Analysis
-
max time kernel
153s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 20:55
Static task
static1
Behavioral task
behavioral1
Sample
PO39100.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PO39100.exe
Resource
win10v2004-20230220-en
General
-
Target
PO39100.exe
-
Size
1.5MB
-
MD5
13dc441ec2f9e3f9aa1f354a4b14d318
-
SHA1
05b62c596ca78745d73514cd5d43434929955863
-
SHA256
6f35bb0a7644cfda2468e984269f7febafcb672591a887a8029257dea0801a7c
-
SHA512
30f4da77bf1ba35334fc1812a6792bb91396fdc8cc7b918f81c6395a48523079cccc89c7090b5c21c30ab62939fa8663cc695ad7d876f083773f7c85cffc5242
-
SSDEEP
24576:TwMryIYPOfPFxgvnRnc215nETdxUA6p7GDHDCf0uEywBk1EM8Xzd:Md5PsPfgvRv0gA6pYC52lD
Malware Config
Extracted
blustealer
https://api.telegram.org/bot5797428905:AAGaRRXGZN1d9GGFd3sE5x4uSpCGF0PU4m4/sendMessage?chat_id=1251788325
Signatures
-
BluStealer
A Modular information stealer written in Visual Basic.
-
Executes dropped EXE 22 IoCs
pid Process 232 alg.exe 3920 DiagnosticsHub.StandardCollector.Service.exe 2948 fxssvc.exe 3988 elevation_service.exe 2116 elevation_service.exe 4652 maintenanceservice.exe 2088 msdtc.exe 2936 OSE.EXE 4600 PerceptionSimulationService.exe 1100 perfhost.exe 2076 locator.exe 1456 SensorDataService.exe 1692 snmptrap.exe 4952 spectrum.exe 452 ssh-agent.exe 1332 TieringEngineService.exe 3600 AgentService.exe 4512 vds.exe 448 vssvc.exe 4272 wbengine.exe 1340 WmiApSrv.exe 924 SearchIndexer.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Drops file in System32 directory 24 IoCs
description ioc Process File opened for modification C:\Windows\system32\dllhost.exe PO39100.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\SysWow64\perfhost.exe PO39100.exe File opened for modification C:\Windows\system32\SgrmBroker.exe PO39100.exe File opened for modification C:\Windows\System32\vds.exe PO39100.exe File opened for modification C:\Windows\system32\vssvc.exe PO39100.exe File opened for modification C:\Windows\system32\wbengine.exe PO39100.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\4238b2a59a2815e1.bin alg.exe File opened for modification C:\Windows\system32\fxssvc.exe PO39100.exe File opened for modification C:\Windows\System32\msdtc.exe PO39100.exe File opened for modification C:\Windows\system32\msiexec.exe PO39100.exe File opened for modification C:\Windows\System32\SensorDataService.exe PO39100.exe File opened for modification C:\Windows\system32\spectrum.exe PO39100.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe PO39100.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe PO39100.exe File opened for modification C:\Windows\system32\AppVClient.exe PO39100.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe PO39100.exe File opened for modification C:\Windows\System32\snmptrap.exe PO39100.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe PO39100.exe File opened for modification C:\Windows\system32\AgentService.exe PO39100.exe File opened for modification C:\Windows\system32\SearchIndexer.exe PO39100.exe File opened for modification C:\Windows\System32\alg.exe PO39100.exe File opened for modification C:\Windows\system32\TieringEngineService.exe PO39100.exe File opened for modification C:\Windows\system32\locator.exe PO39100.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1796 set thread context of 4388 1796 PO39100.exe 83 PID 4388 set thread context of 2152 4388 PO39100.exe 86 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\extcheck.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javap.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstat.exe PO39100.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe PO39100.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE PO39100.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jabswitch.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jar.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmc.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\orbd.exe PO39100.exe File opened for modification C:\Program Files\7-Zip\7zG.exe PO39100.