Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 11:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe
Resource
win7-20240508-en
General
-
Target
2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe
-
Size
712KB
-
MD5
a88a8be0a73bb51350a2039994ff5ec8
-
SHA1
7082b53e9ba374f55d64e7378dc8a07b22f5daef
-
SHA256
36eb5818340884110f263a5dac6b7a00fd543360827b2bdfa283657bd4f97dd7
-
SHA512
14ffb74c2c8fbd09fe20bef9c7ac7135c26b2980623b324ebdceb77532a8c0901f3ff0b059cebaa48f32f6fd9e6a4010fbf2daf9ab9a4232a87a0f0bdceecc90
-
SSDEEP
12288:ItOw6Bav+lCFcD1goThydrWUeB+QChZsrwbebPeVmfCUqVfZbdbHF:26B0UOoTqy8QCYrLLeYKUML
Malware Config
Signatures
-
Executes dropped EXE 22 IoCs
pid Process 900 alg.exe 1920 DiagnosticsHub.StandardCollector.Service.exe 4300 fxssvc.exe 1016 elevation_service.exe 3740 elevation_service.exe 4360 maintenanceservice.exe 1972 msdtc.exe 5072 OSE.EXE 4352 PerceptionSimulationService.exe 2632 perfhost.exe 1936 locator.exe 4436 SensorDataService.exe 3696 snmptrap.exe 872 spectrum.exe 2740 ssh-agent.exe 4704 TieringEngineService.exe 3596 AgentService.exe 3160 vds.exe 664 vssvc.exe 2744 wbengine.exe 2072 WmiApSrv.exe 2376 SearchIndexer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 31 IoCs
description ioc Process File opened for modification C:\Windows\system32\msiexec.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Windows\system32\SearchIndexer.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Windows\SysWow64\perfhost.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Windows\system32\locator.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\System32\SensorDataService.exe alg.exe File opened for modification C:\Windows\system32\SgrmBroker.exe alg.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Windows\System32\vds.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Windows\system32\vssvc.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Windows\system32\wbengine.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\system32\SgrmBroker.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Windows\system32\spectrum.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Windows\system32\AgentService.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\System32\msdtc.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Windows\System32\SensorDataService.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Windows\System32\snmptrap.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Windows\system32\AgentService.exe alg.exe File opened for modification C:\Windows\system32\AppVClient.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Windows\system32\dllhost.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Windows\system32\TieringEngineService.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Windows\system32\msiexec.exe alg.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\ce4fed5d4a48edc7.bin alg.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\System32\alg.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Windows\system32\fxssvc.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\tnameserv.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\7-Zip\7zG.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\klist.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\tnameserv.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\schemagen.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\tnameserv.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe alg.exe File opened for modification C:\Program Files\7-Zip\7z.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\notification_helper.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\chrome_pwa_launcher.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe alg.