Analysis
-
max time kernel
48s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2023, 21:23
Static task
static1
Behavioral task
behavioral1
Sample
1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe
Resource
win10v2004-20230915-en
General
-
Target
1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe
-
Size
1.7MB
-
MD5
9338d9137039a527d50f034c5b8b364f
-
SHA1
561fb03bb58f00cbd73913baabff9e418e23108e
-
SHA256
1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953
-
SHA512
9afdda480de87d0f76cde8ebfba6fd9543241ac575fbfd61db472eae7ef91f31cb8236f230cf828cd72a9d01bcd3f2ec963de958110dcba049a1aead9f87fa65
-
SSDEEP
49152:DqNJtiVbAb6tl3T9Y5UfkVbIU6pTK0L+kWOQ/NaP:+NJMVbAb6t8UQGjWOQ/N
Malware Config
Signatures
-
Executes dropped EXE 14 IoCs
pid Process 2300 alg.exe 4192 DiagnosticsHub.StandardCollector.Service.exe 3348 fxssvc.exe 4240 elevation_service.exe 724 elevation_service.exe 2932 maintenanceservice.exe 2208 msdtc.exe 628 OSE.EXE 4460 PerceptionSimulationService.exe 3932 perfhost.exe 1228 locator.exe 2060 Process not Found 2620 snmptrap.exe 3780 spectrum.exe -
Drops file in System32 directory 16 IoCs
description ioc Process File opened for modification C:\Windows\SysWow64\perfhost.exe 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe File opened for modification C:\Windows\System32\SensorDataService.exe 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe File opened for modification C:\Windows\system32\SgrmBroker.exe 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe File opened for modification C:\Windows\system32\spectrum.exe 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe File opened for modification C:\Windows\System32\alg.exe 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe File opened for modification C:\Windows\system32\AppVClient.exe 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe File opened for modification C:\Windows\system32\dllhost.exe 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe File opened for modification C:\Windows\System32\snmptrap.exe 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\58c69d8aeac8ca73.bin DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\System32\msdtc.exe 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\fxssvc.exe 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe File opened for modification C:\Windows\system32\msiexec.exe 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe File opened for modification C:\Windows\system32\locator.exe 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe -
Checks SCSI registry key(s) 3 TTPs 36 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 Process not Found -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4892 jp2launcher.exe 4892 jp2launcher.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 656 Process not Found 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2504 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe Token: SeAuditPrivilege 3348 fxssvc.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2504 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe 2504 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2504 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe 2504 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2504 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe 2504 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe 4892 jp2launcher.