Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 03:15
Behavioral task
behavioral1
Sample
a3a428f65fbc7b7212c0334f1509f077_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
a3a428f65fbc7b7212c0334f1509f077_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
a3a428f65fbc7b7212c0334f1509f077
-
SHA1
e7994a05c5ab4f0a4fa7bd0990289d8429941a1d
-
SHA256
b8f061eac5daf9cd23e62efdb6b292c9ede5d7c24af837a0951d4443920f3ec8
-
SHA512
cd46d525a6012b0fb962035835affb115ae73640759f9e50a2f002b29d61519fa82cb4f7bbdf54d8ee180844451153f4008b68c4f79014abfceffedc2e5db0dd
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZj:0UzeyQMS4DqodCnoe+iitjWwwn
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a3a428f65fbc7b7212c0334f1509f077_JaffaCakes118.exe a3a428f65fbc7b7212c0334f1509f077_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a3a428f65fbc7b7212c0334f1509f077_JaffaCakes118.exe a3a428f65fbc7b7212c0334f1509f077_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
pid Process 5000 explorer.exe 64 explorer.exe 4552 spoolsv.exe 4880 spoolsv.exe 3280 spoolsv.exe 2268 spoolsv.exe 2292 spoolsv.exe 912 spoolsv.exe 2376 spoolsv.exe 1852 spoolsv.exe 3932 spoolsv.exe 4344 spoolsv.exe 2264 spoolsv.exe 2860 spoolsv.exe 4604 spoolsv.exe 3836 spoolsv.exe 1076 spoolsv.exe 2296 spoolsv.exe 4188 spoolsv.exe 4492 spoolsv.exe 2092 spoolsv.exe 2952 spoolsv.exe 880 spoolsv.exe 4808 spoolsv.exe 3188 spoolsv.exe 4504 spoolsv.exe 4316 spoolsv.exe 1912 spoolsv.exe 3636 spoolsv.exe 4936 spoolsv.exe 5100 spoolsv.exe 4432 spoolsv.exe 604 spoolsv.exe 2140 spoolsv.exe 4400 spoolsv.exe 4996 spoolsv.exe 1636 spoolsv.exe 4288 spoolsv.exe 3136 spoolsv.exe 1588 explorer.exe 2672 spoolsv.exe 1676 spoolsv.exe 1672 spoolsv.exe 1204 spoolsv.exe 2284 spoolsv.exe 2664 spoolsv.exe 2760 spoolsv.exe 2948 spoolsv.exe 2580 spoolsv.exe 1128 spoolsv.exe 2704 explorer.exe 3972 spoolsv.exe 3388 spoolsv.exe 1348 spoolsv.exe 220 spoolsv.exe 1504 spoolsv.exe 536 spoolsv.exe 4252 spoolsv.exe 348 spoolsv.exe 388 spoolsv.exe 2956 explorer.exe 4844 spoolsv.exe 412 spoolsv.exe 1496 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 54 IoCs
description pid Process procid_target PID 2388 set thread context of 3164 2388 a3a428f65fbc7b7212c0334f1509f077_JaffaCakes118.exe 86 PID 5000 set thread context of 64 5000 explorer.exe 91 PID 4552 set thread context of 3136 4552 spoolsv.exe 128 PID 4880 set thread context of 2672 4880 spoolsv.exe 130 PID 3280 set thread context of 1676 3280 spoolsv.exe 131 PID 2268 set thread context of 1672 2268 spoolsv.exe 132 PID 2292 set thread context of 1204 2292 spoolsv.exe 133 PID 912 set thread context of 2284 912 spoolsv.exe 134 PID 2376 set thread context of 2664 2376 spoolsv.exe 135 PID 1852 set thread context of 2760 1852 spoolsv.exe 136 PID 3932 set thread context of 2580 3932 spoolsv.exe 138 PID 4344 set thread context of 1128 4344 spoolsv.exe 139 PID 2264 set thread context of 3972 2264 spoolsv.exe 141 PID 2860 set thread context of 3388 2860 spoolsv.exe 142 PID 4604 set thread context of 1348 4604 spoolsv.exe 143 PID 3836 set thread context of 220 3836 spoolsv.exe 144 PID 1076 set thread context of 1504 1076 spoolsv.exe 145 PID 2296 set thread context of 4252 2296 spoolsv.exe 147 PID 4188 set thread context of 348 4188 spoolsv.exe 148 PID 4492 set thread context of 388 4492 spoolsv.exe 149 PID 2092 set thread context of 4844 2092 spoolsv.exe 151 PID 2952 set thread context of 412 2952 spoolsv.exe 152 PID 880 set thread context of 1496 880 spoolsv.exe 153 PID 4808 set thread context of 4040 4808 spoolsv.exe 154 PID 3188 set thread context of 4696 3188 spoolsv.exe 155 PID 4504 set thread context of 2328 4504 spoolsv.exe 157 PID 4316 set thread context of 2540 4316 spoolsv.exe 158 PID 1912 set thread context of 2432 1912 spoolsv.exe 159 PID 3636 set thread context of 2784 3636 spoolsv.exe 161 PID 4936 set thread context of 616 4936 spoolsv.exe 162 PID 5100 set thread context of 4584 5100 spoolsv.exe 163 PID 4432 set thread context of 3624 4432 spoolsv.exe 164 PID 604 set thread context of 3320 604 spoolsv.exe 165 PID 2140 set thread context of 2080 2140 spoolsv.exe 167 PID 4400 set thread context of 3584 4400 spoolsv.exe 168 PID 4996 set thread context of 3848 4996 spoolsv.exe 169 PID 1636 set thread context of 2920 1636 spoolsv.exe 171 PID 4288 set thread context of 2408 4288 spoolsv.exe 177 PID 1588 set thread context of 3152 1588 explorer.exe 179 PID 2948 set thread context of 4128 2948 spoolsv.exe 185 PID 2704 set thread context of 4988 2704 explorer.exe 189 PID 536 set thread context of 3576 536 spoolsv.exe 195 PID 2956 set thread context of 2888 2956 explorer.exe 198 PID 3236 set thread context of 4116 3236 spoolsv.exe 205 PID 2720 set thread context of 3036 2720 explorer.exe 208 PID 1884 set thread context of 3648 1884 spoolsv.exe 209 PID 4376 set thread context of 3600 4376 explorer.exe 210 PID 2504 set thread context of 2392 2504 spoolsv.exe 212 PID 3348 set thread context of 2244 3348 spoolsv.exe 214 PID 3148 set thread context of 836 3148 spoolsv.exe 216 PID 2252 set thread context of 1056 2252 spoolsv.exe 219 PID 1632 set thread context of 4876 1632 spoolsv.exe 220 PID 4300 set thread context of 3468 4300 explorer.exe 222 PID 3412 set thread context of 760 3412 spoolsv.exe 224 -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\explorer.exe a3a428f65fbc7b7212c0334f1509f077_JaffaCakes118.