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xht\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\msxml3r.dll,-2 = "XSL Stylesheet" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-915 = "XHTML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-10046 = "Internet Shortcut" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9907 = "MIDI Sequence" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9936 = "QuickTime Movie" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-101 = "Microsoft Excel Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@windows.storage.dll,-21824 = "Camera Roll" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-123 = "Microsoft Word Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-182 = "Microsoft PowerPoint Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\cabview.dll,-20 = "Cabinet File" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5383EF74-273B-4278-AB0C-CDAA9FD5369E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000e1c98e9084b2da01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-115 = "Microsoft Excel 97-2003 Worksheet" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-913 = "MHTML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.svg SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia\ActiveMovie SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-12385 = "Favorites Bar" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{01BE4CFB-129A-452B-A209-F9D40B3B84A5} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000005e8f939084b2da01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9902 = "Movie Clip" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9939 = "ADTS Audio" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-140 = "Microsoft OneNote Section" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@"C:\Windows\system32\windowspowershell\v1.0\powershell.exe",-103 = "Windows PowerShell Script" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000052f1959084b2da01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-172 = "Microsoft PowerPoint 97-2003 Slide Show" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E2FB4720-F45F-4A3C-8CB2-2060E12425C3} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000d503c89084b2da01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9934 = "AVCHD Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@windows.storage.dll,-21825 = "3D Objects" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9905 = "Video Clip" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9932 = "MP4 Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9937 = "3GPP Audio/Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-121 = "Microsoft Word 97 - 2003 Template" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9935 = "MPEG-2 TS Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-102 = "Microsoft Excel Template" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Common Files\system\wab32res.dll,-10100 = "Contacts" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9938 = "3GPP2 Audio/Video" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{80009818-F38F-4AF1-87B5-EADAB9433E58} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000a6252c9184b2da01 SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{F81B1B56-7613-4EE4-BC05-1FAB5DE5C07E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000007284e58f84b2da01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\Windows.UI.Immersive.dll,-38304 = "Public Account Pictures" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9914 = "Windows Media Audio/Video file" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-142 = "Microsoft OneNote Table Of Contents" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{97E467B4-98C6-4F19-9588-161B7773D6F6} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000004204a99084b2da01 SearchProtocolHost.