Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2024 17:32
Static task
static1
Behavioral task
behavioral1
Sample
3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe
Resource
win7-20231129-en
General
-
Target
3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe
-
Size
1.8MB
-
MD5
081eb50889093f0b10a83844e01560be
-
SHA1
4f34f297f81bc3b2ce80d8dcb1a2e734a2348588
-
SHA256
3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536
-
SHA512
dec5f0fa50a68727742679ea38ff355438c28f3847dd2829cc1b56a3246564f452f7e5c19ff570f78e842190fc35f3b6dc8a5020d339bb105291928e435c4c0f
-
SSDEEP
49152:Jx5SUW/cxUitIGLsF0nb+tJVYleAMz77+WA3B5LG83QtHHI/QW/e:JvbjVkjjCAzJYB5f3QhHMQW
Malware Config
Signatures
-
Executes dropped EXE 22 IoCs
pid Process 1200 alg.exe 4012 DiagnosticsHub.StandardCollector.Service.exe 3088 fxssvc.exe 3336 elevation_service.exe 3744 elevation_service.exe 2576 maintenanceservice.exe 2276 msdtc.exe 1916 OSE.EXE 4324 PerceptionSimulationService.exe 3524 perfhost.exe 232 locator.exe 3584 SensorDataService.exe 2372 snmptrap.exe 4740 spectrum.exe 4124 ssh-agent.exe 3900 TieringEngineService.exe 2176 AgentService.exe 1440 vds.exe 3224 vssvc.exe 4388 wbengine.exe 1384 WmiApSrv.exe 3708 SearchIndexer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 37 IoCs
description ioc Process File opened for modification C:\Windows\system32\SgrmBroker.exe alg.exe File opened for modification C:\Windows\system32\dllhost.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\System32\SensorDataService.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\SysWow64\perfhost.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\system32\SearchIndexer.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\system32\fxssvc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\System32\alg.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\System32\SensorDataService.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\system32\SgrmBroker.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\system32\vssvc.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\system32\dllhost.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\system32\msiexec.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\system32\SgrmBroker.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\5f18329366ec4f27.bin alg.exe File opened for modification C:\Windows\System32\msdtc.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\system32\AgentService.exe alg.exe File opened for modification C:\Windows\system32\AppVClient.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\AgentService.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\AppVClient.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\system32\TieringEngineService.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\System32\vds.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\system32\msiexec.exe alg.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\system32\locator.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\System32\snmptrap.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\system32\wbengine.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\system32\AgentService.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\system32\msiexec.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\fxssvc.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\system32\spectrum.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Google\Temp\GUM4EBC.tmp\goopdateres_pl.dll 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File created C:\Program Files (x86)\Google\Temp\GUM4EBC.tmp\goopdateres_is.dll 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\servertool.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUM4EBC.tmp\goopdateres_es-419.dll 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Temp\GUM4EBC.tmp\GoogleUpdateSetup.