Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 21:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe
Resource
win7-20240508-en
General
-
Target
2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe
-
Size
1.8MB
-
MD5
02b2cf9b514ec3461da4f15837aee007
-
SHA1
48ce22254980f9ad9fe38eac6c3fbd77b0f72037
-
SHA256
6717a50f6cfc3bbacfe9ad23cc29687928789b183ff59785e50119b64b1d767c
-
SHA512
ee6b705ba175520b2f8e1682cfdbc51081acfae5727e6472ff9eb8a63cc61d373439d85c16339e6d3ec64f78f2de2b2d7a50ae5157b1865037d6d85c001a7206
-
SSDEEP
49152:0E19+ApwXk1QE1RzsEQPaxHNVkQ/qoLEws:Z93wXmoK9qo4w
Malware Config
Signatures
-
Executes dropped EXE 22 IoCs
pid Process 1272 alg.exe 5008 DiagnosticsHub.StandardCollector.Service.exe 5116 fxssvc.exe 2436 elevation_service.exe 3460 elevation_service.exe 4796 maintenanceservice.exe 1768 msdtc.exe 4908 OSE.EXE 1612 PerceptionSimulationService.exe 1480 perfhost.exe 4344 locator.exe 4628 SensorDataService.exe 4204 snmptrap.exe 4232 spectrum.exe 4924 ssh-agent.exe 4892 TieringEngineService.exe 1472 AgentService.exe 4656 vds.exe 4400 vssvc.exe 1004 wbengine.exe 3164 WmiApSrv.exe 1316 SearchIndexer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 31 IoCs
description ioc Process File opened for modification C:\Windows\system32\SgrmBroker.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\8249b957b3e2edcd.bin alg.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Windows\system32\locator.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Windows\System32\msdtc.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Windows\System32\vds.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Windows\system32\SearchIndexer.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Windows\system32\msiexec.exe alg.exe File opened for modification C:\Windows\system32\SgrmBroker.exe alg.exe File opened for modification C:\Windows\system32\msiexec.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Windows\System32\SensorDataService.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Windows\system32\spectrum.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Windows\system32\TieringEngineService.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\system32\AppVClient.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Windows\system32\dllhost.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Windows\SysWow64\perfhost.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Windows\system32\AgentService.exe alg.exe File opened for modification C:\Windows\System32\alg.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Windows\system32\fxssvc.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Windows\system32\AgentService.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Windows\system32\wbengine.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\System32\snmptrap.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Windows\system32\vssvc.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Windows\System32\SensorDataService.exe alg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\keytool.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\schemagen.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_156609\javaws.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateSetup.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmid.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\tnameserv.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaws.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe alg.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File opened for modification C:\Program Files\dotnet\dotnet.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_156609\javaw.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe alg.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe alg.