Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
ad0681927f323d678ebaafa28aebd5e0_NEAS.exe
Resource
win7-20240220-en
General
-
Target
ad0681927f323d678ebaafa28aebd5e0_NEAS.exe
-
Size
622KB
-
MD5
ad0681927f323d678ebaafa28aebd5e0
-
SHA1
04cb20173fedd9e9e6c7d41c21febd2652b6b09b
-
SHA256
04baa2ea851f9074da56696f196d89ba0aebcd4f661a82267fe86df050d48d91
-
SHA512
0b2f938910cb2748fbc522f475e8109caf2fe4040a7b93eec5c6e1fa900eaaa7e90cabc187bb427b4bbc3d4f3e587a755e0091feed01bff49e0feac929a9d78c
-
SSDEEP
12288:/ukOFjHjVOfSCuBn+1V4mlzEFQyYVgwvPNaMvwaQDR6q79LRgRljjX:/uk0Djsf9nz4mloFQnpXUMPQDR6q79d
Malware Config
Signatures
-
Executes dropped EXE 22 IoCs
pid Process 3328 alg.exe 1348 DiagnosticsHub.StandardCollector.Service.exe 4332 fxssvc.exe 3928 elevation_service.exe 3092 elevation_service.exe 4408 maintenanceservice.exe 3356 msdtc.exe 4456 OSE.EXE 3056 PerceptionSimulationService.exe 2196 perfhost.exe 2528 locator.exe 768 SensorDataService.exe 3172 snmptrap.exe 1600 spectrum.exe 2732 ssh-agent.exe 732 TieringEngineService.exe 2592 AgentService.exe 4884 vds.exe 4408 vssvc.exe 1816 wbengine.exe 2472 WmiApSrv.exe 3636 SearchIndexer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 31 IoCs
description ioc Process File opened for modification C:\Windows\system32\vssvc.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Windows\System32\msdtc.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Windows\system32\SgrmBroker.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Windows\system32\spectrum.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Windows\system32\AgentService.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Windows\system32\TieringEngineService.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Windows\System32\alg.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\a4cea8fbad45b396.bin alg.exe File opened for modification C:\Windows\system32\AppVClient.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Windows\system32\fxssvc.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Windows\System32\SensorDataService.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Windows\System32\snmptrap.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Windows\system32\msiexec.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\system32\msiexec.exe alg.exe File opened for modification C:\Windows\system32\AgentService.exe alg.exe File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Windows\System32\vds.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Windows\System32\SensorDataService.exe alg.exe File opened for modification C:\Windows\system32\locator.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Windows\system32\wbengine.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Windows\system32\SgrmBroker.exe alg.exe File opened for modification C:\Windows\system32\dllhost.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Windows\SysWow64\perfhost.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Windows\system32\SearchIndexer.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.106\Installer\chrmstp.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.106\Installer\setup.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{C1566D4E-90C3-4D8D-8731-8398B4F79F34}\chrome_installer.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\123.0.6312.106\chrome_installer.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.106\chrome_pwa_launcher.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\klist.