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 656 Process not Found 656 Process not Found -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe Token: SeAuditPrivilege 4300 fxssvc.exe Token: SeRestorePrivilege 4704 TieringEngineService.exe Token: SeManageVolumePrivilege 4704 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 3596 AgentService.exe Token: SeBackupPrivilege 664 vssvc.exe Token: SeRestorePrivilege 664 vssvc.exe Token: SeAuditPrivilege 664 vssvc.exe Token: SeBackupPrivilege 2744 wbengine.exe Token: SeRestorePrivilege 2744 wbengine.exe Token: SeSecurityPrivilege 2744 wbengine.exe Token: 33 2376 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 2376 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2376 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2376 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2376 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2376 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2376 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2376 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2376 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2376 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2376 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2376 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2376 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2376 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2376 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2376 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2376 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2376 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2376 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2376 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2376 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2376 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2376 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2376 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2376 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 2376 SearchIndexer.exe Token: SeDebugPrivilege 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe Token: SeDebugPrivilege 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe Token: SeDebugPrivilege 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe Token: SeDebugPrivilege 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe Token: SeDebugPrivilege 764 2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe Token: SeDebugPrivilege 900 alg.exe Token: SeDebugPrivilege 900 alg.exe Token: SeDebugPrivilege 900 alg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2376 wrote to memory of 3736 2376 SearchIndexer.exe 113 PID 2376 wrote to memory of 3736 2376 SearchIndexer.exe 113 PID 2376 wrote to memory of 4832 2376 SearchIndexer.exe 114 PID 2376 wrote to memory of 4832 2376 SearchIndexer.exe 114 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-30_a88a8be0a73bb51350a2039994ff5ec8_bkransomware.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:764
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:900
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:1920
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:1532
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
- Executes dropped EXE
PID:1016
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3740
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:4360
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1972
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:5072
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:4352
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:2632
