Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 14:29
Static task
static1
Behavioral task
behavioral1
Sample
Technical Spec.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Technical Spec.exe
Resource
win10v2004-20230221-en
General
-
Target
Technical Spec.exe
-
Size
1.5MB
-
MD5
ebf99fc11603d1ec4706b4330761df32
-
SHA1
c560ca5ae10593d7861701654d839d1071515866
-
SHA256
693c258cb5620f7e8714d4afc7215e2c7dc16872265148341db23b639906eecb
-
SHA512
d31c699f201343bd02c07bbf5d41e00df8368b81bfbb1d037fb4b1e1894fd3b8232e80b065845745fa6dab7f23d47efbb1d8b6a9143f5b7db0fb4a57395c4f4a
-
SSDEEP
49152:NQh9Nn3uFcWIY2YZGIUtNlMpovD2i9c2:0/37Wp2YPUtNlMG7N
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Executes dropped EXE 22 IoCs
pid Process 2704 alg.exe 2884 DiagnosticsHub.StandardCollector.Service.exe 5104 fxssvc.exe 1360 elevation_service.exe 2328 elevation_service.exe 3796 maintenanceservice.exe 3352 msdtc.exe 1676 OSE.EXE 2336 PerceptionSimulationService.exe 2732 perfhost.exe 5100 locator.exe 2004 SensorDataService.exe 2800 snmptrap.exe 5108 spectrum.exe 4652 ssh-agent.exe 3092 TieringEngineService.exe 4396 AgentService.exe 2964 vds.exe 3960 vssvc.exe 2820 wbengine.exe 2936 WmiApSrv.exe 736 SearchIndexer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Drops file in System32 directory 29 IoCs
description ioc Process File opened for modification C:\Windows\System32\snmptrap.exe Technical Spec.exe File opened for modification C:\Windows\system32\vssvc.exe Technical Spec.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe Technical Spec.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\SysWow64\perfhost.exe Technical Spec.exe File opened for modification C:\Windows\system32\locator.exe Technical Spec.exe File opened for modification C:\Windows\System32\SensorDataService.exe Technical Spec.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe Technical Spec.exe File opened for modification C:\Windows\system32\SearchIndexer.exe Technical Spec.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\System32\alg.exe Technical Spec.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\System32\SensorDataService.exe alg.exe File opened for modification C:\Windows\system32\AgentService.exe Technical Spec.exe File opened for modification C:\Windows\System32\vds.exe Technical Spec.exe File opened for modification C:\Windows\system32\msiexec.exe Technical Spec.exe File opened for modification C:\Windows\system32\spectrum.exe Technical Spec.exe File opened for modification C:\Windows\system32\TieringEngineService.exe Technical Spec.exe File opened for modification C:\Windows\system32\dllhost.exe Technical Spec.exe File opened for modification C:\Windows\system32\fxssvc.exe Technical Spec.exe File opened for modification C:\Windows\system32\SgrmBroker.exe Technical Spec.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe Technical Spec.exe File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\e86dddabc9ce9937.bin alg.exe File opened for modification C:\Windows\System32\msdtc.exe Technical Spec.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe Technical Spec.exe File opened for modification C:\Windows\system32\wbengine.exe Technical Spec.exe File opened for modification C:\Windows\system32\msiexec.exe alg.exe File opened for modification C:\Windows\system32\AppVClient.exe Technical Spec.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4352 set thread context of 3676 4352 Technical Spec.exe 94 PID 3676 set thread context of 3584 3676 Technical Spec.exe 100 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\klist.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\tnameserv.exe Technical Spec.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe Technical Spec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe Technical Spec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe Technical Spec.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstatd.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\kinit.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javaws.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\kinit.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jabswitch.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\orbd.exe Technical Spec.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe Technical Spec.