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{487BA7B8-4DB0-465F-B122-C74A445A095D} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000aa4fea19edaeda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\ieframe.dll,-913 = "MHTML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000dd6a4319edaeda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-177 = "Microsoft PowerPoint Macro-Enabled Slide Show" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\windows.storage.dll,-10152 = "File folder" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32,@elscore.dll,-2 = "Microsoft Script Detection" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32,@elscore.dll,-9 = "Microsoft Bengali to Latin Transliteration" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{97E467B4-98C6-4F19-9588-161B7773D6F6} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000f47f3719edaeda01 SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{01BE4CFB-129A-452B-A209-F9D40B3B84A5} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000088f38a19edaeda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@"C:\Windows\system32\windowspowershell\v1.0\powershell.exe",-103 = "Windows PowerShell Script" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-115 = "Microsoft Excel 97-2003 Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32,@elscore.dll,-3 = "Microsoft Traditional Chinese to Simplified Chinese Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\ieframe.dll,-12385 = "Favorites Bar" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.svg\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\zipfldr.dll,-10195 = "Compressed (zipped) Folder" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\cabview.dll,-20 = "Cabinet File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32,@elscore.dll,-6 = "Microsoft Cyrillic to Latin Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E2FB4720-F45F-4A3C-8CB2-2060E12425C3} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000df952b19edaeda01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Common Files\system\wab32res.dll,-10100 = "Contacts" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-123 = "Microsoft Word Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\Windows.UI.Immersive.dll,-38304 = "Public Account Pictures" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9905 = "Video Clip" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9925 = "MP3 Format Sound" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\acppage.dll,-6002 = "Windows Batch File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9910 = "Windows Media Audio/Video playlist" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000078508d11edaeda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-120 = "Microsoft Word 97 - 2003 Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-142 = "Microsoft OneNote Table Of Contents" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{3DBEE9A1-C471-4B95-BBCA-F39310064458} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000f134a217edaeda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9912 = "Windows Media Audio file" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-127 = "OpenDocument Text" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\C:\Windows\system32,@elscore.dll,-8 = "Microsoft Malayalam to Latin Transliteration" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\ieframe.dll,-914 = "SVG Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9923 = "Windows Media playlist" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-101 = "Microsoft Excel Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-172 = "Microsoft PowerPoint 97-2003 Slide Show" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\searchfolder.dll,-9023 = "Saved