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateComRegisterShell64.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files\dotnet\dotnet.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateComRegisterShell64.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmid.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe alg.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe ad0681927f323d678ebaafa28aebd5e0_NEAS.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-174 = "Microsoft PowerPoint Presentation" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-178 = "OpenDocument Presentation" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-913 = "MHTML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xhtml\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Common Files\system\wab32res.dll,-10100 = "Contacts" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{01BE4CFB-129A-452B-A209-F9D40B3B84A5} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000008604e5db85a0da01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-123 = "Microsoft Word Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-180 = "Microsoft PowerPoint 97-2003 Template" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{AEB16279-B750-48F1-8586-97956060175A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000044d6fdc85a0da01 SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{97E467B4-98C6-4F19-9588-161B7773D6F6} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000b8b7d6db85a0da01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdf\OpenWithList SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E2FB4720-F45F-4A3C-8CB2-2060E12425C3} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000001afc9edc85a0da01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@windows.storage.dll,-34583 = "Saved Pictures" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-915 = "XHTML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-131 = "Rich Text Format" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\notepad.exe,-469 = "Text Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000eec0fdda85a0da01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9926 = "M3U file" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{487BA7B8-4DB0-465F-B122-C74A445A095D} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000da6c6bdb85a0da01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000024da3adc85a0da01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\searchfolder.dll,-9023 = "Saved Search" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia\ActiveMovie SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-170 = "Microsoft PowerPoint 97-2003 Presentation" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@windows.storage.dll,-21824 = "Camera Roll" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{8082C5E6-4C27-48EC-A809-B8E1122E8F97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000e00988db85a0da01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9925 = "MP3 Format Sound" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9905 = "Video Clip" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@windows.storage.dll,-21825 = "3D Objects" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{3DBEE9A1-C471-4B95-BBCA-F39310064458} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000011e804db85a0da01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5383EF74-273B-4278-AB0C-CDAA9FD5369E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000006f55d4db85a0da01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-182 = "Microsoft PowerPoint Template" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000d8aa47db85a0da01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9932 = "MP4 Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@"C:\Windows\system32\windowspowershell\v1.0\powershell.exe",-103 = "Windows PowerShell Script" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xhtml SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9912 = "Windows Media Audio file" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-140 = "Microsoft OneNote Section" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-172 = "Microsoft PowerPoint 97-2003 Slide Show" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-177 = "Microsoft PowerPoint Macro-Enabled Slide Show" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-102 = "Microsoft Excel Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9935 = "MPEG-2 TS Video" SearchProtocolHost.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 656 Process not Found 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe Token: SeAuditPrivilege 4332 fxssvc.exe Token: SeRestorePrivilege 732 TieringEngineService.exe Token: SeManageVolumePrivilege 732 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 2592 AgentService.exe Token: SeBackupPrivilege 4408 vssvc.exe Token: SeRestorePrivilege 4408 vssvc.exe Token: SeAuditPrivilege 4408 vssvc.exe Token: SeBackupPrivilege 1816 wbengine.exe Token: SeRestorePrivilege 1816 wbengine.exe Token: SeSecurityPrivilege 1816 wbengine.exe Token: 33 3636 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 3636 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3636 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3636 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3636 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3636 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3636 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3636 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3636 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3636 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3636 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3636 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3636 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3636 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3636 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3636 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3636 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3636 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3636 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3636 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3636 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3636 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3636 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3636 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3636 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3636 SearchIndexer.exe Token: SeDebugPrivilege 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe Token: SeDebugPrivilege 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe Token: SeDebugPrivilege 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe Token: SeDebugPrivilege 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe Token: SeDebugPrivilege 1808 ad0681927f323d678ebaafa28aebd5e0_NEAS.exe