Analysis
-
max time kernel
105s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/04/2024, 02:05
Static task
static1
Behavioral task
behavioral1
Sample
b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe
Resource
win7-20240221-en
General
-
Target
b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe
-
Size
6.0MB
-
MD5
743a564f3aeb37a7605ffeba899aed6d
-
SHA1
4d913181401478446388ea98f0182aa13d634ed3
-
SHA256
b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8
-
SHA512
6e291ae29e29d66036c848f32594ecd6277942ed9ff3119c611b541c1b20b14cc7fcf3e445e73e8f200871d2046de9ce57140185a5475aa5bab19eb8eebe5a7e
-
SSDEEP
196608:57wqheSVYK/bua/BlWWnuVhsus8nm+q4yHBVH:58qgSmIbr/Asb8nmFVH
Malware Config
Signatures
-
Executes dropped EXE 43 IoCs
pid Process 468 Process not Found 1720 alg.exe 2412 aspnet_state.exe 2364 Setup.exe 568 mscorsvw.exe 1452 mscorsvw.exe 1592 mscorsvw.exe 2440 mscorsvw.exe 840 ehRecvr.exe 2880 ehsched.exe 816 elevation_service.exe 1632 IEEtwCollector.exe 2576 GROOVE.EXE 2088 maintenanceservice.exe 2000 msdtc.exe 1316 msiexec.exe 1612 OSE.EXE 1652 OSPPSVC.EXE 2296 perfhost.exe 2732 locator.exe 2016 snmptrap.exe 2396 mscorsvw.exe 2344 vds.exe 1112 vssvc.exe 2748 wbengine.exe 2996 mscorsvw.exe 800 WmiApSrv.exe 952 mscorsvw.exe 2592 wmpnetwk.exe 1948 SearchIndexer.exe 2568 mscorsvw.exe 2768 mscorsvw.exe 2872 mscorsvw.exe 2192 mscorsvw.exe 1744 mscorsvw.exe 1128 mscorsvw.exe 2560 mscorsvw.exe 2324 mscorsvw.exe 2356 mscorsvw.exe 1704 mscorsvw.exe 1716 mscorsvw.exe 1636 mscorsvw.exe 1284 dllhost.exe -
Loads dropped DLL 20 IoCs
pid Process 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 468 Process not Found 2364 Setup.exe 2364 Setup.exe 2364 Setup.exe 468 Process not Found 2364 Setup.exe 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 1316 msiexec.exe 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 468 Process not Found 756 Process not Found 468 Process not Found -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 21 IoCs
description ioc Process File opened for modification C:\Windows\System32\vds.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Windows\system32\vssvc.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Windows\system32\wbengine.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Windows\system32\IEEtwCollector.exe alg.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\3099e6deae4ef42b.bin alg.exe File opened for modification C:\Windows\system32\fxssvc.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Windows\system32\IEEtwCollector.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\System32\snmptrap.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Windows\system32\SearchIndexer.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Windows\System32\alg.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Windows\system32\dllhost.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Windows\System32\msdtc.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Windows\system32\locator.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat SearchProtocolHost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat GROOVE.EXE File opened for modification C:\Windows\system32\msiexec.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Windows\SysWow64\perfhost.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javaws.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\kinit.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroTextExtractor.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\Adobe_Updater.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\jabswitch.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\servertool.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\LICLUA.EXE b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\kinit.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32Info.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{D9005A2B-BC2A-4153-8911-AE3B3F543790}\chrome_installer.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateBroker.exe alg.exe File opened for modification C:\Program Files\TraceEnter.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jsadebugd.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\mip.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files\7-Zip\7z.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\schemagen.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\servertool.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\tnameserv.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\jp2launcher.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WksConv\Wkconv.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\8.0\x86\vsta_ep32.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jrunscript.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java-rmi.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\keytool.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javah.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\policytool.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe alg.exe -