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:1936
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4436
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:3696
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:872
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:2740
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:1564
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4704
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3596
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:3160
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:664
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:2072
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
PID:3736
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 8962⤵
- Modifies data under HKEY_USERS
PID:4832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5296fb729178242e04e92bab95763c300
SHA1e293ca66f19259aaea6ab7071d84bd055196319c
SHA2565794db5497368362e84e1714b7413f570e0977f060886e1df501418cb98de09c
SHA512c770a738ae3ae00bb58a98bf9dc8fb86a23cff7a900295616ce9c13cc5c3f667c236533e536b0eb9e68eb96a679a076924a96a2ef48e1d6bcd3e2b6768a96f3c
-
Filesize
797KB
MD5bb0dd82ad33540f5d42c5a73f96968c4
SHA1c1f2e9e639de84c8882510aa500cd1f8df33cacf
SHA256f54304fd787ee5a1674fc151f582d540b302da2108fe9cdc190dc443de83fff5
SHA512516e3633c0e6de218a511f15ada4523213fecc48fc5c515a1f68dd322c481f4e48ab703c4e553b132e91a32e842c068f3aee81cb7444dbf320c10ae6d8353968
-
Filesize
1.1MB
MD5605778b93a7d41a8e4da7c7b2c089a3a
SHA113f6b8e09f1de6fcf3736697a9972a5e7c3a0825
SHA256c872062677d539b0c2b143b1b6850c9e05070c7b628097f92839fcaf671b7672
SHA5122dbac1b511977ba6d7b9eeba93ac05f945dc727bfa1c803a2c5d4c2f6e9faf3056a0d3984bdee3d652d389e56d92915f659b2a1da162f5f728669ed088bf7bda
-
Filesize
1.5MB
MD5b55c362656978b83f934fd7c642e166a
SHA11d222c9f1125ab6d42d0175a7c17ae7919ddda71
SHA2565d3441f292bb26db930e4b37052f282a1b32184caf9490b3dc0289e9e6b93a1b
SHA512461bc516f4832c912d98775cfdd62f3cce675e745748b42dc21c6f4cf3ca02b3a30448c0d003534ac2cea59870f3423c16139eb560a762be46010cfbe9804a62
-
Filesize
1.2MB
MD5fc0d1b55a9095eb8f245c9e08d99f84f
SHA1d816caf56773a25b8a903992ecd98e4a7de3f503
SHA256af6adff18d51de9a8f684311425a896f6780e05f6025f580e2470876da7fcb48
SHA5127fa0885c2162433f1093e58ca5d547a41241c68440f06a789278e28c182378ba2f37f9f32f409b8e00987bd2a926da02f3f4ec342807b05f67f04d5cd88b996f
-
Filesize
582KB
MD544a356006a7a2eea31b914c92a27917e
SHA13dc70d0ec0b8c31a7e1d8953e1c18a14552057a5
SHA256d7b93238988e79f4fb29123417050b0d83a448b998d54b5faca5479682ee6556
SHA51218649a69f418d9cd0fdae9d97c3cb2839b620e221c3b2020bb1fde0ed111e8eab833a6a2aacc78c1d24cceef38d32f81133b522355dc4523eda37682b38e53ad
-
Filesize
840KB
MD5698d1c20fe5a39ebd656f0081ffb859d
SHA12ad9459b8b9284f2eced8b8d961ffa0d3846fc36
SHA2568b59c52b8e5d41daedeb55fea31dcd56eeb3a3300426c069895839441c72fa24
SHA5124522fce05f41bc46ff3d55aa9aa039339626673930d803a470ffd47b0cbab4ad31b444e05539a9c973ed739d436b7b60432b53d11cba171f091e56dfcde430d0
-
Filesize
4.6MB
MD5226d9adf7f1c20cfc6cba4e6e28c0c90
SHA10de31555ce1233b34726d9cebfe93e50c1ee0331
SHA2564ad7bebf2d41615a3185121039862a289cd16cc376e00ed9f018800e9ad55596
SHA5124dc1d8988668e3dcbcc653a55cefaf6fa68cbe1b2af6d81616c944aa26f370768d2ce5a8c90f4fa0cf490202b14f61306cadb05480fc2c022896b60a8c94bf99
-
Filesize
910KB
MD50c3c27754b609f5ca9d01a5d11c46c67
SHA1241cb37331fc4e92d807418ec9c1be45104fe6da
SHA25601a0d22947f9e3cf545263451f02192888791a43120982b1a8f2da165e71dc24
SHA5122e90f2358d675978fb4ea5c73fa0c276ed7cebfc05850169f60717bebab3ee6734a2481af50a085482013aed668d0ff15e0c4ce00e000e37659d1bcb435e2143
-
Filesize
24.0MB
MD5371e99f021d754fdfb40063fde49187c
SHA102b560f6dc216ffe9f229644bb575d9f370c8954
SHA256da6063f38bbb1ef03c5d297b5dd180ef9564cd6db8d09ec8b44bb95b561552dd