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUM4EBC.tmp\goopdateres_am.dll 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe DiagnosticsHub.StandardCollector.Service.exe File created C:\Program Files (x86)\Google\Temp\GUM4EBC.tmp\goopdateres_bn.dll 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File created C:\Program Files (x86)\Google\Temp\GUM4EBC.tmp\goopdateres_kn.dll 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe alg.exe File created C:\Program Files (x86)\Google\Temp\GUM4EBC.tmp\GoogleUpdateSetup.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_76234\java.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateOnDemand.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe DiagnosticsHub.StandardCollector.Service.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe DiagnosticsHub.StandardCollector.Service.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-127 = "OpenDocument Text" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@windows.storage.dll,-21824 = "Camera Roll" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-111 = "Microsoft Excel Macro-Enabled Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\ieframe.dll,-915 = "XHTML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-142 = "Microsoft OneNote Table Of Contents" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-176 = "Microsoft PowerPoint Macro-Enabled Presentation" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{80009818-F38F-4AF1-87B5-EADAB9433E58} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000b3fddbd94651da01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9939 = "ADTS Audio" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-116 = "Microsoft Excel Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9932 = "MP4 Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\ieframe.dll,-10046 = "Internet Shortcut" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{1E589E9D-8A8D-46D9-A2F9-E6D4F8161EE9} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000c26bc7d84651da01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-124 = "Microsoft Word Macro-Enabled Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\wshext.dll,-4804 = "JavaScript File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9912 = "Windows Media Audio file" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9925 = "MP3 Format Sound" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{97E467B4-98C6-4F19-9588-161B7773D6F6} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000002b713d94651da01 SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5383EF74-273B-4278-AB0C-CDAA9FD5369E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000bbde1ad94651da01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-107 = "Microsoft Excel Comma Separated Values File" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithList SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000059a8a3d84651da01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E46787A1-4629-4423-A693-BE1F003B2742} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000006b7b18d94651da01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-123 = "Microsoft Word Document" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{AEB16279-B750-48F1-8586-97956060175A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000008ebc97d84651da01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\mshta.exe,-6412 = "HTML Application" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-175 = "Microsoft PowerPoint Slide Show" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\ieframe.dll,-913 = "MHTML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-125 = "Microsoft Word Template" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{8082C5E6-4C27-48EC-A809-B8E1122E8F97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000000aaeecd94651da01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\notepad.exe,-469 = "Text Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\Windows.UI.Immersive.dll,-38304 = "Public Account Pictures" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia\ActiveMovie SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{01BE4CFB-129A-452B-A209-F9D40B3B84A5} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000011b8f4d84651da01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-115 = "Microsoft Excel 97-2003 Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\ieframe.dll,-12385 = "Favorites Bar" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-120 = "Microsoft Word 97 - 2003 Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9907 = "MIDI Sequence" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\ieframe.dll,-24585 = "Cascading Style Sheet Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-177 = "Microsoft PowerPoint Macro-Enabled Slide Show" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-172 = "Microsoft PowerPoint 97-2003 Slide Show" SearchProtocolHost.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 4012 DiagnosticsHub.StandardCollector.Service.exe 4012 DiagnosticsHub.StandardCollector.Service.exe 4012 DiagnosticsHub.StandardCollector.Service.exe 4012 DiagnosticsHub.StandardCollector.Service.exe 4012 DiagnosticsHub.StandardCollector.Service.exe 4012 DiagnosticsHub.StandardCollector.Service.exe 4012 DiagnosticsHub.StandardCollector.Service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4904 3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe Token: SeAuditPrivilege 3088 fxssvc.exe Token: SeRestorePrivilege 3900 TieringEngineService.exe Token: SeManageVolumePrivilege 3900 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 2176 AgentService.exe Token: SeBackupPrivilege 3224 vssvc.exe Token: SeRestorePrivilege 3224 vssvc.exe Token: SeAuditPrivilege 3224 vssvc.exe Token: SeBackupPrivilege 4388 wbengine.exe Token: SeRestorePrivilege 4388 wbengine.exe Token: SeSecurityPrivilege 4388 wbengine.exe Token: 33 3708 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 3708 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3708 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3708 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3708 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3708 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3708 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3708 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3708 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3708 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3708 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3708 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3708 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3708 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3708 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3708 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3708 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3708 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3708 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3708 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3708 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3708 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3708 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3708 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3708 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3708 SearchIndexer.exe Token: SeDebugPrivilege 1200 alg.exe Token: SeDebugPrivilege 1200 alg.exe Token: SeDebugPrivilege 1200 alg.exe Token: SeDebugPrivilege 4012 DiagnosticsHub.StandardCollector.Service.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3708 wrote to memory of 1792 3708 SearchIndexer.exe 115 PID 3708 wrote to memory of 1792 3708 SearchIndexer.exe 115 PID 3708 wrote to memory of 1636 3708 SearchIndexer.exe 116 PID 3708 wrote to memory of 1636 3708 SearchIndexer.exe 116 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe"C:\Users\Admin\AppData\Local\Temp\3134e4e72112e321b2f42db3808315436b04653126118a8754ec44e72696b536.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4904
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1200
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:4180
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3336