Drops file in Windows directory 33 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe alg.exe File opened for modification C:\Windows\ehome\ehsched.exe alg.exe File opened for modification C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{AC0FA65E-C67F-4917-86C3-43C7E149B061}.crmlog dllhost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngenservicelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.lock mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File opened for modification C:\Windows\ehome\ehRecvr.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe alg.exe File created C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{AC0FA65E-C67F-4917-86C3-43C7E149B061}.crmlog dllhost.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.lock mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe File opened for modification C:\Windows\ehome\ehRecvr.exe alg.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngenservicelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\ehome\ehsched.exe b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Setup.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-9 = "Microsoft Bengali to Latin Transliteration" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-106 = "Tulips" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-2 = "Microsoft Script Detection" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-8 = "Microsoft Malayalam to Latin Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-1 = "Microsoft Language Detection" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-107 = "Lighthouse" SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE\SAL\CacheHashTableSize = "67" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE\SAL\NvpClientsCount = "32" ehRec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\MCTRes.dll,-200016 = "USA.gov" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\notepad.exe,-469 = "Text Document" SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE\SAL\FileDiscontinuitiesPerSecond = "20" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\MediaPlayer\Health wmpnetwk.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-6 = "Microsoft Cyrillic to Latin Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Program Files\windows journal\journal.exe,-62005 = "Tablet PC" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-108 = "Penguins" SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE\SAL\CommitMaxCheckPointPageCount = "7" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE\SAL\FileGrowthBudgetMs = "45000" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE\SAL\CacheShortPageCount = "64" ehRec.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Program Files\Common Files\system\wab32res.dll,-10100 = "Contacts" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit ehRecvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE\SAL\LogMaxJobDemoteTimeMs = "5000" ehRec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\MCTRes.dll,-200005 = "Websites for United States" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\System32\ieframe.dll,-12385 = "Favorites Bar" SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE\SAL\FileGrowthQuantumSeconds = "180" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\OfficeSoftwareProtectionPlatform OSPPSVC.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-7 = "Microsoft Devanagari to Latin Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-117 = "Maid with the Flaxen Hair" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{97E467B4-98C6-4F19-9588-161B7773D6F6} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000040ca12d75994da01 SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE\SAL\CommitMaxCheckPoitnRateMs = "10000" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE\SAL\SwagBitsPerSecond = "19922944" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE\SAL\CacheLongPageCount = "32" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE\SAL\CriticalLowDiskSpace = "1073741824" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\Software ehRecvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE\SAL\CacheWaitForSize = "32" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE\SAL\NvpRecWaitForCounts = "32" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\MediaPlayer\Preferences\ wmpnetwk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\MediaPlayer wmpnetwk.