SHA5122ed6457a1f6edc0d09536beae4ffdb5785e0b2b470a629e10bd91b0f070258d20bd436d260de5052864010eadc1f9bd7814883b9f40af7585193fff28f27618b
-
Filesize
2.7MB
MD550324180611bcbc1f182341558b100e6
SHA18fc6087bd41f868140fdac3157e1a2b00500c071
SHA25650414130348f6f8eb1c263cbdd6960dcca9ee72a5a0924031e7cf37ae9e4b19a
SHA512a03a53bf768363cf7ef8e569f2d110fe69a5c862103449778980d94fcfae7ff793cabc44129230f0652dc18372961bc4fe8bd42c7dc89667c58157f7fe47eef9
-
Filesize
1.1MB
MD53412ab98b0e337aa309d32a1db5ca5e4
SHA185a0ab6fd3227677aac25a24709b4032a745672f
SHA256e81a4acad7f92134b92905ad3dcffe47a9c468d7e82c2d4cd23af03abd655413
SHA5128f422a9a5b871cd6db0ce347dd4d55a48f83f8f410f8d4ec13470f38d6b645ba9e21e9d93abff8c9f179b7804435f8c95455c0a0a3244ce973f0ad50d4ea157a
-
Filesize
805KB
MD51c0e605dec225fb7d405566df55bab90
SHA17b86423e8c66befac340ffa45ffe941c5119f4ee
SHA256f210f384d1916bbfb63e56bd5fb614b33feaa102fbfedb595004b6c6761febfb
SHA512412719ce9240a8a0307310ce53f890a771fa38a2c04fd696ee4f6d3a12adfc43e61aa960fdae3b4dc78e74fb25d623f028af9f7898dd3aa0792b7200ed139894
-
Filesize
656KB
MD58026b07caf922c486854faf24d2b00d3
SHA128c29ae2fe803a1f145fb12caaf12aaaa419b30b
SHA256008e33793ee99736eeace12ab5e718f3cb7231bd69809b562e4467265aa1616e
SHA5127de030a5b8dab912def8f457a82a0130ccf1facfc100e04eef2d6b9f8a277ce4d9569ab7ccf7344b539fe706a62afb5b9bedfbd247975d3d60a847deda3d43cf
-
Filesize
5.4MB
MD5d2c10c57e339d045114129c295596e36
SHA154a3bfb5f9585756ad8dffcea45e5b9f9d355587
SHA256b8ebaa5622237996877ada96438398eaaaa6ea8575777261045f5e31051bd10e
SHA512ef81caaa195643f8411082b77e4056a198d3c91d6441d520cf6c8dbc0eeb132213bfc3601a985386790b218ee5c8b4e38b4007c95e421fd9f3de218bc76e91f8
-
Filesize
5.4MB
MD50052bba1cd459096186b10b93d8b1063
SHA1b903ff86657c6f5542d88bc839b4196f8c9c2a13
SHA2565821d108ab96eab15a8b18e29fe90ee07db5dcf884163e5087bb3d0ff0a7293f
SHA512c8293008e0fc48e5d0c1975fd8c5b8012777cd515970d201ac054cab561f55b77af21fb4403cb1dffb362323e25c7e959945ad11477115404136c9cf44e4cd31
-
Filesize
2.0MB
MD5f4e2c9b3ac7ff1a9fc771a2735f2963a
SHA1c9ecb0b638ee851172231175950e1dd1fcf3e1db
SHA2563dfd68395c9a757ea8bc7fb0cdcf9ce7379a1b5755492b0d2140a8a72577179f
SHA512a09f2a99abd20d6704ad437ffaa5ffc16c3236f5b29ed4d6b4a8569733aa477c46185fbae54b8c981ffc391c544e394faaa1f4de00d15763119995a828780221
-
Filesize
2.2MB
MD56849b0b428cf226dba719f62612f8603
SHA117d1cb000a8e11476e786aa280bca8600b301adc
SHA2560472afe61b8f60334d54965ca8c7b23afdce5034975246d2a09eed574ba0c283
SHA51293b1d47ae47147d93b574ea658e3e057f970bc084e0dfbb09f25a802b0b46bdab5ed6563ccdaea60a026592ece6c3e473b2ece647a15da673e4d7b6ea3986400
-
Filesize
1.8MB
MD54cbe4d57e0bd0c4d495989b8be449a9d
SHA1266e36d4de53949fb346a93925a116c6b61c9c89
SHA256138c3428e7cd01f8975fed6b53b8d2278b063bd855d93ee29722ffd5f9fb3b4f
SHA512f1e1cea9f47b608755b58198b03fa1b8b463b50bd3ff6a4720170933f12a5a4ffdc0c6aa8166aef267f76b785c7001ed00dfa837a332ba0f43282dd70e0e6754
-
Filesize
1.7MB
MD57f2d3255b71c71a659e6cbaa3b8874ab
SHA1d557100460a3b4b38a2cd9871fd847a4202c0f5a
SHA256d5aaad43ea21a62b15999becf22c85be1b255c2b902422bbc01ea2b0db7be270
SHA512b1c909c80751dcc11529a4ebeac4efa9199bd7cc8cdd0f3950f34dd02a4138eae0e6e27b74bfe4e21e735fc4cda7231c1b1716d072db0f2beb08d9d3b2cef7c2
-
Filesize
581KB
MD52633bc1c2ed62a45a108118d42a8fb02
SHA1dc0b9441da862e2e101e4d1d48cf637064d6c790
SHA2562c6374baf0481307657ea84db59935cda51802bada9e2dc8779bcc137d7ebf75
SHA512927a184517f81b3dca7a7597eb7409f5d4ff3fd9149714b2870352baf028064c2498d0f82d8145bb019bf15a03841562477a46f60b83e6a2f447905a50ecef9c
-
Filesize
581KB
MD524b3e1e9c4f9010f9edbc58ff4e38720
SHA18ffe9ab4bce862fc0682669165e5d33ae8898555
SHA256c59fa5150a79f008394a6db40634cd5e38ba966fa12cb003132dd1d3920abbcb
SHA512900ec627be184793aa90ffecf9363a98e9eb5b78b94a470dbed3e3f447bcb2011c00df753ebe6f354432a2cce7c95230ebc8249361906a83ddce218b958618dd