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3744
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:2576
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:1916
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:4324
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:3524
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:232
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2276
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:1384
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
PID:1792
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 8962⤵
- Modifies data under HKEY_USERS
PID:1636
-
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:1440
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3900
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:4124
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:4760
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4740
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:2372
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:3584
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3088
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5afbd5c31962499ea6836fc8e202743f6
SHA1b86f64cf78cd390db6afd82da082db1ab0d999ee
SHA256c3edc7a7bc2ff823b9867bf28d96305069c9faa50ea32cbef864937b188889c3
SHA512f845ddcd8a2e4fdc9327e76e33a76522d4bc5b3f3281543681fca3748cfbe8839911fa914473d8a6f8c543312bccc9bb1da4a9d199ce94399c160311651ed8e3
-
Filesize
57KB
MD5ce378b57f2d47ea5c23667aeb5d97770
SHA16dbc75186f0efc5a54c28d70edf694f5b310f786
SHA2566196c2a081eee4a515abd9e84a21dd59d9e874a354b9b937c00cb10d4bb5b834
SHA5126be2a05c1a77071ea92379a4e5030e1f5c98a09c048f3c8c78989028d61dfb7fd373329104b93720b265f4caa653f06065d8e70dd7598700347d389c542f3eb3
-
Filesize
239KB
MD55905197def568b1bfa3f97ab4ceea77e
SHA1fafc10f2d045480231b174ac419d5883c017ce7a
SHA2565fc9d95fc8b09ecf0da1932f4334d725aaf494315ce3c1b0b8e3860230e22dc6
SHA51253ea4ac642d1c7f4691e83611adf4093c5b774c47d6185de0591abb0a44476024cf7d5c39d496f81e3a54675cf3915337f1ad80e61f0d54d2c0158fe8453936a
-
Filesize
207KB
MD5b045823ac39ef0eb7e53c064927830a8
SHA18af2b15bb59b717a83f675c8d81f5245d35d689a
SHA2567236ff8cb04e8c18f0b720b8daba3ab70d6de41c61943af2a1c7ce920c9b4d43
SHA51225d3c9a0fd6428620a7f84536528479205355bcae2379f2f67c1c86a3b43c6a2a282065fa4dfe7075349f85e583b73b1ac74d58b157ca3b1a6bd4fac3b50b56e
-
Filesize
335KB
MD5afe0d77f27e3c389164e3be377532849
SHA10b96fc3b3e28d490e076d96a3c2249f078792cee
SHA2561b695649ccf2e032a75e59407440414d4c9add672f0b9cad2b934a139acac4cd
SHA512b38907a4c10ffc14487953c162521c05e077fd95f242d05078b8d3bcc2dd72853979cd36cc534d8264fcda6ebbd0d55bcf2a07219d81b83539d7286580df4aaa
-
Filesize
303KB
MD503698cda248d0e8912c59e5c70aab896
SHA19d928c7b37c9826be4b2d3929e259d44789aaca6
SHA2565f369a2374bb598dc1d000f4b580bd7626e7a5076713600d500e7c322235c184
SHA5121aae35587217239c1fe9787fa9c09b43d63ce23365df9b0dbbfeaa228db0678bc493644b7846c32fc571b5d7450c5387a0b144fca7de317592c61f1b97becf02
-
Filesize
150KB
MD54a3b3d11289bc0bf0e0e9bfe50239293
SHA13c1d8d2bcaa9d5325ab5044949a62007531a6f61
SHA256134fdde4a4eb5818744576347838327e049de565a7c6b3f062e2d54481a5f7c5
SHA512c162f8b04be6eb5cdd17b9eda8cff6094c38d33872d523ab620222d13a763db3aeada5cf569200b5664fea85109501c65c8647154a06df8ff35440511d387814
-
Filesize
9KB
MD589b2e58fd4bd634de382ef53f9ee567c
SHA1ad05ce306f6af6e679c9b0f7a81bc5525e01d671
SHA2565a02cec9908f039aabe67edb2bac525334be20ca6f802b1b642ed6a6cbc44e45
SHA512b330b0591ed8779fc02cbf68ed4c92127f1fa4b7cdeb296688fa9feae3fb247f475ed3c2548e69cb9092bf6fd30906b0dd88cc95376fd4a7c2d2dd86fa536a32
-
Filesize
92KB
MD5f8edab9f28e5883127e0c1155df1aa5d
SHA1756e2dab716a939c79c632cc0f370e760e3fe7a2
SHA256bc9e2fe881a771955518424c83849c37af860c66e7a6dde84d663b72321500c0
SHA512bc6f755f71dd21b8f75b80ade5d17cd93e1d57f9e5bfbbbe26507cb9f8bcdc898be256a8f0ae1583d9fdb7964077ead0d51ab5b971f1cadc1fc3b29f873a7911
-
Filesize
82KB
MD54c16384548e5b9a4dcfe02c2bda0c333
SHA11ca9605d958ccadb17aa618f2ccc871b8dd629df
SHA256e4d32f61f5a186d737527867d0d8401ba9c3530f694e57e9a3b5a6b41a4964eb