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\rmid.exe Technical Spec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\klist.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\rmiregistry.exe Technical Spec.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\extcheck.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javaw.exe Technical Spec.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe Technical Spec.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\tnameserv.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\xjc.exe Technical Spec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe Technical Spec.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe Technical Spec.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\ssvagent.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\kinit.exe Technical Spec.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe Technical Spec.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe Technical Spec.exe File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE Technical Spec.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\keytool.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmiregistry.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\servertool.exe Technical Spec.exe File opened for modification C:\Program Files\Windows Media Player\wmpnetwk.exe Technical Spec.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe Technical Spec.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\rmid.exe Technical Spec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe Technical Spec.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe Technical Spec.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jinfo.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\jabswitch.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\rmiregistry.exe Technical Spec.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe Technical Spec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe Technical Spec.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javah.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\pack200.exe Technical Spec.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe Technical Spec.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe Technical Spec.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javac.exe Technical Spec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jdeps.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstat.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstack.exe Technical Spec.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\unpack200.exe Technical Spec.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe Technical Spec.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe Technical Spec.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe Technical Spec.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9909 = "Windows Media Audio/Video file" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia\ActiveMovie SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.DVR-MS\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-127 = "OpenDocument Text" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.DVR-MS SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdf\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9911 = "Windows Media Audio shortcut" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000597aeff46e7fd901 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@"C:\Windows\system32\windowspowershell\v1.0\powershell.exe",-105 = "Windows PowerShell XML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-114 = "OpenDocument Spreadsheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\System32\ieframe.dll,-912 = "HTML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithList SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{80009818-F38F-4AF1-87B5-EADAB9433E58} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000faffaff36e7fd901 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9939 = "ADTS Audio" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\system32\zipfldr.dll,-10195 = "Compressed (zipped) Folder" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-123 = "Microsoft Word Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-125 = "Microsoft Word Template" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-115 = "Microsoft Excel 97-2003 Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-111 = "Microsoft Excel Macro-Enabled Template" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5383EF74-273B-4278-AB0C-CDAA9FD5369E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000005a87dfe6e7fd901 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-131 = "Rich Text Format" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\System32\mshta.exe,-6412 = "HTML Application" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-142 = "Microsoft OneNote Table Of Contents" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\System32\searchfolder.dll,-9023 = "Saved Search" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@windows.storage.dll,-21824 = "Camera Roll" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\System32\Windows.UI.Immersive.dll,-38304 = "Public Account Pictures" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-175 = "Microsoft PowerPoint Slide Show" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{F81B1B56-7613-4EE4-BC05-1FAB5DE5C07E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000078f4aafe6e7fd901 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\system32\cabview.dll,-20 = "Cabinet File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@windows.storage.dll,-34583 = "Saved Pictures" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\System32\msxml3r.dll,-2 = "XSL Stylesheet" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\System32\msxml3r.dll,-1 = "XML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9925 = "MP3 Format Sound" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\System32\setupapi.dll,-2000 = "Setup Information" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9910 = "Windows Media Audio/Video playlist" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{C120DE80-FDE4-49F5-A713-E902EF062B8A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000ff8c3df36e7fd901 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9934 = "AVCHD Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@"C:\Windows\system32\windowspowershell\v1.0\powershell.exe",-103 = "Windows PowerShell Script" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\system32\msinfo32.exe,-10001 = "System Information File" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000a40515f36e7fd901 SearchProtocolHost.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 85 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 39 IoCs
pid Process 4352 Technical Spec.exe 4352 Technical Spec.exe 4352 Technical Spec.exe 4352 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe 3676 Technical Spec.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 664 Process not Found 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeDebugPrivilege 4352 Technical Spec.exe Token: SeTakeOwnershipPrivilege 3676 Technical Spec.exe Token: SeAuditPrivilege 5104 fxssvc.exe Token: SeRestorePrivilege 3092 TieringEngineService.exe Token: SeManageVolumePrivilege 3092 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 4396 AgentService.exe Token: SeBackupPrivilege 3960 vssvc.exe Token: SeRestorePrivilege 3960 vssvc.exe Token: SeAuditPrivilege 3960 vssvc.exe Token: SeBackupPrivilege 2820 wbengine.exe Token: SeRestorePrivilege 2820 wbengine.exe Token: SeSecurityPrivilege 2820 wbengine.exe Token: 33 736 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 736 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 736 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 736 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 736 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 736 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 736 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 736 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 736 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 736 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 736 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 736 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 736 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 736 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 736 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 736 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 736 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 736 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 