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-3 = "Microsoft Traditional Chinese to Simplified Chinese Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE\SAL ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE\SAL\ShadowFileMaxClients = "32" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft ehRecvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft wmpnetwk.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-4 = "Microsoft Simplified Chinese to Traditional Chinese Transliteration" SearchIndexer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" ehRecvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-5 = "Microsoft Transliteration Engine" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-116 = "Kalimba" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\MediaPlayer\Health\{E878B55C-DCB4-4B82-B5E2-9F1B7A2C0650} wmpnetwk.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\OfficeSoftwareProtectionPlatform\VLRenewalSchedule = 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 OSPPSVC.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\System32\ieframe.dll,-10046 = "Internet Shortcut" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\MCTRes.dll,-200017 = "GobiernoUSA.gov" SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE\SAL\LogMinJobWaitTimeMs = "3000" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE\SAL\FileInlineGrowthQuantumSeconds = "30" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE\SAL\NvpRecCount = "32" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings GROOVE.EXE Key created \REGISTRY\USER\.DEFAULT\Software wmpnetwk.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap SearchIndexer.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2364 Setup.exe 2364 Setup.exe 2364 Setup.exe 2364 Setup.exe 2224 ehRec.exe 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe Token: SeShutdownPrivilege 1592 mscorsvw.exe Token: SeShutdownPrivilege 2440 mscorsvw.exe Token: 33 2184 EhTray.exe Token: SeIncBasePriorityPrivilege 2184 EhTray.exe Token: SeDebugPrivilege 2224 ehRec.exe Token: 33 2184 EhTray.exe Token: SeIncBasePriorityPrivilege 2184 EhTray.exe Token: SeShutdownPrivilege 1592 mscorsvw.exe Token: SeShutdownPrivilege 2440 mscorsvw.exe Token: SeRestorePrivilege 1316 msiexec.exe Token: SeTakeOwnershipPrivilege 1316 msiexec.exe Token: SeSecurityPrivilege 1316 msiexec.exe Token: SeShutdownPrivilege 1592 mscorsvw.exe Token: SeShutdownPrivilege 1592 mscorsvw.exe Token: SeShutdownPrivilege 2440 mscorsvw.exe Token: SeShutdownPrivilege 2440 mscorsvw.exe Token: SeBackupPrivilege 1112 vssvc.exe Token: SeRestorePrivilege 1112 vssvc.exe Token: SeAuditPrivilege 1112 vssvc.exe Token: SeBackupPrivilege 2748 wbengine.exe Token: SeRestorePrivilege 2748 wbengine.exe Token: SeSecurityPrivilege 2748 wbengine.exe Token: 33 2592 wmpnetwk.exe Token: SeIncBasePriorityPrivilege 2592 wmpnetwk.exe Token: SeManageVolumePrivilege 1948 SearchIndexer.exe Token: 33 1948 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 1948 SearchIndexer.exe Token: SeDebugPrivilege 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe Token: SeDebugPrivilege 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe Token: SeDebugPrivilege 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe Token: SeDebugPrivilege 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe Token: SeDebugPrivilege 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe Token: SeDebugPrivilege 1720 alg.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2184 EhTray.exe 2184 EhTray.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2184 EhTray.exe 2184 EhTray.