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3164 a3a428f65fbc7b7212c0334f1509f077_JaffaCakes118.exe 3164 a3a428f65fbc7b7212c0334f1509f077_JaffaCakes118.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 64 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3164 a3a428f65fbc7b7212c0334f1509f077_JaffaCakes118.exe 3164 a3a428f65fbc7b7212c0334f1509f077_JaffaCakes118.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 64 explorer.exe 3136 spoolsv.exe 3136 spoolsv.exe 2672 spoolsv.exe 2672 spoolsv.exe 1676 spoolsv.exe 1676 spoolsv.exe 1672 spoolsv.exe 1672 spoolsv.exe 1204 spoolsv.exe 1204 spoolsv.exe 2284 spoolsv.exe 2284 spoolsv.exe 2664 spoolsv.exe 2664 spoolsv.exe 2760 spoolsv.exe 2760 spoolsv.exe 2580 spoolsv.exe 2580 spoolsv.exe 1128 spoolsv.exe 1128 spoolsv.exe 3972 spoolsv.exe 3972 spoolsv.exe 3388 spoolsv.exe 3388 spoolsv.exe 1348 spoolsv.exe 1348 spoolsv.exe 220 spoolsv.exe 220 spoolsv.exe 1504 spoolsv.exe 1504 spoolsv.exe 4252 spoolsv.exe 4252 spoolsv.exe 348 spoolsv.exe 348 spoolsv.exe 388 spoolsv.exe 388 spoolsv.exe 4844 spoolsv.exe 4844 spoolsv.exe 412 spoolsv.exe 412 spoolsv.exe 1496 spoolsv.exe 1496 spoolsv.exe 4040 spoolsv.exe 4040 spoolsv.exe 4696 spoolsv.exe 4696 spoolsv.exe 2328 spoolsv.exe 2328 spoolsv.exe 2540 spoolsv.exe 2540 spoolsv.exe 2432 spoolsv.exe 2432 spoolsv.exe 2784 spoolsv.exe 2784 spoolsv.exe 616 spoolsv.exe 616 spoolsv.exe 4584 spoolsv.exe 4584 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2388 wrote to memory of 1440 2388 a3a428f65fbc7b7212c0334f1509f077_JaffaCakes118.exe 81 PID 2388 wrote to memory of 1440 2388 a3a428f65fbc7b7212c0334f1509f077_JaffaCakes118.exe 81 PID 2388 wrote to memory of 3164 2388 a3a428f65fbc7b7212c0334f1509f077_JaffaCakes118.exe 86 PID 2388 wrote to memory of 3164 2388 a3a428f65fbc7b7212c0334f1509f077_JaffaCakes118.exe 86 PID 2388 wrote to memory of 3164 2388 a3a428f65fbc7b7212c0334f1509f077_JaffaCakes118.exe 86 PID 2388 wrote to memory of 3164 2388 a3a428f65fbc7b7212c0334f1509f077_JaffaCakes118.exe 86 PID 2388 wrote to memory of 3164 2388 a3a428f65fbc7b7212c0334f1509f077_JaffaCakes118.exe 86 PID 3164 wrote to memory of 5000 3164 a3a428f65fbc7b7212c0334f1509f077_JaffaCakes118.exe 87 PID 3164 wrote to memory of 5000 3164 a3a428f65fbc7b7212c0334f1509f077_JaffaCakes118.exe 87 PID 3164 wrote to memory of 5000 3164 a3a428f65fbc7b7212c0334f1509f077_JaffaCakes118.exe 87 PID 5000 wrote to memory of 64 5000 explorer.exe 91 PID 5000 wrote to memory of 64 5000 explorer.exe 91 PID 5000 wrote to memory of 64 5000 explorer.exe 91 PID 5000 wrote to memory of 64 5000 explorer.exe 91 PID 5000 wrote to memory of 64 5000 explorer.exe 91 PID 64 wrote to memory of 4552 64 explorer.exe 92 PID 64 wrote to memory of 4552 64 explorer.exe 92 PID 64 wrote to memory of 4552 64 explorer.exe 92 PID 64 wrote to memory of 4880 64 explorer.exe 93 PID 64 wrote to memory of 4880 64 explorer.exe 93 PID 64 wrote to memory of 4880 64 explorer.exe 93 PID 64 wrote to memory of 3280 64 explorer.exe 94 PID 64 wrote to memory of 3280 64 explorer.exe 94 PID 64 wrote to memory of 3280 64 explorer.exe 94 PID 64 wrote to memory of 2268 64 explorer.exe 95 PID 64 wrote to memory of 2268 64 explorer.exe 95 PID 64 wrote to memory of 2268 64 explorer.exe 95 PID 64 wrote to memory of 2292 64 explorer.exe 96 PID 64 wrote to memory of 2292 64 explorer.exe 96 PID 64 wrote to memory of 2292 64 explorer.exe 96 PID 64 wrote to memory of 912 64 explorer.exe 97 PID 64 wrote to memory of 912 64 explorer.exe 97 PID 64 wrote to memory of 912 64 explorer.exe 97 PID 64 wrote to memory of 2376 64 explorer.exe 98 PID 64 wrote to memory of 2376 64 explorer.exe 98 PID 64 wrote to memory of 2376 64 explorer.exe 98 PID 64 wrote to memory of 1852 64 explorer.exe 99 PID 64 wrote to memory of 1852 64 explorer.exe 99 PID 64 wrote to memory of 1852 64 explorer.exe 99 PID 64 wrote to memory of 3932 64 explorer.exe 100 PID 64 wrote to memory of 3932 64 explorer.exe 100 PID 64 wrote to memory of 3932 64 explorer.exe 100 PID 64 wrote to memory of 4344 64 explorer.exe 101 PID 64 wrote to memory of 4344 64 explorer.exe 101 PID 64 wrote to memory of 4344 64 explorer.exe 101 PID 64 wrote to memory of 2264 64 explorer.exe 102 PID 64 wrote to memory of 2264 64 explorer.exe 102 PID 64 wrote to memory of 2264 64 explorer.exe 102 PID 64 wrote to memory of 2860 64 explorer.exe 103 PID 64 wrote to memory of 2860 64 explorer.exe 103 PID 64 wrote to memory of 2860 64 explorer.exe 103 PID 64 wrote to memory of 4604 64 explorer.exe 104 PID 64 wrote to memory of 4604 64 explorer.exe 104 PID 64 wrote to memory of 4604 64 explorer.exe 104 PID 64 wrote to memory of 3836 64 explorer.exe 105 PID 64 wrote to memory of 3836 64 explorer.exe 105 PID 64 wrote to memory of 3836 64 explorer.exe 105 PID 64 wrote to memory of 1076 64 explorer.exe 106 PID 64 wrote to memory of 1076 64 explorer.exe 106 PID 64 wrote to memory of 1076 64 explorer.exe 106 PID 64 wrote to memory of 2296 64 explorer.exe 107 PID 64 wrote to memory of 2296 64 explorer.exe 107 PID 64 wrote to memory of 2296 64 explorer.exe 107 PID 64 wrote to memory of 4188 64 explorer.