736 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 736 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 736 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 736 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 736 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 736 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 736 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 736 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 736 SearchIndexer.exe Token: SeDebugPrivilege 3676 Technical Spec.exe Token: SeDebugPrivilege 3676 Technical Spec.exe Token: SeDebugPrivilege 3676 Technical Spec.exe Token: SeDebugPrivilege 3676 Technical Spec.exe Token: SeDebugPrivilege 3676 Technical Spec.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3676 Technical Spec.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4352 wrote to memory of 4116 4352 Technical Spec.exe 92 PID 4352 wrote to memory of 4116 4352 Technical Spec.exe 92 PID 4352 wrote to memory of 4116 4352 Technical Spec.exe 92 PID 4352 wrote to memory of 4508 4352 Technical Spec.exe 93 PID 4352 wrote to memory of 4508 4352 Technical Spec.exe 93 PID 4352 wrote to memory of 4508 4352 Technical Spec.exe 93 PID 4352 wrote to memory of 3676 4352 Technical Spec.exe 94 PID 4352 wrote to memory of 3676 4352 Technical Spec.exe 94 PID 4352 wrote to memory of 3676 4352 Technical Spec.exe 94 PID 4352 wrote to memory of 3676 4352 Technical Spec.exe 94 PID 4352 wrote to memory of 3676 4352 Technical Spec.exe 94 PID 4352 wrote to memory of 3676 4352 Technical Spec.exe 94 PID 4352 wrote to memory of 3676 4352 Technical Spec.exe 94 PID 4352 wrote to memory of 3676 4352 Technical Spec.exe 94 PID 3676 wrote to memory of 3584 3676 Technical Spec.exe 100 PID 3676 wrote to memory of 3584 3676 Technical Spec.exe 100 PID 3676 wrote to memory of 3584 3676 Technical Spec.exe 100 PID 3676 wrote to memory of 3584 3676 Technical Spec.exe 100 PID 3676 wrote to memory of 3584 3676 Technical Spec.exe 100 PID 736 wrote to memory of 1124 736 SearchIndexer.exe 122 PID 736 wrote to memory of 1124 736 SearchIndexer.exe 122 PID 736 wrote to memory of 2736 736 SearchIndexer.exe 123 PID 736 wrote to memory of 2736 736 SearchIndexer.exe 123 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Technical Spec.exe"C:\Users\Admin\AppData\Local\Temp\Technical Spec.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\Technical Spec.exe"C:\Users\Admin\AppData\Local\Temp\Technical Spec.exe"2⤵PID:4116
-
-
C:\Users\Admin\AppData\Local\Temp\Technical Spec.exe"C:\Users\Admin\AppData\Local\Temp\Technical Spec.exe"2⤵PID:4508
-
-
C:\Users\Admin\AppData\Local\Temp\Technical Spec.exe"C:\Users\Admin\AppData\Local\Temp\Technical Spec.exe"2⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:3584
-
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
PID:2704
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:2884
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:1116
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5104
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:1360
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2328
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:3796
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:3352
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:1676
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:2336
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:2732
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:5100
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:2004
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:2800
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:5108
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:4652
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:1744
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3092
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4396
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:2964
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3960
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:2936
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
PID:1124
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 916 920 928 8192 924 9002⤵
- Modifies data under HKEY_USERS
PID:2736
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5922dec213b3817e94eb9a2d2814f04c7
SHA19b1fa044613c2a657bf2ba657bc6e8342f912f50