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe PO39100.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe PO39100.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\notification_helper.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jhat.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jjs.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\pack200.exe PO39100.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javac.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javah.exe PO39100.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe PO39100.exe File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java-rmi.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jrunscript.exe PO39100.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe PO39100.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe PO39100.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe PO39100.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jsadebugd.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jvisualvm.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javafxpackager.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\klist.exe PO39100.exe File opened for modification C:\Program Files\Windows Media Player\wmpnetwk.exe PO39100.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe PO39100.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstack.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jinfo.exe PO39100.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe PO39100.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\appletviewer.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jconsole.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javadoc.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jdb.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jps.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\kinit.exe PO39100.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\ktab.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmap.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jstatd.exe PO39100.exe File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE PO39100.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe PO39100.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jcmd.exe PO39100.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe PO39100.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe PO39100.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe PO39100.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe PO39100.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe PO39100.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jdeps.exe PO39100.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\native2ascii.exe PO39100.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe PO39100.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe PO39100.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 SensorDataService.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe -
Modifies data under HKEY_USERS 16 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32,@elscore.dll,-2 = "Microsoft Script Detection" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32,@elscore.dll,-4 = "Microsoft Simplified Chinese to Traditional Chinese Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32,@elscore.dll,-8 = "Microsoft Malayalam to Latin Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32,@elscore.dll,-1 = "Microsoft Language Detection" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\system32\windows.storage.dll,-10152 = "File folder" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32,@elscore.dll,-10 = "Microsoft Hangul Decomposition Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32,@elscore.dll,-3 = "Microsoft Traditional Chinese to Simplified Chinese Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32,@elscore.dll,-5 = "Microsoft Transliteration Engine" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32,@elscore.dll,-6 = "Microsoft Cyrillic to