Search" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-114 = "OpenDocument Spreadsheet" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{C120DE80-FDE4-49F5-A713-E902EF062B8A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000001a89041aedaeda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\ieframe.dll,-912 = "HTML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-124 = "Microsoft Word Macro-Enabled Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Windows\System32\wshext.dll,-4803 = "VBScript Encoded Script File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-107 = "Microsoft Excel Comma Separated Values File" SearchProtocolHost.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 664 Process not Found 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe Token: SeAuditPrivilege 5116 fxssvc.exe Token: SeRestorePrivilege 4892 TieringEngineService.exe Token: SeManageVolumePrivilege 4892 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 1472 AgentService.exe Token: SeBackupPrivilege 4400 vssvc.exe Token: SeRestorePrivilege 4400 vssvc.exe Token: SeAuditPrivilege 4400 vssvc.exe Token: SeBackupPrivilege 1004 wbengine.exe Token: SeRestorePrivilege 1004 wbengine.exe Token: SeSecurityPrivilege 1004 wbengine.exe Token: 33 1316 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 1316 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1316 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1316 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1316 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1316 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1316 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1316 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1316 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1316 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1316 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1316 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1316 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1316 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1316 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1316 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1316 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1316 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1316 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1316 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1316 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1316 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1316 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1316 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1316 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1316 SearchIndexer.exe Token: SeDebugPrivilege 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe Token: SeDebugPrivilege 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe Token: SeDebugPrivilege 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe Token: SeDebugPrivilege 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe Token: SeDebugPrivilege 1504 2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe Token: SeDebugPrivilege 1272 alg.exe Token: SeDebugPrivilege 1272 alg.exe Token: SeDebugPrivilege 1272 alg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1316 wrote to memory of 3992 1316 SearchIndexer.exe 116 PID 1316 wrote to memory of 3992 1316 SearchIndexer.exe 116 PID 1316 wrote to memory of 3668 1316 SearchIndexer.exe 117 PID 1316 wrote to memory of 3668 1316 SearchIndexer.exe 117 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-25_02b2cf9b514ec3461da4f15837aee007_bkransomware.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:5008
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:3976
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2436
-
