Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
30/09/2023, 17:33
Static task
static1
Behavioral task
behavioral1
Sample
2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe
Resource
win7-20230831-en
General
-
Target
2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe
-
Size
1.8MB
-
MD5
35ccc2260cfd3f83cf2ffdada82e70ee
-
SHA1
febd852308e898a7586853926401d5c27e3e8912
-
SHA256
2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a
-
SHA512
8bc29c15dede50699ecb88864cdbf964a6ab02e7acfa232fe38e0667ad4a620e89e0099ce122214e321b68b02cbfda2c0dce12f3c5a980a51581291e62c322ef
-
SSDEEP
49152:oK783MoXnFv3dcj7q5LsLp3CceMuczXr5qtvW89Ombvzc05hK:oK78HXnl3dcj7q5KpyceMuczXlqRVbvj
Malware Config
Signatures
-
Executes dropped EXE 52 IoCs
pid Process 464 Process not Found 3044 alg.exe 2476 aspnet_state.exe 2524 mscorsvw.exe 2808 mscorsvw.exe 1628 mscorsvw.exe 1476 mscorsvw.exe 1136 ehRecvr.exe 268 ehsched.exe 2232 elevation_service.exe 456 IEEtwCollector.exe 2684 dllhost.exe 2540 GROOVE.EXE 2412 maintenanceservice.exe 2928 mscorsvw.exe 1292 mscorsvw.exe 2852 mscorsvw.exe 1468 mscorsvw.exe 2124 mscorsvw.exe 2044 mscorsvw.exe 896 mscorsvw.exe 2448 mscorsvw.exe 2764 mscorsvw.exe 2108 mscorsvw.exe 752 mscorsvw.exe 2260 OSE.EXE 2320 mscorsvw.exe 1936 OSPPSVC.EXE 1540 mscorsvw.exe 456 mscorsvw.exe 2108 mscorsvw.exe 1908 mscorsvw.exe 1688 mscorsvw.exe 2604 mscorsvw.exe 368 mscorsvw.exe 2396 mscorsvw.exe 2920 mscorsvw.exe 2736 mscorsvw.exe 3028 mscorsvw.exe 2096 mscorsvw.exe 952 mscorsvw.exe 2548 msdtc.exe 2536 msiexec.exe 2152 perfhost.exe 2448 locator.exe 2368 snmptrap.exe 1048 vds.exe 3040 vssvc.exe 1172 wbengine.exe 1620 WmiApSrv.exe 1528 wmpnetwk.exe 2884 SearchIndexer.exe -
Loads dropped DLL 15 IoCs
pid Process 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 2536 msiexec.exe 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 760 Process not Found -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat GROOVE.EXE File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\locator.exe aspnet_state.exe File opened for modification C:\Windows\system32\SearchIndexer.exe aspnet_state.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\SysWow64\perfhost.exe aspnet_state.exe File opened for modification C:\Windows\system32\vssvc.exe aspnet_state.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat SearchProtocolHost.exe File opened for modification C:\Windows\system32\fxssvc.exe aspnet_state.exe File opened for modification C:\Windows\system32\fxssvc.exe 2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe File opened for modification C:\Windows\system32\IEEtwCollector.exe aspnet_state.exe File opened for modification C:\Windows\system32\msiexec.exe aspnet_state.exe File opened for modification C:\Windows\System32\snmptrap.exe aspnet_state.exe File opened for modification C:\Windows\System32\vds.exe aspnet_state.exe File opened for modification C:\Windows\system32\wbengine.exe aspnet_state.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\34bef125c30a3ea8.bin alg.exe File opened for modification C:\Windows\system32\dllhost.exe 2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe File opened for modification C:\Windows\system32\IEEtwCollector.exe 2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\System32\msdtc.exe aspnet_state.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe aspnet_state.exe File opened for modification C:\Windows\System32\alg.exe 2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdate.exe aspnet_state.exe File created C:\Program Files (x86)\Google\Temp\GUM8547.tmp\goopdateres_lt.dll 2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe aspnet_state.exe File created C:\Program Files (x86)\Google\Temp\GUM8547.tmp\goopdateres_pt-BR.dll 2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\keytool.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\orbd.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXE alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe alg.exe File opened for modification C:\Program Files\Windows Media Player\wmpnetwk.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\pack200.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\reader_sl.exe aspnet_state.exe File created C:\Program Files (x86)\Google\Temp\GUM8547.tmp\goopdateres_fr.dll 2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\OSPPREARM.EXE aspnet_state.exe File created C:\Program Files (x86)\Google\Temp\GUM8547.tmp\goopdateres_fa.dll 2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe aspnet_state.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\rmid.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe aspnet_state.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\tnameserv.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javap.exe alg.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe aspnet_state.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jre7\bin\policytool.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Setup.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe aspnet_state.exe File opened for modification C:\Program Files (x86)\Google\Temp\GUT8548.tmp 2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe File created C:\Program Files (x86)\Google\Temp\GUM8547.tmp\goopdateres_pt-PT.dll 2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe File opened for modification C:\Program Files\7-Zip\7zG.exe alg.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jps.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jre7\bin\rmiregistry.exe aspnet_state.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe aspnet_state.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\pack200.exe aspnet_state.exe File created C:\Program Files (x86)\Google\Temp\GUM8547.tmp\goopdateres_en.dll 2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe File created C:\Program Files (x86)\Google\Temp\GUM8547.tmp\goopdateres_no.dll 2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe File created C:\Program Files (x86)\Google\Temp\GUM8547.tmp\goopdateres_sk.dll 2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe File created C:\Program Files (x86)\Google\Temp\GUM8547.tmp\goopdateres_sw.dll 2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe aspnet_state.exe File created C:\Program Files (x86)\Google\Temp\GUM8547.tmp\goopdateres_pl.dll 2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe -
