Analysis
-
max time kernel
153s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2023 20:08
Static task
static1
Behavioral task
behavioral1
Sample
PO_39100.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PO_39100.exe
Resource
win10v2004-20230220-en
General
-
Target
PO_39100.exe
-
Size
1.5MB
-
MD5
13dc441ec2f9e3f9aa1f354a4b14d318
-
SHA1
05b62c596ca78745d73514cd5d43434929955863
-
SHA256
6f35bb0a7644cfda2468e984269f7febafcb672591a887a8029257dea0801a7c
-
SHA512
30f4da77bf1ba35334fc1812a6792bb91396fdc8cc7b918f81c6395a48523079cccc89c7090b5c21c30ab62939fa8663cc695ad7d876f083773f7c85cffc5242
-
SSDEEP
24576:TwMryIYPOfPFxgvnRnc215nETdxUA6p7GDHDCf0uEywBk1EM8Xzd:Md5PsPfgvRv0gA6pYC52lD
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Executes dropped EXE 22 IoCs
pid Process 4268 alg.exe 2548 DiagnosticsHub.StandardCollector.Service.exe 4344 fxssvc.exe 2320 elevation_service.exe 4196 elevation_service.exe 500 maintenanceservice.exe 4236 msdtc.exe 2604 OSE.EXE 2180 PerceptionSimulationService.exe 5096 perfhost.exe 4448 locator.exe 4996 SensorDataService.exe 4060 snmptrap.exe 3256 spectrum.exe 3756 ssh-agent.exe 4852 TieringEngineService.exe 4016 AgentService.exe 2688 vds.exe 2624 vssvc.exe 4240 wbengine.exe 428 WmiApSrv.exe 888 SearchIndexer.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Drops file in System32 directory 24 IoCs
description ioc Process File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe PO_39100.exe File opened for modification C:\Windows\System32\msdtc.exe PO_39100.exe File opened for modification C:\Windows\system32\SgrmBroker.exe PO_39100.exe File opened for modification C:\Windows\System32\snmptrap.exe PO_39100.exe File opened for modification C:\Windows\system32\TieringEngineService.exe PO_39100.exe File opened for modification C:\Windows\System32\vds.exe PO_39100.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe PO_39100.exe File opened for modification C:\Windows\System32\alg.exe PO_39100.exe File opened for modification C:\Windows\system32\SearchIndexer.exe PO_39100.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\b3c9ec0fc94b1c77.bin alg.exe File opened for modification C:\Windows\system32\dllhost.exe PO_39100.exe File opened for modification C:\Windows\system32\fxssvc.exe PO_39100.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe PO_39100.exe File opened for modification C:\Windows\system32\locator.exe PO_39100.exe File opened for modification C:\Windows\system32\wbengine.exe PO_39100.exe File opened for modification C:\Windows\system32\AppVClient.exe PO_39100.exe File opened for modification C:\Windows\System32\SensorDataService.exe PO_39100.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe PO_39100.exe File opened for modification C:\Windows\system32\msiexec.exe PO_39100.exe File opened for modification C:\Windows\SysWow64\perfhost.exe PO_39100.exe File opened for modification C:\Windows\system32\spectrum.exe PO_39100.exe File opened for modification C:\Windows\system32\AgentService.exe PO_39100.exe File opened for modification C:\Windows\system32\vssvc.exe PO_39100.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4732 set thread context of 1040 4732 PO_39100.exe 91 PID 1040 set thread context of 2376 1040 PO_39100.exe 96 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE PO_39100.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\orbd.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstat.exe PO_39100.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe PO_39100.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javadoc.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jcmd.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jdeps.exe PO_39100.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jhat.exe PO_39100.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe PO_39100.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe PO_39100.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE PO_39100.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe PO_39100.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\policytool.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javac.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\schemagen.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\klist.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\ktab.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\pack200.exe PO_39100.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe PO_39100.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jarsigner.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmc.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstatd.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmic.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmiregistry.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\xjc.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmid.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\unpack200.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jabswitch.exe PO_39100.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe PO_39100.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE PO_39100.exe File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmap.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jsadebugd.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jvisualvm.exe PO_39100.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe PO_39100.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe PO_39100.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javapackager.exe PO_39100.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jconsole.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\servertool.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java-rmi.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\tnameserv.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javaw.exe PO_39100.exe File opened for modification C:\Program Files\7-Zip\7z.exe PO_39100.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe PO_39100.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaws.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jps.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jjs.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\wsgen.exe PO_39100.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe PO_39100.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe PO_39100.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jabswitch.exe PO_39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jdb.exe PO_39100.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe PO_39100.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 72 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 676 Process not Found 676 Process not Found -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1040 PO_39100.exe Token: SeAuditPrivilege 4344 fxssvc.exe Token: SeRestorePrivilege 4852 TieringEngineService.exe Token: SeManageVolumePrivilege 4852 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 4016 AgentService.exe Token: SeBackupPrivilege 2624 vssvc.exe Token: SeRestorePrivilege 2624 vssvc.exe Token: SeAuditPrivilege 2624 vssvc.exe Token: SeBackupPrivilege 4240 wbengine.exe Token: SeRestorePrivilege 4240 wbengine.exe Token: SeSecurityPrivilege 4240 wbengine.exe Token: 33 888 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 888 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 888 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 888 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 888 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 888 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 888 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 888 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 888 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 888 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 888 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 888 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 888 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 888 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 888 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 888 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 888 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 888 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 888 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 888 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 888 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 888 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 888 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 888 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 888 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 888 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 888 SearchIndexer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1040 PO_39100.