Token: SeDebugPrivilege 3328 alg.exe Token: SeDebugPrivilege 3328 alg.exe Token: SeDebugPrivilege 3328 alg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3636 wrote to memory of 396 3636 SearchIndexer.exe 113 PID 3636 wrote to memory of 396 3636 SearchIndexer.exe 113 PID 3636 wrote to memory of 2424 3636 SearchIndexer.exe 114 PID 3636 wrote to memory of 2424 3636 SearchIndexer.exe 114 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad0681927f323d678ebaafa28aebd5e0_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\ad0681927f323d678ebaafa28aebd5e0_NEAS.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3328
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:1348
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:3140
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4332
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3928
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3092
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:4408
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:3356
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:4456
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:3056
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:2196
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:2528
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:768
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:3172
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:1600
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:2732
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:3560
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:732
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:4884
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:2472
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
PID:396
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 8962⤵
- Modifies data under HKEY_USERS
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
848KB
MD5c969e19ad169f2f40dda6a91f0e3e6a4
SHA1fcaf60d91fcec3cd9aaef8a0b8b016a832fdee4d
SHA256df5d68d423cce1c7270b0a3e8737af9bf6ff4b3e179e54a4c7c86d0815ac359b
SHA512214dd0be3bff79d3464713798078ad1c2f22321a8d89b6517151e8e699f6dea0f0c5301756346d27a43ede87322e18d8f1c4eb0a3f427bdb142d482101c5a573
-
Filesize
25.4MB
MD558e5c34e6c6b7ec0c189f0ae247bbfcb
SHA1d5aea4fd7ac365c4ca95a5522406bc4ef1418a1d
SHA256a3dcf032041fa2397ff32b7e67cb6dce9ce642b0c7b103506e5284f16545d339
SHA512580b350b2e72cc8625467327fe00d97fb7ac02ca9da9444790d6db8a80c172fd9d308e0ec33b289d5b9f4ecca1126f1a77cea72b3cc8bd04a4b8ad4aada2f029
-
Filesize
611KB
MD5a40eb17e279a1a9baaba6131f133a021
SHA158c4cc08954f1c2017badec57bc5ca6f11e08079
SHA2567d677314b2911a1447302d926de41b91a72b9af6cc5ba389bc6615587c08b869
SHA51287467c0ffe19cf186b8d3a0ae3b31254f3dc89c47dc39448b9da95380d11c801e602684c2f9df77fb3004a0d9b5f26927c4c41c5ec22670b8a89284804bb517b
-
Filesize
666KB
MD5ed474fd4e78103ae1c04981f0bf140da
SHA1f10ad99a5c244d12d82a7405e2a0ad6d7f7ded6d
SHA2568cb8b4160b5cebadf0a9f0da06385f935fbd9c967c857c0917fabf78bb48abdf
SHA512bbf605e0a013a4706c1f85f2bf7857bba28add6dece217261b9b779519fe416527b632b0224434b75d80bd37db55716363d38b551aef58e5b6b46a8474afbf87
-
Filesize
973KB
MD51d77b14edd5530e4f32fb4ca11f6c307
SHA199ee20a6a40596ea544dc6bd26bd268d91171f1a
SHA2567df26fc4d6d60631fbd0e8949dd9ed9e0aea6d6b0fca49f3240aaec66dea21c9
SHA512b4a2eebc81190381f4aeabc0e59a17aef8a0446d80965700f82373c0c4a79bcbd1688a854a4830632cc8df38a6d5f7baed89e22a2bb544e55a744cdebd863f5b
-
Filesize
1.7MB