C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3460
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4796
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1768
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:4908
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:1612
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:1480
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:4344
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4628
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:4204
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4232
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:4924
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:1096
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:4656
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:3164
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
PID:3992
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 8962⤵
- Modifies data under HKEY_USERS
PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3692 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵PID:5772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD58e84684b5102eece5265eda3721dd739
SHA146eb8dd3b98f32b8b41d8be05a095a3aa0b71740
SHA2566b0214e55d9acedaec4e4abc89abface09e0e5b2b7cd3f239984e2e492a0d57e
SHA51295423973bf970bfe6a83477b21c4e9ec68d272b1a1ab3ee3b076d0c7a3c02b39fdcd1cfb61eb581c6019237e8875e1e7b0c2b4547ba63d8e459aee80d240d26e
-
Filesize
1.4MB
MD53487d8006a04891daa787f6159d5ceae
SHA1a679976e9a74398222055b8f24c5283615aa2757
SHA256272e29d4861737b8da6b785a54cab4879b017a01d75904f58fb91f64f535b234
SHA5128bfdbea7b5f80571460896c555184141695712cecd6bf61a6c8f78f653a8c7818ea28efd5aaa61014d9026675c98493248277880f4d7695bcbe72902ba5b7f7f
-
Filesize
1.7MB
MD5b04b8aac49f0cbd1b026c6c64a254277
SHA18d19c8772b60e323bd1985511fe1bcba43df99ed
SHA256f31069e6629cea5dc4d5258991d5c0f4ef5cf3ec1c58ee17e0c89dfe99ef9a19
SHA512c454d9e174f5ba8c19554acdc088b7fbb82cbc774a9f690e98d59b0b8965341fe2c71e7dc8e7a5d7d57668e7d29ff8ea0f15818fa33f74923c17ca9a4131c2b1
-
Filesize
1.5MB
MD56d99fc4ea915d6345cca5bfe851329e5
SHA1686bc609c57289839bd3bd9d8d3b6bd86f292b0a
SHA256fb86b6fa6d38b58116d1a9dd73b3326b8f16f756a24b274e40d027464d201d55
SHA51219e5e2185f87fd7542911015cfbfe9f2e81e0cfee97716a9502cff07516f9c2684da4b4bf0b7153f5a56faa320754f21ef60944a78823159f78e2f8622693b0d
-
Filesize
1.2MB
MD5117ca2bf29456a582961e68735590e04
SHA11610ac984cfa646103110d1f17578781001e8169
SHA256b792c7c30086c2b59b98db8fdfa19dd72e5d8e205de7324f212f421e5b127d59
SHA5127bb526050637a8a5095ba9452339a1ee99a3fd01068ed8cad2d117a45b0d72184254348329cc91e35e082c43d7bc55746fb130282ab1557a14da28dd94743991
-
Filesize
1.2MB
MD5c154d6c6cedcb4d9d19fa91ac8f33d5c
SHA1c56d17b11d52afefbd4dcee982054d485ef5313e
SHA2569f8fbac663cb1e21f7e3baea0e86b1aad65d442059bdb52d4bcb39cf587b79d9
SHA5122e59375ce2f396f90b3acd9bbd78b2f7ffa3ad5af742744e8406f605e4b2fbd5cfd9bfd183edf2fb10cad50da2f4cfb70e272db14787c03e0f1e9b0715b8edf1
-
Filesize
1.4MB
MD5b5e2189245fed7055f56dc01aabdd30c
SHA18a0c912bcf66dab78ea11aba663f8d5ed179d201
SHA2560e7b55a885e7b9b11747771b84f53e40d1f80fc08aa39be7f7d2b01e22a80f5f
SHA5126aa9a15ae1d1527004a3df170c21ca8814dabf29a0645c95b7d9a17cc4e52d96295e9ddd5a7c4b7d8021542261e771239c9d0f82952f927bd066c7c8f8436f98
-
Filesize
4.6MB
MD595571492b35fc80bba8ff05ad2836368
SHA1deeeda7a1c3f7d439bd6610ea35acdd0970f0d23
SHA256f98a06cd0e37acfe858237e489e97220b960144af65ff813db0c1d42061003b6
SHA5124a84b6f867c6c25d0a38d6772d4218e095d5864dd66742bc69fe92af91a96f9eefc94184a275eebd3426931726c073160885fed35b567a0641ec9a04fe4b0de7
-
Filesize
1.5MB
MD5a422e461f5dabc728d87e380d7c7592b
SHA12f501d8f002b3651c489f7115cadb02bba8ea217
SHA256e4f1795afb6e436f342565673593162ed491c5c3652b67b70fef9d2e8463754f
SHA5126069bf0b98f3380423c40774c1cd8d3f4e9af170ea767a9ae57d00869dfa00f14cf5bc4d2d9888ebbf96ed1291c96593372d9c3e61e7b113e677a333c7b96726