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2504 wrote to memory of 2232 2504 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe 87 PID 2504 wrote to memory of 2232 2504 1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe 87 PID 2232 wrote to memory of 4892 2232 javaws.exe 88 PID 2232 wrote to memory of 4892 2232 javaws.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe"C:\Users\Admin\AppData\Local\Temp\1f0a6f5ae387c94bd08fe5e217cf6ef248998f996036a2520497eae3ec901953.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Program Files\Java\jre1.8.0_66\bin\javaws.exe"C:\Program Files\Java\jre1.8.0_66\bin\javaws.exe" -J-Djdk.disableLastUsageTracking=true -SSVBaselineUpdate2⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files\Java\jre1.8.0_66\bin\jp2launcher.exe"C:\Program Files\Java\jre1.8.0_66\bin\jp2launcher.exe" -secure -javaws -jre "C:\Program Files\Java\jre1.8.0_66" -vma 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 -ma LVNTVkJhc2VsaW5lVXBkYXRlAC1ub3RXZWJKYXZh3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4892
-
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
PID:2300
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4192
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:1768
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3348
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4240
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:724
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2932
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2208
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:628
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:4460
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:3932
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:1228
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵PID:2060
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:2620
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
PID:3780
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵PID:2836
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:4144
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵PID:3796
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵PID:4532
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:4676
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:5064
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵PID:3636
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2736
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵PID:2552
-
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵PID:3252
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 800 804 812 8192 808 7842⤵PID:1064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD571e9166d135216ea57e7bb38dc320322
SHA16b62c1cfea40a7b8edddbfa32ec7c227b10e3b98
SHA2565fd43cedd4de3b0081b358d13fdaf8604c152127dad6d42b04c868061f6cacc1
SHA51210457bb955b89d7596a7ae882a4688dabfb86a40daf2207199e47b5f002f2bebd04591a6728741bf1526f3677bfeb24f1ae37ff997c65ca820b52ee30d5bc432
-
Filesize
1.6MB
MD580a8adc89805bef8f3e29a936f08501d
SHA1ad05066b42977f4649c09807c71324a79193a099
SHA2564cfbd008b47d3732ee0d58ee1445aab49628782b63bbe14f6b9f1dcee2e47a22
SHA51266521277031de838902e35b2ff934d860dcb3fcdcbd0547aa5545fc07d341f0ffd54071ca0bbb8ed9d8d732e0cf8fc3f25a14403d73c5ad5ff883f79c83c4e61
-
Filesize
1.7MB
MD57970823d35fedabf6d0c9fc81b9fc382
SHA18851ec064faade78bb3bc900fc531829df44096f
SHA256570e39220a1ced62dd7c156ac6f1e5913f140b3b5f93a36bb704d09e539cfcaf