Drops file in Windows directory 37 IoCs
description ioc Process File created C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{20FD87B1-72A4-4857-AD7A-4DBC9A851DD0}.crmlog dllhost.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\ehome\ehRecvr.exe 2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe File opened for modification C:\Windows\ehome\ehsched.exe 2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe aspnet_state.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe alg.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe 2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.lock mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe 2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe File opened for modification C:\Windows\ehome\ehsched.exe aspnet_state.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\ehome\ehRecvr.exe aspnet_state.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe 2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.lock mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenservicelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngenservicelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe 2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe 2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File opened for modification C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{20FD87B1-72A4-4857-AD7A-4DBC9A851DD0}.crmlog dllhost.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe aspnet_state.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe aspnet_state.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe alg.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\gameux.dll,-10056 = "Hearts" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\System32\ieframe.dll,-913 = "MHTML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\MdSched.exe,-4001 = "Windows Memory Diagnostic" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\gameux.dll,-10057 = "Minesweeper" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\gameux.dll,-10308 = "Mahjong Titans is a form of solitaire played with tiles instead of cards. Match pairs of tiles until all have been removed from the board in this classic game." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%systemroot%\system32\windowspowershell\v1.0\powershell.exe",-111 = "Performs object-based (command-line) functions" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%systemroot%\system32\comres.dll,-3411 = "Manage COM+ applications, COM and DCOM system configuration, and the Distributed Transaction Coordinator." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\gameux.dll,-10302 = "Compete with - and against - online opponents at the classic trick-taking, partnership card game of Spades. Score the most points to win." SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE\SAL\LogMinJobWaitTimeMs = "3000" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\migwiz\wet.dll,-588 = "Windows Easy Transfer" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%windir%\system32\MdSched.exe,-4002 = "Check your computer for memory problems." SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE\SAL\LogMaxJobDemoteTimeMs = "5000" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\cabview.dll,-20 = "Cabinet File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SNTSearch.dll,-505 = "Sticky Notes" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\comres.dll,-3410 = "Component Services" SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE\SAL\CacheLongPageCount = "32" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE\SAL\CacheWaitForSize = "32" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\System32\msxml3r.dll,-2 = "XSL Stylesheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\mblctr.exe,-1008 = "Windows Mobility Center" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\ehome\ehres.dll,-100 = "Windows Media Center" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\migwiz\wet.dll,-591 = "Windows Easy Transfer Reports" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%CommonProgramFiles%\Microsoft Shared\Ink\ShapeCollector.exe,-299 = "Provide writing samples to help improve the recognition of your handwriting." SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" ehRecvr.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\eHome\ehepgres.dll,-304 = "Public Recorded TV" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\eHome\ehepgres.dll,-308 = "Landscapes" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\OfficeSoftwareProtectionPlatform\VLRenewalSchedule = 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 OSPPSVC.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\gameux.dll,-10055 = "FreeCell" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\wdc.dll,-10030 = "Resource Monitor" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\gameux.dll,-10300 = "Play the classic strategy game of Checkers against online opponents. Be the first to capture all your opponent’s pieces, or leave them with no more moves, to win the game." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@searchfolder.dll,-32822 = "Everywhere" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%systemroot%\system32\Msinfo32.exe,-130 = "Display detailed information about your computer." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%windir%\system32\FXSRESM.dll,-115 = "Send and receive faxes or scan pictures and documents." SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE\SAL\FileGrowthBudgetMs = "45000" ehRec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-9 = "Microsoft Bengali to Latin Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-102 = "Desert" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Program Files\Common Files\System\wab32res.dll,-4602 = "Contact file" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\OobeFldr.dll,-33056 = "Getting Started" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\System32\syncCenter.dll,-3001 = "Sync files between your computer and network folders" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\gameux.dll,-10209 = "More Games from Microsoft" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\sud.dll,-10 = "Choose which programs you want Windows to use for activities like web browsing, editing photos, sending e-mail, and playing music." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\odbcint.dll,-1310 = "Data Sources (ODBC)" SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE\SAL\CriticalLowDiskSpace = "1073741824" ehRec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-142 = "Wildlife" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\gameux.dll,-10102 = "Internet Backgammon" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software wmpnetwk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\System32\ieframe.dll,-912 = "HTML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\gameux.dll,-10054 = "Chess Titans" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@gameux.dll,-10056 = "Hearts" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\gameux.dll,-10303 = "Enjoy the classic strategy game of Chess. Play against the computer, or compete against a friend. The winner is the first to capture the opponent’s king." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-3 = "Microsoft Traditional Chinese to Simplified Chinese Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-117 = "Maid with the Flaxen Hair" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@%windir%\system32\migwiz\wet.dll,-601 = "View reports from transfers you've performed" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\filemgmt.dll,-2204 = "Services" SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE\SAL\NvpRecCount = "32" ehRec.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2716 ehRec.exe 2476 aspnet_state.exe 2476 aspnet_state.exe 2476 aspnet_state.exe 2476 aspnet_state.exe 2476 aspnet_state.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1972 2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe Token: SeShutdownPrivilege 1628 mscorsvw.exe Token: SeShutdownPrivilege 1476 mscorsvw.exe Token: 33 1252 EhTray.exe Token: SeIncBasePriorityPrivilege 1252 EhTray.exe Token: SeDebugPrivilege 2716 ehRec.exe Token: SeShutdownPrivilege 1628 mscorsvw.exe Token: SeShutdownPrivilege 1476 mscorsvw.exe Token: SeShutdownPrivilege 1628 mscorsvw.exe Token: SeShutdownPrivilege 1628 mscorsvw.exe Token: SeShutdownPrivilege 1476 mscorsvw.exe Token: SeShutdownPrivilege 1476 mscorsvw.exe Token: 33 1252 EhTray.exe Token: SeIncBasePriorityPrivilege 1252 EhTray.exe Token: SeDebugPrivilege 3044 alg.exe Token: SeShutdownPrivilege 1628 mscorsvw.exe Token: SeShutdownPrivilege 1476 mscorsvw.exe Token: SeTakeOwnershipPrivilege 2476 aspnet_state.exe Token: SeRestorePrivilege 2536 msiexec.exe Token: SeTakeOwnershipPrivilege 2536 msiexec.exe Token: SeSecurityPrivilege 2536 msiexec.exe Token: SeBackupPrivilege 3040 vssvc.exe Token: SeRestorePrivilege 3040 vssvc.exe Token: SeAuditPrivilege 3040 vssvc.exe Token: SeBackupPrivilege 1172 wbengine.exe Token: SeRestorePrivilege 1172 wbengine.exe Token: SeSecurityPrivilege 1172 wbengine.exe Token: SeDebugPrivilege 2476 aspnet_state.exe Token: 33 1528 wmpnetwk.exe Token: SeIncBasePriorityPrivilege 1528 wmpnetwk.exe Token: SeManageVolumePrivilege 2884 SearchIndexer.exe Token: 33 2884 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 2884 SearchIndexer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1252 EhTray.exe 1252 EhTray.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1252 EhTray.exe 1252 EhTray.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 1136 SearchProtocolHost.exe 1136 SearchProtocolHost.exe 1136 SearchProtocolHost.exe 1136 SearchProtocolHost.exe 1136 SearchProtocolHost.exe 1924 SearchProtocolHost.exe 1924 SearchProtocolHost.exe 1924 SearchProtocolHost.exe 1924 SearchProtocolHost.exe 1924 SearchProtocolHost.exe 1924 SearchProtocolHost.exe 1924 SearchProtocolHost.exe 1924 SearchProtocolHost.exe 1924 SearchProtocolHost.exe 1924 SearchProtocolHost.exe 1924 SearchProtocolHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2928 1628 mscorsvw.exe 43 PID 1628 wrote to memory of 2928 1628 mscorsvw.exe 43 PID 1628 wrote to memory of 2928 1628 mscorsvw.exe 43 PID 1628 wrote to memory of 2928 1628 mscorsvw.exe 43 PID 1628 wrote to memory of 1292 1628 mscorsvw.exe 44 PID 1628 wrote to memory of 1292 1628 mscorsvw.exe 44 PID 1628 wrote to memory of 1292 1628 mscorsvw.exe 44 PID 1628 wrote to memory of 1292 1628 mscorsvw.exe 44 PID 1628 wrote to memory of 2852 1628 mscorsvw.exe 47 PID 1628 wrote to memory of 2852 1628 mscorsvw.exe 47 PID 1628 wrote to memory of 2852 1628 mscorsvw.exe 47 PID 1628 wrote to memory of 2852 1628 mscorsvw.exe 47 PID 1628 wrote to memory of 1468 1628 mscorsvw.exe 48 PID 1628 wrote to memory of 1468 1628 mscorsvw.exe 48 PID 1628 wrote to memory of 1468 1628 mscorsvw.exe 48 PID 1628 wrote to memory of 1468 1628 mscorsvw.exe 48 PID 1628 wrote to memory of 2124 1628 mscorsvw.exe 49 PID 1628 wrote to