-
Filesize
24.0MB
MD50690a5b2eb5a56b04b271ba6bdebbf36
SHA1c529aea242a14e056d20a37acb38f66089b979c6
SHA25641833a478fbfe58b987b9d2304888169bd3a4a7aa6b995544e8122890021b57c
SHA51207d9106cd8fdb2fce87035d95569689d0a887e46a99b28cb075a21e21785bc56ba0e90ac19cf35d6ad9ecba33b463c35701afd90104842ed381af9e0a77a06b5
-
Filesize
2.7MB
MD55222d28866ed5f1a20c4377008a53c2a
SHA1b8f569b2a1b77e0c1e1aa158123522fc1e96d05f
SHA25638f3bc815a4d0d2791c8c7b528c136279e3508b66f265ba2ba8f889e819b1dc4
SHA5127cc3be4e1ef328185531c26430d048e598cf71a3e895b1627d54f4d03e4fa4ef0e44e16efce2b6d88605598551717cdef8a29c2f391f7b3e25800a9e2bd8bc5c
-
Filesize
1.1MB
MD5f7d194abe44c06a11107556afa02aae1
SHA1bd38e3f18f2d54cb409f55dcc6722cd789f6e033
SHA25647d5992e0f92934a0147fbf21bc680c4dd6ce3b7d3fcda9fe2c7b1f7719b411b
SHA512a8a31d48a2670b83a79c3cf1b8b0c0e73ba741771e20355d6b07a059ffab4aab7037a702acfc30f7c881592bdc9518497e7c4cad50abfae307f75f4f91445d0e
-
Filesize
1.4MB
MD5be53e296010e5ab4969d837b54f21707
SHA1533cdb8669fc907868336239ee506b1cb99fdc0a
SHA256b89992fbbc6204cca77571741af5a8c707014514cdbee9e84e4e3469f8e38cbb
SHA5127c8ed6cf47499826b573522f9e219e103eb67dbc2ee0931a3d2a6cc24cf8bb6f08e86b40bb769aa4d1303659afcd5c59ba9b5ba236720b65c879664fe0cf4914
-
Filesize
1.2MB
MD5b579688c2d5a60147ac534a7217c0318
SHA1ea60718f0921f71754c983c810da5e40ad3671bc
SHA2564c9ea7b8d797946b9b5aec11491f6e1257213e95c39847ca4f74b33f154b44b5
SHA512bfb21d28aa1c65b614938c5aa8f5fff57b21490626425d89c63f518930302100a348405c9d721dfc9e33080d7bd89d32aec375e6b67fab02e7473e248a1ed92e
-
Filesize
4.8MB
MD577a63600d9205347b3b09410b1a1af36
SHA159f9e1f499105a4da96df88f9fb1a41279e5293d
SHA256d285e0ba8c6dc0e29ba774e45e4cf7048c0ef6caec4413e35f8b9dc0d58b1828
SHA512914d0737a9387da344eab70790816ac9de30ab1c546b8bd3d2d200453cbc92f30ec8660e5d8089401df0e1ea980df890dcb5c6ffe2b2d70bf6944d589afdc241
-
Filesize
4.8MB
MD5a9c4bd435b3a390c0ad188d77e1bff58
SHA1c494f584a11c7668504673b1e96068635cd429ba
SHA2562ba5ca9839954ee3ac0a682e599d3c11a5fba7109f681b0cd955e557f85d1905
SHA512d40dc829f0671a9b6d6adaba290a60f23bc3ded690e9cdb850df90ee1e36eae1acb3d590bb070705d2494232d3c497a8d5bb5cb9564201a38a2d7cbf258b5e6d
-
Filesize
2.2MB
MD5487b19aaf44695c86ee76a063426d670
SHA1cb4fec37d0947bff4fd6183912b2eb4aa03e9298
SHA25696d3b3dce9a2820849ede1f414afce704866d924c1c020c3ab6cdb35fa12e0db
SHA512c25323968f3f6cff9c38e7db926240161255ca4242944a27312b6c75489024252ef78992e8517c26c363f1147d945af6e90bbb919c84cdf1ad61c03810b23732
-
Filesize
2.1MB
MD53a0e8c343aaa4d56db9528ad3d01c2aa
SHA113e3c127106c63a06cabfad863734f8217361961
SHA256ffa6e3cdde55bddd8e394434c108b8e3922edfdf615dd666010c110bc9ecdba7
SHA512429acd80c73e0512a8efcdae975eb31391ebff058c352a62d5f7e7741cbb1e6b87ecf816550238c88ae27ba126998ca6fd13e922ca683b55b94820b6da5f08d7
-
Filesize
1.8MB
MD595528d944c71712c41ffc7810af47c18
SHA189d985b9c55423bd85e1a0cf65411534ef6e89ce
SHA256056109787b17dcb1e6358f870f03abf72c003ba7bc39fee5b8d8ca370423295a
SHA512e6d0c4797495f1711e199729646261f7aa07764492c5a9669cf27883232832f6ec0eca023a984121b4d958044d823080b66af54a7286309c8a930c64c744f6a9
-
Filesize
1.5MB
MD5116707e40b15b7ab5bb2acbb4d1a7750
SHA1d13c918fcc48d813a2a56542183ebef13fe4ffdc
SHA256ab78c2de67bfcdc8539c601e7ae881c4774e68702f0e21507b44858b2cbcc281
SHA5120de75b51828e56f65dfa44a6ce46329330ef17d14d94cd05be6aa12092b9bf06534fe3939b21fafa9de38aac36c3fbe8aa3db0ee6e11c4527566f4abe8071d37
-
Filesize
1.2MB
MD57aaa8bc4ab51ae58222da433d7d22837
SHA1d40e444681b879b184c184098bd3758349881f61
SHA2568e42ab87887e9c7788a505e55bf26f34f91c51b0eefc405d212cd2e3e8b03479
SHA512a27b0c566719ae2226efd318bcab49a350d57ece8e30c3740e4f9056e7f80bbe2a032485bb29b4db03ae55db067a3e834e0fdfaab1ce309c7cd168bfc38a4b2f
-
Filesize
1.2MB
MD509971eda4b8a7a2ec6699b47c2b933dc
SHA105531a59e1b0a0114319ec8fe5614c6f93a89cf4