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4732 wrote to memory of 1040 4732 PO_39100.exe 91 PID 4732 wrote to memory of 1040 4732 PO_39100.exe 91 PID 4732 wrote to memory of 1040 4732 PO_39100.exe 91 PID 4732 wrote to memory of 1040 4732 PO_39100.exe 91 PID 4732 wrote to memory of 1040 4732 PO_39100.exe 91 PID 4732 wrote to memory of 1040 4732 PO_39100.exe 91 PID 4732 wrote to memory of 1040 4732 PO_39100.exe 91 PID 4732 wrote to memory of 1040 4732 PO_39100.exe 91 PID 1040 wrote to memory of 2376 1040 PO_39100.exe 96 PID 1040 wrote to memory of 2376 1040 PO_39100.exe 96 PID 1040 wrote to memory of 2376 1040 PO_39100.exe 96 PID 1040 wrote to memory of 2376 1040 PO_39100.exe 96 PID 1040 wrote to memory of 2376 1040 PO_39100.exe 96 PID 888 wrote to memory of 1928 888 SearchIndexer.exe 120 PID 888 wrote to memory of 1928 888 SearchIndexer.exe 120 PID 888 wrote to memory of 5028 888 SearchIndexer.exe 121 PID 888 wrote to memory of 5028 888 SearchIndexer.exe 121 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO_39100.exe"C:\Users\Admin\AppData\Local\Temp\PO_39100.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\PO_39100.exe"C:\Users\Admin\AppData\Local\Temp\PO_39100.exe"2⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:2376
-
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4268
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:2548
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:4648
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4344
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2320
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4196
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:500
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:4236
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:2604
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:2180
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:5096
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:4448
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4996
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:4060
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:3256
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:3756
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:1964
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4016
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:2688
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:428
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵PID:1928
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 8962⤵PID:5028
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD59f9a849256ecc2f43865a1302eb824da
SHA1feefc7db7593c226857219096ec986ce20492323
SHA2566eeee7d2a01487916ec82ebcb4654e607856804c895cb4acff29a928677ddace
SHA512c1072e997b43e5c4090f1bbbd6776a463e5e92c6723608c83b6de94c83160af9eeeaa5efa9362a9c01eae1f8868a06e1588511563872171f5ebf270bc8f76542
-
Filesize
1.4MB
MD5a3db1c7498750cb2f3ff38bac8393ef5
SHA14e122ffc8474599807065d5f7a7009863d3f1aa1
SHA256e6210d77b3e0a5410a30600b4c0cd748aac28e61fc968168babbeb0b7b390ce3
SHA512f8a77db6c65eb99f95a08720345ca0d6ec676a4af13fbfb42e687e61483c044a305b931ac81a90d0f2003ffd5f47fdb6b0ec58054cfb3e4c0a8f2d6dd44e8c7c
-
Filesize
1.5MB
MD543384ed646a27d0e71c20c831e6cf33a
SHA1029acc612c2c69b37bab1c14cc5759342cc30522
SHA256338434951faab787a4e4220a0f88be0e85e3d9cf112fbe18ee3407cd6962c262
SHA512586908677d5cd28a397f30f139be9a96b0fee18b9b6167088af0f495e2d0b6b1af00a1e3309741bbaff5984e54869202a55e7b120e62358bb72f4c40147590df
-
Filesize
2.1MB
MD53d963e3729ced151be523321cc4101af
SHA132a5f5681787d6ec211b18ad245a782b37cf581c
SHA2566f10e31bfcb1eb901765e96526edb3815189c9a29db4449e86c2112dedb6f0fb
SHA512fde5e0bf145c236096a4ce9abc8dc1269bdf6d57ac09207d6559e02e3f7ffcf112ad613bc0675108dd20c3b670579398e5a319ff2a078b1245172f15453e1c2e
-
Filesize
1.2MB
MD585b4b90e6f675c54de529192f48cda49
SHA1671e91da9cc00dfd19e02ca7269327f1c9dc3f49
SHA256ca24eaa7f160172d0b31f70a77c127c78eb0eec2c115a053c41ca9ea29da8b2b
SHA512d47f64d1fb394e625cda4af677139b5fbfe6d970877e2bccb6af5989381b765b5152be97e821f77f635a253fa86936addb0b742dccde29c79aee18dae96e4c8b
-
Filesize
1.7MB
MD55a2e14055353001645ab1abc014c6eda
SHA12c43d1320daac7cb3c4142ec71360bee729377d0
SHA256e697c6c591097c54bee14bc63421cca250728aa4e5abdf01257d0ee7063dc3de
SHA512d8284d72ebb4b9d8c2d7688152daf56f1524403ac1c7a44060a581b153a8a7d5c56e255eff2879321a427d2665f14c86bbe11a4b37432e27e00883233140ba4a
-
Filesize
1.3MB
MD5bbe46f8b78fa3fe7148490f6df265ece
SHA158d2d96f284f886f45775b425b3f6a4a8891f196
SHA2569bc7c818695a74844a545fcd69dfa9d0e62e99b0088484c7f6ec3e483ae06e61
SHA51288f1d5f11e46658298cb1a72ff5fb4ef02b0c8b20cd79b393e16481f2b420745dacb3ba57c9dff2e6f8c2a66f38e01c7f7e371964873034d7c65fc06271d24d0
-
Filesize
1.2MB
MD502da41c04372d042ab400c82b5603bc1
SHA1889d63bfdb73a3f988e37833b9e6fecc34c1ff9e
SHA2562a47e42b700964acb1b82cca0358486c1b88815560e92ef8bb69c3c63ceed2a6
SHA512757453920f459dd0f632e91a1451423c703a04f2a185865a17e33c0ea47907a4019d42aa34a630645f90cc9531405950883b2ceaa64547d01c693ce8d50958f0