Latin Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32,@elscore.dll,-7 = "Microsoft Devanagari to Latin Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32,@elscore.dll,-9 = "Microsoft Bengali to Latin Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 43 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 656 Process not Found 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 38 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4388 PO39100.exe Token: SeAuditPrivilege 2948 fxssvc.exe Token: SeRestorePrivilege 1332 TieringEngineService.exe Token: SeManageVolumePrivilege 1332 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 3600 AgentService.exe Token: SeBackupPrivilege 448 vssvc.exe Token: SeRestorePrivilege 448 vssvc.exe Token: SeAuditPrivilege 448 vssvc.exe Token: SeBackupPrivilege 4272 wbengine.exe Token: SeRestorePrivilege 4272 wbengine.exe Token: SeSecurityPrivilege 4272 wbengine.exe Token: 33 924 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 924 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 924 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 924 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 924 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 924 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 924 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 924 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 924 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 924 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 924 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 924 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 924 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 924 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 924 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 924 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 924 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 924 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 924 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 924 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 924 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 924 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 924 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 924 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 924 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 924 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 924 SearchIndexer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4388 PO39100.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1796 wrote to memory of 4388 1796 PO39100.exe 83 PID 1796 wrote to memory of 4388 1796 PO39100.exe 83 PID 1796 wrote to memory of 4388 1796 PO39100.exe 83 PID 1796 wrote to memory of 4388 1796 PO39100.exe 83 PID 1796 wrote to memory of 4388 1796 PO39100.exe 83 PID 1796 wrote to memory of 4388 1796 PO39100.exe 83 PID 1796 wrote to memory of 4388 1796 PO39100.exe 83 PID 1796 wrote to memory of 4388 1796 PO39100.exe 83 PID 4388 wrote to memory of 2152 4388 PO39100.exe 86 PID 4388 wrote to memory of 2152 4388 PO39100.exe 86 PID 4388 wrote to memory of 2152 4388 PO39100.exe 86 PID 4388 wrote to memory of 2152 4388 PO39100.exe 86 PID 4388 wrote to memory of 2152 4388 PO39100.exe 86 PID 924 wrote to memory of 3600 924 SearchIndexer.exe 117 PID 924 wrote to memory of 3600 924 SearchIndexer.exe 117 PID 924 wrote to memory of 4812 924 SearchIndexer.exe 118 PID 924 wrote to memory of 4812 924 SearchIndexer.exe 118 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO39100.exe"C:\Users\Admin\AppData\Local\Temp\PO39100.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\PO39100.exe"C:\Users\Admin\AppData\Local\Temp\PO39100.exe"2⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe3⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:2152
-
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:232
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:3920
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:4144
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3988