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 1140 SearchProtocolHost.exe 1140 SearchProtocolHost.exe 1140 SearchProtocolHost.exe 1140 SearchProtocolHost.exe 1140 SearchProtocolHost.exe 1896 SearchProtocolHost.exe 1896 SearchProtocolHost.exe 1896 SearchProtocolHost.exe 1896 SearchProtocolHost.exe 1896 SearchProtocolHost.exe 1896 SearchProtocolHost.exe 1896 SearchProtocolHost.exe 1896 SearchProtocolHost.exe 1896 SearchProtocolHost.exe 1896 SearchProtocolHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2364 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 29 PID 2072 wrote to memory of 2364 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 29 PID 2072 wrote to memory of 2364 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 29 PID 2072 wrote to memory of 2364 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 29 PID 2072 wrote to memory of 2364 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 29 PID 2072 wrote to memory of 2364 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 29 PID 2072 wrote to memory of 2364 2072 b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe 29 PID 1592 wrote to memory of 2396 1592 mscorsvw.exe 50 PID 1592 wrote to memory of 2396 1592 mscorsvw.exe 50 PID 1592 wrote to memory of 2396 1592 mscorsvw.exe 50 PID 1592 wrote to memory of 2396 1592 mscorsvw.exe 50 PID 1592 wrote to memory of 2996 1592 mscorsvw.exe 54 PID 1592 wrote to memory of 2996 1592 mscorsvw.exe 54 PID 1592 wrote to memory of 2996 1592 mscorsvw.exe 54 PID 1592 wrote to memory of 2996 1592 mscorsvw.exe 54 PID 1592 wrote to memory of 952 1592 mscorsvw.exe 56 PID 1592 wrote to memory of 952 1592 mscorsvw.exe 56 PID 1592 wrote to memory of 952 1592 mscorsvw.exe 56 PID 1592 wrote to memory of 952 1592 mscorsvw.exe 56 PID 1948 wrote to memory of 1140 1948 SearchIndexer.exe 60 PID 1948 wrote to memory of 1140 1948 SearchIndexer.exe 60 PID 1948 wrote to memory of 1140 1948 SearchIndexer.exe 60 PID 1948 wrote to memory of 2840 1948 SearchIndexer.exe 61 PID 1948 wrote to memory of 2840 1948 SearchIndexer.exe 61 PID 1948 wrote to memory of 2840 1948 SearchIndexer.exe 61 PID 1592 wrote to memory of 2568 1592 mscorsvw.exe 62 PID 1592 wrote to memory of 2568 1592 mscorsvw.exe 62 PID 1592 wrote to memory of 2568 1592 mscorsvw.exe 62 PID 1592 wrote to memory of 2568 1592 mscorsvw.exe 62 PID 1592 wrote to memory of 2768 1592 mscorsvw.exe 63 PID 1592 wrote to memory of 2768 1592 mscorsvw.exe 63 PID 1592 wrote to memory of 2768 1592 mscorsvw.exe 63 PID 1592 wrote to memory of 2768 1592 mscorsvw.exe 63 PID 1592 wrote to memory of 2872 1592 mscorsvw.exe 64 PID 1592 wrote to memory of 2872 1592 mscorsvw.exe 64 PID 1592 wrote to memory of 2872 1592 mscorsvw.exe 64 PID 1592 wrote to memory of 2872 1592 mscorsvw.exe 64 PID 1592 wrote to memory of 2192 1592 mscorsvw.exe 65 PID 1592 wrote to memory of 2192 1592 mscorsvw.exe 65 PID 1592 wrote to memory of 2192 1592 mscorsvw.exe 65 PID 1592 wrote to memory of 2192 1592 mscorsvw.exe 65 PID 1948 wrote to memory of 1896 1948 SearchIndexer.exe 66 PID 1948 wrote to memory of 1896 1948 SearchIndexer.exe 66 PID 1948 wrote to memory of 1896 1948 SearchIndexer.exe 66 PID 1592 wrote to memory of 1744 1592 mscorsvw.exe 68 PID 1592 wrote to memory of 1744 1592 mscorsvw.exe 68 PID 1592 wrote to memory of 1744 1592 mscorsvw.exe 68 PID 1592 wrote to memory of 1744 1592 mscorsvw.exe 68 PID 1592 wrote to memory of 1128 1592 mscorsvw.exe 69 PID 1592 wrote to memory of 1128 1592 mscorsvw.exe 69 PID 1592 wrote to memory of 1128 1592 mscorsvw.exe 69 PID 1592 wrote to memory of 1128 1592 mscorsvw.exe 69 PID 1592 wrote to memory of 2560 1592 mscorsvw.exe 70 PID 1592 wrote to memory of 2560 1592 mscorsvw.exe 70 PID 1592 wrote to memory of 2560 1592 mscorsvw.exe 70 PID 1592 wrote to memory of 2560 1592 mscorsvw.exe 70 PID 1592 wrote to memory of 2324 1592 mscorsvw.exe 71 PID 1592 wrote to memory of 2324 1592 mscorsvw.exe 71 PID 1592 wrote to memory of 2324 1592 mscorsvw.exe 71 PID 1592 wrote to memory of 2324 1592 mscorsvw.exe 71 PID 1592 wrote to memory of 2356 1592 mscorsvw.exe 72 PID 1592 wrote to memory of 2356 1592 mscorsvw.exe 72 PID 1592 wrote to memory of 2356 1592 mscorsvw.exe 72 PID 1592 wrote to memory of 2356 1592 mscorsvw.exe 72 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe"C:\Users\Admin\AppData\Local\Temp\b33933dfe540d2a386b850825ae35db8f85c551f42f1084fece937a68d1c87b8.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
\??\c:\86769fbc83e0e7b8df1321d0322f2e\Setup.exec:\86769fbc83e0e7b8df1321d0322f2e\Setup.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2364
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe1⤵
- Executes dropped EXE
PID:2412
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:568
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1452
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1ec -InterruptEvent 1d8 -NGENProcess 1dc -Pipe 1e8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2396
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 25c -InterruptEvent 1d8 -NGENProcess 1dc -Pipe 1ec -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2996
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 258 -NGENProcess 260 -Pipe 25c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:952