-
Filesize
581KB
MD5b1e147abb91d15e2b3c7b4cdeba7ff11
SHA18a98753000c7793d98ba2296687857564263cba5
SHA2563478f19c6ddbddc712b2aade7235eab190523453d6fe9759250b52d691628840
SHA512ea6ee2fb5001032749bcda5fb708e5346e19be2cda890fd04d0c51a31155b25cb3d1a085570d7acc96b87676273351a681dcd5e810a9797fedbd9a916aef993c
-
Filesize
601KB
MD51ae38561b08926da024f59f80d5c756b
SHA167134e0a3a50fedf2f350f6791a88f84553d735b
SHA25627ac429fedba03d4555457ef945aee9f033b87332a0e73a677bfd28555a4d227
SHA512700fadabb94a37342e1b5099749e3c42df8b70ecff53dfecefbcfe91b68ab6b71306dff43ece5790facc9c8c73afab77854db0ad2e1629680f51160bd79e7891
-
Filesize
581KB
MD5c9dc70a09a4f8d5a9800cada27efe65f
SHA18577cf348010c2a146b186307a4986c086d7daaa
SHA25655594047f6bbe3097623aabadfbfbd29f40c47c28d637b5fafb5f13679258eae
SHA51237a3018b7cca1068ef31dedc24944861414869e94833330112d30c138149f2a2fc33920a505ce8274f2a262f9ddb0fb43a06299deeffb024447142d13bc6d90f
-
Filesize
581KB
MD562b958e44dd260af88694aa72f0421de
SHA1524dc3a2fc89cd461aa9d2a2d7b2fe02d527faae
SHA256888bdff166687a27f9a3e162580312aec66db85ff9838c2b2151709b4d6603d3
SHA512de4eba5286d7ffe6195fddf62d4dfffb1bacd636d89ce08ea36306937584a69a7bcaf3bb645b52c04c78f2c0436589af0c2f26549e5c13ffb4838b64bcd1ca0a
-
Filesize
581KB
MD58d8164c0651fc99622e0ac91b49c02e2
SHA14b19be3d0416a69aa67d70c068669e9ec84fd870
SHA256fe798b7ea5f65aed9483bbafb048b4d27b7990c7ab3622bc96003c04b098caeb
SHA51281a15dbcb47e39265f754be2482d81caa86d06bc39f73f4f73ab2ecf5e74636403dd92260ecf75287382bbaa213dc21fe5efe6e21fae7e989d47894db6773aba
-
Filesize
841KB
MD5f448cc494b25650e89cfe7ae63f2c1d2
SHA1647bb8bbf7f4a764095edb9a4a01fa565964d214
SHA2560f91c929ec5641f4846adae362a58843a2e7ecf3ade373942f37f9cb9f411042
SHA512540eeb62937c74a5571d941c25248ce818ae6ba4c5db8f509092390800637c6e75f879192fd9ffe6192cce24f7012b559da9f03f093a65bcccfc442587f20633
-
Filesize
581KB
MD5f7b213a05c66f5a89af2571d1d323eae
SHA1bd51c8ed3c9570cc46a599275f6a4cb7eae24b18
SHA2561afcd00a2933a4e11ca05516a1e5537653c0cda012ad3987aec2ea276e7a7e0f
SHA512a9b6c773ac1853ee50b03b462d3ad5f028ecf65f45a2e1dccef355d1cd0cdfb931c5bcce7749e5e075d3936855c7e5e5bf3052e1dc10f1b58abc98f7b37dde40
-
Filesize
581KB
MD5a20e33bdc7a7bf3d0253cca747123238
SHA18d58dca921e6e63eab169f58b09f0a1a61a0d80c
SHA256fd986131706133c524865f952f1d8e8eaf2799ff81497e777de3a0afdb068536
SHA512caf70ccd0c8a456543f710eba31c9da923e6c095492c043fadeb934f1418a6244a80dba8d90019b0cfd84d3fdf36c54ec06ec986a47ada15ded75aedece7cefa
-
Filesize
717KB
MD542a6da5b85ee217c98873802c2dfb054
SHA167b8eb9df9c969a536dd54a48ee5e87e5440ec9b
SHA25646dff39a4a89134b65c9a1cb6ef4da62604714d2dbc92f4b8e84c7a63c8785d7
SHA5127c74f9bdf14420f7ecb27f9a60e9546778f0be3eb78bb5faaea6282271ecb7200128c42e70286844166cf3df86b365af9d08aeb52dbe7f6edb744807f0305123
-
Filesize
581KB
MD51498672f67d080675c5e8c30e51d0164
SHA1e3618801e722f9b69a17fd2605c4f8a35fbee79e
SHA256b83d6385dae3dea2bfc984ea2414ed90e62cd8210dcdfbff7f2e45886f6efc7b
SHA512e5bcb5d9f147cd84a389f0a918322c7157052826e898dc383f494545245175254d2c114fdce352abe85956aa630a1c079e5392d7a440efc3f3d75d007650b2cc
-
Filesize
581KB
MD52203b176818d5a53fe603494265a52c9
SHA11b4244b930ffbc4a804ee9e5b137c77596d79894
SHA256bc8e60c593fb79adfc23a56cd06517f057e867531c8bf4d8facc3f2f44fe948a
SHA51274626f289f65b67b071aaabdebdaf3eaca20008808a4ab814a19ca83fc5e21e35c1789cd921319dfc8a8532529607cde2f94cf83efc94878e07b2ae622f395de
-
Filesize
717KB
MD57460e0906ee0164aedd09b19da517f25
SHA1592309e9eb9b5b319f0ac4da162da4647e192d7a
SHA256bfa2db2c8ceea05b8f89a2eb7ce9fa0c49a510e10bb1445cbc819e264e6f665a
SHA512e53f7ca85057dd81cff443bb6c651e938d524436bbee8dbd0b2d762a51f8492c11e9bc418ffd957171b502e9519cd463d00c103a93ddcb764cb607300e13f6e0
-
Filesize
841KB
MD5684ed5c7f975b4e7d2c7a1474ff3c7be
SHA172a49d6ab000797df53392927b2ab35877c18478