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2116
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:4652
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2088
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:2936
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:4600
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:1100
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:2076
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:1456
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:1692
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4952
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:452
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:2656
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:4512
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:448
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4272
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:1340
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
PID:3600
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 8962⤵PID:4812
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5e1dd59ca2ee56f26c2926d0ea9ee6f9d
SHA1f855a65897efb9743ee4b3e18f5e77bd733573f6
SHA25608ec1be4a11ef31b8bec196ed4519800fbca9bc8aac01082ce938c91f54b7afc
SHA5122ba5780fb7f75b0e09ad9822653706ccaf5d5ee05facdb3a55433c7ebf4b4a6df45a6a811127affce3262fd5177c62325a26c44a97d170ab846f600ad772c8ce
-
Filesize
1.4MB
MD529e81a43d3f737aa10597d5b479a99b3
SHA19f33b192620e915bdd4de6d45f6459538526f649
SHA2564d574eca2abcc061d439e7306dd2c990c0d81912aa986eab92a0ce9715917a1d
SHA5122e6564e61f653925bfe2c528b3fea14023a63ad4132e90d755fc469dd1de1622dba09f85d898d7b5bd030f0ff6aeb5d2ddd71889f5e3ead82fe40bc4aa5cd964
-
Filesize
1.5MB
MD5d291b22c03929b89ed159a3dcf15f0cf
SHA14fc62d0aa27cd0eb68c31c42fda8a7b4600007e2
SHA2561a45b3b0473d98e93fc211345f04825d0ffef06ef412b9c5d306c7a5ec283078
SHA512afe29110df41655bc210ecc4cb641cbc17c2b8aa72fd3d8592cf50947158b917d52ecda3f98b1eceb80a4013e3dadba90bf1be16c3a6c4d76deb3c25f4021710
-
Filesize
2.1MB
MD5d5e1f23478539c53f6705181cd22528c
SHA1b0eab97dde710591037e8622158467f943677132
SHA2564c708f28cca9113e58605661dd6436ebf4f291595301f7975ad72e5eb5d5662b
SHA51235b77a45de5d14e9a530c44e819446f9115d9074c6188be256dc2704454fcc72c60d71f64a334b22250314108d0e6d9cb3ade6d5118a79860a56489edd1b2be0
-
Filesize
1.2MB
MD55d8ca8c260a176c4cb428cd8365864a3
SHA1590a26d397b7ec2a987ba9f172c30ff065fd6524
SHA256e22a87276d6b84f6aa8a318b5fafb00ad38678c73d9e1dbc7fb149c23c431102
SHA5120cd0f5f1a22e62c3486f7abc704943e2605cf393f7fe9095edb53b090033680c6000da1985ddfbe7a219450acb1247bff28829b8030cb7288ac594b9d1a39068
-
Filesize
1.7MB
MD508e04fe38a910521f7a426e9fbad2773
SHA1af9a60f9b3d61663fa859f60d970f4a8619ba7a4
SHA256a75a6f6a18c26262d42b4cdcd3f57488cdae4f5bea64893807e099b770f2468f
SHA512ed80e1aa152ac0319acbe8b1573ae98fa8ea2c9537c43f8a8a51f982fc516a61ed01f7c0e405a6a6db5a647aca29f3d07faafe653674e83cd6bf560d560033d1
-
Filesize
1.3MB
MD593cb4aa3fbd2db7a3ac2be81f7dfdf74
SHA1f43bc4e596f2c842b37d22901cff06fa271dac3a
SHA2561738dd8e9c83bd21daa8065c33591ab395f65f2e0142430432a55d1c7136dcf7
SHA51252c0e51db84efebf6723098bb9e524dd74b976bd0809e6dfeff76b7df787eef31ee840b701f674a38ba137bea0155db4554cbf914fed8c2dc925f8c48b4cfe15
-
Filesize
1.2MB
MD5ed4b6ba502d57a33a0266c44e825649a
SHA150447e8e316046a0d2db7fbcb4cf178640fbc1c8
SHA256c2f4b2657de5dff495e9dbd0134e49e9b7c7cb400cf26ada887d828422a65bb8
SHA51229eccf89c4e506068305ac6f611c6c433c8ee2b10db7434d83742dd504a98f07afa7894a6efc6f4474b2fdfe7283c68dc7b7c631eea32c2e1657e71cd9db8ad1
-
Filesize
1.2MB
MD5974dfd87440b5d18f122c36e87b5440d
SHA19859722f96c9ab1224f13c0a221bb5ea7aaae713
SHA256df843b0f4ed9eb24bfc36b7cc1ecabf4776963db3aad2b4b996b822896eca14c
SHA51251e1dcc892a7d2673e08a368d757c9af0b20b42c908611e4c79287706a8978be323c3d2087b22375f652f3ec5e8d219eb3f1d0f15e1d53864adee6fb96638cc3
-
Filesize
1.6MB
MD5c50edfc886a7b69916ef4ff6af7ac011
SHA13228f8d687f21c9a2550ea3eb5d4240893f00142
SHA2560c632f8012fe766cd782dc60db0df34556842deb885f25609e5734689610c033