SHA256ba47425f6413d9405dbc4c371b700a46c6485c878af9a32b26083c2db3431a4c
SHA51251978c035a4b3a89fe503d66cb7be2964d33dcceb8e7423a0f38ce72e012e9333fe9809ffad05a0bf0bb5230ab57e267708a279689a8b2785acd10dae176d22b
-
Filesize
1.2MB
MD51fd742dfd507021de58c56ff99a88593
SHA10ee6c8424a30c6023508878655f55c526db02385
SHA2563a0ea01d196a16a5a0c58d9a63162a2ddde3a9df6f4c01ecf21d402e11489435
SHA512c2fa11c3e82ab35bc84e8eedc9aa68fcd2b5bffbf71d44aab9f4529158cbdde275dcbe0690c39a88efe14c7813276186699a8d9b67d0c963a653c80e4ef6ff61
-
Filesize
1.2MB
MD561ce0798e7983e2f2c1b2324b8d3c743
SHA10da9c3019c09d144193f6dbab030056f8316f1bb
SHA2566c09cf80d3ad005d75b3a7f428b2ad142de05cedd20e00cec461d5b625b5e7f4
SHA51279d61ef4f3d951baa7bea26afdd0d2b07d84c923b4b8b7c5cc756e8d849175ceb220e792541409417f88a77ee7a550d1b203e30873ff3f266d61cc2f97d8ac38
-
Filesize
1.2MB
MD5b795ad5e13143ff51056633731c11200
SHA1a33d2b67e8ced6509716d0434072cdca8164ff63
SHA256c8165962a3dfe46cc936d137e33954a67adb08361352710039cf9b9a485767dd
SHA512b877303c8c3f9879116b4d6b218e25751f86111bd15c286b81790873047eab46daf064f9ce4ab8f3b2583ad78b8b707d300a5c0ff1e6f780e729e5ddbf2fe03e
-
Filesize
1.2MB
MD56c1b6d2df3248a2ff198fb68ee1f2561
SHA1df9e6bd07fcc48a04e25fb85efdbba13f3fb665c
SHA2569cc8e9465d5b90196be4bab46053eb0e3abbd6adb6038f54f8c59fdde07886d8
SHA5123946eb34fda7a075dccdd297adade0d26790bb201822819b738905c0d1ec0e2cc29bcfcf06abd6f077ab6698cd50b37ddabaa978c28c7e33dd8063179fe8504b
-
Filesize
1.2MB
MD5c15d72bf1d5def6bc150eb70da96a225
SHA164fba1606fd820e0acb4479eee9fbd4da8a2ca42
SHA25600a6ec15c0676891a0eeb54817f42167a5e24e3fa4876e3ad7a7373649218390
SHA512aede67c47865acd25fb2ece4ff82988d6097ecce694376d7510eedfe7a3238fc85cb2a617d477d7bdd8e1bbc66f8f76d1aa2e4c86dc6b7eba15251915f397d17
-
Filesize
1.4MB
MD5c8417819fbd4f3fd90135672badf3060
SHA18e16bf094aecd570f06f79f10679219f45dc3f00
SHA25620d3d3513138a084fefcf95a28e41e2380c9203a4e29c55202da238bfe7c0a70
SHA5123b5916647c9b7e04853fd003df6bee1d3c1d8edc543c83e722ac3486ebfd8af54697ccb256fc954031ac5cf9afa519edd3188c2164084806ae6e1f5e50f77ac4
-
Filesize
1.2MB
MD5b54faf779946d55273b2834cd603da59
SHA1aca97d0d23e9ed5ebda17c59df7391b6a29b8065
SHA256abd63d5d4e3093735304bb2ff1806122db66e8ad7d40d89ebd368b6783487c03
SHA512f472c0d1a6ccfe1eb1750e7aa298f5d04f4bb81b5144aa1c334652616b1b6348c87cb0e94b41717c7c1375af7138cc63fcd21a03646369b1ea2595152cd96395
-
Filesize
1.2MB
MD51b45ce103f84e6581248c27e9c105648
SHA194f7a9c7b43ecd6b48cc43d197a1f21a40df8b03
SHA25661189ab04d6e2b0e4f785b8eeabf5fb52b29418ad72a6c3a3c2e2d2ee05684b3
SHA512e0ca3d013fd1a63bcfa3121664f2aed32652db02714dc1c6abcfb4ee39ef097cd7345f6db9f829eeeb7ccb5bca40a84ce99d549d775037bd387f74b2e8963666
-
Filesize
1.3MB
MD5c93dec99371aec39372ea43c20946022
SHA1d14205f42cff71da32c5843eb8893ca60e5a707c
SHA256c7d68a549b57807b9bacec9a516fef052d4a784de091b1f18c9659f84525f1d2
SHA512543d1e436b86fecc8171baa93e852e61b37f442302e746dfb6593d9d6984bdf088b40ffd083901ec36946d69710f3658cfd192f0f19f36c238d160411c7348ce
-
Filesize
1.2MB
MD5800dc478c80d78d2c1ba7d1921dd4c5a
SHA1239a145919105eadae9927b73dcdffa15bfff935
SHA256f940e5ba33857d05003cc08a374114f9384822f517be9eb63889b0c8522cf5e0
SHA512a2fb9afc52b104ea6c59f5edf2c3bda0a104cb0e65cc5a99a650c97959f0035e9d04a08eca2649036813889209edf5605a5c69241d40115628c252a3d692486e
-
Filesize
1.2MB
MD558bf2cf6fe2201ac2ad7da25cb3febfd
SHA1be261fb81a01659f96fd716c7770d7cfdfca8940
SHA25634acf4b7641a77d1c61c38e3fea9da485dcf2a339287a53e4fffc44fa8b61658
SHA5120017c35adc12970fea27e56998a62147f8641e20f015d3e1f86fcf593afd89b4020306010e06717eec5791950f623f3bbea67d14cef91ac3e3bc3b7b31c6413f
-
Filesize
1.3MB
MD53449d3bc922fdbec9ecc62b80420b40e
SHA11b863d14fee297dc149c984cad705b361fa7a6e2
SHA256c28bc4af87f3f9be76eb16c8129778fd4ef8b6b9ec9c6b7a5d91ab5bce1432a1
SHA512853e9b3aa52c9cc8237c35d85bc49565e53814c7ae012bfe9708544f3116eda67756bebdfdedb18b38fb6e00212620f30cff712e05aafaf4e3c37c00254bb57f
