Analysis
-
max time kernel
132s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 18:17
Behavioral task
behavioral1
Sample
ab18159a961fa789a2361c1f73e002be_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
ab18159a961fa789a2361c1f73e002be_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
ab18159a961fa789a2361c1f73e002be
-
SHA1
ae9aed248cdc10b3d413efd4116744a205476947
-
SHA256
3f5dba864063b2de952a43b649b1488cc56d4e3d6c263a65c81bb617738a6ebc
-
SHA512
c53f5c5902d07f16822e3621edca28006b9978122d9d697482056de2023ca92900a1d701e1d283487bfd629cde3d106271acb7d27fc006fff787db9775e090a4
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZG:0UzeyQMS4DqodCnoe+iitjWwwi
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2080292272-204036150-2159171770-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ab18159a961fa789a2361c1f73e002be_JaffaCakes118.exe ab18159a961fa789a2361c1f73e002be_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ab18159a961fa789a2361c1f73e002be_JaffaCakes118.exe ab18159a961fa789a2361c1f73e002be_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
pid Process 3564 explorer.exe 1556 explorer.exe 376 spoolsv.exe 64 spoolsv.exe 3592 spoolsv.exe 1480 spoolsv.exe 1104 spoolsv.exe 2024 spoolsv.exe 3672 spoolsv.exe 940 spoolsv.exe 2404 spoolsv.exe 4640 spoolsv.exe 4160 spoolsv.exe 3996 spoolsv.exe 1728 spoolsv.exe 4324 spoolsv.exe 5100 spoolsv.exe 1544 spoolsv.exe 1300 spoolsv.exe 3224 spoolsv.exe 3908 spoolsv.exe 3200 spoolsv.exe 4932 spoolsv.exe 3880 spoolsv.exe 4424 spoolsv.exe 1524 spoolsv.exe 4596 spoolsv.exe 2472 spoolsv.exe 4136 spoolsv.exe 860 spoolsv.exe 4084 spoolsv.exe 624 spoolsv.exe 2284 spoolsv.exe 1688 spoolsv.exe 4364 spoolsv.exe 4048 spoolsv.exe 3368 spoolsv.exe 1200 spoolsv.exe 4240 explorer.exe 1208 spoolsv.exe 4608 spoolsv.exe 4564 spoolsv.exe 3304 spoolsv.exe 3108 spoolsv.exe 864 spoolsv.exe 1176 spoolsv.exe 1864 spoolsv.exe 1292 spoolsv.exe 2956 spoolsv.exe 2996 spoolsv.exe 3192 explorer.exe 3428 spoolsv.exe 1132 spoolsv.exe 704 spoolsv.exe 2392 spoolsv.exe 2200 spoolsv.exe 2120 spoolsv.exe 4400 spoolsv.exe 664 explorer.exe 3956 spoolsv.exe 856 spoolsv.exe 4504 spoolsv.exe 3944 spoolsv.exe 2088 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe -
Suspicious use of SetThreadContext 45 IoCs
description pid Process procid_target PID 2708 set thread context of 2272 2708 ab18159a961fa789a2361c1f73e002be_JaffaCakes118.exe 86 PID 3564 set thread context of 1556 3564 explorer.exe 91 PID 376 set thread context of 1200 376 spoolsv.exe 127 PID 64 set thread context of 1208 64 spoolsv.exe 129 PID 3592 set thread context of 4608 3592 spoolsv.exe 130 PID 1480 set thread context of 4564 1480 spoolsv.exe 131 PID 1104 set thread context of 3108 1104 spoolsv.exe 133 PID 2024 set thread context of 864 2024 spoolsv.exe 134 PID 3672 set thread context of 1176 3672 spoolsv.exe 135 PID 940 set thread context of 1864 940 spoolsv.exe 136 PID 2404 set thread context of 1292 2404 spoolsv.exe 137 PID 4640 set thread context of 2996 4640 spoolsv.exe 139 PID 4160 set thread context of 3428 4160 spoolsv.exe 141 PID 3996 set thread context of 1132 3996 spoolsv.exe 142 PID 1728 set thread context of 704 1728 spoolsv.exe 143 PID 4324 set thread context of 2392 4324 spoolsv.exe 144 PID 5100 set thread context of 2200 5100 spoolsv.exe 145 PID 1544 set thread context of 4400 1544 spoolsv.exe 147 PID 1300 set thread context of 3956 1300 spoolsv.exe 149 PID 3224 set thread context of 856 3224 spoolsv.exe 150 PID 3908 set thread context of 4504 3908 spoolsv.exe 151 PID 3200 set thread context of 3944 3200 spoolsv.exe 152 PID 4932 set thread context of 2088 4932 spoolsv.exe 153 PID 3880 set thread context of 4320 3880 spoolsv.exe 154 PID 4424 set thread context of 4984 4424 spoolsv.exe 156 PID 1524 set thread context of 732 1524 spoolsv.exe 158 PID 4596 set thread context of 4500 4596 spoolsv.exe 159 PID 2472 set thread context of 620 2472 spoolsv.exe 160 PID 4136 set thread context of 1440 4136 spoolsv.exe 161 PID 860 set thread context of 956 860 spoolsv.exe 164 PID 4084 set thread context of 2068 4084 spoolsv.exe 165 PID 624 set thread context of 4476 624 spoolsv.exe 166 PID 2284 set thread context of 4840 2284 spoolsv.exe 167 PID 1688 set thread context of 4820 1688 spoolsv.exe 169 PID 4364 set thread context of 2416 4364 spoolsv.exe 171 PID 4048 set thread context of 1120 4048 spoolsv.exe 172 PID 3368 set thread context of 2408 3368 spoolsv.exe 176 PID 4240 set thread context of 4028 4240 explorer.exe 181 PID 3304 set thread context of 3076 3304 spoolsv.exe 183 PID 2956 set thread context of 2540 2956 spoolsv.exe 189 PID 3192 set thread context of 3144 3192 explorer.exe 191 PID 2120 set thread context of 2288 2120 spoolsv.exe 195 PID 664 set thread context of 4060 664 explorer.exe 196 PID 1696 set thread context of 4664 1696 explorer.exe 202 PID 432 set thread context of 2752 432 spoolsv.exe 203 -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\system\udsys.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification \??\c:\windows\system\explorer.exe ab18159a961fa789a2361c1f73e002be_JaffaCakes118.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini ab18159a961fa789a2361c1f73e002be_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2272 ab18159a961fa789a2361c1f73e002be_JaffaCakes118.exe 2272 ab18159a961fa789a2361c1f73e002be_JaffaCakes118.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1556 explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2272 ab18159a961fa789a2361c1f73e002be_JaffaCakes118.exe 2272 ab18159a961fa789a2361c1f73e002be_JaffaCakes118.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1556 explorer.exe 1200 spoolsv.exe 1200 spoolsv.exe 1208 spoolsv.exe 1208 spoolsv.exe 4608 spoolsv.exe 4608 spoolsv.exe 4564 spoolsv.exe 4564 spoolsv.exe 3108 spoolsv.exe 3108 spoolsv.exe 864 spoolsv.exe 864 spoolsv.exe 1176 spoolsv.exe 1176 spoolsv.exe 1864 spoolsv.exe 1864 spoolsv.exe 1292 spoolsv.exe 1292 spoolsv.exe 2996 spoolsv.exe 2996 spoolsv.exe 3428 spoolsv.exe 3428 spoolsv.exe 1132 spoolsv.exe 1132 spoolsv.exe 704 spoolsv.exe 704 spoolsv.exe 2392 spoolsv.exe 2392 spoolsv.exe 2200 spoolsv.exe 2200 spoolsv.exe 4400 spoolsv.exe 4400 spoolsv.exe 3956 spoolsv.exe 3956 spoolsv.exe 856 spoolsv.exe 856 spoolsv.exe 4504 spoolsv.exe 4504 spoolsv.exe 3944 spoolsv.exe 3944 spoolsv.exe 2088 spoolsv.exe 2088 spoolsv.exe 4320 spoolsv.exe 4320 spoolsv.exe 4984 spoolsv.exe 4984 spoolsv.exe 732 spoolsv.exe 732 spoolsv.exe 4500 spoolsv.exe 4500 spoolsv.exe 620 spoolsv.exe 620 spoolsv.exe 1440 spoolsv.exe 1440 spoolsv.exe 956 spoolsv.exe 956 spoolsv.exe 2068 spoolsv.exe 2068 spoolsv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2708 wrote to memory of 1388 2708 ab18159a961fa789a2361c1f73e002be_JaffaCakes118.exe 81 PID 2708 wrote to memory of 1388 2708 ab18159a961fa789a2361c1f73e002be_JaffaCakes118.exe 81 PID 2708 wrote to memory of 2272 2708 ab18159a961fa789a2361c1f73e002be_JaffaCakes118.exe 86 PID 2708 wrote to memory of 2272 2708 ab18159a961fa789a2361c1f73e002be_JaffaCakes118.exe 86 PID 2708 wrote to memory of 2272 2708 ab18159a961fa789a2361c1f73e002be_JaffaCakes118.exe 86 PID 2708 wrote to memory of 2272 2708 ab18159a961fa789a2361c1f73e002be_JaffaCakes118.exe 86 PID 2708 wrote to memory of 2272 2708 ab18159a961fa789a2361c1f73e002be_JaffaCakes118.exe 86 PID 2272 wrote to memory of 3564 2272 ab18159a961fa789a2361c1f73e002be_JaffaCakes118.exe 87 PID 2272 wrote to memory of 3564 2272 ab18159a961fa789a2361c1f73e002be_JaffaCakes118.exe 87 PID 2272 wrote to memory of 3564 2272 ab18159a961fa789a2361c1f73e002be_JaffaCakes118.exe 87 PID 3564 wrote to memory of 1556 3564 explorer.exe 91 PID 3564 wrote to memory of 1556 3564 explorer.exe 91 PID 3564 wrote to memory of 1556 3564 explorer.exe 91 PID 3564 wrote to memory of 1556 3564 explorer.exe 91 PID 3564 wrote to memory of 1556 3564 explorer.exe 91 PID 1556 wrote to memory of 376 1556 explorer.exe 92 PID 1556 wrote to memory of 376 1556 explorer.exe 92 PID 1556 wrote to memory of 376 1556 explorer.exe 92 PID 1556 wrote to memory of 64 1556 explorer.exe 93 PID 1556 wrote to memory of 64 1556 explorer.exe 93 PID 1556 wrote to memory of 64 1556 explorer.exe 93 PID 1556 wrote to memory of 3592 1556 explorer.exe 94 PID 1556 wrote to memory of 3592 1556 explorer.exe 94 PID 1556 wrote to memory of 3592 1556 explorer.exe 94 PID 1556 wrote to memory of 1480 1556 explorer.exe 95 PID 1556 wrote to memory of 1480 1556 explorer.exe 95 PID 1556 wrote to memory of 1480 1556 explorer.exe 95 PID 1556 wrote to memory of 1104 1556 explorer.exe 96 PID 1556 wrote to memory of 1104 1556 explorer.exe 96 PID 1556 wrote to memory of 1104 1556 explorer.exe 96 PID 1556 wrote to memory of 2024 1556 explorer.exe 97 PID 1556 wrote to memory of 2024 1556 explorer.exe 97 PID 1556 wrote to memory of 2024 1556 explorer.exe 97 PID 1556 wrote to memory of 3672 1556 explorer.exe 98 PID 1556 wrote to memory of 3672 1556 explorer.exe 98 PID 1556 wrote to memory of 3672 1556 explorer.exe 98 PID 1556 wrote to memory of 940 1556 explorer.exe 99 PID 1556 wrote to memory of 940 1556 explorer.exe 99 PID 1556 wrote to memory of 940 1556 explorer.exe 99 PID 1556 wrote to memory of 2404 1556 explorer.exe 100 PID 1556 wrote to memory of 2404 1556 explorer.exe 100 PID 1556 wrote to memory of 2404 1556 explorer.exe 100 PID 1556 wrote to memory of 4640 1556 explorer.exe 101 PID 1556 wrote to memory of 4640 1556 explorer.exe 101 PID 1556 wrote to memory of 4640 1556 explorer.exe 101 PID 1556 wrote to memory of 4160 1556 explorer.exe 102 PID 1556 wrote to memory of 4160 1556 explorer.exe 102 PID 1556 wrote to memory of 4160 1556 explorer.exe 102 PID 1556 wrote to memory of 3996 1556 explorer.exe 103 PID 1556 wrote to memory of 3996 1556 explorer.exe 103 PID 1556 wrote to memory of 3996 1556 explorer.exe 103 PID 1556 wrote to memory of 1728 1556 explorer.exe 104 PID 1556 wrote to memory of 1728 1556 explorer.exe 104 PID 1556 wrote to memory of 1728 1556 explorer.exe 104 PID 1556 wrote to memory of 4324 1556 explorer.exe 105 PID 1556 wrote to memory of 4324 1556 explorer.exe 105 PID 1556 wrote to memory of 4324 1556 explorer.exe 105 PID 1556 wrote to memory of 5100 1556 explorer.exe 106 PID 1556 wrote to memory of 5100 1556 explorer.exe 106 PID 1556 wrote to memory of 5100 1556 explorer.exe 106 PID 1556 wrote to memory of 1544 1556 explorer.exe 107 PID 1556 wrote to memory of 1544 1556 explorer.exe 107 PID 1556 wrote to memory of 1544 1556 explorer.exe 107 PID 1556 wrote to memory of 1300 1556 explorer.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab18159a961fa789a2361c1f73e002be_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ab18159a961fa789a2361c1f73e002be_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1388