memory of 2124 1628 mscorsvw.exe 49 PID 1628 wrote to memory of 2124 1628 mscorsvw.exe 49 PID 1628 wrote to memory of 2124 1628 mscorsvw.exe 49 PID 1628 wrote to memory of 2044 1628 mscorsvw.exe 50 PID 1628 wrote to memory of 2044 1628 mscorsvw.exe 50 PID 1628 wrote to memory of 2044 1628 mscorsvw.exe 50 PID 1628 wrote to memory of 2044 1628 mscorsvw.exe 50 PID 1628 wrote to memory of 896 1628 mscorsvw.exe 51 PID 1628 wrote to memory of 896 1628 mscorsvw.exe 51 PID 1628 wrote to memory of 896 1628 mscorsvw.exe 51 PID 1628 wrote to memory of 896 1628 mscorsvw.exe 51 PID 1628 wrote to memory of 2448 1628 mscorsvw.exe 52 PID 1628 wrote to memory of 2448 1628 mscorsvw.exe 52 PID 1628 wrote to memory of 2448 1628 mscorsvw.exe 52 PID 1628 wrote to memory of 2448 1628 mscorsvw.exe 52 PID 1628 wrote to memory of 2764 1628 mscorsvw.exe 53 PID 1628 wrote to memory of 2764 1628 mscorsvw.exe 53 PID 1628 wrote to memory of 2764 1628 mscorsvw.exe 53 PID 1628 wrote to memory of 2764 1628 mscorsvw.exe 53 PID 1628 wrote to memory of 2108 1628 mscorsvw.exe 54 PID 1628 wrote to memory of 2108 1628 mscorsvw.exe 54 PID 1628 wrote to memory of 2108 1628 mscorsvw.exe 54 PID 1628 wrote to memory of 2108 1628 mscorsvw.exe 54 PID 1628 wrote to memory of 752 1628 mscorsvw.exe 55 PID 1628 wrote to memory of 752 1628 mscorsvw.exe 55 PID 1628 wrote to memory of 752 1628 mscorsvw.exe 55 PID 1628 wrote to memory of 752 1628 mscorsvw.exe 55 PID 1628 wrote to memory of 2320 1628 mscorsvw.exe 57 PID 1628 wrote to memory of 2320 1628 mscorsvw.exe 57 PID 1628 wrote to memory of 2320 1628 mscorsvw.exe 57 PID 1628 wrote to memory of 2320 1628 mscorsvw.exe 57 PID 1628 wrote to memory of 1540 1628 mscorsvw.exe 59 PID 1628 wrote to memory of 1540 1628 mscorsvw.exe 59 PID 1628 wrote to memory of 1540 1628 mscorsvw.exe 59 PID 1628 wrote to memory of 1540 1628 mscorsvw.exe 59 PID 1628 wrote to memory of 456 1628 mscorsvw.exe 60 PID 1628 wrote to memory of 456 1628 mscorsvw.exe 60 PID 1628 wrote to memory of 456 1628 mscorsvw.exe 60 PID 1628 wrote to memory of 456 1628 mscorsvw.exe 60 PID 1628 wrote to memory of 2108 1628 mscorsvw.exe 61 PID 1628 wrote to memory of 2108 1628 mscorsvw.exe 61 PID 1628 wrote to memory of 2108 1628 mscorsvw.exe 61 PID 1628 wrote to memory of 2108 1628 mscorsvw.exe 61 PID 1628 wrote to memory of 1908 1628 mscorsvw.exe 62 PID 1628 wrote to memory of 1908 1628 mscorsvw.exe 62 PID 1628 wrote to memory of 1908 1628 mscorsvw.exe 62 PID 1628 wrote to memory of 1908 1628 mscorsvw.exe 62 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe"C:\Users\Admin\AppData\Local\Temp\2fcbae1ddb45814101eeea404b12efaf692680af979e5d6e9acfee1b2fc6e95a.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2524
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2808
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ec -InterruptEvent 1d8 -NGENProcess 1dc -Pipe 1e8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2928
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 1d8 -NGENProcess 1dc -Pipe 1ec -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1292
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 258 -NGENProcess 260 -Pipe 25c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2852
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 250 -NGENProcess 264 -Pipe 24c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1468
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 254 -NGENProcess 268 -Pipe 248 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2124
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 254 -InterruptEvent 240 -NGENProcess 264 -Pipe 1f4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2044
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 26c -InterruptEvent 260 -NGENProcess 270 -Pipe 254 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:896
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 250 -NGENProcess 274 -Pipe 26c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2448
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 1dc -NGENProcess 270 -Pipe 258 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2764
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 278 -NGENProcess 260 -Pipe 268 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2108
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 1d8 -NGENProcess 280 -Pipe 1dc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:752
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 274 -NGENProcess 284 -Pipe 27c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2320
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 260 -NGENProcess 288 -Pipe 244 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1540
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 280 -NGENProcess 28c -Pipe 264 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:456
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 250 -NGENProcess 290 -Pipe 240 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2108
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 294 -NGENProcess 28c -Pipe 278 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1908
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 270 -NGENProcess 298 -Pipe 250 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1688
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 280 -NGENProcess 28c -Pipe 274 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2604
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 2a0 -NGENProcess 294 -Pipe 29c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:368
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 294 -InterruptEvent 1b0 -NGENProcess 184 -Pipe 2a0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2396
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1b0 -InterruptEvent 2b4 -NGENProcess 28c -Pipe 2b0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2920