SHA256a5a2d2bef8385103c1590d6e577270f66350244a07529d88e0b1d1408c5c49a2
SHA5128288075060857309e23f90699cb5d171f0fe0f3c81e9cc8c47070d5c4b288c0c600c2e8e9fcbba01a1ba12a52dd0ec2a6472b71c324f6caa402f8d3fe1a90db3
-
Filesize
1020KB
MD5b4f98ef7ee0f5ccd16229349886caf0f
SHA19cbadcec4fc6731120c55ffb0cfaa22592d945ad
SHA25657e23343b508d335b0bd2efee7d3e5bd258300fb7023995c10dc55baf3139949
SHA512199cf0f0c385234389d4ebde9f2a585dad391afa1721cf6a70d82591c5fea38c1cc64441df5ea387ed59132a71cb46192283b634713d422acc0bf6bf3dbeb8f0
-
Filesize
1.5MB
MD5c00910461dba4805697cde404b58da02
SHA19293631652e348752c2d5ec2c2975da8daee6852
SHA2561f972c5f4d99075711202d044ad15005242a5787552ad034acc704e1f53db281
SHA5124bf39ff0e98a345ca77908afd80f34f462320346cf491e07e62124c26e28be3874bc6e0794a2d91d480caca2fe550718988d541fab4c146ccd9d5ff4cf53fa4c
-
Filesize
701KB
MD52a363c0d89c992239a1042344dd87190
SHA14128798387fe9a46c53bc858ee32c84ac1db475a
SHA256d8404d862d15b687625755e3d22bdff9d1adfe4dabcd88eb2e4cdac8a5c2fbd3
SHA5121388941669c9cdc824158e6330d8a490a906c4e606c03728c24f4c6ce57041e84d05118da23cf2780d9195947dd2184a8b0264ed65640aa0fd2b8f5cc777e303
-
Filesize
588KB
MD579a93bdcbb20d28a8e5cb3426b03a9d3
SHA1d44fb6f7591624f4324bd9a70f692495313b3263
SHA2568053b8285db9ca50ddf8bda76a609fdcdc51730d230c774c228811de51b259ea
SHA51227d0158a43798b79f78b2079ec1baa1dabb5aea14e56067b17a14a4e814d6ba20c71e27c8291cda7919a7ef6c99ed3b339f7dc46616ca2ecb2c9c480be4e2038
-
Filesize
1.7MB
MD5f6e6053c248b4a93ff3780b0918a8cc9
SHA1141886a8801f24fe3585085767b4c602ccb240e5
SHA2566ecd0244dd88c0945f7481b59ff58143f18b7622ec719545d68bd4bfaa6d731e
SHA5126c140003c6043c24da1961334159f5e9cdcd281f5ac1f66edee4a9c097c2b8f5d89cf1affe167027ae5165bd93119d350046a8d99dc40e92a61c9326ba22d78b
-
Filesize
659KB
MD5a6b6668b3af0e410abb020a5bdbb2a17
SHA1fd1a968c3629660d00902aa684bbb1d4dfd2d039
SHA2568442efe2ebdba9887e1025768017c0ac53dae4679f4421c7050452dfedcccadb
SHA5123de79a974336b5d23c10e3ab3ac5cd9038f678c6008b89a6f74f39ae683a737aa75c0327a126c47e4d21a318eea9132ba2de7aa9a08f8ff307a84b6af88fdc1b
-
Filesize
1.2MB
MD57ecdb3f9a85d5fe741c10cd64adc9206
SHA1421332ab0ef59b147cc142d7d6af57d218c6ad75
SHA256999d46526fea2dd2d0658a00f9f261db4227f937685b349603d574c71fc8043e
SHA5128244da2628651358b5d610c3dfaeb5e1b0e0f5a3b38bba0c386ccc7488ff30a34807b63283f3a9be194826baea5a362fec74932a55dd387e59ce8253ef5ec477
-
Filesize
578KB
MD5a2a11fdb37c58a700cb637c4845e24c6
SHA13c5776a6f5779a9f1c1c3ac71c4404ef769f534c
SHA2565a2587ed46c2c5a7b159ea75bac7e07481c888dd18c3aeb5f87711489221e8ad
SHA51290d8b4baa1888279d503faec24281d19ec50fb99d5215b4bf6b46ab5c04af14c73d2d40dd8595e8837270fa07302ec63851fe94079dc501640c81c9e0a44e438
-
Filesize
940KB
MD56de6213589b89b1ee51a2c846541e32e
SHA1f038de64659bc779556fbb3aaa787927b0922b61
SHA256c032933f530b9be46e00fe60ab34dc41b479b8b771de76fbe06b9809d5a251b1
SHA512413de014af41cc2b40f6a199eb5686dacedb58230c806a5080a9e03f543902db189dd4d49aec53fb2eca4ed26042833e8fa68b534f44fcbf917b932fb6144209
-
Filesize
671KB
MD5b3eae808076d4b396ce2e949f38eab8b
SHA1a7db42940dbfb420a2ba86a84ddc2991c79d8ab5
SHA256ad2e9ac630d7196e5bd5bcbe2c30c0a0916a0390c817839904d6339ffb47db35
SHA51243fbfcdd27374b9ef0e0e92632c3857b2b1c8c02115c86f40799998f5f746e1b90240f32c22f3141f45eba6f0354e1f8146449f3d49b51a33d6213b242134d83
-
Filesize
1.4MB
MD55064432a06c31a44c87b5a89cf1f7d17
SHA1f8ee2214fe86550aeedd7175e9e1ef4725a2e02d
SHA2569a9493225dbff3fc07ab41ea6633481f05c8e9e92665c6b20fe76832005f07bb
SHA512b2877a3f794329bab1ea019c2dac37f5e0a87d42b25ff0b2b2a14e3355de539ca2fc5a4d87e863a1d75eb415cb7fda1f883ef2e6c1d095118ef16bde72bc0703
-
Filesize
1.8MB
MD5982f14a1adb94f92f185b1b0f9cf6a50
SHA1f4a18e963ad1ad61155c18b4f81342e71e8fb40e
SHA256435483473348ebf89c5f0f1ace639fc0c792b1f7bbc9640835f2a8a1b58fb8e3
