Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe
Resource
win7-20240705-en
General
-
Target
2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe
-
Size
712KB
-
MD5
671f55ad9af7009f4edcf5b50d5cd1c5
-
SHA1
5169d17036d572ce8a2732d30cf2ce66e5a81d3c
-
SHA256
97033401a7d1d24b9c4273ebd8f0dff6c25e4027a15f91026d651655fb950181
-
SHA512
ababedc861c326dc9df37df77d37b34ad6a0a2e98d466a01bbc173a0898243a0e0e61fe73897d397912fe2ed6bf2e8068ecb7f289224c9a4f2ca51e75a426db3
-
SSDEEP
12288:ntOw6BakVqKNdQ8yRK6rkObwsToHOOWGgqvoEWH/lInNg4JYU5a0Cuxy:d6BxVqIi2lObXobHAEW9INFJY0au
Malware Config
Signatures
-
Executes dropped EXE 22 IoCs
pid Process 4464 alg.exe 2908 DiagnosticsHub.StandardCollector.Service.exe 1336 fxssvc.exe 640 elevation_service.exe 756 elevation_service.exe 3680 maintenanceservice.exe 5028 msdtc.exe 1152 OSE.EXE 4684 PerceptionSimulationService.exe 2996 perfhost.exe 844 locator.exe 2904 SensorDataService.exe 4928 snmptrap.exe 2088 spectrum.exe 1404 ssh-agent.exe 4400 TieringEngineService.exe 3060 AgentService.exe 4384 vds.exe 2564 vssvc.exe 5056 wbengine.exe 3088 WmiApSrv.exe 4336 SearchIndexer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 31 IoCs
description ioc Process File opened for modification C:\Windows\system32\SgrmBroker.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Windows\System32\snmptrap.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Windows\system32\AppVClient.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\AppVClient.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Windows\system32\fxssvc.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Windows\system32\msiexec.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Windows\system32\dllhost.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\SgrmBroker.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\System32\alg.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\msiexec.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\System32\msdtc.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Windows\System32\vds.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\78534259971c363d.bin DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\TieringEngineService.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Windows\system32\dllhost.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Windows\System32\SensorDataService.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Windows\system32\spectrum.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Windows\system32\wbengine.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Windows\system32\fxssvc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\AgentService.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\SysWow64\perfhost.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Windows\system32\locator.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Windows\system32\AgentService.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Windows\system32\vssvc.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Windows\system32\SearchIndexer.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Windows\System32\SensorDataService.exe DiagnosticsHub.StandardCollector.Service.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmid.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\tnameserv.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateBroker.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateOnDemand.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmid.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\123.0.6312.106\chrome_installer.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleCrashHandler.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateComRegisterShell64.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\ktab.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe DiagnosticsHub.StandardCollector.Service.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe DiagnosticsHub.StandardCollector.Service.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9907 = "MIDI Sequence" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-1 = "Microsoft Language Detection" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@windows.storage.dll,-21824 = "Camera Roll" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9902 = "Movie Clip" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-113 = "Microsoft Excel Binary Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-174 = "Microsoft PowerPoint Presentation" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WTV\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-6 = "Microsoft Cyrillic to Latin Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@windows.storage.dll,-34583 = "Saved Pictures" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@windows.storage.dll,-21825 = "3D Objects" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9923 = "Windows Media playlist" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia\ActiveMovie SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-127 = "OpenDocument Text" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-175 = "Microsoft PowerPoint Slide Show" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9937 = "3GPP Audio/Video" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.DVR-MS\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-114 = "OpenDocument Spreadsheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-101 = "Microsoft Excel Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\wshext.dll,-4802 = "VBScript Script File" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-914 = "SVG Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-12385 = "Favorites Bar" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9934 = "AVCHD Video" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9932 = "MP4 Video" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdf\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-5 = "Microsoft Transliteration Engine" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-9 = "Microsoft Bengali to Latin Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Common Files\system\wab32res.dll,-10100 = "Contacts" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-123 = "Microsoft Word Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-102 = "Microsoft Excel Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\zipfldr.dll,-10195 = "Compressed (zipped) Folder" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.svg\OpenWithList SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{1E589E9D-8A8D-46D9-A2F9-E6D4F8161EE9} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000004044edf75edcda01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-912 = "HTML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\Windows.UI.Immersive.dll,-38304 = "Public Account Pictures" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-120 = "Microsoft Word 97 - 2003 Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-176 = "Microsoft PowerPoint Macro-Enabled Presentation" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9911 = "Windows Media Audio shortcut" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-10046 = "Internet Shortcut" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000090226af75edcda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-107 = "Microsoft Excel Comma Separated Values File" SearchProtocolHost.