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1b0 -InterruptEvent 2a8 -NGENProcess 294 -Pipe 290 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2736
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 2bc -NGENProcess 2ac -Pipe 1b0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3028
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1476 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 1c4 -NGENProcess 1c8 -Pipe 1d4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2096
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 1c4 -NGENProcess 1c8 -Pipe 1d8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:952
-
-
C:\Windows\ehome\ehRecvr.exeC:\Windows\ehome\ehRecvr.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1136
-
C:\Windows\ehome\ehsched.exeC:\Windows\ehome\ehsched.exe1⤵
- Executes dropped EXE
PID:268
-
C:\Windows\eHome\EhTray.exe"C:\Windows\eHome\EhTray.exe" /nav:-21⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1252
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2232
-
C:\Windows\ehome\ehRec.exeC:\Windows\ehome\ehRec.exe -Embedding1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
C:\Windows\system32\IEEtwCollector.exeC:\Windows\system32\IEEtwCollector.exe /V1⤵
- Executes dropped EXE
PID:456
-
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2684
-
C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE"C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2540
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:2412
-
C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:2260
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1936
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2548
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:2152
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:2448
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:2368
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:1048
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:1620
-
C:\Program Files\Windows Media Player\wmpnetwk.exe"C:\Program Files\Windows Media Player\wmpnetwk.exe"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2884 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-86725733-3001458681-3405935542-10001_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-86725733-3001458681-3405935542-10001 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"2⤵
- Suspicious use of SetWindowsHookEx
PID:1136
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 592 596 604 65536 6002⤵
- Modifies data under HKEY_USERS
PID:2340
-
-
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706KB
MD5cb3d043f82dda2160c6b5605f9ec25c2
SHA1b30933eef8491389b24791f2ab24b35d70057068
SHA25600e57c2dd6eea11d74232681a8fff3a8073763d834527a2b04197df0d1742dfe
SHA512c3e04f770067a19b75bf0a0701caa54b5a27dff813eeaed15cae4478510a553d9e557a30514420169beac28d26aa0e0221678bdf35c7770c242163b753d5d5a8
-
Filesize
30.1MB
MD514d47ee6a5dbee223c7b7e936e742ff0
SHA1a469a92d7259df1b7a25357fae62584b58fd5b10
SHA2561ed316c1f50d0bec3e765a0cc66150401a50a1308fe9dac44f5bd40da3595f07
SHA512955d7b2f4f7d78f91a34470ae562fdd4b07af46aee7a324aac8a3c3779d6a750b891a57f6709ec6211c3263c739b9ea2b9fed6a66dce81da8083b47cf2f1bf67
-
Filesize
781KB
MD57389fff774fe45185f6a3ec2cb1c992e
SHA1e7a4e9458ca4daa7b7f3bc4270119a9fa19e5020
SHA25676ff3cf0ab9dc43a9ba639e9e1dde8ba792c70d9a9fe528b0ad7be0a2b16b54a
SHA5129230a5e85fa833624a13d8edea54270c3ef1141be1b7730c91be51a869b9ea7d1954f798fae14569bbe4251c8d2cdc5dacbbdb80b8df4ffe569951fc0e0c11ef
-
Filesize
781KB
MD57389fff774fe45185f6a3ec2cb1c992e
SHA1e7a4e9458ca4daa7b7f3bc4270119a9fa19e5020
SHA25676ff3cf0ab9dc43a9ba639e9e1dde8ba792c70d9a9fe528b0ad7be0a2b16b54a
SHA5129230a5e85fa833624a13d8edea54270c3ef1141be1b7730c91be51a869b9ea7d1954f798fae14569bbe4251c8d2cdc5dacbbdb80b8df4ffe569951fc0e0c11ef
-
Filesize
5.2MB
MD5c71d888f4188e48e3baaa716bcb2f19f
SHA1dfa092acc1335db850ec4600bec6376cabc3443d
SHA2568852b363f1bb3616176bf5b8c8d25656c3b834216ad3f16259526b1cd9ffbcbc
SHA512da3b61ab21c993ad0d3e0876fd07fa4d6dd5a8b599fd943cf8f472afdc9f6d607111ecd3c9798e88f584d624bea6736d58adcbd2876ad713d6f2c90c9fb21725
-
Filesize
2.1MB
MD52fd5d45945a5ead9ac85d1d9c4f4cafa
SHA18d9e2bfd3dc4bb5d709d618c007977a0ed536f3f
SHA25648f73808c2c8272e1133c8156b515118e2346595188055bbf8fe1f0ef190889c
SHA51209a9c0a3892eec28df0d1bd8f57c95b89e5ad171ed9efe3d5a533a09660ba2acc7e0c6fd9f2efcaa9fb18a7174c60fd42e675d93011061d31791b5e7bcf6bf47
-
Filesize
1024KB
MD512c996941beb748468b2674cfd764d2e
SHA1c8a54cca8eade95a28eec3aa8e07dd20b3f8f265
SHA256f339fea675a9113986dd3988ff1b1b3a8d5dace88fc463606e88dc71484c604e
SHA512d132f2f49c7eb4f5805bcc29e359ba7926f1c478e99aec08c37208f5faee5e25ce182f3c18c7c1c850ededac43bccfb1938f2b5866b1f1ecf0a0f4514ff1e929
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms
Filesize24B
MD5b9bd716de6739e51c620f2086f9c31e4
SHA19733d94607a3cba277e567af584510edd9febf62
SHA2567116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312
SHA512cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478
-
Filesize
648KB
MD525938b383a4a1924be3650790bf3b130
SHA16e700fb474984383cf6f2e7d54f71cf0f25a098e
SHA2560cc17526d6d5eacc3ccb7b520b27aa772573871343b23262418011a8ca9e0d19
SHA51299a88db799ef30ee2d252c95dd54a4a1cb972229a2cc5dffc9771eb361933efef5aa81cb04501eced96cb1436115ac74300049a9835c7d0b4b6928b52c8d50bf
-
Filesize
648KB
MD525938b383a4a1924be3650790bf3b130
SHA16e700fb474984383cf6f2e7d54f71cf0f25a098e
SHA2560cc17526d6d5eacc3ccb7b520b27aa772573871343b23262418011a8ca9e0d19
SHA51299a88db799ef30ee2d252c95dd54a4a1cb972229a2cc5dffc9771eb361933efef5aa81cb04501eced96cb1436115ac74300049a9835c7d0b4b6928b52c8d50bf
-
Filesize
872KB
MD5e7452139ecc3af07b73fd37d49d71d55
SHA1af5dfb2ce81df6a409f9bd2183e50eec9caa8234
SHA256c1a03a2278dadd46b9c33e07aee9eb4e3a810d6eca92ad058619f7a69ce4a374