SHA51291b259fa70c1d217ed3ef842bb2cb32c75dad1d4e0edfd4eab5c6639b128fae51f3f8e965e63dfbde14bc4abb2ea5e25a89dfd958e380778374a51963ca4dbd4
-
Filesize
79KB
MD563a0a050fb2f586c0e31af6359cdcb2a
SHA180b48d2054fc43cc7da66970c1bdf810c2aa74e1
SHA2560d54d508a75936ff6e04d7a5a99ed26c52bfdbda50592310e989e68954072501
SHA512a36fcccf4c070698c1e9351a3f006e59648b65989fcab03aa947b5466c52b73bfae9e4bf1d0be5f36a0563c3f8c4d0d167056b3e0323de53f556b13b0a9203cf
-
Filesize
40KB
MD5a7f265b9d536ad14105c8da1d5ff909b
SHA1678aaffcb114a37c0b7a812ed5dcea918e753252
SHA256f7d32fc780060e69b13653c38dab92368a14ff2d41d83e838b682e0c979aae7a
SHA5127fa2708f10e85489ef13de361e02c5bb8fadf8281f8010147473eed6ce308da8d0c4644759b6c258bef64e1517e48a0f6f758c2c21d499208ab912496cdc4bd9
-
Filesize
37KB
MD5de2a19c201ce7dd2bf08c6ddcd2cff73
SHA1b280375550f4c3cea578d2837a580385f6015d4d
SHA25615ffaba3d15b8af0761ab629de10142323b02849cbb6337484b08ef157c4a7b0
SHA5129df6b658fc197742d3b0882c61f496aa81862a8d0bf534f92fd52b5e244ceea1985178e784518a63cd98d86bcbd41708a730cd864c67e1ce8392ea1445b1aa9e
-
Filesize
141KB
MD5812e2dfc5a088ac8c139f219a218604b
SHA17fff08c5a3b8da80c37d962d68aa687759ca32e8
SHA256bd9272b56c24e445f079991c401a868ec2549521740f0862a73cf5aa07f5575e
SHA512541abc891d2f20b0fa9e05671a8b2a55bd76329fdfb9e0ddc845701a56b3180d5b09d5c864939c869379331ec1a616c63dc7224cae523282a57157ce255a03c9
-
Filesize
1KB
MD58763cde32c5137d644e3e276f5020fef
SHA1dd339ff158eef11a446ec16cf9747626b9ceea32
SHA256395d9d34de0482d6b68ceb2a55a684c29598c970bd38504c66fd8c141874d4fb
SHA512920b0786c165649574ac2f8087e1393488ff77d0dcae6152b0a923a20e4a82dcc4c636e3e0601ad42c6c7530836b9625604d0c61f56309f6f90fd374d4002a06
-
Filesize
73KB
MD569abbdbf9d88a7aca56fa06601891f49
SHA19a2719dc8f6dcff6e275b70d0dd9196a8b3c7fa3
SHA2563e53d65cce62548a1143395be2fdc46b829411276d6043e46534a55f2a4fa80a
SHA512e82ee831c90013b8059e958b43980769d6a8f1d352945d9b19e707cd35f4308871f6b9b6b4c9745085f32552887f5f5677f94a6132c281ce2f84a84a750c58d8
-
Filesize
22KB
MD548575bc2bd83e7d5d18729f003d9a7d4
SHA1562738aecab1babe56f5e5f720f37189e80f8e9a
SHA2569044cb1ba52b48f27febd6f5546ab692395470031d0cbcf29d90d486b8ad9fa3
SHA5127c7945e3b19069129d2d3a6d8119751872ad645b769999c5eea08971c5a3cfc4cdd5568df5413868fe88ed8c692d7805ff2c01ab4eadd297b5200ce08633ef99
-
Filesize
80KB
MD55ef69e511fb6c58dc409f9e7acb5a14b
SHA163f55433d69d07e9ca20caf576e9f8ab92511c6b
SHA2565242d96c46befc88c10d025e7290dc7db3ec6a0a2badc8410b85e4f60be5e0f7
SHA512e12c98197eb711360eba5a5bef8c0ac88c95e635606a731a38371f4a1def839fc06c1cbba0da7d1e6bc8ec60ef5f0e3c4dd8a2841087a56fd0221ca873ab3d73
-
Filesize
57KB
MD5865d655b1b2c7de4f1e37efed8ab8475
SHA1b4c2a50f912c9ec6a841e152edf15ac5e14dcfb2
SHA2562e480ec6cc179ca7452be2e298762b025d1da269ca8d10e1c6a5c03a967cf9b8
SHA512aa73b23babb401feff4cbd2967703adc5b4cede8ae8b4b47f725e2a1d6dd9617dfa193324e60af96401d4859dee322a6551ae1a35b3006d3ae857fc9c32edb07
-
Filesize
96KB
MD521594f27b6adff7ae5402605dc75cdd3
SHA12931cd98b5ee55d8540aed864d764127807404cd
SHA256009a85f6e006175b9fc7f0a27cfb3dbab2cdb32844add0730294ff069b0e0244
SHA512ccfdf19ef46b06d48b518a09bc8bfb6e55653ef1a9d1abda6aba50ffe5c28d8458f9fb92f6632918fabdd10549a124d06048900cabe87a2527f5b662ad8d47d4
-
Filesize
41KB
MD5860e40ef8537a296979ddadbe7a68a0d
SHA1b47da41f7ad30fc59f3fb44da556321f85bd20de
SHA25668a2ee2767c5cad8e8711649d1fb7e0af01429326b938017006873a55d35b8cf
SHA5125c77e641d58f26a11e60cc1ccb93dc7737b9e99d45a18b0540c89ca55f24b1a33114bc0e1fd9440dee3fb093c7252e6917282bcef00634e2894f2cbc54709a9e
-
Filesize
81KB
MD5acedc1524b7c9f8f65e6c1a8e102e505
SHA17c601b0c69cbd15ed349f3aa3bfde7d272fc8efa
SHA25654e6cb09f3284a632a94a0364467c0b7951dd5927447d1c8f7a04f5408cae5e5
SHA5124b34acf38f6b65ac4d5eee4309e8799acadde46ad0f6dec09e2d2ec61941d9da570d91ac6dc758e607c39104654ae5f7f27e4c90cad09030160b389111bd65d9
-
Filesize
54KB
MD56b5f001b559faed851ef8e07225f10b8
SHA1fd60b35826dea74a9e8e432d53973593a9a9e79b
SHA2564ebcab23984f61311401edb1d11b8d88fac6cd2b3515d980c3e188632d4917a1
SHA512a36d675e4c9e9feefc223f4956d906b38d27182e8b3622d6ba7420740e4afe3cb0f7973d69fc74e2638644b2b17b510ebcc7dc3b4d275053a4624301298d17d9
-