-
Filesize
1.2MB
MD5317f1ce1ddc6bcdd4a59aae5da3975f1
SHA1601b5256cacabfb33db5ad1b8fe3dfe27ee2b880
SHA256122d327c347a83f7d51839a3f1f053d65302265d7fd85d25614fdacdf5a4676b
SHA5122373d73f586051d8ca00c83214efa65adcbc159c364cc73e0935d30e30f9b6a77e1d78793014c090e2ed49b82258ca2b9b0b35e0f4e416df9ceb146ac55672e6
-
Filesize
1.6MB
MD56626bccd1b54003374394c3d211e4f06
SHA1eace0d4b81f90ca9debcbf30c3100e703d588777
SHA2561e7af66a907c183b056d7497bde7c3032afa72b7898e50f9b93a8b2b8cc56ba4
SHA512512f2b773b393ad9978216dd566c0d535aba8fdebee5005b9eb721d95b956f251a72caf5a7e504b2aaaf082b17a81af83d187e48fef4da5b60be43f2277eae38
-
Filesize
1.6MB
MD56626bccd1b54003374394c3d211e4f06
SHA1eace0d4b81f90ca9debcbf30c3100e703d588777
SHA2561e7af66a907c183b056d7497bde7c3032afa72b7898e50f9b93a8b2b8cc56ba4
SHA512512f2b773b393ad9978216dd566c0d535aba8fdebee5005b9eb721d95b956f251a72caf5a7e504b2aaaf082b17a81af83d187e48fef4da5b60be43f2277eae38
-
Filesize
1.3MB
MD5bf9f0c13d09825c1977b0c92a48870b6
SHA119e8446189cf21627ed1d947f205667fdbc342d4
SHA256e7cda41b22a1f124c6f594ac7ba900978d4055d64fde44d678146ac0a3501ccd
SHA5129aa93f452c7cd39726299d2e90c311dad4f3e0a10f6cf00727477f9c3929c703153bcabd6d1c1940a0265994f0ddb8e0c4c6aeda3196caac6812d9435fbc6e25
-
Filesize
1.4MB
MD5fd0c43c517009f144c7293319e215ccd
SHA1580cb8f3fa9b0c8bd40d5361502560e8392f0126
SHA2565834fd204c1432cc9b278ac9c237d3b7411176aed7529272d69a203d7321f940
SHA512ed998e817ef1b0dc3efcfb332266c31c159da0481562fba6ec839e3481efba5f9e3d6ea1f862e6354d2b5028115799562b6bfbbd5788523b16fd8b6c0f941211
-
Filesize
1.8MB
MD523cdca343ae80b91e66a75b4a734c4e4
SHA1e6d0ef0ba4a52ce1f36ab53313a99b64a066c4fc
SHA2565470917e7c70b0840bfc28e23e0bf8de3726e1e4cb7f68304f1f93a19c3e2353
SHA512497c1a8f3a211844206c6f40bec39c4ec1a902bc5813518ebbb66a6e1c264b58e4ad3fba85af99d620166fcfb9e9e83b4ca4ac4761293c086d5dee1ed29800ab
-
Filesize
1.4MB
MD54f18cbc652948bb7ad7f886d5fd84575
SHA1e218c314c4dfe308310a01f36ad7266990e6ceed
SHA256b6ab6dc4cab522411f4e65b695d3f3d37a01d8a03cdf1e99eeaa24d15a9726ca
SHA512cb64dd4c15cec87fa4ec2307e92044888642b7f7316216a82483e06bc69810da01a9e4284e5511370b30d3fea75e7afe54eaffdbcfa487024c5caaec808b3dbd
-
Filesize
1.5MB
MD5fcdd1e90a20effbc47fdf58904aa0012
SHA164f1abc17aad168d2a505c0652d5396868997343
SHA25660b4533362a608153f409a5e81473f67e6e7a5990cc992906f4d367e7f9568ab
SHA51258d4fc27e4634a7a04af87306a6e177fa054ef9f54d8d278aa73c697c3e592283fdc360bdbbb40716d8932b1bf1eee3cfa72881b9f552aff7e0ab7272771662a
-
Filesize
2.0MB
MD5d7e09aab3bd0bfa83cb78ff63ba7a361
SHA1bf22b229565039bbcc8ba91e963b9302274b689e
SHA256b2c0e3bfa8c1904bb1277e6e829f95dd0a5ac0afe4b48a75c8cc0d835a8355a4
SHA5123cbe6fc8427802ba92aff875c3cfe01860748642ff557d38a2cdb1e61e7507681d2545cfc3bf3e1232ff770b3d931ba47b5182e77e7fde56f600e23bb8917e5e
-
Filesize
1.3MB
MD5659fec0891adb348d6b244fa969c342b
SHA1294faf494639d2b66c57980899e04310f77a7fae
SHA256a3cf741e1fe0d26c1187b4ab7d3a544fd0c014476dac812779029718b0a6b2ff
SHA512b6ba8c53e41082bec0a976a50c060c5c88ec8f0bdcc9a093d565613006cd66f0111566bf7f220c91acbb381d0e05fcac1c3764c173f93ce85ce8a20d57366ad1
-
Filesize
1.4MB
MD5af1b3255e90a778edab70a3b046db0a4
SHA1d71bc9926d06643f6466b7be647fe4d0277e8296
SHA2564c909e372d270f3107a5ad2527ba90dd554c02880b1d56fa59fd56211c0d7813
SHA512810d67f8df2bcc8771510580029248728391ab5d5d74a96ad8505945aa02eebc58d3d413f3867695834e90107b97995e1a95b2522f6e9202f7cb561e0ab153b3
-
Filesize
1.2MB
MD51a4aafd49d5a2c0b9e2e71558ee18667
SHA1819fd1c37a2087e26e9a5e199cbf14441960c073
SHA256174d75bc3c3ad9bc0448d456221ebb8d1d5534f9522d7ef27363f4725a0ef414
SHA5127d2836d9d15ce9ecbbd125236ce3620283d165e1bfaa22f4e8eb8099bc5e873422724e4219278caa28cfa3bef797d8841320e8190e54093624bd6651a53fe5f7
-
Filesize
1.3MB
MD5ea3f78b3c51641842bd97d7edb7ff360
SHA1710b339e830df68500ed1e86eca49332a08e1272
SHA25682d97a704fff7545f37a14cd95308c1ba0aea1840d84bcca403efd6f2baa2071
SHA5129ec432877e63f38bad20402a0d85b02585a41782a5a953c177f0bbd31c86feebd358fbf6960523b0271cbbe7c51f1e67fe31aaffd66de879bfb039e9ea171b46
-
Filesize
1.4MB
MD54967755ec14d204a4b041e54aef355d9
SHA1f1f04965585e6e961d26c0ec03dbcab7ca6839c9
SHA2567d58d1b50e2af692284297713f83d072c812643e4bd162dd0eff0d8ab84387f3
SHA512705ee07f11fb811d337ba055759a577d6150ac27d4fa042786243543297ab55f2ef52a97e7fb0b3269dcf79102efa76bb143d85a9107bfe67f239ee8f6f34c4e
-
Filesize
2.1MB
MD5e13abb26b658a5c18743a5af287b91ca
SHA1eedc320f4d7a2c5046874add2370ea639163cee0
SHA256116bb63008161d6786cb1e293297dd91f9bfff0fbfb1d68005d0c0186818efa0
SHA5126483fca1b91a325101b81d1bc48407bf17874a28dc17977828686149cc7b57f3430ae5fc13ba9de1da78bc97ec95cd6138ffca0e410449b9a5793244a2b99c7f