MD511469846a132784fcd11fb9224ed3f60
SHA1901f515bc728158dcfa46c6df2cf6ea490ca22b9
SHA25649da34e7cc68592b2031d58e4e64b813d04b33514af5ab115c02274aedd60936
SHA51234edb4d85e482e75dfc4e8ac40221035a4d85caeff2d08136590896e052220402907f81ced627135752c0481d31d5fbe9e0bf6dddd4d2b2bb4c85d102ac61f77
-
Filesize
841KB
MD5cd04c781f8c9ff87c7c3edfec9dd93e0
SHA18acf5a454d1897db281a0b08c7a59ccfc1592521
SHA25651eb183473f6e06cd3532d5ec93ff37aa191dca56ca368b4c70ae1230d7e4d55
SHA512be2f7be46b08597c7b529effb04c62fdb66d4d0fc13f311433f898dcc330f1eef3be92a653ea7493d72d454686d9d58532128d3e902602ea8380e41399a66196
-
Filesize
1020KB
MD51d2357ba91066dba3829ab3fea1e4d17
SHA1a25098e40edf52d1001b79df8ad221dc166cc6a3
SHA256d5aba9882ecad9110689929bd005ce33ac06c7fc9047abe91db078b8d93a2943
SHA5121184e58aa94ddf407fc234a9cf13ee2e754f38c12c084f182c0827e5b95310093ec1b265d3be2b0aff1bcc304a765d1ab6b7e90dd4d9cc8f03ae6c60de200d59
-
Filesize
950KB
MD57253c65c6865470d319ec8465b56fea7
SHA131056e11125ee55b7a0ce3c33132168fccf5b550
SHA256ca6a3cf5ae52f774b422c7f6f34712a89d6c17518acb70417f2335cad72f9c9b
SHA512845c53aa548afd2e28f21dda992adc7f8f3bb1338edc7ba49f32ffc14adaa2a46acd1062a43fbab97b21553b6dc177e78ffab09e7f13473fe5418468bf3fc069
-
Filesize
716KB
MD506503aec2ec7510a3b65629b6bc81bf7
SHA18a67c23b4794bdca6248c768b812e9ff4dd6f72e
SHA25689e124d8d8fc90544d53072649807b09dbe1306acf803761cec3297661eb598c
SHA5128cfdf96541b39575a436cc2da4150be3ce4ccdc7eb8a0f6c29e5ddbbc03eeed876f2d6a65833752769c37097a3beba975e3cff06b82409af60cfad8520ab0199
-
Filesize
663KB
MD5e79a5a5bce742b06c73d95084876d74b
SHA18dd46e503346adf7ed7efcb084646511c565ed89
SHA25622e193e23ece6f6fe66f0c4613868891e4e8f2770010efac0b4ae9663d78346c
SHA5124c44fe7acb04483e2d2cec96416ca653df1784d007c876d8f069c0ce8833ba01fc07bce6a70aaef071ecda8f04d252d4bf490569866c4c1cd3b81ab2c772612c
-
Filesize
663KB
MD599e066c4bc44f22486be5c482e960bf8
SHA1ef081310fe91154ee7d01ca2caa7edcff3fcc8a1
SHA256ffdc4a46c60751e46b7ae89b3dfc518b495ff80bd31be16d9f94b56f79362686
SHA512e8a0ed01d7ce60605e65bf8135fbc56b26c0ff59d7be8d96e3d06001478fda4bc53b0cb26903de6b2fb0b9fda476be063ca0a5a6960faef1fb941370373125e6
-
Filesize
2.1MB
MD52bc53a5e6607cd3969bb4088e5a5452b
SHA1a1c981301e5f43827b16e422a06a7988c4330d61
SHA2568d8c73dccda7892b9e6af3ac8193893385ef67ad311b6687d5809c123e3eca36
SHA512a88a93754bdbd39c4120451846c541ffda54020819f8af224d66d3997a3d3eb3ba5881886148a5282c7223791e5ca29f17239db4da297e8b3c7538dfd8044dad
-
Filesize
789KB
MD54bd3d03ee61f96a2b71c94127a8c39e9
SHA194670b4df987198e85bfdba6b0bb2f44b8fbda8a
SHA25675c708ee64f3ca4bdf171599ecff06b73123fcab557b16e28eef3cb02e386b32
SHA51212b547e4e0110f717e14199ba8a4f601afcc458f82ddf2678f540ff41cf822fc75bba2857db30045d17f69d50190da96dd645cf516167f876a67602faa8bd2c6
-
Filesize
805KB
MD52cdad1259bbe283611299fc03728efc2
SHA1e06c98a3aaa9d950741abbbb6ab92eaadf6fdbf0
SHA256922d7aaeafa4482c7b45a2605d8b397fb1858768036ec9c612b59a1d6124ef9d
SHA5128ebbe43f2bcc3ce7bc3c7052dd824ce0cfd35316e99ebf3cef8328075202a7c0290a5a309b48d36617cb8abeb6ab01b83c6380ffc9a1dc7a0d2c70730252df3e
-
Filesize
2.1MB
MD5fd3c817654b4b2d940627997becce2c0
SHA16ecb5352ec677047a804b1b55358f62ba8130f45
SHA256a34ebc642a1e6f66c4cf052c577d47bff4681f1ddb4b7d6c9a01cd165b438d3b
SHA51204da8a6b3b60407bc59e2070ee7e28ab09a018ade9e4070ecbefb9fc3eccdc397d32055ac2c77fe5a1ab963471641603ebf887dc6780758986c24e7b44b2ba28
-
Filesize
581KB
MD55f010cef0f1a615b9743cee0e8526c75
SHA1bd16b3edf38357d31adfb8c553011d638f00b728
SHA256760164d96979b242d41d4dccd99a90d8914e37e9f90b1b78663e67b191f934eb