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 248 -InterruptEvent 250 -NGENProcess 264 -Pipe 24c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2568
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 268 -NGENProcess 260 -Pipe 244 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2768
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 240 -InterruptEvent 248 -NGENProcess 26c -Pipe 250 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2872
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 1d8 -NGENProcess 270 -Pipe 240 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2192
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 274 -NGENProcess 26c -Pipe 1f4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1744
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 278 -InterruptEvent 260 -NGENProcess 27c -Pipe 1d8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1128
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 280 -NGENProcess 26c -Pipe 264 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2560
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 288 -NGENProcess 270 -Pipe 284 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2324
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 28c -NGENProcess 254 -Pipe 1dc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2356
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 274 -InterruptEvent 268 -NGENProcess 26c -Pipe 258 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1704
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 270 -InterruptEvent 268 -NGENProcess 274 -Pipe 254 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1716
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 248 -NGENProcess 26c -Pipe 290 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1636
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2440
-
C:\Windows\ehome\ehRecvr.exeC:\Windows\ehome\ehRecvr.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:840
-
C:\Windows\ehome\ehsched.exeC:\Windows\ehome\ehsched.exe1⤵
- Executes dropped EXE
PID:2880
-
C:\Windows\eHome\EhTray.exe"C:\Windows\eHome\EhTray.exe" /nav:-21⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2184
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:816
-
C:\Windows\ehome\ehRec.exeC:\Windows\ehome\ehRec.exe -Embedding1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
C:\Windows\system32\IEEtwCollector.exeC:\Windows\system32\IEEtwCollector.exe /V1⤵
- Executes dropped EXE
PID:1632
-
C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE"C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2576
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:2088
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2000
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1316
-
C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:1612
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1652
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:2296
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:2732
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:2016
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:2344
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1112
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:800
-
C:\Program Files\Windows Media Player\wmpnetwk.exe"C:\Program Files\Windows Media Player\wmpnetwk.exe"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-330940541-141609230-1670313778-10001_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-330940541-141609230-1670313778-10001 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"2⤵
- Suspicious use of SetWindowsHookEx
PID:1140
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 588 592 600 65536 5962⤵PID:2840
-
-
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1896
-
-
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD57cd05e054f0ced7175b13f3b229d335d
SHA187c8dd1c0e6e5a33bdc01f363e57119d74950e9c
SHA2564d420a307cc0ae265c54f81acd63e32b40ce362419c4c6c945597e1b5cdfdbe0
SHA5128610db9e15f0732ca1ed90a16e1ccf2883bde0859457d8fd0a7c75c1092603a60da74689c40718e2adc3b06bb98184a02c0b40143d3d02b873b5f1144a9042ed
-
Filesize
128KB
MD514560c2d0c41a11a8b9cd3b9cb5d1765
SHA18032882b191f4bea493ba6bd37d506d3b4e4d051
SHA2563f299563b7ab180b9282c07539511ed996e6c2a6b5079967359de53ce14af106
SHA51288a491910cc5ed96d00a73dc41bff68b1655c3f81aa08a9ecda7fc3a3a472c2ddbda75fff09254a7180822c1d52bc02abc38695b01b513d519232d0d4a949991
-
Filesize
128KB
MD51d1258be1e98a0126a489008f27a032f
SHA1c44ad7157ab66f49604de816064bbe250c75c7d6
SHA2565e0389549cf351dc4cd7dbe5ba02a40695fcd8c1e68a78d11a9e859c4765dfc9