SHA512142aa9f1b528b480a9768e09ad9f3cae5802b4ed507534eb356ee8089bb840982686f96fca50ca4a6de8638bfc9646dd072a5ee08fc2129f93626efab1093fc0
-
Filesize
603KB
MD50ea1c22a734f98edfeed09f104e0d80b
SHA1b9e9a0e768008d51c6d2be0b877746498ef65e0d
SHA25692cd9cd2c3a4e674603ab09557a276e155eb903a793b486ed5f114dbd2f6aedd
SHA512c22504d608248756f112364d79e743244061b76f933b25c950f0328588d997a66fccf2e5b8c532f6cdb81209cb65b17ef2f5e1413caa1487b867d07ae03a97e1
-
Filesize
678KB
MD54385b68870ce2f5a8875135634c8e108
SHA18be1c774534377ce2f45b527071da37c454b68f8
SHA2560cf3539754ccb56e08ad35493f2bf266d1c07ac0e2efd4cf8254475586d6d74e
SHA512f5241f17dc251f5e79a682107da1c7c7c652dc5d86c97bd48d8cef0599e4c86638e20e5eff1cf004fa43fc9b9ee6139d46c889b6b31ebd58f3d9ced9344248c5
-
Filesize
678KB
MD54385b68870ce2f5a8875135634c8e108
SHA18be1c774534377ce2f45b527071da37c454b68f8
SHA2560cf3539754ccb56e08ad35493f2bf266d1c07ac0e2efd4cf8254475586d6d74e
SHA512f5241f17dc251f5e79a682107da1c7c7c652dc5d86c97bd48d8cef0599e4c86638e20e5eff1cf004fa43fc9b9ee6139d46c889b6b31ebd58f3d9ced9344248c5
-
Filesize
678KB
MD54385b68870ce2f5a8875135634c8e108
SHA18be1c774534377ce2f45b527071da37c454b68f8
SHA2560cf3539754ccb56e08ad35493f2bf266d1c07ac0e2efd4cf8254475586d6d74e
SHA512f5241f17dc251f5e79a682107da1c7c7c652dc5d86c97bd48d8cef0599e4c86638e20e5eff1cf004fa43fc9b9ee6139d46c889b6b31ebd58f3d9ced9344248c5
-
Filesize
678KB
MD54385b68870ce2f5a8875135634c8e108
SHA18be1c774534377ce2f45b527071da37c454b68f8
SHA2560cf3539754ccb56e08ad35493f2bf266d1c07ac0e2efd4cf8254475586d6d74e
SHA512f5241f17dc251f5e79a682107da1c7c7c652dc5d86c97bd48d8cef0599e4c86638e20e5eff1cf004fa43fc9b9ee6139d46c889b6b31ebd58f3d9ced9344248c5
-
Filesize
625KB
MD52a090986b0834f05a489145f9b131760
SHA1685212fc9c60b8df2a37cb51a2c493017ff22541
SHA256957f34335c6a632a767fa808931be8f3c7dc9dc7ed987b53d7462af58185c24e
SHA512a4e630fae552a141686fb9070ea5e61569a0ecfd4cb440d6e208bdbf6d06d0ff190e8e425c10985493c44c7442a5738fb59acaeac6e0d5b0911fc336a63045d2
-
Filesize
625KB
MD52a090986b0834f05a489145f9b131760
SHA1685212fc9c60b8df2a37cb51a2c493017ff22541
SHA256957f34335c6a632a767fa808931be8f3c7dc9dc7ed987b53d7462af58185c24e
SHA512a4e630fae552a141686fb9070ea5e61569a0ecfd4cb440d6e208bdbf6d06d0ff190e8e425c10985493c44c7442a5738fb59acaeac6e0d5b0911fc336a63045d2
-
Filesize
1003KB
MD53af9b7b75f4f8a544ddf982efc7199c8
SHA1b787b23c46a67974032371a8a82f0fe1674b8616
SHA256bf054feda687bf4b6ecf9661d43d768642ae20107ebd26912d11f1f5ebd16a4b
SHA512593821131b9fb23b4744a2625a45e3fec3809804a12ae1737f06504b843cdb86719f76189bb0995619da0adb8a692ecea5b3f7617a077d0f0206296eaf48c5f2
-
Filesize
656KB
MD53de82677230aa1338d8209a9e59f5b19
SHA123ae51ab71accb5b5ca3b6561c9fb3aefdae5f24
SHA25668e561ed0b09e8173fbf050220d38a77ee9e8a664ebdd6685b2e0b33b784ecbb
SHA512ec7340eb2941b0d33cb3f7e0fdc9c0e9f2a2b2085b71976b35a658e377c1becd8c898622f6f5d31e24b13bd2168092c7ab838c28c65b1a5d7fc122d06050ae75
-
Filesize
656KB
MD53de82677230aa1338d8209a9e59f5b19
SHA123ae51ab71accb5b5ca3b6561c9fb3aefdae5f24
SHA25668e561ed0b09e8173fbf050220d38a77ee9e8a664ebdd6685b2e0b33b784ecbb
SHA512ec7340eb2941b0d33cb3f7e0fdc9c0e9f2a2b2085b71976b35a658e377c1becd8c898622f6f5d31e24b13bd2168092c7ab838c28c65b1a5d7fc122d06050ae75
-
Filesize
656KB
MD53de82677230aa1338d8209a9e59f5b19
SHA123ae51ab71accb5b5ca3b6561c9fb3aefdae5f24
SHA25668e561ed0b09e8173fbf050220d38a77ee9e8a664ebdd6685b2e0b33b784ecbb
SHA512ec7340eb2941b0d33cb3f7e0fdc9c0e9f2a2b2085b71976b35a658e377c1becd8c898622f6f5d31e24b13bd2168092c7ab838c28c65b1a5d7fc122d06050ae75
-
Filesize
656KB
MD53de82677230aa1338d8209a9e59f5b19
SHA123ae51ab71accb5b5ca3b6561c9fb3aefdae5f24
SHA25668e561ed0b09e8173fbf050220d38a77ee9e8a664ebdd6685b2e0b33b784ecbb
SHA512ec7340eb2941b0d33cb3f7e0fdc9c0e9f2a2b2085b71976b35a658e377c1becd8c898622f6f5d31e24b13bd2168092c7ab838c28c65b1a5d7fc122d06050ae75
-
Filesize
656KB
MD53de82677230aa1338d8209a9e59f5b19
SHA123ae51ab71accb5b5ca3b6561c9fb3aefdae5f24
SHA25668e561ed0b09e8173fbf050220d38a77ee9e8a664ebdd6685b2e0b33b784ecbb
SHA512ec7340eb2941b0d33cb3f7e0fdc9c0e9f2a2b2085b71976b35a658e377c1becd8c898622f6f5d31e24b13bd2168092c7ab838c28c65b1a5d7fc122d06050ae75
-
Filesize
656KB
MD53de82677230aa1338d8209a9e59f5b19
SHA123ae51ab71accb5b5ca3b6561c9fb3aefdae5f24
SHA25668e561ed0b09e8173fbf050220d38a77ee9e8a664ebdd6685b2e0b33b784ecbb
SHA512ec7340eb2941b0d33cb3f7e0fdc9c0e9f2a2b2085b71976b35a658e377c1becd8c898622f6f5d31e24b13bd2168092c7ab838c28c65b1a5d7fc122d06050ae75
-
Filesize
656KB
MD53de82677230aa1338d8209a9e59f5b19
SHA123ae51ab71accb5b5ca3b6561c9fb3aefdae5f24
SHA25668e561ed0b09e8173fbf050220d38a77ee9e8a664ebdd6685b2e0b33b784ecbb
SHA512ec7340eb2941b0d33cb3f7e0fdc9c0e9f2a2b2085b71976b35a658e377c1becd8c898622f6f5d31e24b13bd2168092c7ab838c28c65b1a5d7fc122d06050ae75
-
Filesize
656KB
MD53de82677230aa1338d8209a9e59f5b19
SHA123ae51ab71accb5b5ca3b6561c9fb3aefdae5f24
SHA25668e561ed0b09e8173fbf050220d38a77ee9e8a664ebdd6685b2e0b33b784ecbb
SHA512ec7340eb2941b0d33cb3f7e0fdc9c0e9f2a2b2085b71976b35a658e377c1becd8c898622f6f5d31e24b13bd2168092c7ab838c28c65b1a5d7fc122d06050ae75
-
Filesize
656KB
MD53de82677230aa1338d8209a9e59f5b19
SHA123ae51ab71accb5b5ca3b6561c9fb3aefdae5f24
SHA25668e561ed0b09e8173fbf050220d38a77ee9e8a664ebdd6685b2e0b33b784ecbb
SHA512ec7340eb2941b0d33cb3f7e0fdc9c0e9f2a2b2085b71976b35a658e377c1becd8c898622f6f5d31e24b13bd2168092c7ab838c28c65b1a5d7fc122d06050ae75
-
Filesize
656KB
MD53de82677230aa1338d8209a9e59f5b19
SHA123ae51ab71accb5b5ca3b6561c9fb3aefdae5f24
SHA25668e561ed0b09e8173fbf050220d38a77ee9e8a664ebdd6685b2e0b33b784ecbb
SHA512ec7340eb2941b0d33cb3f7e0fdc9c0e9f2a2b2085b71976b35a658e377c1becd8c898622f6f5d31e24b13bd2168092c7ab838c28c65b1a5d7fc122d06050ae75
-
Filesize
656KB
MD53de82677230aa1338d8209a9e59f5b19
SHA123ae51ab71accb5b5ca3b6561c9fb3aefdae5f24
SHA25668e561ed0b09e8173fbf050220d38a77ee9e8a664ebdd6685b2e0b33b784ecbb