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe 2908 DiagnosticsHub.StandardCollector.Service.exe 2908 DiagnosticsHub.StandardCollector.Service.exe 2908 DiagnosticsHub.StandardCollector.Service.exe 2908 DiagnosticsHub.StandardCollector.Service.exe 2908 DiagnosticsHub.StandardCollector.Service.exe 2908 DiagnosticsHub.StandardCollector.Service.exe 2908 DiagnosticsHub.StandardCollector.Service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe Token: SeAuditPrivilege 1336 fxssvc.exe Token: SeRestorePrivilege 4400 TieringEngineService.exe Token: SeManageVolumePrivilege 4400 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 3060 AgentService.exe Token: SeBackupPrivilege 2564 vssvc.exe Token: SeRestorePrivilege 2564 vssvc.exe Token: SeAuditPrivilege 2564 vssvc.exe Token: SeBackupPrivilege 5056 wbengine.exe Token: SeRestorePrivilege 5056 wbengine.exe Token: SeSecurityPrivilege 5056 wbengine.exe Token: 33 4336 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 4336 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4336 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4336 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4336 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4336 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4336 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4336 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4336 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4336 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4336 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4336 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4336 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4336 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4336 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4336 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4336 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4336 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4336 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4336 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4336 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4336 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4336 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4336 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4336 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4336 SearchIndexer.exe Token: SeDebugPrivilege 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe Token: SeDebugPrivilege 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe Token: SeDebugPrivilege 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe Token: SeDebugPrivilege 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe Token: SeDebugPrivilege 2432 2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe Token: SeDebugPrivilege 2908 DiagnosticsHub.StandardCollector.Service.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4336 wrote to memory of 2864 4336 SearchIndexer.exe 111 PID 4336 wrote to memory of 2864 4336 SearchIndexer.exe 111 PID 4336 wrote to memory of 3068 4336 SearchIndexer.exe 112 PID 4336 wrote to memory of 3068 4336 SearchIndexer.exe 112 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-22_671f55ad9af7009f4edcf5b50d5cd1c5_bkransomware.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
PID:4464
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:3012
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:1336
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵
- Executes dropped EXE
PID:640
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:756
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3680
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:5028
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:1152
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:4684
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:2996
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:844
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:2904
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:4928
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:2088
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:1404
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:628
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:4384
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5056
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:3088
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
PID:2864
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 800 804 812 8192 808 7842⤵
- Modifies data under HKEY_USERS
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD52e25309c9552e223d7aa5a18fad3fa5d
SHA1c016ce99ec8a8624deb1a64dbf29514ccc28b128
SHA2569c2860f6594ea659b9985c94b3e61ba25de09e070f638da3cd3a401ea8f9f33d
SHA512c2f7abcd1e1b168e6f13eebedd11fa66ea0db9ffc0177e189ac3ca5be3b190bbf541b17e0fc10277327b2a46b38b008e73c6c197e20682b9c896b41ad640b522
-
Filesize
789KB
MD5ed10c193497ab0bec152c0cfa21e1340
SHA1e5e0c758da8af5745ebe4837af0832a51607497d
SHA25669b524f52fdbf2ba6601f439e369e4ff1ebb0b231172aaf15ba05c304121cbc3
SHA512dbe7a9bfd563e53bc754905676b186de23dd48505b49abb4ee6c3250f9869608ba8cf516150b089cf952b85e6bf830ab01a55e0b0098e2eb17295b8282cee6fb
-
Filesize
1.1MB
MD5004f262cd953fd25fce7c6633069c990
SHA189d9eaa6c87143bd55d1cb91acb3d3a5dc30daeb
SHA256585e6c6b551142f5d92437668854647431b5c82b3070a2f2e001cb57051df3cb
SHA512dda755d67f4b355cc3fbdc05de546ee64c296b4db1205bb6e2dad350f5f0407eb307ff2d39a7b5eda8a016e3fb53089dbe51fcb929100ce5224c8c8da02e7738
-
Filesize
1.5MB
MD5331a460a37d0f190d035f25d5534bb2a
SHA1888c438f06f5e99ad03315838146abc5870d9d10
SHA2564162a51052028ea6d823c7ddf63a179f9a5ed1ac2d4bd34273b190dfbe85eecf
SHA51295a4884e7fe14830a9a440f976fbd4e88febd2c85c4cbce91f2b23310d6003e4fa22a737abc2505cebdeaf022685909d65ae2474a2a7e3ff7e40ec8800e8538e
-
Filesize
1.2MB
MD56f5c81830cbfda1c3f7358747d156d1b
SHA1c3ac439bf4ce911f80419832e4dc23a2da14f37e
SHA2567e88e68ea15cb13a923280a2cbeacfda75c7281faae7c6944615d2996a5bf534
SHA51250ffaabbdf6fc1a89ad85c03d67efacc8b1194037f3da1c13be4282f815bcec1aaba12188216b4f244d60b7c317a3467552fd2c84cc41baf32e0a2e8e7cffd19
-
Filesize
582KB
MD57cfc02de1d8654a67650ae55112c8f08
SHA16003c7c384b8d40bdbf9703ccb988a3bbe61f10e
SHA2566d0cf100dd4a594f191f1bc57975c01d94accaf134b0ce03b85511de8a752b68
SHA5124322a3a01bd075fd34f47d321c11045a5b07d0e3ec35c690db1a2817397d46b24a909ec59e94d11e7fa6d4cc1ea0cd8cd4cccbad3f8544233448ac624e5fa12a
-
Filesize
840KB
MD50363119ec719179a56a817be95415260
SHA1f2639db88f722cffb99c40fb9658aa71f66c15ae
SHA2566c99abc861cb9af48e90038b6001e9a488c3c08d28467493d20eb8342dff03eb
SHA512a1ac4b4522eedc8c1b58f563bc70a9387c7fa44b8f98cd851872ff756ce2a49724356f0d87c3d8b0a4ea2278938f9875c5323418c29d32c30344fcdb8ba21f80
-
Filesize
4.6MB
MD5a3b50c5a482869a07f87a438a23848db
SHA12474b4c5276081cfee5cfd839d6768b843605143
SHA2567b777e00bb486c62732811a24741a3c1f673f690fcde94b165863cab9661d7c2
SHA5127827f478a239c2df7c52108650ab9bd3ec152a8aa6d00284b32eca1a67b1759007863d49fe0e13d8c936987e68bd3033d64e79490a9cabaaa02ff389fe0906c5
-
Filesize
910KB
MD58de6a9b8730a9476c7ed12fbb6764654