Filesize
132KB
MD58b55d981f86d0959737909c2e0ea8183
SHA1d44c7a3659085cdabd38c6a62f818e1d7ac67a0f
SHA256050ef55f43a2c68040cb788948304abe7ca77d47632ceb2fa3b41c0f1ef20e29
SHA5124023e82f2198c2512e1201500a9480a2d28a0f54768afec5c08bc2a79016084e30964f20970cb685220168c592ce033675b6eee94314d32b13d798df14667d69
-
Filesize
110KB
MD57d177dc139a0b768e783aba1ba026edb
SHA134f2fbb30776faa381639138a5d1cfa06b28cfa2
SHA256fd821650eac15476e18214e3a264d9a7326515a35d99164f47c000af74268a8b
SHA5128addbec972d0102c4c59655434ef47de43f506103b9ac20d878451d51846d9b621a841fda88b7c5b1c4a5d219903dc3bf40035c7053a897c8553ec694250afcc
-
Filesize
59KB
MD5ee59a1d84bed63f1b172e157b553078a
SHA10be59cef2564db5a8e3858014f57d3fc718f84f2
SHA256ca8f5dba600af71d36bbcbc799b86acd356aff06464478ecdc2d613e8c38bbf9
SHA512854d64544ef99803d8cb452020d72681dbf862429efc3bf35bc922108aa2e974262ba0ad1ef658a760910906a74a0faccc348b3a10e667755e0f154dc54ad289
-
Filesize
139KB
MD5dd4720ccb3ae8a1348dca1715fff7c37
SHA1859bc70a4cf2fbb41356ff86dabb9366b007edfc
SHA256c9d6bc72e5a3cc25e4c19038cb85333ca3a790ebfa1847e6a7f38be051168acc
SHA512726e0d829abdcd329bc067ce1de6b9bf475d2afbd2131f3aa06296ad54213677c948db3345c969b9900dfa6eda3841d1baa3b6a619e75304a70078d24297b813
-
Filesize
50KB
MD55b328a0c792c2d3dfa79be06e177d37b
SHA1c4db01a855329634cc1a6657e8ee4137d44a81fb
SHA256571f75caea5520451aa5201d182d4472fbaec3599e162713ec608387a0c89f7c
SHA512cc2925e309a464e7c60fbe368c47c53e24c286d2a4626bd39da7452562fea758240cf5c69e9deb1a9578d97d14ba59ada182f8d0a8ec27fbb0b9f4ac82457201
-
Filesize
112KB
MD554d213731a19e51194a31cd82101113b
SHA159003bace2b2ed260420becf50a4f713b29a4596
SHA256d6a243eb956a0ff72999d2ad70119a11450c053c2657f58c3fa284f0da7fc4b7
SHA51231b904ab1dfdab8c5f35294f736cbb7c89e6d2a9179328200dece309db09cb6449d5fb3136bf8a926b06671a0f751e73520171bc98c883137bd0265305068aec
-
Filesize
92KB
MD53991f1d5a8e89a4b5114feac5eae8726
SHA1f33a6fb5eaff3d558b3f4a5fa821ff8e51e58b29
SHA2569dfa67358daf8391c8ba49bfdff9af3018148aeefab54cf0dff47fb1f2f4c8e2
SHA512e88f57ad425c4f891773293bf646667caa404d769790cc743bed22486d94e8e8a23b4e60e19d429fa6171cb105d5eb9fe84731098b61515c7791b7afb2aa1930
-
Filesize
30KB
MD5b5e7fad9c628be384f79ea929923f29a
SHA16af60636509dad4eebeb8d2aa45309e7cfa250c8
SHA2564e7537b731d5897129bffd0966b0101d03a43a7557b3894c62fe0483ba04362e
SHA5125d780ed851b4d889c03072574b81e2e46d51968f3c667760e615922165f52a8ca64a008fab68a0e281c20cfb85c66a21d90490dd1b970026c402df5bc302e0fa
-
Filesize
196KB
MD5844a33e072c20870e261cbb3742b0870
SHA14cab399c07c363e741c7b15582d4ae0d393a9649
SHA256083b58875df3e688804250775dd654ff5669c2e7daa9afdcdbe4436d4374893d
SHA512b0761a50fc634744c790cfeb0f4932d8396cf23742c9f963e1b32a6007b1e357f7378746e672874667cb2fe5718999cc835bde8f050c05eb4e9db148e2a578fd
-
Filesize
69KB
MD5d4a18c3ac8760fc6296fcb35fff81cbc
SHA1bc21f22dfaba04171af092fe6ae76114546aa6c5
SHA256131e597df6ea7d021ddf25bbe36ec4f94b18e2e6ed0ad1e68ff28572f81289d6
SHA5122d76844efa385e7a9db59342ecb1b4c57bc20bbe83f9df7f8d069a8f094bc4d6134a0ff00556dca3aaebfebe6ab2b7933f5daffa2345ca31f93ec57df872d434
-
Filesize
88KB
MD533a854940b3b2f75cec0611846652ee0
SHA1b9e565d34629d1bd1ff1f8f2dcbabcf88ab51620
SHA256427d63aeab4c226383d4644b03ff9e88ce95ffae0a1a83739a3b68f67016524b
SHA512c95f4417e6b5e946fca4fd99da73551ea93d73daa807bdefc94ae9e9ea6bc8a77a9caeb3ce5f826295a3dbc70af3bca4c76d1991beed54028d77ecc5b7c82e57
-
Filesize
83KB
MD50a537dd133173116adc35ef7d1eba615
SHA11b71f28df4903114414158ab7b22b50b80f4939d
SHA256437515cb0fb3788f3cdcc40bdd6b03f31e4d1099e52dc7e921fa9e21b9422d85
SHA512e0905c3c6c9ce6f061d3ec63e8859a51e2dffc008c53ab163f8ceaf8104f0f942b3fc34370edae67bdc1a17ee8d5365199dcb15011e58fd9e0323f74e18a3764
-
Filesize
57KB
MD58d6448e804bc51d7405c160a1e526b39
SHA1b43213a01d7a253015d63e805b73d016e28e6352
SHA25676f1646ab0116cd76b03eca7ea34773b1e3a6fbc0a20e44ac6d1e2104e471285
SHA5123e2863f03c6b390b4225aea95667b25617b5160c1fc0fd6f6958b49aec88f1449801cafe58c580a5a5165898c8ff9a64d071269daea41279588fa7e7587c4078
-
Filesize
65KB
MD52831f86de672fca0c8a332807603180b
SHA17032b5fba03196418a758dfb994116562f1e627f