SHA256e37a76a01a99312b42edd34b7121a3d4317e56fb1619c0b9a9e90bf65a1fecb4
SHA512edbe2ec911fa03b9ab783985fda314d77d70d8850bc6653b6e25d7bc558c73ac9d77f5cb5d0a499b7cf3b3c569ec3f28366718ddb6db73c84848d264d0d4724b
-
Filesize
1.4MB
MD57b895b3eb64d81a2f08d3c5c1f407ef8
SHA1c123311199f0b16fac7fc4d4bf7513d1ef01ff24
SHA2566ff7f2cb16de201104bacd58a42c1bad99ab7f3833bc4b7ad3dcda7b6c8515ac
SHA51250e24f9117ac1b30427d354f2f147b2214b84d0040cc436008f33bbc03a31dd3c0799644f6079f269460ba31f62745299b7729978cedb1a0d402f5acadd81a75
-
Filesize
1.4MB
MD57b895b3eb64d81a2f08d3c5c1f407ef8
SHA1c123311199f0b16fac7fc4d4bf7513d1ef01ff24
SHA2566ff7f2cb16de201104bacd58a42c1bad99ab7f3833bc4b7ad3dcda7b6c8515ac
SHA51250e24f9117ac1b30427d354f2f147b2214b84d0040cc436008f33bbc03a31dd3c0799644f6079f269460ba31f62745299b7729978cedb1a0d402f5acadd81a75
-
Filesize
1.5MB
MD5bfb840ee259e8e39c8f2ebd164a3dd29
SHA13f0456c28e0da59ef220440d92e3592330e999b5
SHA25694d655f6c33f3986f96e24002fd5e0b873aaecc314a7f64d15d63aaec55d143e
SHA5121cc21a58bc4bda19202392bfd858c7599cabcf50acd8d9595a549174eb901aeaf84954ef224c3b88226607feeff9d664679703aa2f407df2b457435fca07e1a8
-
Filesize
2.1MB
MD5c295ff9ef3432a11460781f712b11554
SHA1f0fa497d9726c2021bec5291e9140a2048ab0418
SHA2564dc0f3499637a7c9f73f1cb7d019a9cefb8afd12a7d89588a247625d5f3db829
SHA5121f7cc61d3437f9ad4bb2cff3d822011d432c71baf9b1f655c9ef4c725c6556000bd3afe96e0e3b0e5f4ca9fdedb08fc17859e102f5224abdaa72678dcde1ac53
-
Filesize
1.2MB
MD58a14fb572708de33c367e2e47c4b0ae6
SHA1ca8d7c77b222c30c93aab6b43516082fb014138a
SHA2565aeca3483856a0bd3897714f00f938216803165e5c407080fa29f8cc05ff5e1d
SHA5127d439c4f80a6b642cf2ff6cde9d4f5c421fecbfaa909c626f6248a9dd5ad1d438bd5885cb6be345c319283a49811f3446026119cdf49175ff783600d926ef45f
-
Filesize
1.7MB
MD56be07c07536d28348e6b4b4bbdf7bda5
SHA17c857d235889ab1efb060a6f08882d77b1fa72b8
SHA2568541655c2e8cedb21c7b70be0f88c6b6cb4146cd38c80e12d258e116dd57224f
SHA5127ec319c10149699b3acc93cd7ffdf8478a86816bd6cc70a0124a0abb31a884e3630e42a2bdb310ea5ef84d7bae7b5168a114822a863c0ce882f0aa2f31fc05d7
-
Filesize
1.3MB
MD58414b7acac435abe5561f42ca7b9fc8b
SHA1d575383c80c30f352899feb32ed363fb43af761a
SHA25688a22065a445c57187a14a09ca2d1d11bc737b2d4978a5d664ab7c877baad115
SHA51272a55592b033996b1fa7b3ce2a4d2ff82a13c76a84b2e585ba22634145e81b781a82d097422b2c02bed99ac06c4c1b377a532f502b22f690608bb2b82763a7ad
-
Filesize
1.2MB
MD5dd0c59deaa5cf3d507b30e79eb7c6fca
SHA1309e5ec2719471780ad3ddeb4f0c428997cf8429
SHA25699387ab10974d19bf726be00409f77e8d313e1fc40191f09b518f0e800b1016c
SHA5127e0075e7c644f6975947fbf961ea52947ac9e1adb9aeffbc1c2e2ec2174b9063606225249d4bf529a213fe3aa6bc5c11c4bd071def5dc19c187bded3b1edaeaa
-
Filesize
1.2MB
MD52f5c33564d7a6637e17c0a13312000ab
SHA133d6703165c3f13f1d4be79a9d30e3b043a6bae3
SHA2562197473286b506f330ac397433dda73a3d79d0be707a84bf279bc9c5bdd8caf7
SHA51294c664349f0515bb293a0deee5b777de06f417a7135dd32cf5be31ba5f3387d57811a40b6fa2c2f07d82aaeda17a528babc7ddb4712fb2723822b9ab01040331
-
Filesize
1.6MB
MD550dc799415c72de4198e9e20387e8ccd
SHA1b480bcc19574d4283dd2e720d31f330c27af23de
SHA25647241094a68d9c0c88166b047d8bc835aa36ecb07721e5db616e8e4dabe25492
SHA51273ff51a20a6edb0de6578cf1d8549eabf9b5ab7371a961d6145554f780c4a8a4753fe372933ea526dacfc0903a4d9c9a871991def0dcb84d8139d657e7c1b0a3
-
Filesize
1.6MB
MD550dc799415c72de4198e9e20387e8ccd
SHA1b480bcc19574d4283dd2e720d31f330c27af23de
SHA25647241094a68d9c0c88166b047d8bc835aa36ecb07721e5db616e8e4dabe25492
SHA51273ff51a20a6edb0de6578cf1d8549eabf9b5ab7371a961d6145554f780c4a8a4753fe372933ea526dacfc0903a4d9c9a871991def0dcb84d8139d657e7c1b0a3
-
Filesize
1.3MB
MD5c0b239111253286e4983ad040e05f20a
SHA18773c5febabd50240f744e08ac6bfd7ac12455d7
SHA25653582b4b38b6280fb5d55ddb3ebff6cd026383018efd45604d1e7fa5389356d2
SHA512d19f73a3e1f69734f8c99c28b53b339e13c80f74f1d428e61b20fd172602346291053b4cede1313af8d45ffadb2ddcee9d2fd1a9875b8d5717cd83673b9ca681
-
Filesize
1.4MB
MD51c91cd64e0d28fd9612a75b6e3a59650
SHA155e749789ac0109cab3c315b6d6bf288a7230b5a
SHA256d462242c213414250d67576b9f9d7899f08b5f303829d5d5e802861a99dfea6f
SHA5128e58356b67b41df6f46bbb2f06f1c9316ec2e1ac65ca0028aa1bb3aa5b14ec6b48c5be3cc43ff62bc4606954ac740f855a5cd567f01fbb67d49fd58c36364b37
-
Filesize
1.8MB
MD59a518c616bbd6c3e00b4f1b4d1600bba
SHA1d2bf063368092897f3191c3c0a88162d325ddd57
SHA25600c9df5b4b9c2097a9f1d1cd66f33d3e04128b087195149660c8141edbe3ef91