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3a428f65fbc7b7212c0334f1509f077_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a3a428f65fbc7b7212c0334f1509f077_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1440
-
-
C:\Users\Admin\AppData\Local\Temp\a3a428f65fbc7b7212c0334f1509f077_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a3a428f65fbc7b7212c0334f1509f077_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3164 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5000 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:64 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4552 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3136 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1588 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3152
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4880 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2672
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3280 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1676
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2268 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1672
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2292 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1204
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:912 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2284
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2376 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2664
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1852 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2760
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3932 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2580
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4344 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1128 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2704 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4988
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2264 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3972
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2860 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3388
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4604 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1348
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3836 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:220
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1076 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1504
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2296 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4252
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4188 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:348
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4492 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:388 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2956 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:2888
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2092 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4844
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2952 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:412
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:880 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1496
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4808 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4040
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3188 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4696
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4504 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2328
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4316 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2540
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1912 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2432 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2720 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3036
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3636 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2784
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4936 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:616
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5100 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4584
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4432 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3624
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:604 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3320
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2140 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2080
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4400 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3584
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4996 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3848
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
PID:4376 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3600
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1636 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2920
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4288 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2408
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4300 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3468
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2948 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4128
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:4028
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:536 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3576
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:716
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3236 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4116
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:4276
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
PID:1884 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3648
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
PID:2504 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2392
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4364
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3348 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2244
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3148 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:836
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:1888
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
PID:2252 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1056
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1632 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4876
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:2368
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3412 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:760
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3132 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4912
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5028 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3976
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1804 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3924
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3384 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3884
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:404
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4372
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2728
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3336
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3380
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1196
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1580
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1488
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3364
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4508
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1028
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2060
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4324
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4956
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3792
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3772
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1776
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4952
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2836
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4968
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4916
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:2084
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD5dac5e6b80f1af94566545bacb424d8e0
SHA1af812468ef4dc66f1e34cf19eae0157f687050c6
SHA256d179afed5315673c3b2f3b4e44508e857c9ed198b504f31a356780de2368cd8c
SHA5120c89889bffee1c40b73fe905c2e07c2ff9b67e2ed020f68546aab4bb872ed4cdae25a0e0ec6e3f4c01e83691404fcadc038047503df61f492f7cba210d2a5bb4
-
Filesize
2.2MB
MD52e9bd259eb52f6682106b78dfa1c8c72
SHA1729229d3c8765fdcd0bd41c9304ca64e1d9676cf
SHA25666c88968f03beb723f1e2f72cadc8c754858a6774deafe084c344eb378acb672
SHA512b941e09f219d42b2fdde945b86cada9b9e0d31a084b8b5d0c9d78e30720739b18227ac8cda3b3a6a39302b427fceca185c9627f49f70087f99be1e7a1ea4db9a