SHA2568fe7ced5a82e09268b971d93cb7108fbae6efa4b981eb54dace6ae713e20cf3a
SHA512d8f938f4b63b6c582de23aff74a445384e0c9c8408eec4edbad3ddb10f33a625aa5111b172fd65c8d43c8301a58cf3ff563ea20f3ca754f509439071ab3c5568
-
Filesize
193KB
MD5434d30b480c33ccd6f721ca5448bd029
SHA165613854cc75b9ca1f3309bf3b7e38f6a1a16267
SHA25693db8ba6e562af5365fc041dd5860cbf1145fe46131c2e8d116969689a74f28d
SHA512ae424b54b9fa6692d9dcd7d56cad4ce2026f8efec50d315e9355d854909e2f38b9b829b76abe4ee4ed8f6713a649fd284c458f9278262459ffbb2364ba28d839
-
Filesize
154KB
MD57c7311ec0443fe9c2e399bae134665c2
SHA125f62be3448b8f378d9f0d930f1090c441b9fc6a
SHA25698234d0c4b7a99c8bd09dd243bacfdcb0c58edba6bc5600fb885b27af29b53cd
SHA512a07176f18b5410eb2184046fe1cbdffc24bdef42e441b980e0fed706f5718697d28b38b203fc946a2b073670cddb772f2d6059e41f77460c0f08b2939b2a789b
-
Filesize
33KB
MD5a72656cf8fc43f2636dcb5f7970796db
SHA16a0a32ae55dc6717c6b5943546d52f5aecfaaf84
SHA256beff91ecf84d7f413d12258525dde40ae3d15c45c2a702fbc7afdcaa34e8bbc3
SHA512e95cddda5380b3625032fddb04fa1f04f3e0170b41db31d9b04cb51e11c1355b8d198389946e7e74d0ea559b1bb61599c78f9da480df21aa7317b9d454df48e8
-
Filesize
206KB
MD52aa49da504b685a522f7d9a34d6076fb
SHA1d9e244fdbf2c11bccd0a16f2d7c42aadbb1bcc82
SHA256cb792451a8e81c52cf327c90c0c3762559ee61712fe47964042a0618abf9e0ed
SHA5122320d7519c2db3825df0b2749e9a7d4f6150a9e711dfb3a17e41c549feb713ccbac936ea26077421069369420c2393dc2dc4a6fc618015d7958a703b4ca4af18
-
Filesize
326KB
MD5c4c5b45a3f0fbc84e8c9438bcfaf8918
SHA1d014b25cfe0ea3dfd900e68b8c663c8b45ccae6b
SHA25660f6a22e2b8bd21f1068f2a8dd0a9547c0a09306ff2b6fd1c5502d6b53346ac5
SHA512ec32a1a2ae5503191b7adc5643ec3a9e554ac0218de9eba483f5415b03cd08e33b319657992837003c5fa1fc560540c898f270a226f171d37be29c9c2ce47cbc
-
Filesize
627KB
MD51f591835f5ca77b8e9dccad8074908a1
SHA13e7da5ce8a948c7bfe1d0ba4d4a26c6118280457
SHA256fbf4263f6f54b7d497459e62536c5640427c58ac643523ecc8beaf013ad395d6
SHA5123513e067e5b9c05419d8d801ec7faa09babec1dcdfe771b6e2f64e78b992238b791124228fef17614ea66c8893880e7d450e4b5e0145648e38781c143be90671
-
Filesize
1KB
MD5483a5f9b44d554e4d86d1ec941a7fd64
SHA1e32cfaa0770d73da420fa362acb2016623a1fcc4
SHA25688c8ed4c0ee80b4d3419bbf6640017d0d29ae8ce3a30c2c6a4c5536cdc098750
SHA512a1817ad2306183165d5635e347973497a0776a4b1683b83a154191e5ec3808c47cbcfbbffe7cbc4cb41e9530f247de4df2706eb2a812cb2c40e76394b8b9def5
-
Filesize
372KB
MD5222c74c178b81565381a754d001be00a
SHA199d6e12f0a8fed1a880b6b7a642665d974faaccf
SHA256a22a91699e6ce12587a6eae06cf91809874f5d8605eaa7ed4a9a7b908b95e338
SHA51234f42bb149269f567190c7091a1d949cc1dbe7df76fa702bdcc345363c58b04ef1ef6ab53cad91e1cb26b18fdcfbad105eaf7c155f3e6c22f759ff6857f83875
-
Filesize
57KB
MD5eab52fa0937ea576e5f6016965a4284d
SHA1bdb08ff71cf8d9a460aec1554179e870e479c57b
SHA256fe54c812667205344daa462859f6e1abc3b794c760438519200b3315a5bda25f
SHA5128ad6227e1a8050115460d201e570af438b2ad7189009c895e72a69c849b539cc250c80ba6ab0644a8ea7af1baec7bd8ffbf468396251ebb9a6e7aff0d5d738cf
-
Filesize
149KB
MD5b2d51070e2741950ddb4c9dfe2f4077e
SHA1b9d42a2a03bab208fa3ade4fb59150e69553d096
SHA2565d3c7ff6757d9f73f80d98a755233a4ec1f12c810096796893909df795032446
SHA51274f012f4c50a69b012380271cd2dc62bc94d33668624ad3d50fdf298c46cc721f96add79ad146204efa62dd54c7a04f1db240dd713b26b0cb8af789de8ee74e8
-
Filesize
118KB
MD55283cb255f08b9a8ee16f74378690c65
SHA1ceb6e1df441575c27d7b34d95d1daecfc45b5555
SHA2569ca1004f585959246df4e06ec11a1e8043cd22a128f9a7b4f086b2bf3e950dcf
SHA512dfdec8f61f1ca890efef0a3256ba732bc8b6d455afb14ed5bd60bb51dcfd3fe4fc9224a027f12f3abe7538253e36ead35417889c152d550942b2baa27576ed82
-
Filesize
45KB
MD552496850fe51719a37d21a1e34082d53
SHA1215c96428a30aa60fef5ad7233e6fa3dc35ab18b
SHA256c372f88b4555f614383f4fbec7bd6a8ed71994a0e4f50f54fc0435066f39b998
SHA51258cca5e8f41b93a207015ee3fd2f676329bec15e5154c6854b9742d3f4a8180441037ea18c031a66973058f2566650cf4263aee98c888ff31c56974fc96f6488
-
Filesize
310KB
MD5b86d3d5d7024cecf677f7d31bbd5d030
SHA13be9ba30d060bf13dd56558a340bd0f12473761d
SHA256c098940bc3df9bc435412072bef648dde873951b952946d05eadc6058b8cd9b8