SHA5124a774bef90d9ec8abdd031bdf64c15b3a4fb74a6ac0bd73e13d9f06765ab025f5310d0c67c974ad408ab80aae8a1176d75a19c6cdc41e2e981003ea18ca9be82
-
Filesize
128KB
MD5a676b373878bc62d2ce0cbe8ba53fdc2
SHA1d955068c170c8057e12a8eff538810888a7b3888
SHA2568dfd73d5aa189cafa0b1c6e370ad9460c50e87c4c2468aa2af79fb3bb7b15f0d
SHA512b763462761c38bf1d603677c1131e4b4d2aefd609385651a0eef4ceeeba3ffb36e49e79b06cbcbc1e50a48240ee2cebb4ba9df40f9d072923355a9538e687750
-
Filesize
128KB
MD5e0f608aee1a3179029f1266cc1510f41
SHA11e7b37a8008648b6403364a9c869d1d381336990
SHA2565c1dbed26e494cb998ba627972e6e50f20e87685944cc259d19bd5f4554acaa1
SHA5123c45d9e05281f87f61e049fb283d7c636ca0850054dd6fc292f2c966259674eb5027611b9d285dd6e06b4437eb270c0928acd91c401667de931843ed6ae09c47
-
Filesize
1024KB
MD55b1fea1a2ae1ea31b02a0f3e844ec2c7
SHA1630cef40765e5192837690c666634fb856eb0383
SHA256afc7bb3e1663a6c6943fe38d2d9983b00f50c303449d5e2da653c309e7acd4d7
SHA512923b64477a522af54cb9958cdb13548548afb2f7661581c800afdbf0e65f879f679e82d5781a180663820ccf29e6ff3b872e469980dd82ed41c550a17e04fb4b
-
Filesize
15KB
MD5cd131d41791a543cc6f6ed1ea5bd257c
SHA1f42a2708a0b42a13530d26515274d1fcdbfe8490
SHA256e139af8858fe90127095ac1c4685bcd849437ef0df7c416033554703f5d864bb
SHA512a6ee9af8f8c2c7acd58dd3c42b8d70c55202b382ffc5a93772af7bf7d7740c1162bb6d38a4307b1802294a18eb52032d410e128072af7d4f9d54f415be020c9a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms
Filesize24B
MD5b9bd716de6739e51c620f2086f9c31e4
SHA19733d94607a3cba277e567af584510edd9febf62
SHA2567116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312
SHA512cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478
-
Filesize
128KB
MD587cc82bcd30bc753745989f47422f8fd
SHA18501de477a5c68059d4b692fabad934624be058f
SHA256e3937a550bc89a3ae06c5f49e4d4fd5e89da310bba44fdd9fbe2ae5377ccaf0b
SHA51238c01ed0a2402a209af2c0e2018f03e7391dd59364d3183bc7ef7c731d70b867dab5618f125120065553a8aff58c3d4cec0b1d6eb3e2eeaf6d78765754687c8e
-
Filesize
128KB
MD5ddd1c12a629b75e5bab261616aecc571
SHA19fa9d55d417009814ba013599d5ba5b63f5d4906
SHA2568c080a80eed434cfb8f2d3d5be677e8404cfc9d0e25468456a84444edcc5824a
SHA512d506436e99d1dff6d287aee23aa5eb6773c4c6e6e690c6efa7dc6eeed2c307ef9625d5852657eb585d8b8dc6b3f4d4fb51c7bca44c4fd4c383b329c8e07d62bc
-
Filesize
1.4MB
MD50bbbc68d088e35a4ccd97903fcb69bee
SHA1bfa3091b29add85dc25fe664630cee99a8a71bc2
SHA256fdefae4ac847d162f1eda9dacc6bd1ea715e9ec7b19ccf6aa3a5aad62d4b6f23
SHA5125a57668375cea4f47b1547676f1e54436e89b4dd1afeab3f70d3408a5631fd6744cb1f8521c43ec31c3b26c6457bd7c0545eaa8b9f2529553d3ef5b1da31290f
-
Filesize
128KB
MD591c2e17c6b288bd0b961d9e9e7a05e28
SHA19a134dda1f5f380f35617e4d3499e2f9515760d4
SHA2565f2a68a11bbaa2efac1f077bdbbc69fcfd1326da6eebdc8599db8e32e5fe3e24
SHA51274cc138b8c56206428c27a81b8f54ed5e60b8004bee3850dd70f9901a7515333bbc08812f3fcac4a674ff5e2e7896e75bdad0ed9e2415cefcc9c479158b28124
-
Filesize
1.4MB
MD5246cf534aa1f2ecc8db5c88396b1845c
SHA13baeed8eafde33eac2ea92c767bddcc9db17956b
SHA2569fc4ebdddab77477420446274695437e1d654a19fa5db214320ceab0fb982925
SHA51241750da664f838169215a2be1e1780194895214d01df25a2ff558b84720cd2fe1b46534126ebc93b25aa3a6af8e8afd35cfe05082f969797635f24d5bbd99c9c
-
Filesize
128KB
MD5ec49ce9254893b2cc98fef598310a27c
SHA15d0c4651f219163627513bc5d2468cc5670f49f9
SHA256654266fbc0287c5300103d17a1c40bd1d2ce73ad834070495d4b3c88d732bba3
SHA512dfe2a7c5ba8fbfc6df235c4e22d6bbdad13a691ff51cd54ad7f2f8fe62c93b2e90e398422cfe4c02d6daf1058f8c34ea7a232fc530484425f93c27906efc6020
-
Filesize
128KB
MD5493bf611b0d0a4ef53082ead81990df4
SHA1f5e9b8465ea959a9af7209339d7076288a3aa1f9
SHA256a049c867764a3f4322f558c2586c43bbc182c392b44eda898ef64fce6bbcbd16
SHA512a2bf5d2f142b6064dad7acf1b9adc8bf479e84381b28932aea7be88afcfd2e000da7f3e9d7bb377edf456b60c95eff7176cde5eb27e49f42c393a1c4d1238553
-
Filesize
128KB
MD5bbc5d62b3ecdeab233077bca9cc126e7
SHA1f9da427b40964656708741c27b67485c59cb51d9
SHA25672ddec6cf7ec510a4fed1a718ac044336d3df96c8256ada51fad39f6454591fb
SHA512ca926641ebdf03aa47f6db5a1a6aa72d72e2a6422a7b7059a1e9a1aaf2961dd62d358ebabefeb689d96b1f1dda901d178eb7716f38cd47c3b24b8aa658dd2a57
-
Filesize
128KB
MD5e5982a819a8a7c9ea610e9b1be20a18e
SHA17fe2c7c533e1eed54c04be115cc9fa5ddb3bfdfc
SHA256929bcdf602ce475ddd36af0d02375cba0d60082565561851159301631e163703
SHA5123d371029a5a1327dd4b85b27aef1d26c932c4782abd954d005eaaf23e04e029a403326a06cd325c0b2c068c93811925915d08eda508cb668de5282922a489f6a
-
Filesize
1.4MB
MD53fd184a273636fd95b7430c9d877cfd5
SHA1ebe7f59328f6115f12661a83eccf2079f0caa0bd
SHA256be4341022be021836cc57fcb694720da4d7193be13491bacb613ada5038aca28
