901884bf388aeefaadd0f5ca500
SHA167ffc1b09a81b685c0a683bb7206f5b2ce9a354b
SHA256944616cdbcd7d8f52f20e64941e5e77ae4eb2f1895725593d24ca478fb71534c
SHA5129dbe410686cea950d82b1429fea26179896d5183478347e44ac9b53739659b214445a26e588beecd2daeb88fb5fe5609ce543a9f06ddc1023a2eebfa30a5d2c5
-
Filesize
415KB
MD564bc1983743c584a9ad09dacf12792e5
SHA10f14098f523d21f11129c4df09451413ddff6d61
SHA256057ec356f1577fe86b706e5aeb74e3bdd6fe04d22586fecf69b866f8f72db7f5
SHA5129ab4ddb64bd97dd1a7ee15613a258edf1d2eba880a0896a91487c47a32c9bd1118cde18211053a5b081216d123d5f901b454a525cbba01d8067c31babd8c8c3c
-
Filesize
294KB
MD5704cd4cac010e8e6d8de9b778ed17773
SHA181856abf70640f102b8b3defe2cf65669fe8e165
SHA2564307f21d3ec3b51cba6a905a80045314ffccb4c60c11d99a3d77cc8103014208
SHA512b380264276bad01d619a5f1f112791d6bf73dc52cdd5cca0cc1f726a6f66eefc5a78a37646792987c508f9cb5049f0eb86c71fb4c7a2d3e670c0c8623f0522ee
-
Filesize
294KB
MD5704cd4cac010e8e6d8de9b778ed17773
SHA181856abf70640f102b8b3defe2cf65669fe8e165
SHA2564307f21d3ec3b51cba6a905a80045314ffccb4c60c11d99a3d77cc8103014208
SHA512b380264276bad01d619a5f1f112791d6bf73dc52cdd5cca0cc1f726a6f66eefc5a78a37646792987c508f9cb5049f0eb86c71fb4c7a2d3e670c0c8623f0522ee
-
Filesize
294KB
MD5704cd4cac010e8e6d8de9b778ed17773
SHA181856abf70640f102b8b3defe2cf65669fe8e165
SHA2564307f21d3ec3b51cba6a905a80045314ffccb4c60c11d99a3d77cc8103014208
SHA512b380264276bad01d619a5f1f112791d6bf73dc52cdd5cca0cc1f726a6f66eefc5a78a37646792987c508f9cb5049f0eb86c71fb4c7a2d3e670c0c8623f0522ee
-
Filesize
294KB
MD5704cd4cac010e8e6d8de9b778ed17773
SHA181856abf70640f102b8b3defe2cf65669fe8e165
SHA2564307f21d3ec3b51cba6a905a80045314ffccb4c60c11d99a3d77cc8103014208
SHA512b380264276bad01d619a5f1f112791d6bf73dc52cdd5cca0cc1f726a6f66eefc5a78a37646792987c508f9cb5049f0eb86c71fb4c7a2d3e670c0c8623f0522ee
-
Filesize
294KB
MD5704cd4cac010e8e6d8de9b778ed17773
SHA181856abf70640f102b8b3defe2cf65669fe8e165
SHA2564307f21d3ec3b51cba6a905a80045314ffccb4c60c11d99a3d77cc8103014208
SHA512b380264276bad01d619a5f1f112791d6bf73dc52cdd5cca0cc1f726a6f66eefc5a78a37646792987c508f9cb5049f0eb86c71fb4c7a2d3e670c0c8623f0522ee
-
Filesize
294KB
MD5704cd4cac010e8e6d8de9b778ed17773
SHA181856abf70640f102b8b3defe2cf65669fe8e165
SHA2564307f21d3ec3b51cba6a905a80045314ffccb4c60c11d99a3d77cc8103014208
SHA512b380264276bad01d619a5f1f112791d6bf73dc52cdd5cca0cc1f726a6f66eefc5a78a37646792987c508f9cb5049f0eb86c71fb4c7a2d3e670c0c8623f0522ee
-
Filesize
294KB
MD5704cd4cac010e8e6d8de9b778ed17773
SHA181856abf70640f102b8b3defe2cf65669fe8e165
SHA2564307f21d3ec3b51cba6a905a80045314ffccb4c60c11d99a3d77cc8103014208
SHA512b380264276bad01d619a5f1f112791d6bf73dc52cdd5cca0cc1f726a6f66eefc5a78a37646792987c508f9cb5049f0eb86c71fb4c7a2d3e670c0c8623f0522ee