SHA5126c7427a7a1f836400eb58ba050817fca8284618f8c2c419939cc2233f713ef265c81447ecb7acd2ac4d56de1147f82f2c02329ed83b74276ac4bdd979cc504d7
-
Filesize
706KB
MD50d5038ce9e23b030755f9eed50d85463
SHA19247296c66cade1aa1d8d1cbba1114843dda9125
SHA2561bf04df81e1215d7067b296ebb4187372e4f729465d723d58e5a7422f18ef26e
SHA512db6a36735a729db9d7066d5ef84b3cf1b452f9efa30cde3f92e1846d18de27b324b390407dffbc9cc6f9b391f2e687acd5aa6a02f1eb925663b55b275c488655
-
Filesize
581KB
MD57c2f9577def63bb810e7c5d4173dde42
SHA19d5e98d0869be2f92dcc15a3d47bb8744b87732f
SHA2565d4d2daab063414975d4d23fbb9553c80b3a25720a34bec75a9ecbc078eba472
SHA5128e20f4c08b0172ba33849f505c985b06ddff45bfe4a7976a6d56583addc0d47f1b57716e4211429b9b8e43fc5cc4233869b1942f974edcaa751a1175fb240504
-
Filesize
581KB
MD51855158d2a42f8759ab547409729d627
SHA1ca290040d91d55deabb51285d7b08ac6eb04f20c
SHA25616c3e82b7caaec3270d5389602d66a07224221c20674e9dd68518de1e91e434e
SHA5123f3f0784f4f4ad3f22aa9fa751b0ea982dcf4784c463e0315a1883b1b43c81b6e7530a223fc71ad803f3da33ad87791d7f159adccfc47cbd7b43d7dc0f872c70
-
Filesize
655KB
MD55eabf8f00e6d5dd31760a383635aa7b8
SHA145a83c66af1f6e76487b7c3db849bde16bcdb318
SHA25679320e5579c17af773cf769f72f66a241c6b55573dc0f6efe4a54403c30f4170
SHA512b91f63ec14a58a64c4099ce2b1bfe5183e0b51d4a3d9e274a9e932d8f71c9452130d8bb6fc8547ee441ae10db1f01e25e675c848114728359d6865413b957378
-
Filesize
591KB
MD5332e32b5d714a16cd61d7972766ec661
SHA14560ebad2d592c77e1dea8d5942b5959354bef34
SHA2564dc8e805f432b2d50bfb6d851f7fe9a4b656f9d55963e819cbfe97f587bb2f25
SHA5123c5006347cf7af288c965b236f563c3ad0b5f3bb44ac8640876d3bbd107df31a582dd0069ba841e738e769a86f280d7e2f4045fd41bab4c481547a1ecf9af74b
-
Filesize
1.2MB
MD5c9a568716cf43fb6d266f8300481ca1d
SHA17cfaf7396d00a2d1e66e68279712fb5152dd358c
SHA25680ba09019116318321f9ec050fd0b2ca21cc318ad90933a6abe25f17c143db84
SHA5121cd33de26fef3556f077590263ac8f8d9658dec44789026f84ba55071ca0007c69b1273e09f22c2393bc846c69972534c7d167a7c2c7fe18ed22208d22f034fb
-
Filesize
789KB
MD518528dc0e1dc480a8cd30e199f5c9f13
SHA1cbdd2b1e697709f7c46059224f267c9ab0942113
SHA25619620c3cfbdb1bdc2130a0b2cc0741d8301ad2a1b9253437b98dd377236c6843
SHA5127e2a0b4aed2bb386bb0b754e11cfdf63eeaf5e68bcab8777f8c6ac5f5ba8d3336ea924fd21654ee54f03fa34c80200a6639fb1af2a4a3611617e68744ec604f7
-
Filesize
1.3MB
MD5d874358ad9e91c1402004b12ad6b14f4
SHA10cf625e7c641db0598f4b3108b83d122f480a7a9
SHA256fd245bf5177e4c0b61db09ea612b6a5c3d4a895be06c78a81807f13d97d05a72
SHA5126f037725ca18cbe4c767a240804ddee9d30023f44e0998c93d36c1e17ebc2f7054cd988ed2a1c51079e52b20d12b6071db696007208c5594beeeea56a8b64424
-
Filesize
636KB
MD5cd0fecd78bd0d2e8569cc39866a9a245
SHA1e1033bf90089b765b7914c36e09e81161b112fc5
SHA2563a4d4f54aeba165f0b27183f74ed3b85ad3326f8362e4428e460b6d11592abdc
SHA51283cf224ebcb30987efbbc1f81a8266ee821fcb5403695f3773675a6fd97ebe7bcace4a32e1299b8a65930af535b53c1597b6541ea7203377461cb8bf88cd45d6
-
Filesize
836KB
MD56e173d02bb7cc3f7d2e2121b51fe23ea
SHA1214c9521f7ebaa02fe4b65b908b409d0574f8f0c
SHA2560bf4f235f9b7ef4c523f89ac943d169a81f8da48bce5fa0881f125be2bc0bba2
SHA5122ba8f385a53668075ab3600193bcd554b41da9300cef828d6078e13ecc753bed6dd6ff0c1796f62c69cbb4008939d9d95b8aefb48267bb8a2ba18a6b899051f7
-
Filesize
621KB
MD593b6795de5f2e0b930ed7ac20b893a8c
SHA11d1cd079264dd67693b88890ee91bbf4d60c3383
SHA25677fe39ca35af63beb7543400bb31c9bf4e50623bbafe8f3a5e8781bb992096ef
SHA5129371416f730fd121000c30216351cfd4ce97b9d313dc1cb9bb216c77ccff1ff428ae172e100f5d5ebc7e35711c689bbcf2fa8718de508fe90ea4061ad39dc7ce
-
Filesize