SHA19a096344ba4370e07b8c3fc87ac67c49048d54f2
SHA256a001011717b443204c73f098a43c695bcd4aec5859a2e11542de719c1a794191
SHA51272a74f29fd51cddb313ad8ab5bb9bbd7fc1e25248c5cbfd51e488af0b6ca2253762f34b32232cd8da1dcab6b0bde7a25cb74e8282580578ed63b7b85a1b2011f
-
Filesize
24.0MB
MD50c4aa7546b9e30aa924c8d0bd0a1b457
SHA1474ade6778372112d779a6c38a459d2bb8254c1d
SHA256d75a748871c27e219525ab634c68a8ce2300c817a55731954b83bd39c676ce62
SHA5124b2a152fd927c8f5e46b27750fd090a5bb45b17b0db6524b0f7bab518b4a3f3d748d3d2836bfe53bb8a60f8874af7ce85b846bb4ffcab5867290844cb054ce0a
-
Filesize
2.7MB
MD5c447fdfb145571ebc9626ad2e8675a50
SHA17840ca59619037904c6d32cdfdda47aa7d6f674a
SHA2563c77971e80dfc1a6dec22f829e8d27cb684852251cbc48523a564ab9ae8f163d
SHA512b8bc33c4a54955413445c5d69759d519befab65acfb8074066e28af8d784f5819a68353398d1e0a78415ba8e19bd16c48fa98b7634e3238c6195f18fef686206
-
Filesize
1.1MB
MD5a54fbab5e407c44d014c90f242c4692e
SHA1ab7449055451e7b9535fa092d41f92982d0c2dc3
SHA256adcc469a0956210701e8d1c964d750834fe3621ca013c74f363b01b5917a151f
SHA512959c466028e0256971e3bff35b6c89e311144b45ddc0ab06547c1fa11a1b88c92ba0836301b5a4117f7a3b48b95e771baa3ed9139efe8cd5cb75e54eb6bef3db
-
Filesize
805KB
MD5eca275bbc9da7ab2ea31aa5c2c8b576c
SHA1d1a42f8372b9b76f1b824266b88ce2f3fd70e976
SHA256799d3580067147642fa3c0cd1c8d4060b3c4b2622ad9548e853454444967b5ec
SHA512b529a91fca68057074c601b36669c08437fc1b1dff58459e292ae9ba3277dcd77ced226d08dc81f5533ed31eea25377924632c1607ad6131971b5948cb2ae346
-
Filesize
656KB
MD5e8f38825a0096b1bfac21947fbf29bd9
SHA19fa624b364ab25162bd4fb19a924872cb0461440
SHA256afc0a52681b164caa8c10d1c0271f8ab2667d4cd1d1a3fd95fc21e33aaa7cc72
SHA512ca6e9f2ec2beb1c9e91e94b1d91637fc4f7678631797fe181d40b621d68f40f85317ba086503fe4ad3d1a55fe12f2882a10cb6bb18aba3075bd2c4db2a8961e1
-
Filesize
4.6MB
MD591e906bd7f56726f2acfe6f556d91a87
SHA1b78d39265ebe5b3a38ecde2f62448aef99ecdcc9
SHA256fc0fe4159e669a02d6591e8db2fb29763e8319444a156e8584f2ea3348b5f9c4
SHA5124e67c9245e70fb44edc9aa24461db0199dd1abee1d9bc48db36ec3a1a37b219e5f17b6ae5d3fed41daf347341e4fc41bb377614e496b54f5da94af0b3117a6e8
-
Filesize
4.6MB
MD54c56b22bc202846c9ffb099d712829ca
SHA198d9f1a459e7500218b059c9eb024c162b5679f5
SHA256f04b83786c642746179cb473c725f3344476cb374436158340b1b8cd8ee10f61
SHA5125847338200d251972360eff5ff3baf1f2884f67d3cd1b53ec3866f1442c97fe90086151433e002f2abe9336d7ff96c1f8c7d5815b7c968d882c098951b167ef9
-
Filesize
1.9MB
MD54973c1b7263325853c338a004673c107
SHA1f13b9babda3aa994f46a10bac76ae5eda5a17138
SHA256eaa661a21b2d6c84c619742df70087650f65ac81bf3eb07fe86fe1030a41f281
SHA51202915bbb8975ca9c517f8e9649ec592b97c39b51fc40b988ac09a625b866b2777ed9428bf59a8456e5e70fc1ac7c20f20d6bcbbd8ba27a579d4b2281f6680d56
-
Filesize
2.1MB
MD55000b5aff6e53f2a0c8be7e693da5b41
SHA10912bf7c8e60fdecda9cff6632aca44b41ab288d
SHA256d1f2687c248730a0a51f18a5229656fa418a490c5a685f781c857f055c61bb5a
SHA512ede8f9a26aca9d462a15edb5e310e8cb7ad99d76aa93af623378f5a4c3668ee536c10d917fea74bd9f08e85a8e5deb1f6b84c99cc602eeac890db41f131e632a
-
Filesize
1.8MB
MD557b10aa0ccfb3ec32c8ba16cf40e68b3
SHA1839b10a9f95311ea228351e9349f0b3e0e75ad2f
SHA2562968416371490d68503759025885a0c1d0addf37c712856c9a869c2f424f8834
SHA512a5e19835c1004fcf1633e388c84574fd961e2c6c9451f287d80f22644c947bf4a29b55404e908536c35f1362db82a63244aade7b023c1fd011f7962343d6e160
-
Filesize
1.6MB
MD5be4b232b86ff4c872c68d3db7a611027
SHA1dbf9855eca17415b0802367ffc4d0ab9b4ab8a80
SHA256aa2446dde9c8a7edad65fc1755d44c28d3d77f6a2b46f40a5522631337e505ed
SHA5124bc2d727ae989acd8f3cf9c30e95dc2b57147b0028bcd479f6a0bdaa6e0f42910e84ccc31644ec24fa268a9c7ec27ad8bb9093022f53104ea844f7e3b1e4cb0f
-
Filesize
581KB
MD5991ecfabc8511e0c6a1371ca57afe86a