SHA512e479767ecc991011f74dea678cb2ff8b976921a8f5e69c2bb88edd80149c00479ead4f6022cd6583933fdc04182c6d581f3918a76448ab14e59daf958af4f251
-
Filesize
128KB
MD57caa30329d7480ba93788b03fb34ada4
SHA12acde0ca3eb3aa6bbde9dec3328df3de7450c8dc
SHA2569e80506ce5b5b797aedea47205a76c91e1304758b18b723853c90eea7df4d8ec
SHA51201ef933ca459d01a58fdb3e57d6825423d4f1195f8717f12ed6b3b04b6c120e6533996601ce288ab2d9971c4f04258ce9ef597186dac1ade546580e5b09cfd38
-
Filesize
128KB
MD54a4bbf5795b5e0f9018a3290daa5e1b6
SHA16f3fd8b7b0dd78871d325a9d482d230606fee657
SHA256464d5e2b0dc626235a559ffa9fd8e1488d28ec57cabc0c2b4e4eb37f3b80729c
SHA51245650a66a3716897832c7ace966f9175c6c1e66641f77daccb2c8aa011400d5b50590167eee9384620c6e615514c2f7203a70e061b5079b5449aeeda31efb610
-
Filesize
128KB
MD5bfd067bec193d380d18f9744986af1e9
SHA112078b76633ae4fb58a76e57340bdfd99f37f137
SHA256d4c44f6088867bfe397b84aa3a16400cf7f29336777253f8e4a3b0ad6cc2d0aa
SHA51201bfd1c18c95ffff9ddc2d619fcf4e959f2ddd5e3ab3cc245894aa197fe45bc1ab9ffbab9f4b59d05a5d2fad7786b95945d792b48d69b540f951c1715e401282
-
Filesize
128KB
MD55d899266888599e2dcab1553c6e9ebf3
SHA1654d36278916217e63d1e3d96aa88df9d3e53767
SHA25697120a239764f180d47f81c32cfc1422be1a55f96c2131259e15da97d1dff6af
SHA512264e73cda4c82b347f7c5fd6f322b4f9c7a1c7b097f55543428ea874bee4951915c3c1d857c339497224f4ae05d0ab5ff8bfc1f59c5f7397f2b1b23c4534c5f5
-
Filesize
128KB
MD55dc7e58d1cdfea0efd16e74b8258a8a3
SHA1bf33968fd659dde090f74b38d2764dde5b7ab406
SHA256c38b473471693f5183a11763f2ad62c0ea4a9317fddffe3384726c1270ca841f
SHA5120b0756d8dde5f031b122e20a486e34c0b09f4e674b3d0be1dfb2f76bb170fa6419267b292839bdd2a2a06666bc279e3901dc14e7128d2832209ddf845f00d7aa
-
Filesize
76KB
MD5006f8a615020a4a17f5e63801485df46
SHA178c82a80ebf9c8bf0c996dd8bc26087679f77fea
SHA256d273460aa4d42f0b5764383e2ab852ab9af6fecb3ed866f1783869f2f155d8be
SHA512c603ed6f3611eb7049a43a190ed223445a9f7bd5651100a825917198b50c70011e950fa968d3019439afa0a416752517b1c181ee9445e02da3904f4e4b73ce76
-
Filesize
788KB
MD584c1daf5f30ff99895ecab3a55354bcf
SHA17e25ba36bcc7deed89f3c9568016ddb3156c9c5a
SHA2567a0d281fa802d615ea1207bd2e9ebb98f3b74f9833bba3cb964ba7c7e0fb67fd
SHA512e4fb7e4d39f094463fdcdc4895ab2ea500eb51a32b6909cec80a526bbf34d5c0eb98f47ee256c0f0865bf3169374937f047bf5c4d6762779c8ca3332b4103be3
-
Filesize
128KB
MD56dcb8d246542c0e8c1360ede078a168e
SHA19a236d6d6021dc51b3e8b703d088865ba6bee328
SHA256d8fcc3235dd630eb35370b95a412294f99994eca4fff8fd220b4b3b3b32499f2
SHA5124dffe18c11346aceb27fa969e5b4625124f6aef7147a2822fe0544cc87f6dc0b056123322c870a6de57573a827d4e2150207875232b89b33eaff032ee3124e90
-
Filesize
141KB
MD53f0363b40376047eff6a9b97d633b750
SHA14eaf6650eca5ce931ee771181b04263c536a948b
SHA256bd6395a58f55a8b1f4063e813ce7438f695b9b086bb965d8ac44e7a97d35a93c
SHA512537be86e2f171e0b2b9f462ac7f62c4342beb5d00b68451228f28677d26a525014758672466ad15ed1fd073be38142dae478df67718908eae9e6266359e1f9e8
-
Filesize
29KB
MD512df3535e4c4ef95a8cb03fd509b5874
SHA190b1f87ba02c1c89c159ebf0e1e700892b85dc39
SHA2561c8132747dc33ccdb02345cbe706e65089a88fe32cf040684ca0d72bb9105119
SHA512c6c8887e7023c4c1cbf849eebd17b6ad68fc14607d1c32c0d384f951e07bfaf6b61e0639f4e5978c9e3e1d52ef8a383b62622018a26fa4066eb620f584030808
-
Filesize
40KB
MD5b13ff959adc5c3e9c4ba4c4a76244464
SHA14df793626f41b92a5bc7c54757658ce30fdaeeb1
SHA25644945bc0ba4be653d07f53e736557c51164224c8ec4e4672dfae1280260ba73b
SHA512de78542d3bbc4c46871a8afb50fb408a59a76f6ed67e8be3cba8ba41724ea08df36400e233551b329277a7a0fe6168c5556abe9d9a735f41b29a941250bfc4d6
-
Filesize
38KB
MD55486ff60b072102ee3231fd743b290a1
SHA1d8d8a1d6bf6adf1095158b3c9b0a296a037632d0
SHA2565ca3ecaa12ca56f955d403ca93c4cb36a7d3dcdea779fc9bdaa0cdd429dab706
SHA512ae240eaac32edb18fd76982fc01e03bd9c8e40a9ec1b9c42d7ebd225570b7517949e045942dbb9e40e620aa9dcc9fbe0182c6cf207ac0a44d7358ad33ba81472
-
Filesize
16KB
MD59547d24ac04b4d0d1dbf84f74f54faf7
SHA171af6001c931c3de7c98ddc337d89ab133fe48bb
SHA25636d0159ed1a7d88000737e920375868765c0a1dd6f5a5acbb79cf7d97d9e7a34
SHA5128b6048f4185a711567679e2de4789407077ce5bfe72102d3cb1f23051b8d3e6bfd5886c801d85b4e62f467dd12da1c79026a4bc20b17f54c693b2f24e499d40f
-
Filesize
40KB
MD54ce519f7e9754ec03768edeedaeed926
SHA1213ae458992bf2c5a255991441653c5141f41b89
SHA256bc4ca5ad609f0dd961263715e1f824524c43e73b744e55f90c703b759cae4d31
SHA5128f2ff08a234d8e2e6ba85de3cd1c19a0b372d9fca4ff0fc1bba7fe7c5a165e933e2af5f93fc587e9230a066b70fb55d9f58256db509cc95a3b31d349f860f510
-
Filesize
39KB
MD5fe6b23186c2d77f7612bf7b1018a9b2a
SHA11528ec7633e998f040d2d4c37ac8a7dc87f99817
SHA25603bbe1a39c6716f07703d20ed7539d8bf13b87870c2c83ddda5445c82953a80a
SHA51240c9c9f3607cab24655593fc4766829516de33f13060be09f5ee65578824ac600cc1c07fe71cdd48bff7f52b447ff37c0d161d755a69ac7db7df118da6db7649