SHA51244303e019ec2a4057e6223807eaaf911df86cc982d5e4eed63a6287b7b96877c8e5356bfa1e07c8d899e75b674a5053bac9213fd5cbe5748c4ee7f873c4ec2e7
-
Filesize
236KB
MD56c2acb5eb8d3aea068af07a321384883
SHA136a995a55a8e16aeaa1e338b692f6d11819c1f55
SHA256179afe02129e03e918e9f3a4c10b24aec4cb8e13ba566ad51e8bf7ced3b97c94
SHA512ee2e7cd00c02e8c1fb2b01b2ab4bc4f4484eb052b7e0bb1fd73143ca76d76b85a171dfb54da9900811b17d662a6a8332b9caec157506329bcf86b9b93c18af55
-
Filesize
131KB
MD55efc8752ab191577b8daf2a677ea5ae1
SHA157ff64d8660575d43c191a186bf219e578f19b59
SHA2563f90e41c274f8ddfbcf3731aec175126cd5bd473cdf6b4bbbbc509f0f4fa5844
SHA512817758407d1fc0f3dd1df24343aceb795e2e2233cf0c343b209be244a1a76b369706413b7eb9a06aaf0fcbb9513cfc4f99731ac9534b18179b0d67725d805730
-
Filesize
954KB
MD528ae144f3d7efc5f3784a5a6edc8e118
SHA12eb283b581a3e680263677677efd1cef0471425b
SHA2562a6f6f9c8ddf06e7050e9ce850132d85bca9dfadb2689c863b72ffe1c43c8314
SHA5126e1947d299a234349e8fae19bf3b0b318b16895e9641a3d0deab16fb6ae68382922383331a8aa0ffc32a2e9ed0b33b5e356294bad8ac00bab7e27df2832e59a0
-
Filesize
300KB
MD58e056a60232d82a7e287760b98a66074
SHA1986c9f71e3483575ca7794ff992fde83cad5955d
SHA25636f29bd02fe07a943e1903d096e933e5456a127c96e26f98a6b416a4c132a77f
SHA51231a3d2c3b4eace1edbfeb476c7c1ffa818c377e9a281d939835a33627735a93a2d6f17da4753af1721805a10a1e19525e6184e86f294d8c74b578d6017f98175
-
Filesize
69KB
MD55dcd6adbf13d2e94f373ad0eeb8e98cb
SHA12fc31bd9479e7d6ed59f25753802c0d4eebd4d72
SHA256a620ce6f0636a22232f94b5f393381d357375e031a9347a7992dbd28487ea6d1
SHA512b1ec3cb965ab4075312681773c6590d4c6a12f5d36a29000c0b51aa95159f837490cd24d0c74d4d116a8e8beb5e4cfa31aa41f1864783302f1a47dd74e8adb7d
-
Filesize
128KB
MD506add06bcbd8e7af1ac527cf5feaddba
SHA15f43a2387c74cd5bab471b53c48066c80913a24f
SHA256b8522c19b5f8e0c70006be395e7d28061d80ed3dc40626569f19881aacf61264
SHA5123333d763dd621968b76c2752b3863de2695b4f4c0fb07a5d2f2a9bca9c7b3c70908947439bb10cd2fee45d72559aa000af728523f3d2803e0266beb2ee592546
-
Filesize
83KB
MD54cbefd48fea159bbcad069f0efa4ee4b
SHA1d8d3a92e00053219dd3410efd003c58099870c8e
SHA256a2ab367e87cd7831f682f591f50a8923d3c5e3849c00bd337f97244ea4758ca6
SHA5124564210fa803f00f3927fd9b114b6b91cd6967fe965e3676cc5bc94349dbc27a2aa394e9c36ecf0e52f19d53467dd90bef2b42a6da59d709f62b57b0bb7ec780
-
Filesize
190KB
MD5f3cc9fcd5c09f13c2a52b7b13ea33309
SHA1a1692a3dda48cf681ed327ebca8b6e14152939fb
SHA256da3e27eb7168ba33f51f274d9d82c6e089cb961143132f2930591a131f744bb9
SHA512e3d109aa21587db57be3b12f4b1c76762d8a6c9191c25ac56e88ae302cb46bddb651b5082e43ab53a7dca0b888a94e98ecde54bdc0ea130b42a97a7e2270dc20
-
Filesize
277KB
MD565b65834433f1b69582b5653c6504736
SHA124e23852a8f82d7dbbb55d16413a4201cf80da7b
SHA25628b86b4eb8687dbef972a0a7fb47ca1bdc7a973b542b1bfbaceeedbcfdcdaa98
SHA5123d3b6e9db5fcedc9fe29c2501659b35c17cc49064417b4f2a9945a89a5d0f145c27703e82dee1a97a434b629a978a347417b0e9de991efb5fcb5f616c06e6a64
-
Filesize
190KB
MD51c4f3bf8305ef35c0744384dc73284d7
SHA12f2a69ddd5e1accc5cbf6a04585774c76e61ad28
SHA2563f1c0b8fdd464b89cead5ad91ac4534e61ee13c3bfffd6f4fc25c643cca616f1
SHA512ccf790b7423eb681ed31429ee199e8c2efc4241c73c75027949699d20b2fe3cd8749c186eb17776e304df56cb86d7d5f0942f6822ccc226b019c6480489ce455
-
Filesize
351KB
MD539b773bcc0ce8cf1458db913646c78f8
SHA161c2e2f1f88dae2d4dfd41bbf668a65ef73342ff
SHA25629ae33610e8a43165ba6e33b10958a01d807f8971240be30a02d003b79ff85ba
SHA51235dd5db7a7e551957ccea82568339c1d172ccfd382282643885b5046eef35aaf935468466227f3b4a438512f6fa90a6576b8f9f7df93edd413ea45758afd4722
-
Filesize
399KB
MD5d252d851bef0591ffbef57de140339b8
SHA166af57407bb233d350082df58d8e08157b758550
SHA256a7cd2a5b5798be1c24fcd42aae0fe5524489960de79a4fa5a5b10b516c004d3a
SHA5124c75c5630398cede0a037bc31d0b779efe017b62fcdfa45a5d013eb2865fd81a1fd0aebb58814992ca3610b5489ffc8d96329678c4cf6661093672ccc40fb71d
-
Filesize
389KB
MD5e8448390f4aff8ef663d2f8ead239a63
SHA1b588f96d70f9a7396ed1184996b62c138b60ecb1
SHA2564c1ecf9b526cf3cb5a83880897aa6851d32efe26fbfb318f435e948fef140855
SHA512e3a102a02029b18d12869e7ab00ba83dd6bbda3851894e1109374d1298b27da97158fefded0273efd31009241837a1abb97b42661d29e9bcd5a6bc318db60c87