SHA1c4f00808b033c8145b0a3b8f721d7a3b46f240a7
SHA25699581c67c8b6de1f5801661a5110aee22cbe2e13d9575aa2b9bcd1f76445a050
SHA512e85b91774ffe257c3c18f174d66ed0e980436ef5582af8effcb6c80489e2ae8727dac4de61c364a90cee33249567b09f8b3b8fba86e6260efbcebbd809ea102a
-
Filesize
581KB
MD54969595413c6c20866bb19ea4c814cb7
SHA1fe3cca5f169e6393aeca64826d43dee25c683ebc
SHA256cb10d046f550a66179be0c697a1bd6c1cdea677036a741af6978a0e3eed3641e
SHA512e48e156605b83f054e73525be816dd079e79ebfa10dac59566b926b996bcd4770acb94027a754c3528482fceec5ef3e3db527e696da404a8bea82cbc6726a253
-
Filesize
581KB
MD55e52240c07195ed905d191f2b5a6c28d
SHA14ed3fd768b0d243dd333853dbd8f30ff106c9b54
SHA2564e1be93681565a11558331769219710a272f090b66175bd2fff760e512ba37f5
SHA512718c7e1bf11b959cf7d7b5a8c1e68dc0b9178657cd2608f5060f14cbea4a4786f1a812f117136b674324a3e7b5d29d429d1a67009f0dcd5488de485465c92a42
-
Filesize
601KB
MD59ce3751e76f78c7424e3baa265fcac50
SHA100896401db5bd8283036c99c51438d0ddaec915a
SHA256eae9e5e69cec9d0bd9de4dd35b157c30edc4dff1e6bfb7b0c8a463e81b5e60fc
SHA512333da2d2c965a547f628213456173a5fcbb919dc5c472583a861c6517798e6e168145aa7620e0a8a1bdfbac5a12fe185cb603501f8e0ac16a86f23193fa9c401
-
Filesize
581KB
MD56e5810c3a9f29c26f1e0e38dd91070b4
SHA1f0b656287284979dde038ceaf1193ff499425f7d
SHA2565d85ab5394846f22fcfd9410fadaec1b7a27643dfaa8105f4048d462c2c91ff2
SHA512d07deefdceac3bcc3e539a6b339a49794841607503bc3c87feb4d632d680095869b2e677dcad4f9432f90b3778785fdcd0b537c67218e933cf7b2b141a69e92b
-
Filesize
581KB
MD500e3cf19625a6731e7ca3998736c8154
SHA1d86e81db7012c881f2efd1a9c2452eaa1c160b67
SHA256393d2ab6fa1a9c41dd89da495d5b1c0d2dc81c343929152fd71e40725b688e19
SHA512cf34f34b5dc26202b8a42fc034904ef92992b0946b05b795a22b05ac16998912266a3189f8330c610c1ad544d247e643e954d9c1fbd59b87b5e6c943eda30769
-
Filesize
581KB
MD5148e35c6c213a6ac319bf72d8adc9c12
SHA116d4b4c48a0eb7db2f1a35ee95e28fcc8075efd8
SHA256693d394975885f0212510dade3e0dadf1e31fc687572f2fa31afb167d54809f3
SHA512fc032a5d358926301bcc6e0fe2e997eaaf9b5420cf34015c277298f01a7f31e76644f18360a45ff777916f1c99f7c5a4137a4dfdb2398f10d7aeffbf24bd547e
-
Filesize
841KB
MD54893ef3e854f60e6d9fbbd3ab5c1d3f9
SHA177d17b244415f49dd09a47073dc3ff44bec61ca7
SHA2564d23210902d03d0b77aa6b1927d355c1a01a98af545d06dfebb6b3bcb5e73248
SHA512b306aa512d724ca969e0999647d1c901bd39a928da179821ce1fbe44603c225d05c0b0e9b2e2ad307f85fdfd1275e313ec613932e8f278d2b14faddabec9ea04
-
Filesize
581KB
MD52e5253a602cbe9a253c6100bf8a35c64
SHA172606482b0489658e951edeffa09597bcd6bd658
SHA2564d00f938488874d631fe1c1f0fc998e359555945a9db201a6f948c590d55da15
SHA5127fe77c738a184d6f6b426a98d5ec7eea534d78a70069e43a5a1cdbd7fa73258a50fbc9d862b359192718e79e840daf0e8772c450b349fe5e571628d122acf531
-
Filesize
581KB
MD554d5ead2af6d8f46b5727717826a30d5
SHA141bce8bb0f12d8288964af1e9f54fe0882d3c9e0
SHA256173569450b106bd9f591d93b269ecfdaa200ed9605369aed5479e061ea0d0386
SHA51297ee60b98deed44b12ecb5d131fe1a5fb398ad69e017ddea631ec020d1f639b244f20c2d7c01086a20fbfa47b95b5e38f0c829036e54facb556527442beb5038
-
Filesize
717KB
MD552493f50790989ea4b8019732ed42ee3
SHA1551afbf6b12f8d6ee8f5c65cd34f0006814840b8
SHA25613886325361ff52af0ddd1fe035384688fe902ad9dfe0c49b4541e519a367a66
SHA512ee3ddc8b50d3a81367b81c873e2569d5b5cd6f3a00059810c0995a21fa2e4a266b2e2153f15374f9ffcf74fe84d12e859f890aa7838638bdffe2b289fa22488d
-
Filesize
581KB
MD5aec86f8fa81271b5eb5f2f4defe06d79
SHA1af9f9b4bb5240e0d949e0d7d98fbd1fd9df3c55a
SHA256d8560e639ebc940fe1d1a6d15cfbbcec168233365da48ee6ce8dd547a4b88c52
SHA51295e1c439fc00a67f5ffa6ba87ca28a229712705a6620a4b7ba9d8e8120054edaddd8b9e42b0d684b8258201cfddf215dca195b295fd02e08ef0a7844bd2103ff
-
Filesize
581KB