-
Filesize
1.4MB
MD50c9edc5f04ff1a3157f641ef4f1c899f
SHA1db51e3779cf093b3aa2c8cd5684c39d0b836cd9b
SHA256decad7d7c4279e5621de57b5c1c1c91a43e81110580cac60dbefa4541926d176
SHA51251d4698c91884c6f08c1f4213e967809ac8ddc38e05cc3c33577b25b78a93e56b03fc9168a83f202dbb0499f79612593f83fdd292611835d3994709cfaf90812
-
Filesize
1.5MB
MD5e46c972aace07273e869a833933d1d4b
SHA1e44bb385c741fad6671fe156d4c9f97ba51e9272
SHA256f7a6e8b4a81da2c5aa63a169ef6b8403c001dfe82e20ccf69081bda2100e7846
SHA51252c741a10513d26dd144fe63bdf381f8ed1a711e461bd421aadcc84c0140e1ae60878a8a5c9fb676c3f9519d96fe3dbe9874b37f3ca2aee10e9c059d864c037f
-
Filesize
1.3MB
MD51c15a00a3a22e20972bd527ec14a7ba3
SHA1ed30a1d5bd775f121c94bc7434abfc1c2ca91e56
SHA2562744906359933af6f01eb6f0ba6c43c82ae61fc3b0f50e4f0b302037da97306b
SHA51213b22e210c56c33ce9332673fba611be558669b5b3f5fa8fa530538447222450cd53820c2519ef4ed0f9554abb018dc63d23f6b8fa4172ac85997e3db833a1bc
-
Filesize
1.2MB
MD5c7d9c893a2a8f4570843ad7c1d858bcf
SHA15bfa89be2736ea3a8e221d9e2a9c4f0217a9d0f1
SHA25629c15387653427de5adb7c254981f8169eb90f3d8952585d934ff289c2af3d47
SHA5126e8ee81da2d84acd2c5f1ef886b860c79f74c4ba56a5a16957dadd845381dfdaecb972073154c3c0ccbcca72565e7d5bb8fe502fb3f273efa795a11cf5492271
-
Filesize
1.7MB
MD56757e0a373d7a47529a98dc54979a683
SHA19ad0c5c2606219337af2bedb918f8ff34a5aa1a7
SHA256fc9e19213335a64d2b787a7054746fb786290bde897ce2393b001f0a72eb5115
SHA51236821a496ba85dd53103fa1c043c7f374c17c1d892ceab4a5d63efc09d282cfcef09a883e2fa130407ab545fe90e81dd7d5099bd9c887759557ed0afbe99c1bb
-
Filesize
1.2MB
MD53ebf5efeb72c2a3a2e65549b8c5de1b3
SHA148254bccc536c2cca53df75a670edc1a018254c2
SHA256a756d1c27d4d517678eefd8a53ec9731e2cbb008ce594952cd7ee5b1970add2a
SHA512c06b350182218f0f05354145a253f76b7a01cd39cf3d91c064177f13f3ac9e5c5c08e2ca472689f85236ae8c538f3ffdb12f33cfb64948a519bb9654494ca6ea
-
Filesize
1.2MB
MD5cc1d139254dac2114e62d95809011492
SHA13b929bd56dd12be471f6b51403019fc9b5b34f7d
SHA256752c04d4c97abd0818fece5b3f966a3db8699ab0146001dde2194571315e8d1b
SHA5120e9d96f8802feb0544e774f78dba8b2602c072e7373211135c629fef8b65981aaab3907908fc62862ac30be7f68f1268d46a6ca93740c8cefe8ef0934add3f44
-
Filesize
1.2MB
MD5feb06e3c44169efc3071ce621ac9aa04
SHA15a200055e8c7c6e46b2ce975a45d5b9311437091
SHA256add63723337d055fb828099be8036444d7624509bcf995b02dfd46f915e56f1a
SHA512f31019214e5359539f03325a2730a6f92af1a73382cc4dbdc6ccdaa6458444685ab591476ea7db1e9c73261f2aaef981f3c0deb640f1775048378dc2f4af063f
-
Filesize
1.5MB
MD50f91afd873d893b41766b249b14cd9cb
SHA177e2f909e64abfa382528c968d49fa8545e9237d
SHA2567cc5330289687487b7e52a00effac20a465a13d965129a612e725685ac848fc0
SHA51200ad5dc7fab3bf8f53b489e69f75bae90e2c914580c956dd59fc847369c7f573c383200419ce6249dc46c70825b1477fa732f46488190a72b181020673cf46cc
-
Filesize
1.2MB
MD532051857622e81bfca999ae6c289a63d
SHA1fd0026422f1d565dbd5c4bf466c840dc23aaf376
SHA256b97b3e3c310e5ae3fd2e9bd3c0d169dc0a51dc12f176f1307a60a38f88f67b19
SHA512be8ac9822448eddd28744a07a8a7faf40a452bc22fe863c03a7a5b860e23a7014c2109a15f90e1b872cfed20de13bbb5647c6f2f2c721fa173025bacdc37d8d7
-
Filesize
1.4MB
MD53f1a3130691a000ef285be2906ac4488
SHA10737b8917ddaa9cd15798b7a8ece54e09ed9c13f
SHA25626d5aaff9247656701557091ed429001bb619ed724ab84d08b5fb61f4fcede4e
SHA5123005e7ba3d002fe7a15670e54a2bb8fc2df71c08e4d24b1769bbb3952f8c0734702c7fcaaea9111c42a2583312731aa018dad16f74335b55d338d7d0a697e4e0
-
Filesize
1.8MB
MD5a34a7d86208934195a9238a5e6f01cad
SHA1eb40757c7f17dd2d69473d01a12de7f3c5fd5b45
SHA2565013100777f7b7a9a017090c060cf07e065a2a2034325842e0324f7f580399cd
SHA5123f84e2b4631678c470e707189b7fc1885a28a012e7550409cec664ec253cf1ee725c3eef4d97e516a929a34840dac1529a4285f558be2882814b58225b717e49
-
Filesize
1.4MB
MD54e4bcd98c21fcd297492ed4ce8f36d19
SHA1975da00024f02c620ffa8fc95d7e588132c29c15
SHA25695f70bd55f6dc41fbd0bcf7c84c4ce0fbc361779e66dc591327a5c1b7b1c2862