SHA51291ad2c6ccde7ab33e327186cda2c3664dbdeea452767377e3a95746a6801f1d9d9c2326f2859be53e7d442c719e13ff6d81889f2533a8136ae3cd5b8dc9b0381
-
Filesize
1.4MB
MD5d7f00242d9199906ab0469af127b5be8
SHA16314bc906edf1ba9dfbab2e54311c3d16a5f1dee
SHA2564a54599be6e5019ddde6cfa6f95c6c7d522519960c7ce2cb98ddc9f9b20f3068
SHA5122d31370c44862f4a9e5c08df4f9ed634b30a8397564e28a2a23e0c23c8774c20557df11b1f95e986d520d40239372528d922d2a75d5077b56b2092293c57ccf5
-
Filesize
885KB
MD53b56daa0e3df1fce8ec70505042ddb43
SHA1dd938f494f79edbffdd502ba2218f6a712926fa5
SHA2561e03335bc035c9c6cf724797be71faf86f3befb78ccbde0883d0ca4a8768ecb9
SHA51288bce4c2f9483947602d3264d46a4e6e5d410b6468019bfd440fe2a62ba5a4528eda0ec222235afdc28da2e9f1c4c9b5a8c8687b1525fc68815d286938122a25
-
Filesize
2.0MB
MD5981c45fd3f9b629e4a024f59e1f3c299
SHA10a981b6f599edd0c74657ea7dd2f724c1619ce71
SHA2561ca02a3d3410dfe0f822e8bdac2a9e03918bfdd47acb77fb5af35a83af0470a7
SHA5123b759f42fa75035554465c5cf10cc1021c311b94f474e7f996015069c571334db95d6f508c3bb77e5cb046dd23af91e0f7959c67c2fb28bf1efc00022681bdbb
-
Filesize
661KB
MD54a54d6b0f0e0029ade360e2573b3a90a
SHA17a5368b9a5b1d22f8f459e5d987f1487e71176eb
SHA256295c7935714aa3a3dd5e53f27ec01f10900b311b176b53d808e1caea0a9cdfdb
SHA5128f7388c7d33783da762495ca5ebe8234d25018be43c4869702944edd1cfd01e999569e8019a5115418cec906db7be335e85c00110f24f63a01892fa104c0dacb
-
Filesize
712KB
MD59759dc054232d37e787e4473440e1bda
SHA1c9c261c03335bb35bf28dabcccd65f3525e6dc13
SHA2569999e44eb4d941c2932e4bf879de4898feffe37dc3419224180003c3d88fccef
SHA512a204696d4f7fc102baac9018bf045816de0312079e40bcab2dd4a227085bc4fc03f22fd9d866bb5d01d81a383df253c8a8b6c9fd2694d657ba4493dc0b96cbf7
-
Filesize
584KB
MD5bcc73dea82087529a58a10dc310d42d8
SHA1d044871a2be108c76ee4ae00e6f99c8f0dc93dab
SHA256df81d716ece5953a383f3d9a359406449393d40063f717f767a0c1b5e166ef97
SHA5129b0ff1f6117e3f25bd57a2f502ee21bfc2645eb2f3fc734b82dac8b23958ea20c51234c22197dc04065f0fa1df7dfe94dfa55f5c806a75bdd0bd91d290a46a8c
-
Filesize
1.3MB
MD5fa88738991a692827eb969983e78278b
SHA13fd3cfd13cb91c80240dd2bc4f0e0cb90ec67ad7
SHA2567f9cfd607e55a9e19335b8e730fb7af876fa2d2e8d7f2b67f4484a7fd0de5235
SHA512ddb631a26d9710140f220da32b033d9eb8fa7015f1ac91743208e996b5020e35e641b561355af652e76d68a1b5119a91ecee7343cdee1d13307244efff05a095
-
Filesize
772KB
MD5cc26ac09464f80468c69bcd5703cb584
SHA1de451be02bdac5d8834bb5b68ac3e7006088b67b
SHA2564c893471d3e9cd8bd766516688c5c40832efad784226c301f84295dfd1f3fe30
SHA5120ed8bda8be6cfe80d77b86c1c496ba2b4babe5731b066a9fe0ad92731e0eb74a7171637ed3394d42fe2f345cd5543b759e64bbbc09f5ebe76ae5e191a931d810
-
Filesize
2.1MB
MD5406a9b9d578abc943f74922d9d95ffaa
SHA15ce64e0f2e0f14b7f8bff3842de91cd5fb9d91a5
SHA25655cdbcdab359b002aebc7f7d14b046bef13604571ba949d6d081ddd40aab043f
SHA5126bebaa0eb3849730df5c2ddcab5dab45bc6d3e6dab11a6ed125357f6253a66df4d118230c42007c9bb710c6aa8a82392fef1f690aa9e2d4dec1ea585f59d406c
-
Filesize
1.3MB
MD5044e0f0f904d014b71e0cea4181e1e8c
SHA19126207b207e1c971b92124f80c2e445ed99ac5f
SHA256ea1f84a72cbe2b8097699cab353d2cfc26c4a842e99e461327469a0dc26ca964
SHA512b8f613c349c53c15aba0bc166431320427c77da3ecc0d0d285dce598226eb5fe8639942ec97428d3243e08487dc1f8802b6d91fd78045bde9a86f357a241495a
-
Filesize
877KB
MD51cd6b3d7f456c786932d0d63297fcf98
SHA1ed79399e928dd64b4b19cf52d2d9f90073ad649a
SHA2566cad8480773acba8233c7343c60a8a5a36835a0aadbc612caa13712f590619a9
SHA5120b75e8d00003f1b6e48957f479d494889abadb772c29e0e3e5525c3a5941244c9c05cf586e70949b0bbb85b830439c714e7058400261ccfe31c47adbd0b217fc
-
Filesize
635KB
MD5e8628e8f42eee877841eb409d0693135
SHA12f3e5a591b42df926c85bba06b0d584010f65bb1
SHA25661f111cbe3deadcfcf1b4acfc39c2181552c8b22e375f560a94d4ec08237af1a
SHA5122513b1926f21e8f524024235bc6ce36f3088eed69f2cd28f32b54e60cd1ef50023d7ac3fcf7364fffbd54d2b90c77668ac9e3662852e407d4d513ce2decce422