-
-
C:\Users\Admin\AppData\Local\Temp\ab18159a961fa789a2361c1f73e002be_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ab18159a961fa789a2361c1f73e002be_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3564 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1556 -
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:376 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1200 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4240 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4028
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:64 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1208
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3592 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4608
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1480 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4564
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1104 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3108
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2024 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:864
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3672 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1176
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:940 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1864
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2404 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1292
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4640 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2996 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3192 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3144
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4160 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3428
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3996 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1132
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1728 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:704
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4324 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2392
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:5100 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2200
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1544 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4400 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:664 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4060
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1300 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3956
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3224 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:856
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3908 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4504
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3200 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3944
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4932 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2088
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3880 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4320
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4424 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4984 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1696 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4664
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1524 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:732
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4596 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:4500
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2472 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:620
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4136 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:1440 -
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:3324 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3484
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:860 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:956
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4084 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
- Suspicious use of SetWindowsHookEx
PID:2068
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:624 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4476
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2284 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4840
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:1688 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4820
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:3992 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:4872
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4364 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2416
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:4048 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1120
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3368 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2408
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4632
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1040
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:3304 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3076
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:1620 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:1376
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2956 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2540
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:4104 -
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"8⤵PID:3372
-
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:2120 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2288
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
- Drops file in Windows directory
PID:4792
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
PID:432 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:2752
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4972
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4296 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3188
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:4680
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1572 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3972
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3364
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4576
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:1100
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3212 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1272
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2476
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1124
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1180 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:628
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:5072 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3440
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3608
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:808
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:3832
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1672
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4824
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4704 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:552
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3100
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3448 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:1008
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2980 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4304
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2756 -
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵PID:4452
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵PID:3784
-
-
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1540
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:1660
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:428
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3116
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:3560
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1052
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:4868
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
PID:2708
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:5024
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3280
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:2040
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1692
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:1876
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:3504
-
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵PID:4676
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:2652
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
Filesize
2.2MB
MD5aedcc117ac9fc4f132162d0beb2e59cc
SHA185ccf5ba9046a72a1d582f87f2d49ba8b9be9a8a
SHA256c65f13e10fb09d32e6cf70cf54ae183890b3c69ef5cbb0489dee37aa13d058db
SHA512d16e6a4442dc017000e99502bc81da0357e20909deedc2b8c4061e7b230b912e308b61d226d2962eef8bc3456b2521e84a50cf6e8044208ddda13f1def593706
-
Filesize
2.2MB
MD518a038eeefa3bd2d0f648c6e5bef83fb
SHA118e6c7812319d241230e1e57953ba0255af15ba8
SHA2565fcd6b0aa37461dac404a70d4a785252c95fa97bad1e6b053c3e88f64662714f
SHA5120193d192693fa793f9a271646adee333ca997f40897342b051ec6143398d29b6b59b932d1ca34c6184cee7b3c71431252f4545129a471b85b29b129c0ac47c4a