SHA512448f84290e7223a094bfb2f4eebb9744eb1927deda012c12c0a3d73934a3fd8bb12bc369e18afe09a3c184c2569090eaeb9ebfef9e6b499c2cf8257a0dd72a26
-
Filesize
2.1MB
MD5d930e2fec5f102d47a3470b3149c521f
SHA1aae378210940db9ce642be59523bb73033f6f22f
SHA25608914a5c86a7bcf90dbc44683ff91cf67933000126feaf914da06f46175024c4
SHA512a864eb8d09fbfa20aae1cb724c2fc7e395f4c2dae95a31c25a707e9f9a941057baa33f288e5355372df9070637e172d1575193b26d088974af5fc9045819bd28
-
Filesize
698B
MD598d0551ecdbd471d2b232495fbca9dea
SHA1708cd5c1f98c35c21b68e850936a06c847e6187a
SHA256665ee894e194d56ffb1e958f32ffed14d75b0fb6e812826e9b7f49703fe154e4
SHA512b66a8e55455b9af381e162482f20a8c77d350a8dba62c97d4c567db6072baef2760b91e9115ab109c5913c3c36d52cfb3637f8488215f4db8fa004375ed9990d
-
Filesize
267KB
MD5ee29e8cc7df153b92922599ae3f95ec5
SHA1fbe69d7b307532581edadf498b4e7adafe98b860
SHA25647ad597b2457846d436c66439809a0e28648334321274979f9af38b023baee7a
SHA512bb08f0c29db07100af97fa44bdec07544f2dc2cca1dc348f658057d1005911ee0a4074e7db1b8462153b85fa8c8fb6cdd6a6ff5083a62647903ced5cccaf4fa1
-
Filesize
1.4MB
MD54c38eb07c72c08b9897677d981c6f37a
SHA159e9d28417bef7a7cfc145a265ac52fe21b9cb38
SHA2561c181cf24d542f40937ed6315f23a8acedbb35708ce043c79bffd8853110aea2
SHA51217eb07f17187eaf03bda80233b84a2894ef2fbc6c74f1f055b10114c22d44e735c019803fe4ed4d85b479f9a8c0b9c961a623e68f38a9fb3d40da5112dc0f819
-
Filesize
1.7MB
MD50763043db03f4325f19435259ed89d62
SHA1ebd55d4b6ba0721877df6cc52b84c69b4e6f9041
SHA2561506743500e2d95e4d0c921a32a82f0a8850ba1c881d9f3258870b37e0e5277e
SHA5126f8c75254106d8927715735fe914aa4c90770e0bae20786ebb921e5c56fc952997c7564967092df26b9acba79d41895be468c555c0071dccfc30460e06557625
-
Filesize
1.5MB
MD554d1b7532ebe876943343538f6101c46
SHA117bda23a88f3a587cf3409db0e55f85c7cac78e9
SHA2562ebb3331d23bf97b51f513240de78c73d38ed58784838cca7bedff74315ca59d
SHA512e2d9b27ccac39bd7e0dac43ba9bdbc3324e034b8554da45047af4d6b38c4f7a0aa68653d5f58e81302dcb87fcaf606a93b7914726dacefb6e6838c100614b0d1
-
Filesize
1.2MB
MD52131f39de9c81944f9b6616c277e941d
SHA1b82e50fa2ab3e700ce3127bf41fcd8e98e9887ac
SHA25658172d270680603e479836821b7e7b3945b395388e619c1860068f3011679ea7
SHA5121759e32920b01fb0d40979fb8e7e41f9f61e31658f89d57030a63c8a0b2d754644afe172ba04a6b40bbc4c9cab927cb0d34f8b7fa34fb773fe0e479e62b7aa41
-
Filesize
1.4MB
MD5a72f9daa0bbfd0fa10a869ebe97e2e50
SHA143d69b1609f9b21944e3ef8c36bd402ad7c46432
SHA2565327e3a859865b439af0c9d81aa165d93a83bf0fcbf0a07d386b449830f1e0f9
SHA512a28eac36dcde6a1e42063d0d28187939b7b157b1b09e2b3513da0d8e9dada24d4e984e5697bb486df5c1baa1783c21fa92229e0e83d6e05cf3eeea506faae3f7
-
Filesize
1.8MB
MD51ac09e0c84f7537e65a8e5896d8acd66
SHA1cc3cc78221efbf7557d85201e7f062ea976b792f
SHA25680a035cbf2999fde92f581ae014c1f7841f8cf4ea60e8efebd1ef6bc605a6dab
SHA512355c6eb58200674c69907a8f625003fd3f8798c65e85701d13e4e1107dfcf93743efced49ab48e67002ae0cecafee12c4e9c91129f18b5d5a3d472f1395fd2a9
-
Filesize
1.8MB
MD51ac09e0c84f7537e65a8e5896d8acd66
SHA1cc3cc78221efbf7557d85201e7f062ea976b792f
SHA25680a035cbf2999fde92f581ae014c1f7841f8cf4ea60e8efebd1ef6bc605a6dab
SHA512355c6eb58200674c69907a8f625003fd3f8798c65e85701d13e4e1107dfcf93743efced49ab48e67002ae0cecafee12c4e9c91129f18b5d5a3d472f1395fd2a9
-
Filesize
1.5MB
MD5d22accb1a507373f111ed9d2104962d1
SHA121e19766a6880d6dc7702e14a6a84d35e188cdc8
SHA2561c0cde7c88d4dffe81d8109c18484b837f3a58aa3a998eadb45bbf5c413421cd