SHA51234ac4806dba05cedaa14829230fb62f91bcd4311cf211eddc4e23fc53a55de61356b20e031dc85ff812da383a754eb45ceab936faa74371f99cd8293b465228e
-
Filesize
1.5MB
MD55a05f45808f8301d052f9bb5643b1546
SHA1b04be84da9022899a46401893ac68399b51c1df2
SHA25617f2c3b255120562007ffc5a5becd109e8d6c953a31f265f27cfe1471f50ae92
SHA5126bec23daf14db5a94d8359c8f991cc74dfe7db99db6e226cc3fa9cde9a03dfa235819893544dd61acc954d5386d40b4626bc51330caa664079ecb18830529796
-
Filesize
2.0MB
MD5d1817d788d6ae7ab4324d5e6520b0031
SHA1cccf0807851b63fd6f7749805d3fffe9fe2dfc25
SHA25633a6d5f676777ca98826ad53aec1e1bfa278e2df6b979a9186bf4c41e92798f6
SHA512662f105d26b9d58e28e15f4cf0e8b78f4ac4377ffcfcb77ac862133b8dfc8e1340915a0f7ba217437cd1fca748f8b8487a2db557b4a818fd375be4f8de81b76b
-
Filesize
1.2MB
MD5b37de64f0116ff84abca6d39035e0bd4
SHA194f953d4b3a5998622343aac249c41ad3ed6395e
SHA256754d098a300c8284e1dfd0f02e0791a8cec43d4c08da3d125ee149ed049b57df
SHA512d57ab9f5acfdc9ee6cf354c365dabb664bb7bbc4f0af2f6adb91653b4479ad26d23ae92dcde76fa4e9f5624e300c98ef26cfc1632f2ad2bacd3ad5ba01378bb2
-
Filesize
1.3MB
MD52bda504a757a58aa80808966b0536330
SHA15a3bf8af6e06bfae5e24eb96f81258b5cfa1ba6d
SHA2562948dc07821cd01d79d14bfee855dbcedc00e3b29ac5613611826ce4000ba36b
SHA51241e3dd36a893ef824fc216268121ad1a4ab628afd95109657b5f789402398a040080b68c1291827c97023474074c8ccee86c0ddbf97a43cbe7d131b2acaebc03
-
Filesize
1.2MB
MD5f3f7641e91b0db8ebaf92fb9de70977a
SHA1d0d6560c179275dd9843751ede5ab08624ac37f1
SHA25683fbce20f1b3c4fd38caf13e873031e42f14f2121cd25669b8b63fac9a9e4169
SHA51292a2a718b783acbc1394bc177f72935afd12464a63d702941a8966068e60a168695ee92f803a9ff34e4ea802479fedeae2e0e3370e3c9051aaa7597074145c90
-
Filesize
1.3MB
MD5bee518ab4918adf33330a36993136d4a
SHA11f29ec20c8eb481a4f3a2c1fef3d7e66d9d9ac91
SHA256668bd6b5cc50385bd4a28821cb68f3f8fb8c55c6b168a03000ad65e84ef44811
SHA5129863c0c256dfee7f49b976d7958d5f7fe52899bd389bb0fd007015db37ff566331fd968c4ca125b79f6fa60ac85cefa66fffb8be85c4b49820efcd7b0f6361a7
-
Filesize
1.3MB
MD5a86c84ab01ed4ae505c3570e211c8d84
SHA115f1e2ff6f083e1851736bba9f5dd8a6f3e72577
SHA256d1aac0f0377f74a5e8488c3b77f5d397ef0de52b4128271da6b1c48c57a1e28f
SHA512cb28c7df997fd6a45563379d404fe09d4d21d5bf7ff5385b7f4ca558291bd7a43c899fc734c0c96e0004ff68d6fde5f33cbd40fbd60f295b6b1b3afdd073f0c2
-
Filesize
2.1MB
MD51a636f8b4cf0a9954fcba099d55e7ed9
SHA15e2107a4d72c21c70ba17781285045cdd997b330
SHA256638fa41d368a42b1ce202296f96e469feb9f0aef013c760e33c948ae1ddfb52b
SHA51222d2f5a8ef84368839bbe4f2bb44926e2e868ffc6038cfb4a9a92d1bf6aa7a0e4ec6f7ac350301e57b61b28ec38f3ba178556c3383c4be95c2c7e05b755afe08
-
Filesize
1.3MB
MD5a907ef385ffe0feeb8662152fcd9eb1a
SHA1cf67686cf3bc03ba6bfa527e55175d656f331465
SHA25623821d46a448e7dc37ce308b1a42bb3977e2be7a8d0712ab2c78de7d89148475
SHA512da3a2eb670119081df0ec3a87273e4945cd064d06e401efd75066f73c0b9229dea2ae5b6af7bf5a1b755c23654f40251ca1288bf4ede1025052a7dc5cf3e2718
-
Filesize
1.4MB
MD5d7ca208c2c455589407f99e721c80d06
SHA1d3e079788efd5132e65f42f97a911b76739b12bd
SHA256a9aeb8899a77876f50acf9fa10fef671c7a9382748029dea33f735d9bbdc4978
SHA512fa4a5ba17188916f02c812a4275f001d34d765f4474a1af12f17be461682c59863511b7de80461523918c343207ab572884e51053c9b09ea2cb96d1a925c4671
-
Filesize
1.2MB
MD522de6893690629333286c3c1b5d1d06e
SHA1d97ff03da13f0c182968b8ca18ab7b521b99a477
SHA256032e073cc2a557cb99754f770de7763e6af3247cc8a7fd82852464e3e818e844
SHA5120449c87fd17663df029a20b433453b6591840ab61086b0dccf27ae340714acf0f3c42d2f177f494fe388416f5c70e2bd02016fe0c29d3933718254dfc2f24758
-
Filesize
5.6MB
MD57b4445f4bf955042cae0baa87d1a4e39
SHA1bca5fd6783905556e2b9e12317d46c70299cd6dd
SHA2561b9aa34a00bf36c6d0655b983c600f2584df1e70f6648f66e8283b8c339d1d3d
SHA51201f3f01fa3a68073c710217d17ab9863b68238e9367998cb5e1984a20a8e4b12f52f573f8ff9204c9e7dd388e06cb7626fc9083b56eb2ecbbe455ef4ba56aac3