SHA512ec7340eb2941b0d33cb3f7e0fdc9c0e9f2a2b2085b71976b35a658e377c1becd8c898622f6f5d31e24b13bd2168092c7ab838c28c65b1a5d7fc122d06050ae75
-
Filesize
656KB
MD53de82677230aa1338d8209a9e59f5b19
SHA123ae51ab71accb5b5ca3b6561c9fb3aefdae5f24
SHA25668e561ed0b09e8173fbf050220d38a77ee9e8a664ebdd6685b2e0b33b784ecbb
SHA512ec7340eb2941b0d33cb3f7e0fdc9c0e9f2a2b2085b71976b35a658e377c1becd8c898622f6f5d31e24b13bd2168092c7ab838c28c65b1a5d7fc122d06050ae75
-
Filesize
656KB
MD53de82677230aa1338d8209a9e59f5b19
SHA123ae51ab71accb5b5ca3b6561c9fb3aefdae5f24
SHA25668e561ed0b09e8173fbf050220d38a77ee9e8a664ebdd6685b2e0b33b784ecbb
SHA512ec7340eb2941b0d33cb3f7e0fdc9c0e9f2a2b2085b71976b35a658e377c1becd8c898622f6f5d31e24b13bd2168092c7ab838c28c65b1a5d7fc122d06050ae75
-
Filesize
656KB
MD53de82677230aa1338d8209a9e59f5b19
SHA123ae51ab71accb5b5ca3b6561c9fb3aefdae5f24
SHA25668e561ed0b09e8173fbf050220d38a77ee9e8a664ebdd6685b2e0b33b784ecbb
SHA512ec7340eb2941b0d33cb3f7e0fdc9c0e9f2a2b2085b71976b35a658e377c1becd8c898622f6f5d31e24b13bd2168092c7ab838c28c65b1a5d7fc122d06050ae75
-
Filesize
656KB
MD53de82677230aa1338d8209a9e59f5b19
SHA123ae51ab71accb5b5ca3b6561c9fb3aefdae5f24
SHA25668e561ed0b09e8173fbf050220d38a77ee9e8a664ebdd6685b2e0b33b784ecbb
SHA512ec7340eb2941b0d33cb3f7e0fdc9c0e9f2a2b2085b71976b35a658e377c1becd8c898622f6f5d31e24b13bd2168092c7ab838c28c65b1a5d7fc122d06050ae75
-
Filesize
656KB
MD53de82677230aa1338d8209a9e59f5b19
SHA123ae51ab71accb5b5ca3b6561c9fb3aefdae5f24
SHA25668e561ed0b09e8173fbf050220d38a77ee9e8a664ebdd6685b2e0b33b784ecbb
SHA512ec7340eb2941b0d33cb3f7e0fdc9c0e9f2a2b2085b71976b35a658e377c1becd8c898622f6f5d31e24b13bd2168092c7ab838c28c65b1a5d7fc122d06050ae75
-
Filesize
656KB
MD53de82677230aa1338d8209a9e59f5b19
SHA123ae51ab71accb5b5ca3b6561c9fb3aefdae5f24
SHA25668e561ed0b09e8173fbf050220d38a77ee9e8a664ebdd6685b2e0b33b784ecbb
SHA512ec7340eb2941b0d33cb3f7e0fdc9c0e9f2a2b2085b71976b35a658e377c1becd8c898622f6f5d31e24b13bd2168092c7ab838c28c65b1a5d7fc122d06050ae75
-
Filesize
656KB
MD53de82677230aa1338d8209a9e59f5b19
SHA123ae51ab71accb5b5ca3b6561c9fb3aefdae5f24
SHA25668e561ed0b09e8173fbf050220d38a77ee9e8a664ebdd6685b2e0b33b784ecbb
SHA512ec7340eb2941b0d33cb3f7e0fdc9c0e9f2a2b2085b71976b35a658e377c1becd8c898622f6f5d31e24b13bd2168092c7ab838c28c65b1a5d7fc122d06050ae75
-
Filesize
656KB
MD53de82677230aa1338d8209a9e59f5b19
SHA123ae51ab71accb5b5ca3b6561c9fb3aefdae5f24
SHA25668e561ed0b09e8173fbf050220d38a77ee9e8a664ebdd6685b2e0b33b784ecbb
SHA512ec7340eb2941b0d33cb3f7e0fdc9c0e9f2a2b2085b71976b35a658e377c1becd8c898622f6f5d31e24b13bd2168092c7ab838c28c65b1a5d7fc122d06050ae75
-
Filesize
656KB
MD53de82677230aa1338d8209a9e59f5b19
SHA123ae51ab71accb5b5ca3b6561c9fb3aefdae5f24
SHA25668e561ed0b09e8173fbf050220d38a77ee9e8a664ebdd6685b2e0b33b784ecbb
SHA512ec7340eb2941b0d33cb3f7e0fdc9c0e9f2a2b2085b71976b35a658e377c1becd8c898622f6f5d31e24b13bd2168092c7ab838c28c65b1a5d7fc122d06050ae75
-
Filesize
656KB
MD53de82677230aa1338d8209a9e59f5b19
SHA123ae51ab71accb5b5ca3b6561c9fb3aefdae5f24
SHA25668e561ed0b09e8173fbf050220d38a77ee9e8a664ebdd6685b2e0b33b784ecbb
SHA512ec7340eb2941b0d33cb3f7e0fdc9c0e9f2a2b2085b71976b35a658e377c1becd8c898622f6f5d31e24b13bd2168092c7ab838c28c65b1a5d7fc122d06050ae75
-
Filesize
656KB
MD53de82677230aa1338d8209a9e59f5b19
SHA123ae51ab71accb5b5ca3b6561c9fb3aefdae5f24
SHA25668e561ed0b09e8173fbf050220d38a77ee9e8a664ebdd6685b2e0b33b784ecbb
SHA512ec7340eb2941b0d33cb3f7e0fdc9c0e9f2a2b2085b71976b35a658e377c1becd8c898622f6f5d31e24b13bd2168092c7ab838c28c65b1a5d7fc122d06050ae75
-
Filesize
656KB
MD53de82677230aa1338d8209a9e59f5b19
SHA123ae51ab71accb5b5ca3b6561c9fb3aefdae5f24
SHA25668e561ed0b09e8173fbf050220d38a77ee9e8a664ebdd6685b2e0b33b784ecbb
SHA512ec7340eb2941b0d33cb3f7e0fdc9c0e9f2a2b2085b71976b35a658e377c1becd8c898622f6f5d31e24b13bd2168092c7ab838c28c65b1a5d7fc122d06050ae75
-
Filesize
656KB
MD53de82677230aa1338d8209a9e59f5b19
SHA123ae51ab71accb5b5ca3b6561c9fb3aefdae5f24
SHA25668e561ed0b09e8173fbf050220d38a77ee9e8a664ebdd6685b2e0b33b784ecbb
SHA512ec7340eb2941b0d33cb3f7e0fdc9c0e9f2a2b2085b71976b35a658e377c1becd8c898622f6f5d31e24b13bd2168092c7ab838c28c65b1a5d7fc122d06050ae75
-
Filesize
656KB
MD53de82677230aa1338d8209a9e59f5b19
SHA123ae51ab71accb5b5ca3b6561c9fb3aefdae5f24
SHA25668e561ed0b09e8173fbf050220d38a77ee9e8a664ebdd6685b2e0b33b784ecbb
SHA512ec7340eb2941b0d33cb3f7e0fdc9c0e9f2a2b2085b71976b35a658e377c1becd8c898622f6f5d31e24b13bd2168092c7ab838c28c65b1a5d7fc122d06050ae75
-
Filesize
587KB
MD56a9552738e65de2e6917b2fab96d5ab4
SHA11aad612a6a22cd2eacc34f4edb1bd51564cc2d50
SHA256ee9181b3a504948884890158dd32931d4eee3d8269599a90c20daa8dd4d22734
SHA512523c06e948eec06b7794ebeaa1f9b2b44732fd0d4ee1d5a4659a19c3b327ca58007c59b69389ae24b2ae7b5b1424c43dc7231d8d4c8124cbf4f4c580a4ea01f4
-
Filesize
644KB
MD5c1a2bfd6445cb87cb8d6b2d61633eeda
SHA19a385c8b2696c382fa1872b6a35c8c293b5f0260
SHA256fa346c8b1bc89198686fb76acb9bf0d9845f3e2e1eed2debe0c09d0d1792432f
SHA512f391425c09e2cfc764874cafaea95460a0e63dd73ead7335140d5fd3f51be7e2619fa055a01586333c05a960ab9804bde0c76924941282d03d2e38554eaea1ba
-
Filesize
577KB
MD5394dd559916b2bbc97306b633431c8f5
SHA12bc986a5f531536c099ddca1fa4b1effa21be32e
SHA256180d87dfb45b0fe0fc85ba332949700b637166cb5b903a8aba4cc53e8cfe31de
SHA512c0f5cb1857ffbd9d636d48b9804ee6769ec610f7063541c0c147715bdc455514964f75958fc919337c4541ed3f569eade3dfd24c63c1b02446a6f59ddfed22ba
-
Filesize
674KB
MD5d984d645d20dd2f07424f7baf83bd1fd
SHA1f761b027dfd92a207299349dfe7e81b88d705781
SHA2567fade1c9475c2f2e3a0bfa135debf5e0d1af5831e6e985ae82859c9afce2b994
SHA512fec9a3e617f1c18cb425c9c8dc50e4b3c5a1c92b9c8d4bb081bf979a0e38600d754f4b78a92ac361af7b1042ddeaa79f7e745db5c53214ba62e035491944578b
-
Filesize
705KB
MD5ccdef28a1e04edced36b5463d85be3dc
SHA1ef1947a63d98c8469a309d87cdd399acdb0cc4f8
SHA2566ae52ea36d245d6e1a3d7d75953cfff25dd876211a5fb59d74e3f320162190a6
SHA512a329d5849627321b70798d1443eb318c96410c150161368d3257485c300ce30231550a45d40f18f09f5a69a5b0fc845643b7a1d6ce4af05d63df25059f83e0df