1.5MB
MD5115862d8cf00c6ae6095d429830313e8
SHA15e723d9c99599c107af4d57137d5402aed5ab684
SHA256be074543753c2948cc6769a08b8dea6ef6e4475f2a09b11c9a11006facd18e87
SHA5128cdc26b067d7a5e4193a94868b2e7292e862867b098478c0e771b5e52549ec2dbe59db6f92c0a3cf82adcadc56ba7eb1481904dffcd38b8b70631fe6466d9ec9
-
Filesize
1013KB
MD590fcaf00d099e8269a4e30161d264102
SHA1d048cd9ec8c19a058f5fd60d79e0befc95c495a8
SHA256db64bb0db5c8ba97823c823f405e9c7167b55b6de61037b95dcf50d6b10dbe30
SHA512242252f24cc2a55986d3933be8df6c71dc00868c19f62cf38a0a1574c3663137e652bb6c73ef493f3db1df197bc7063b50be583cf42fe9a2563da1448077acbd
-
Filesize
588KB
MD514ff767a941b5d87d0e695782c083999
SHA16be8c78034f7a60a1c6de3964a8d19eef7c6958c
SHA256d9b1ff6f4b2998b5a434cc5c8e018bca4c2afc378636c79e4561bd8aed0afcb9
SHA51259bc9da3fa139a3b8dff5777bf4e19acc7bec0d6c6b9abcbfd325bb27956db656bb4e168c360400250ac10da7af0cf02e0785771aa7b5dcadbde6329732bc6ce
-
Filesize
1.7MB
MD516803da602aa4a03f16db84b0704988f
SHA10d197f8d1249f43ff63c2b43770b5ec0e61c7a97
SHA2568338f6ba0a23f506676c372d5b5d360bd2e0ee45ed515dcfa3fe04d54c6bf68b
SHA512d9d37f3313dbb16086df6e1d8c813f772c3e1dbf1de77da0ed5ae6334c39e1741385c6d845cc75dfef9e5b195b0e0929459f742f533bbe5cf7468d52da14db12
-
Filesize
659KB
MD540b4d737779c8fcd91886a51b6facb52
SHA1596f55ffeb6851ed5e9171fcee409629331dc8bc
SHA2563bf3405aa7a173e8093d802dfbf05b13c80cfe69c17690f8594365c62bd3784f
SHA512db66d0b23f9f94e81cf58b9f14b8d39d26652d7e628a14c80b7d2df2d9939f4fc529f477da93d455de334c874517c6b45a717332ec0866791027a791d0dbe6ac
-
Filesize
1.2MB
MD53b5e7958fd73adda078c13ece6b34c7c
SHA1d25e57c8e2d0613796edab3e4d24426838a3cb69
SHA25692db0cd124fdd3667e509f9faee84b13644ca4b80253767c08e2dd7de35b6f2b
SHA5127647d02d81d75056e7b7940e91fabf895d35ddb8cbef7ef34dc147ff36bf6ce294dfca5f09f700d238c58fe099e601c25fdbdd087678eebcfb40ca657662df02
-
Filesize
578KB
MD561d914befe0fff3df3f1da4c0221c80a
SHA118644de05c563fd58b2f71ebfffc66bf08241dd9
SHA2566625c76e9ab8c4fbc8dba939d85f818c9063a7eb340a34fc18823bab07bbc08a
SHA512859e9ef8c74939f2d7ac2211ac910752c9dd72913d851b076eba5d5571be2b98353f1538ee57811e109a1b914091bc1f3bdd3d3ce751459ec9c44ecbff4f36c6
-
Filesize
940KB
MD53dfd0d4c972fc33ad412a3fe99a5c98c
SHA1ff4f966e970e4908694dee65bef25e4814ba2cf7
SHA256f2b2804dc305cded327d0b8d6588bb79192c272812f4fd90fc34206dbbfa9c3b
SHA5120d3273bfebd8b1496488df082ee4ee2f4152ab571d4effdfa270d5b5b2ea100d463180f4dba9af27f7243dfaf2a40b6c29c3b1034cc0075e9d04413321c9b029
-
Filesize
671KB
MD500a98f6d2a9534bfbc6038442360f333
SHA19742b876e9ddb1f632d7ea09617ed2083223c628
SHA256a580244749a7bdf3ee4dd905f0c205162ab3863cc8ae2ba6df2fed0d286aba30
SHA512aa047365d6a90f82b696c0111f83f1a806c231de962604ef8bbdb228b2be4c2ee46a527b73b2cbf117bd045faa1528923cbbba47bfa8d501e4032959f9cd47db
-
Filesize
1.4MB
MD5afb0f395d5323bb353aadc28854e4770
SHA14c525d70dfcdadde6984f1e8d625f86a62394fb0
SHA256a6fd2d2859b8bc29597540bc7dcebfa3f5e5bb964b234f022f5bd9c1802f7f34
SHA512e0ee26b6d06439c9a4c53b3c5950a0be485db4bb6992ad11a6956605a6c5133a4d39732b1602afeba2637f97ba199b31b0eaba922e03981b72adbc894eaa6a93
-
Filesize
1.8MB
MD551bd7ff6790dad2a2fc94fd92b7c5822
SHA10683372cd035ae81ad4d6361f1411a645e7210b4
SHA256ada7cf7027786c14b2f28407c77d9dc45bbe52ee59ca5f8a0331c5602a275772
SHA5125bef145ad3f6f0b0f87205284aa57210f723ef73096df2a238303293462bf51851716e7cd37083acf5886802966d3e5ea4f4aaf778c9d38c83939266cfdc15e5
-
Filesize
1.4MB
MD52d75f088b53de062dc1100fe8de1ab33
SHA103e45fd0b884596084076273934787674dce2495
SHA256db814877aa938ab3989db1f44c90a3eecee3d99e8b3e99e44faf11909e13f239