SHA51248e1f1590273f81a895d08c9ac56ae2331227eb2036e7fb3eb2490229fb7cb90ec909c9ca4c01f9a00777daffcbf94a87a90060c1e6ecfadf8246476c1a5e07d
-
Filesize
1.6MB
MD5c50edfc886a7b69916ef4ff6af7ac011
SHA13228f8d687f21c9a2550ea3eb5d4240893f00142
SHA2560c632f8012fe766cd782dc60db0df34556842deb885f25609e5734689610c033
SHA51248e1f1590273f81a895d08c9ac56ae2331227eb2036e7fb3eb2490229fb7cb90ec909c9ca4c01f9a00777daffcbf94a87a90060c1e6ecfadf8246476c1a5e07d
-
Filesize
1.3MB
MD5336fc9506219569addb48413cd6ed386
SHA13b0d75a556847acba310f1be70553421b1394c4a
SHA256e75d0571a7989c9ccb1a5f95a58e91d06b572a3bf38fd79cbda93ebab4936ddd
SHA5129cade8a0213707f7404245ef7afa596f4c8e51cdb9b6fd5b35dbda164a9b190a3808acba43b06d7ef05041e234be6bee62ff63bed3f119c5d6c7e91a13facd38
-
Filesize
1.4MB
MD5853cc135da5b1c934bd066fb6352c85f
SHA129953914eed77ff31cab819046809647b1f75e20
SHA256af8e09e6bf5d2e744b8ceaf51ba84dd11af5772813adcc4425d322954dcd97a3
SHA512852e0b42e61278739332017f2abca0163d8d484548e1d1b36150d6a4241fc72a132bb39f0d245f6efad68046ba5103d57d96fceb7c48ab37d9aa3d729566476e
-
Filesize
1.8MB
MD5ae0290097a0a42a5191473f75c279a24
SHA10fafc482664c07f3d02dec456910f99209a19d51
SHA256999a148c71b181b8b42f83655f8da36d0a82fe627b2bec7d3e95bcf50c137d1b
SHA5123d8fa2d7ffb975cc094daefee8da3539126059dbd7aa1605c574dece14e399c4ee6873c0c2ca16ceb2c869e0838f2754dd2186b01b79ea24527a0940a531c3fa
-
Filesize
1.4MB
MD54570d6fd2c7c411332919b16a540ca89
SHA1c95acf559419ff27ea2953e6d0877f5b2b79d52d
SHA2565dc622463ac826eda6cae274f141109466f5bceeaa4807539436813b8dc7ec43
SHA5123ecd364dc7c0df5f95f2214ca837aeb9a42a3c8365e7c07388ebd89227088d7d4df5592a1e77b21e87a6203313524f0b71a02b203fc40c3504ff689bc947f870
-
Filesize
1.5MB
MD554f7cea90100102a21cf4fb5bdfb0815
SHA1e97068f02b42763aff22f0ab79ef53881a11bc73
SHA25634a15a470ef846e4451f1280f648c0ac5d1c67ce59a3ca0defda4891b3529f2b
SHA512ecc45e3b4c9e72d0908285526966c6fda6c1e7354e67cb919835bb0ecece1fa8ec19b4e160245f6062d9f7b5da9d0bdee1152634a24ca0ea3468c026770c7846
-
Filesize
2.0MB
MD5f6fbf47f0f06bec5c22ec747b17c2d29
SHA1c40831a38b2d1fd433790594f739ed8645894333
SHA25671823a57513dbbdc1f1755fe8c3ecb3abb7b8edd778b245822606422437330e0
SHA512ca1ca976ba8a7a9a3d4cd72548ce73c10802d6522b383602315ac9f7206335f1f17bc9ee6a12fd15191a6d2798db161b3f7b837e919dccc30b6c03624214c99d
-
Filesize
1.3MB
MD54c21578c0b5837826354c38bf8a6d019
SHA13d3c05e9fc101514005c4012211f9c89ec34b21d
SHA25646c53c2ba3515dc53e0d8ec7b1dcefbb03da7b50fce657e08a16acbff48b34a1
SHA5129bf02fdf65de8064eec0ada834d84df4044b6ffe64daac45dd0dc80e9b39c3b003d5c5aedd63bd90f14dfccda734edf23b486bd853f2a14134b8df85d31197c2
-
Filesize
1.4MB
MD5cdabd138b917d452d8159964a4701ae0
SHA1f9eb11a72108631a082106efee7b213e8e4a455f
SHA256901391d6770e4cc7126a446c396fff9abbbaa4856bd3b4b2e6a6ddc764c926a8
SHA5125a82337254e35963182d19543193671af2959b8c6c969df53dad1b6c78b529cc679a3b026b5a688f8d6afedbfe910e4d569a1a6f5687d00e95c5784ef88dab0e
-
Filesize
1.2MB
MD56f2ac0f8d7a2b6838f20e9388f457fa6
SHA19d9434aa7baf3d309b7756e0f79cceb8aedde9e1
SHA256d80998e73f401313c98fb657d1840397190721cd76367fed8e4bb99cb8682a07
SHA512daab452644c694c57a512dd4eb8c0d4170cb09bb336a649f3bdad1f909de5424ed594f4909dc4d36e4badfbb6f83d3faa1cb91d1bd609bb25bc0d0105585d990
-
Filesize
1.3MB
MD56c7a7c5ebe00433e69f25a96b4e994a3
SHA15ac7b12befe00559779ef8a5554885d4b7654b2e
SHA256653f401a249bd30b8c060872c9b69d577728408f341157a8cca283dc4495b92c
SHA512028dc030ff392e825c5b27354b008352df6ad940e77bb3ae1f51b95a9ea8c2eb4d1da54094f4a0132e2ec20155dbc41d7d42eb117e2f413d4438e0f3f9c540fc
-
Filesize
1.4MB
MD538916a8e2c232bc7ad6ac9e51d7d6056
SHA1f6ed473a2bb565e8a9465b57d292b3fa91e735cc
SHA25645f1ff6a30460abb24907b28df140ae30181598c6f828c4dc311216b18ca433b
SHA5121da2a12231c80f31d7d3caff8b5be88d6adb78efa3e5072bf11b4327ec24893b25638813fb75ba32ce190230bb02ca6f5bf1b388f1c6b49afe674acf76c7b2e0
-
Filesize
2.1MB
MD522fd034a8b5233eb7ad7c1a31e3c0b39
SHA1cb510715b18648573800e4d5b56d50f5583fa663
SHA25676074fd70b1a033be1a41b35b8d8ba103b527f785746550e488556d4cb602b91
SHA512e222b7db66b0f4ad575fccf40f7de7cb32f3a6e3e065335f42048d437ca17feff29954788d13d937f4626cf82a8f42a396c6783dbd46bf7967d8430516894250