-
Filesize
691KB
MD59b8c155b3a7801cf8f99439c765653b8
SHA1dfce6fc2f31604113fa25d470e6fd320bdadcfd3
SHA256887790794a0674bd4f240bc738c0ba455e510495e885ce8a2e68a5bb70d38d46
SHA512b6dc9bb9383acefe265a91afe0cac6cd42d58e4e5e95433690d4825820c227fc23f98dcbd7ee2831613eceb66ab9ac72ac9fa36d13a9a6f3e8610f79056eb7d7
-
Filesize
1.2MB
MD5102cb917c1aca0c311562f53f1cf10ca
SHA1cea00ade904b95c57df1ac690c25e028d9337e49
SHA256ebcb156ec30cff9bff62e8392ea45e7d1122a998552770acb7cbb2087bbe032b
SHA51278a5da1438f4081e6a04ad5dbe335c0bf027dfdb79d5f5ad2341dc8b1e1050f2e0a52c6de7388b5cc7fd6455ecdc6951585d716a5e54d887b688ef0f967e34dd
-
Filesize
1.2MB
MD5102cb917c1aca0c311562f53f1cf10ca
SHA1cea00ade904b95c57df1ac690c25e028d9337e49
SHA256ebcb156ec30cff9bff62e8392ea45e7d1122a998552770acb7cbb2087bbe032b
SHA51278a5da1438f4081e6a04ad5dbe335c0bf027dfdb79d5f5ad2341dc8b1e1050f2e0a52c6de7388b5cc7fd6455ecdc6951585d716a5e54d887b688ef0f967e34dd
-
Filesize
691KB
MD5fcee1396835e7f6ca2deac09f0fbce33
SHA128bebeb81ca22b712b612784743ac3f5c404beee
SHA256ee18d1faacfa51c5b9121f13189a61df66f95c6b9bb0dedb3da5b1ecee2d1434
SHA512ff1f145c4308e8aad41beca80924056aaee6f6c4eb6c95966fc2ebdf7e19967127f1261d43a7236dbdf5c1abc6e3b48e703fe036f24da0430133cc528311e96c
-
Filesize
691KB
MD5fcee1396835e7f6ca2deac09f0fbce33
SHA128bebeb81ca22b712b612784743ac3f5c404beee
SHA256ee18d1faacfa51c5b9121f13189a61df66f95c6b9bb0dedb3da5b1ecee2d1434
SHA512ff1f145c4308e8aad41beca80924056aaee6f6c4eb6c95966fc2ebdf7e19967127f1261d43a7236dbdf5c1abc6e3b48e703fe036f24da0430133cc528311e96c
-
Filesize
674KB
MD5d984d645d20dd2f07424f7baf83bd1fd
SHA1f761b027dfd92a207299349dfe7e81b88d705781
SHA2567fade1c9475c2f2e3a0bfa135debf5e0d1af5831e6e985ae82859c9afce2b994
SHA512fec9a3e617f1c18cb425c9c8dc50e4b3c5a1c92b9c8d4bb081bf979a0e38600d754f4b78a92ac361af7b1042ddeaa79f7e745db5c53214ba62e035491944578b
-
Filesize
1.2MB
MD57f84939125c38beaa7d8e37399583d1a
SHA1fe25edea85a8bfe2f119cc5c2e931ec27b7e6a58
SHA2567fba824bf7a6d3ce126628dc3c59ba40e176f6d053a7317d47914c126a38587f
SHA5126dbcd423dba3640d7c755acc890ff8d8508e23e5eb2747de74e13308c4e09ba5169b1bd752853b957e8550273025aab2642fc41aba5c46cf25f0ac1b1fbee28a
-
Filesize
691KB
MD59b8c155b3a7801cf8f99439c765653b8
SHA1dfce6fc2f31604113fa25d470e6fd320bdadcfd3
SHA256887790794a0674bd4f240bc738c0ba455e510495e885ce8a2e68a5bb70d38d46
SHA512b6dc9bb9383acefe265a91afe0cac6cd42d58e4e5e95433690d4825820c227fc23f98dcbd7ee2831613eceb66ab9ac72ac9fa36d13a9a6f3e8610f79056eb7d7
-
Filesize
648KB
MD525938b383a4a1924be3650790bf3b130
SHA16e700fb474984383cf6f2e7d54f71cf0f25a098e
SHA2560cc17526d6d5eacc3ccb7b520b27aa772573871343b23262418011a8ca9e0d19
SHA51299a88db799ef30ee2d252c95dd54a4a1cb972229a2cc5dffc9771eb361933efef5aa81cb04501eced96cb1436115ac74300049a9835c7d0b4b6928b52c8d50bf
-
Filesize
603KB
MD50ea1c22a734f98edfeed09f104e0d80b
SHA1b9e9a0e768008d51c6d2be0b877746498ef65e0d
SHA25692cd9cd2c3a4e674603ab09557a276e155eb903a793b486ed5f114dbd2f6aedd
SHA512c22504d608248756f112364d79e743244061b76f933b25c950f0328588d997a66fccf2e5b8c532f6cdb81209cb65b17ef2f5e1413caa1487b867d07ae03a97e1
-
Filesize
577KB
MD57382e87416f08d459f6ace2b876e5d9f
SHA1bf2914008d42b21e16de969c22b41db7e1f3887d
SHA2561ac4a670a23e9df1b6ba33fc0f0b44652af6b069a1ae44cf4bf660c105e2d0ca
SHA5123118a0b17b6bf8abf30cfacca76493ac09402af047c907599c3a0e8315f36973f087e538d7fe35b025ec12f227fc85774f05a3c4842821807f8491b954bd1b59
-
Filesize
644KB
MD5c1a2bfd6445cb87cb8d6b2d61633eeda
SHA19a385c8b2696c382fa1872b6a35c8c293b5f0260
SHA256fa346c8b1bc89198686fb76acb9bf0d9845f3e2e1eed2debe0c09d0d1792432f
SHA512f391425c09e2cfc764874cafaea95460a0e63dd73ead7335140d5fd3f51be7e2619fa055a01586333c05a960ab9804bde0c76924941282d03d2e38554eaea1ba
-
Filesize
577KB
MD5394dd559916b2bbc97306b633431c8f5
SHA12bc986a5f531536c099ddca1fa4b1effa21be32e
SHA256180d87dfb45b0fe0fc85ba332949700b637166cb5b903a8aba4cc53e8cfe31de
SHA512c0f5cb1857ffbd9d636d48b9804ee6769ec610f7063541c0c147715bdc455514964f75958fc919337c4541ed3f569eade3dfd24c63c1b02446a6f59ddfed22ba
-
Filesize
674KB
MD5d984d645d20dd2f07424f7baf83bd1fd
SHA1f761b027dfd92a207299349dfe7e81b88d705781
SHA2567fade1c9475c2f2e3a0bfa135debf5e0d1af5831e6e985ae82859c9afce2b994
SHA512fec9a3e617f1c18cb425c9c8dc50e4b3c5a1c92b9c8d4bb081bf979a0e38600d754f4b78a92ac361af7b1042ddeaa79f7e745db5c53214ba62e035491944578b
-
Filesize
705KB
MD5ccdef28a1e04edced36b5463d85be3dc
SHA1ef1947a63d98c8469a309d87cdd399acdb0cc4f8
SHA2566ae52ea36d245d6e1a3d7d75953cfff25dd876211a5fb59d74e3f320162190a6
SHA512a329d5849627321b70798d1443eb318c96410c150161368d3257485c300ce30231550a45d40f18f09f5a69a5b0fc845643b7a1d6ce4af05d63df25059f83e0df
-
Filesize
691KB
MD59b8c155b3a7801cf8f99439c765653b8
SHA1dfce6fc2f31604113fa25d470e6fd320bdadcfd3
SHA256887790794a0674bd4f240bc738c0ba455e510495e885ce8a2e68a5bb70d38d46
SHA512b6dc9bb9383acefe265a91afe0cac6cd42d58e4e5e95433690d4825820c227fc23f98dcbd7ee2831613eceb66ab9ac72ac9fa36d13a9a6f3e8610f79056eb7d7
-
Filesize
691KB
MD59b8c155b3a7801cf8f99439c765653b8
SHA1dfce6fc2f31604113fa25d470e6fd320bdadcfd3
SHA256887790794a0674bd4f240bc738c0ba455e510495e885ce8a2e68a5bb70d38d46
SHA512b6dc9bb9383acefe265a91afe0cac6cd42d58e4e5e95433690d4825820c227fc23f98dcbd7ee2831613eceb66ab9ac72ac9fa36d13a9a6f3e8610f79056eb7d7
-
Filesize
1.2MB
MD5102cb917c1aca0c311562f53f1cf10ca
SHA1cea00ade904b95c57df1ac690c25e028d9337e49
SHA256ebcb156ec30cff9bff62e8392ea45e7d1122a998552770acb7cbb2087bbe032b
SHA51278a5da1438f4081e6a04ad5dbe335c0bf027dfdb79d5f5ad2341dc8b1e1050f2e0a52c6de7388b5cc7fd6455ecdc6951585d716a5e54d887b688ef0f967e34dd
-
Filesize
691KB
MD5fcee1396835e7f6ca2deac09f0fbce33
SHA128bebeb81ca22b712b612784743ac3f5c404beee
SHA256ee18d1faacfa51c5b9121f13189a61df66f95c6b9bb0dedb3da5b1ecee2d1434
SHA512ff1f145c4308e8aad41beca80924056aaee6f6c4eb6c95966fc2ebdf7e19967127f1261d43a7236dbdf5c1abc6e3b48e703fe036f24da0430133cc528311e96c