SHA512d64ad58efb1891c4a28a75b7219efd8429309b91a65b40dcb0897d774133984ffc3458ce1e2ef4c5bafc235266e18966bb8bc3ea4387bcc52f11d6820c65eabe
-
Filesize
1.4MB
MD5ae1d4dfcfdcbc07e7fa6b2883960ce2d
SHA1094690e62f54f47025047a94027bbd472b34cb22
SHA256bd489f84fda34218d4285a5869b7f011aaf12bdc54a172220a6f494bc729fc65
SHA5127b669e987ef841a3939978ff66de1b15973bc7390fefcd22e5c79f5f9042ccdb7a209d131925dca139359637fb86ba877060dabfa9fd732b297f50106d362152
-
Filesize
1.8MB
MD585ccbddef7ff180ef62c2bdffeb14b02
SHA11ee72e7409e1dd4254e1d071504e22f8e373d8f5
SHA256f0c026108e0e9a036e1638a16629f6fec345e3a19b1216e1741e9d3a4a8e633e
SHA5122fcbcd70cbcc7b517129230a2a78eed3489c4f564805a135b09d63ae1dcb2741af28a9e024257b3b961e503477fdaed6d98e32a3c8fc1de039711e0400dbb829
-
Filesize
1.4MB
MD56e0dcdb0ef5cb48f3545dd1bc7978023
SHA14eebd02830f97c9576bc0b500e539502ded292aa
SHA25639b043338f2ff4e273fe085274dde1abbc9065d40485ada98377652324e9e844
SHA512a4e1c28c251569caa1367136f4f60d634e78ec42821a63f8e4be7d14caa741c76673fb4938c5b9d06250f1ba95fb600699c26c6ad3f8f66172a968d8ed97dc35
-
Filesize
1.7MB
MD5b60e55477b837a4bd634883b71dec0e7
SHA10a906e0b5d09fb29f934f3d67a4ab114eb8274bf
SHA256085c8a90e1f40b5a43e1b25158f3b4ae39480e4955db145b6d455dfbaad037df
SHA51217115aa0a35366e6d2e1a4562a8a2c8fd97b9caea5c2bb4cd357854bede2853f21bce7b71667923bf64fcf9857a11a37fb54d024a95dc72950885677c1e80d4a
-
Filesize
2.0MB
MD58fa2b359803eaf66f96888a75b0dc4ed
SHA1827056f3ff934ce532af693a9cf77b2e363d2732
SHA256f8018d757d8721897598ecf464d0d2701e3e16ad67ffcb45ab3825b09c375bf4
SHA512ce07de4ce2ac550bf08d08bb5c64aeab4d31198a942fdf74629cc45c6b427b539f71088b4ec826680c2f40b25024e0918ae7e9514d25f9e8e42161d92e4d8669
-
Filesize
1.5MB
MD5c77ec422163426cb6cfcfa9fdd33c9ee
SHA1606454f3d34a50df5cbcb1be8e64bcd05c52a608
SHA256ded9c89cd5066a71f9708c0712a7482561a75ab5d2939b973f8e5b1989e24f61
SHA51227ce2045838384a652e7f588f1a5d972b5db4f5e33521b8d42598a47796e7fb78b1c79a284427b29c7d3249877e9802cb545396b7ad0097ca56872ce3cbcb09b
-
Filesize
1.6MB
MD57ec42d825faaf06895bfa5932bf9c0f8
SHA1b7341ad559ab658cd4dd71ad2262822ebdc351ae
SHA256189a7511452e83e5fef42e8605f1c24dd74a2d67d3f7f48b7e706db484a68b8d
SHA512b4ac615b713377a15d276f9402836ac90ff14435f1f376d7d77cc6b13a171dd4173b81bfcd87ad7c44310e860d4c2e43959eac50508c35e5bf9ad77a0b1daef0
-
Filesize
1.4MB
MD5c31984aca1a7a8d26e15579d2a03eef7
SHA1472dd27b43c1317a2b42f5838bc00fd8ede6c7b7
SHA256b8ab7d9d69ce001ea2372ab2e9dfc4ef866291fc958c317c7e41dcab6664a6d6
SHA5121ecb05a8a09c607634a18b6c087f44be1f3e8db08432aea41d2aa4bcf31ebe40afe166149a24c6f63952747252f3449ce41fdf23ac347ca90a325b6ab38e536e
-
Filesize
1.3MB
MD5678b2a52f0f29c6b43bc2745dbc55cc8
SHA1fe8466f855078266099a12c1382adeb0cd066b21
SHA256dfdf8304e0c70722be4d8c9920624624f9d68c57cfce4c259888e5de131eb57d
SHA512165aa72ba83aa7bf20fc411e9250f0704cdbba36a09755503251dda3810b0df37d46d55dd00fa6e23665ecfb7627801ea5fc95862062145b5b39bccf93b0266c
-
Filesize
1.6MB
MD5f629664df39c02af472f01bcfb77d9ab
SHA16115c6e9d3baf53b9ddf3f5c6aa7f33c2e2a39ce
SHA256b977f3b51a57796507e226761574827882a36f5f3834e6072e20d22ba8888421
SHA5123895e3a4b4c8ffd77311f4dee02f6a1d52054222e6331a0e4ba025a3ff65bbb3e6079fb9230c7b39d4b0f3fb835b37a0a578652e8c4cf5c851671f43dd2a8a0d
-
Filesize
2.1MB
MD5f13d003d42bb0529580e8e014c90c19e
SHA10ee2ec64c365ca38982e1f93cb85483f1f05c4a1
SHA256f8e33863cfa68365c778d87d4a2cca832d27bbdff32e3087aa0ba5348fa57017
SHA512acf756e58610f9002b923838b25bcbda64410ca94d09a5102c2aa8d595013c5dce86e161fbb63eb5ed2d8c4fa3ed8705cfc02ba183e49ffb817d4c3a8f886afe