SHA51293ea4956ec5a7e7fb4cd02a3ed0d1aca055c00c4edee95573a888d1729efe9db0a06a3f86a263a774686b644298a96826cb27d3dd2cb65bdb06f9c5cf27100f7
-
Filesize
885KB
MD52515cd5ebbe48e481d0f4896207be364
SHA1737cb50fd9a038e8ee0ad3ae2c8c5275833b7472
SHA256f68bdf2ef684db2699ce239d4e7b693d22b5ef259e6abf0e1c1051b0b876f2e5
SHA512782fced53a356d9521acaafc90a027874b9dc555347c1fc1d2a4789cd1e302771ea6632e017cc74f74587a07b49dc876c9e108bf18a14b3b330abce2efe8fc01
-
Filesize
2.0MB
MD53485e3677b5718a65a9434119747ee08
SHA1d346e09da6435e19e03180dd7d1bfe9797a23099
SHA256acface03010d8dc0ba5f6ca108cce7e002cfdbca85dbfb517d1465ff3a7f08c0
SHA5127a98827d2cd006b586e08d61a9ba61bb4c7ebdfaff480e824f408fe2037329ea2833a0317288ed3e82839d1f92d3f55e2ebf138cf1838429747cc0c41a02e783
-
Filesize
661KB
MD5cbc7230894da9fa4c95bbbe1881455c2
SHA1af72fa442081172c9d69b0936c4780ac78513650
SHA25671424ebf8590d940a5414a88c01a52ce653b499f58ddc38fcd4d7337791e44ef
SHA512d660ff9e2144801fa1211cd7f6200f0d18914738c71783106099eca1893d423aea06647ce10dea77353630f083d3351a715d20f0135cdef4234bd0aaeb00e1ca
-
Filesize
712KB
MD5d32af329d31861ae037d0f7b4ad79a0d
SHA118b8ddbf8a942359f96f532101e6eb7bab4e0b8f
SHA256d6977b9d6b17d2a28c23cfed180f50b4599466d228411995d9aa1446612a83b1
SHA512854428911242acc48e996dd77875ad9447d76b5fe0344518d5633ab62e54ab2e5a3eafd5efd01cfe15afd61866ee409c708f18131df4c10350d4ce1af9d79e21
-
Filesize
584KB
MD52de6e826c7d61b55c9c8fa9d084ac7ce
SHA137dacafe908007c364ec8956216c46c309ee35fa
SHA256ab9871b7d1600063c7935c7cf93507c82eaf8fff7522f6504d971c9afb25fbe6
SHA512c2785969c62246ab65033c9d3fd871bc4bb2cce7027ebb296eb8469e0971c4031acca65c19e040d433085ba554a9a75dfec58d429e836e23bdf435c8814585e3
-
Filesize
1.3MB
MD5d93e01d3eb857e286a84ade10a19602f
SHA18c3d0b4da1a87f324cf3d08129eebf1fd8986051
SHA256e9a42d2d90388a861f41d2a9c3ea539254a5dda7873a321551efd9589bffe8bd
SHA51246d7f570718b02a1c57bf6364f5b86fc20da60cc41087b6dfc70cbbc3b2483c37ff074ae11e5c11f14e27cbb2b3ed8b364a3d58b472df63abc1a00d9492ef765
-
Filesize
772KB
MD5513fea935001109666ab23580dbb3312
SHA1a859e67faae21dd87618065c345e257f4e8bdcb4
SHA256a6fd8228ab51179e51cd0abb5cca4994ff26b77df35021e03986ae1bfc6d5676
SHA512b4a2d154d7c30b5592dead5c13a1802be495be2944fd4c10dbffae86efb89fa6ef2dd37dc5ed927faebe3f3f9de36e83f56a4a2f96ff699d345ec700e80545cd
-
Filesize
2.1MB
MD5e87df3567c2075dcde51fc4d4f6f19d6
SHA17fa150b7c68a3265270e6cd987b23bf775d48491
SHA256276e4161d5ad9213bcdc1fb21e16eeb9df3c6e8c9137fdc70b2616be28a74ad7
SHA5125493a20af50e6fa0508def4d19893cf747693911fc2eba6b4838b64a9a46caa578625712db705952ccedd538f8e14b8f2a8c21ec1ab13743e27a412419fbd055
-
Filesize
1.3MB
MD5d60e34f35f2345f0b6534134bbf1aea3
SHA1d7711839b6fb5c21739b5b06cf3efe9d84e8bb00
SHA2562d6e3738fb6316e77701f3a9e697d883ff411cd044ba85f7c39ac88933b5cd24
SHA5127f23fea666718dc3fcf867866b47b411b36bdffaec052e358d5d7e2ea472364b6f464e440438f063391fc223f76530fbd4bc948c2ed8f184cff5709616e29b23
-
Filesize
877KB
MD5a199ca60efae0b67b4b8cd0f01c5dd37
SHA1c493a64923687c9d338a7e3ad5a51f6179bd91f3
SHA256362721d9297e9d83bc460780103bbe9ea8ee0e6d8b54d9984bf6e7f5e645ce86
SHA51282fa620e5f4c63ee199b2d336d0770db7c8f43fe643be7803abfdec3c16cafe1efb182349786948d1335f4f30411ad02ebb5463800c47cd4b7d8a63f21887bdb
-
Filesize
635KB
MD52299a9e43c642fac3a5745381657a669
SHA1cc0c9ce5111196615ac21e16a37740d3bda99038
SHA2569c0751cc1ada64c6cede7ad3c58f1109d40c7c4a0ed0e4e46124e4d7ecd89814
SHA5122830b663580740a8233e805219b4c780243d2e724071ae4f67c2fb05f33fceaddda51a8fa150a7c11157197dfb9d07668f263f82207a45e018963419bb8fabd2