-
Filesize
33KB
MD56f86b79dbf15e810331df2ca77f1043a
SHA1875ed8498c21f396cc96b638911c23858ece5b88
SHA256f0f9dd1a9f164f4d2e73b4d23cc5742da2c39549b9c4db692283839c5313e04f
SHA512ca233a6bf55e253ebf1e8180a326667438e1124f6559054b87021095ef16ffc6b0c87361e0922087be4ca9cabd10828be3b6cc12c4032cb7f2a317fdbd76f818
-
Filesize
32KB
MD5e87ad0b3bf73f3e76500f28e195f7dc0
SHA1716b842f6fbf6c68dc9c4e599c8182bfbb1354dc
SHA25643b351419b73ac266c4b056a9c3a92f6dfa654328163814d17833a837577c070
SHA512d3ea8655d42a2b0938c2189ceeab25c29939c302c2e2205e05d6059afc2a9b2039b21c083a7c17da1ce5eebdc934ff327a452034e2e715e497bcd6239395774c
-
Filesize
39KB
MD51290be72ed991a3a800a6b2a124073b2
SHA1dac09f9f2ccb3b273893b653f822e3dfc556d498
SHA2566ba9a2e4a6a58f5bb792947990e51babd9d5151a7057e1a051cb007fea2eb41c
SHA512c0b8b4421fcb2aabe2c8c8773fd03842e3523bf2b75d6262fd8bd952adc12c06541bdae0219e89f9f9f8d79567a4fe4dff99529366c4a7c5bf66c218431f3217
-
Filesize
30KB
MD5150b5c3d1b452dccbe8f1313fda1b18c
SHA17128b6b9e84d69c415808f1d325dd969b17914cc
SHA2566d4eb9dca1cbcd3c2b39a993133731750b9fdf5988411f4a6da143b9204c01f2
SHA512a45a1f4f19a27558e08939c7f63894ff5754e6840db86b8c8c68d400a36fb23179caff164d8b839898321030469b56446b5a8efc5765096dee5e8a746351e949
-
Filesize
39KB
MD505a95593c61c744759e52caf5e13502e
SHA10054833d8a7a395a832e4c188c4d012301dd4090
SHA2561a3e5e49da88393a71ea00d73fee7570e40edb816b72622e39c7fcd09c95ead1
SHA51200aee4c02f9d6374560f7d2b826503aab332e1c4bc3203f88fe82e905471ec43f92f4af4fc52e46f377e4d297c2be99daf94980df2ce7664c169552800264fd3
-
Filesize
9KB
MD503e01a43300d94a371458e14d5e41781
SHA1c5ac3cd50fae588ff1c258edae864040a200653c
SHA25619de712560e5a25c5d67348996e7d4f95e8e3db6843086f52cb7209f2098200a
SHA512e271d52264ff979ae429a4053c945d7e7288f41e9fc6c64309f0ab805cec166c825c2273073c4ef9ca5ab33f00802457b17df103a06cbc35c54642d146571bbb
-
Filesize
29KB
MD52fadd9e618eff8175f2a6e8b95c0cacc
SHA19ab1710a217d15b192188b19467932d947b0a4f8
SHA256222211e8f512edf97d78bc93e1f271c922d5e91fa899e092b4a096776a704093
SHA512a3a934a8572ff9208d38cf381649bd83de227c44b735489fd2a9dc5a636ead9bb62459c9460ee53f61f0587a494877cd3a3c2611997be563f3137f8236ffc4ca
-
Filesize
13KB
MD5332adf643747297b9bfa9527eaefe084
SHA1670f933d778eca39938a515a39106551185205e9
SHA256e49545feeae22198728ad04236e31e02035af7cc4d68e10cbecffd08669cbeca
SHA512bea95ce35c4c37b4b2e36cc1e81fc297cc4a8e17b93f10423a02b015ddb593064541b5eb7003560fbeee512ed52869a113a6fb439c1133af01f884a0db0344b0
-
Filesize
35KB
MD5812f8d2e53f076366fa3a214bb4cf558
SHA135ae734cfb99bb139906b5f4e8efbf950762f6f0
SHA2560d36a884a8381778bea71f5f9f0fc60cacadebd3f814679cb13414b8e7dbc283
SHA5121dcc3ef8c390ca49fbcd50c02accd8cc5700db3594428e2129f79feb81e4cbbeef1b4a10628b2cd66edf31a69ed39ca2f4e252ad8aa13d2f793fca5b9a1eaf23
-
Filesize
1KB
MD57e55ddc6d611176e697d01c90a1212cf
SHA1e2620da05b8e4e2360da579a7be32c1b225deb1b
SHA256ff542e32330b123486797b410621e19eafb39df3997e14701afa4c22096520ed
SHA512283d381aa396820b7e15768b20099d67688da1f6315ec9f7938c2fcc3167777502cded0d1beddf015a34cc4e5d045bcb665ffd28ba2fbb6faf50fdd38b31d16e
-
Filesize
1KB
MD57d62e82d960a938c98da02b1d5201bd5
SHA1194e96b0440bf8631887e5e9d3cc485f8e90fbf5
SHA256ae041c8764f56fd89277b34982145d16fc59a4754d261c861b19371c3271c6e5
SHA512ab06b2605f0c1f6b71ef69563c0c977d06c6ea84d58ef7f2baecba566d6037d1458c2b58e6bfd70ddef47dccbdea6d9c2f2e46dea67ea9e92457f754d7042f67
-
Filesize
35KB
MD53d25d679e0ff0b8c94273dcd8b07049d
SHA1a517fc5e96bc68a02a44093673ee7e076ad57308
SHA256288e9ad8f0201e45bc187839f15aca79d6b9f76a7d3c9274c80f5d4a4c219c0f
SHA5123bde668004ca7e28390862d0ae9903c756c16255bdbb3f7e73a5b093ce6a57a3165d6797b0a643b254493149231aca7f7f03e0af15a0cbe28aff02f0071ec255
-
Filesize
9KB
MD55dfa8d3abcf4962d9ec41cfc7c0f75e3
SHA14196b0878c6c66b6fa260ab765a0e79f7aec0d24
SHA256b499e1b21091b539d4906e45b6fdf490d5445256b72871aece2f5b2562c11793
SHA51269a13d4348384f134ba93c9a846c6760b342e3a7a2e9df9c7062088105ac0b77b8a524f179efb1724c0ce168e01ba8bb46f2d6fae39cabe32cab9a34fc293e4a
-
Filesize
128KB
MD5dc746ea112b2beceb6704d1718acf474
SHA1fb66683eff28546b6648d187e7ed31d76466564a
SHA2567145ce6d2c0875c0c4c9e5f736b248052b8627e415b686412b222e047ce219db
SHA512aba53c546c2fd97d3720d5c0c30d1078cdf2abcf355fc5677f73607c53039043f565f5941574053a3dc0b391345b683b3b5d1f8810f42c21f2b2a27c752e54f0
-
Filesize
128KB
MD56a9834cb7421d19986dcb839d2049a96
SHA1669b8e937e63ab23f143ebeb6c48d78fb534d64a
SHA25670d43d3ea0297a581192dfb5a6a4b69b930d3ba7b85a789e2f801df8a6adad57
SHA512268d27b210aecac074c1c1bf9b4cb44657e1b06ecd3ec405beee42e20f83543f460aab69bf1fc9bea9c13bbdb06e288fb102bbd9b65ea8836512b4be39955c77