SHA5126145b8e09fe0e65661483e7d8231d9ddfb7a0372ee29fd9db72f6f0489ffce669706890b3f727a10dde9a63fcd8f50a5fd05e149dbc161fda129e78bf778352e
-
Filesize
1.6MB
MD5a5124edd0a70bf3ae9e02aee5ee012d5
SHA126e226102cda63403ef9d6c7c303f30e4f5da1eb
SHA256ac6cc39b1be219fe8a60f13112bd8ceccbd862eb3b542d34fff9c1e060598527
SHA512373546ee20e285a53af4e06236ccb48d408ec41f7bfee3fb42c37f16e14c853b99e320fe5e3e18b9238e3391f9f1d88f642cacb9754409b5c2a18de4dded1c52
-
Filesize
1.4MB
MD52a8d7de9ceaad4afcaa8ec395bda919d
SHA1c866bf28d414e6e360207474cd250f62492e86a8
SHA2564f3b3c6868e8e095e87b231707d466f910829108db552146f933a34b8cb15128
SHA5120c3025a6b01ee8b1fb354050a228cf3111ff261d16f0d68ddb16258cc6828a4071963d7edcf17a32537e6ea2d1f734c3833130eb5cd692dcc2fe65e3c8dc7bc7
-
Filesize
1.5MB
MD5c390fea7b7d1f2485a4bcf34068cfbcb
SHA190cb86bd7fb3f6e60e53d89877af1536a04c2655
SHA25602f8043f42fb8cc2ebf1956ec8e133b5b44e54d2a1a904eac38d2322897f8d19
SHA512a333a6d76b7f50a7ea41d043be70a3f9fee8efd2a2831d1771203ed38cacd04964ad182559d1c338ca971bde5d3e41895666e3b3bc3b359f9f35e6998e1c9a00
-
Filesize
2.0MB
MD531de51a5f02d0de5fd6427cb6b411b9f
SHA11d4d5b9100207f737486fd4f1c4cbb76a4580f21
SHA25641dd969b4d13326719eb853f4fa2d5e29e0d9a05f3ddea1ae7f2cb350eaa6d31
SHA51279dd6715287a10bf0532689d0fdcdb6ce04301d5bfc711b16eb0f51b2a5de7e607af0970b129e0231eabb3b2178031be95b7009bd84b6ff546280e482d82e990
-
Filesize
1.3MB
MD5cc4790450fb1692fbe9fcaf23fcadb3c
SHA1e4fd87d924e264ed5a504b3f5f1bef7e57638ac1
SHA256f1f8af55f1ee62c977748233e6bafdaf0f2b1a778fea0b1dd383b0d114ade6e0
SHA5120e954e66ae76d4a33b65ad1358d7177844a8f27dda97959d52596252337b27bcfa9e247359b74cc84092c0834da945720951a35f7a78bb718972fefa1abcd8df
-
Filesize
1.4MB
MD5380b31989254d08719d075fc522a9af3
SHA1d3215017868ab1a14334ecb7845b8a35912c463c
SHA256ca54c44c64a8f0371c109dc706cb8b36e66cb4d56c4452f3923e012ba5b3c50c
SHA512404bf4049260bde32bc70547ee1dd25860be37fdfbb2405e0dad6f3f181613b2cda5c40a5f08f48accdbac5509303ed3f01b77fb0ca73f277ed1f74cf5be9a14
-
Filesize
1.2MB
MD51de337d9e58e3232140cecedf46f4d1f
SHA108c79c116933c85c0a0c312edb89517985bee9f9
SHA25623f3cd8923aaf2d0c11ac74ef48c316878b03ec8ed234e75f45c8db2e28c07f1
SHA512d2c762c83f86f79c0b4d5815e74018f0e0f7a1b8006e0e31ebaabb0bf19476fb9254d6cccef46a346ff70acc15513eaecd2153b826a6fe9badcba9cd1689db0f
-
Filesize
1.3MB
MD55c56781413d90bd1e280733591150a90
SHA1fa4f06e975a9e40437a82ec6af3591b9e1920535
SHA25621ee59f41a0ee2d0f9d640f3848f135ed25b30f006c29bac56bd54b4bee1f2cd
SHA5126bb4a1f16b84f7065557e3a9cf599baac8c08641e8f4fcdf57967c0d2ff1b4d9c74bbba405e3db4f34a77a305dedbafe85e731c0ed883b79ee902994f6cec681
-
Filesize
1.4MB
MD587aec108d9c6c183a49372ab48aeeca0
SHA1bc51c3e4647823cbeb39c955d9c20fd034ab6a46
SHA25644317f1ba1e07d125ab64fc58593166f17307db6f28d20d392d6939b50eb8fe9
SHA512b51135709927b7a90bc6fd63b71c998ed352bbd260e034ea58978b12c1b930697049ce75536e26d2f92821522096937a4d4750c1efa901a522660c715d873dd9
-
Filesize
2.1MB
MD5d8fa7fe6a33485ebd2724936647a46cc
SHA159bf0f82e8515fe18af8f146b0c43bcbc5322f48
SHA256626ff528ad69e9760e46782b61a20e51094cfafe54cc06cdf5dbb90bd486ac90
SHA512cd6121d63f0919fb5113252f683bd07f66a50743a11304b886e4fdcb1a406d2a52fb1024b94bc67a45a1b2c7a536f79b01b2bb91b607b0a2d92515315a9408d7
-
Filesize
1.3MB
MD56797acff1cf4539fbd0c538021e5557f
SHA1738c277759be82971273e3a4aacd973bbe6bdbee
SHA256bbb5ec50a057b62095cb210cff0cdf807a6ac6d64047b0e5f75a82d927e3f51c
SHA51268eb1d1335798cd72e9ce778e41eb703456b63dc27a8986ae16c540f765f0c7b24f181326d98af0a6befa91c493009d9a5560e7890845a2526a53036b03c2195
-
Filesize
1.5MB
MD56e5be8227c47ccf9b63da12504f7e782
SHA13939be385518c58dbec32a28db97494cc5fd5526
SHA2569b0ed4b1c2d4ac4f1040950da732cb29960807c83e6e48421a4ffb737f3c294c
SHA5120daa1e17843aa01f1469e14d7ab3985356a7dc1898c790018cfd23a8006b361a45732ce70097674e3eb638b51cf9f73e5d18b533b0ebe311e04035f751081d77
-
Filesize
1.2MB
MD5dd0c59deaa5cf3d507b30e79eb7c6fca
SHA1309e5ec2719471780ad3ddeb4f0c428997cf8429
SHA25699387ab10974d19bf726be00409f77e8d313e1fc40191f09b518f0e800b1016c
SHA5127e0075e7c644f6975947fbf961ea52947ac9e1adb9aeffbc1c2e2ec2174b9063606225249d4bf529a213fe3aa6bc5c11c4bd071def5dc19c187bded3b1edaeaa
-
Filesize
1.3MB
MD53689c3589850aba935460124cc87c51e
SHA11cdf060c45097f04ee342e688c2a569be4ef526e
SHA2568d55204a654df68befb149652ae5d7bf802e63bc3b330e2734e7993bf4d4d9e1
SHA512bb65aa748e6fabd2b876e962f5501edc15bc98b319c7910c0413bd8bf945c198a34f2a4216445f0d015650a05667b13ac10abbcb438028fdc07490bf4a246874