MD588656f89a2f6685b7c48f7ca9d44233f
SHA1e1305403407039533bf52f31f1709767612e63e1
SHA256cb8e70e7e7bb3ac7ba2a9a9b33386b4158e864f666b4590508dfda66003b206f
SHA512d2876b0293fa670f57b3a66560ed8d30f7132b42a24467485616a332c7de13fcbb14736eff73fa07766b8d55e5fb989575af28698673ccdec5fc68f6827912bd
-
Filesize
717KB
MD5950beb759206969b3f5a57bb7aa9733f
SHA153ea75e5a407c3e0620946d78db500e99e48214a
SHA25630454cb093ffd45d9469026b9710290bc904413b687162e6b9b28b94e77dc8de
SHA51207ef7042441f0e767718e7b41c63718619df5aac0c5a16bfd335ed231d14d513c5626b922f213f26a2bb90409dcba041bb715f334b922f6a82973c2a25a29d19
-
Filesize
841KB
MD544cc27e39d39f14a6a414d9be95fdfa6
SHA14d3f716d6944107276b10282a88c3b0c2b91950f
SHA256b49e73165fbc98ff1b725827ccf64cced5b72b178069208870751dd889a1b6cf
SHA51250402be81e9824acb30009c4cbbdcf73d9f06b45a219ed5a42d6b41392836cc8a2aaafc5157a81fd3b1e0df2ea40354defd45c9ab861c86dc4de072663d198e0
-
Filesize
1020KB
MD56d261bcd9bfaad73bea86dcffc844239
SHA1279ec5d2f6083e77c26ae5c6b91cce9224a640c2
SHA25603e5e30f53577c1127ea8fb52237f4b9daa609e546b0082170436abca6363689
SHA51253b19ac1d91ff098f6b4685705258de6969e11126347444496c96dd955aafbed83b6fcca63c7acb68ebff065b938d71cadeb3d38e9a9a02576b9e934676fa0b5
-
Filesize
1.5MB
MD517c73505b44aea591ab1c0e0a2487334
SHA13efc7359778a54305e02c4cd4a29803dc3944276
SHA256047d96ce95557da1a3bbedd066f09cfec69e419df06b572e0855046b4036a808
SHA51266805141f268d84d075f48d628667445adea511d29daa4fc47459f101e7a273a49ce46541e89188c1d5342a4fd2c025895839e13771b298372b8f7d32cd20596
-
Filesize
701KB
MD58c3afe936901332ee37de02143ea8151
SHA1c1509a864262e962c4befa80b6ae6aa6e9dda6ac
SHA2560acfd63becb860dd21d2dc80fa0f951898fd99de25941a1bc5948508c0449e7d
SHA512600bfa955c6d299eacf2582ac12dcdfd54f0c2003fe84a9ad39078ec8b6ab5ee161faeea02684961ce5f9f73a1dad379674844498d60b8dc6df06188ee267005
-
Filesize
588KB
MD50600d1095c2282d19ccac209fb1d8310
SHA147c5603e7aaa6a5933d67add258841ddf5e75b0e
SHA2567faa5f815e63b3e995807d5ce2fed8e244a713cbe16b9435e2d6b929aad1a26f
SHA512963271788a2efc896fa78e54ecc2092c2b78adb923c05bf2fe82bf3bd0276abc66f59a941035171e3be95e6ef17c6127b30b3cfbdcd8d45ccb15bc9e37633fd6
-
Filesize
1.7MB
MD59c122b7b9ffc807a1012d61db9ed3303
SHA1db351f2aa7517a5066e33026daaa3f373bb22096
SHA2568f2d3b2a961dd9d43eecb7d39bc0f46f61413b717fff6d0c4148f5fce13e5f97
SHA5124c4b922bccdb7f70658a215462d9e399a99d216f3f0376e5ad123f57465fa12100bfd00de721e026e1b78bcff500196465a6d5e72ee58d9705510093dbe93653
-
Filesize
659KB
MD56d9123139bf0576d5b27418ff768e9d4
SHA1d86370b9b92bbe4b9f77eef8fbeed1cca400dd18
SHA256c8cbf754d79029b80ed1852d493c8a2d32b6212700ac397c15b9d2ee70e4ecdd
SHA51247fc5e052017ded07af29d720dc880508bc08a15f25865e5c6aab765b79ffbc1d9be194921fd1b34964e545f918bf12ffa20b233dd56b6e51519fa1f838f0d63
-
Filesize
1.2MB
MD56f1e8423321e85c2bf4bbe5cf12fe82b
SHA126e08fece0ec275b7641291323d37f79d8c2f040
SHA2563505fc001410566430455fd2f30edc5a81a3fffeebc8fdee3c8c32327f3d03c3
SHA512361eea2d234e9b815c1d7e037ab0eb4fedbcb1cb2ac894fba2184af2b8a6397bf9fcce898101523721f46a4c5c50f37d3519b1e82df31619a847a23462345c96
-
Filesize
578KB
MD517a81afa88cd24a6f7d3a2808a5031a8
SHA11621f3bf17962a70989b82c7522621b7afda908c
SHA256ff9dea7cb6a450c9d9ff9fe652e7fd1fb613913bed6a50948c73a11c2f60d3f9
SHA51202dcdf41e42d238b1d325bd693ea41fa83d3d4e5aa0f42c466de06d9ffd35d6f447bfbd00b373f13755c8557a7ebeca4fd62b741d6e97b3929311f364e66450b
-
Filesize
940KB
MD53a21c89b8f07118e14e2fef282c7b3b4
SHA1bdae655ba3adbe229f0abb6a5b2cf73cd273e875
SHA25663d322fe5f57cb79380c86ef6890c7f171850ac5be96f93baca72cd9db861e10
SHA512e079573ce5f8285e5230ba98c9011cb9b872bf2d13a408afc8ec0e55df80edc1d00bc592ed2c324ae3ff858c07b2b458fb8f3765d04355a7b6fb600fe2be6f88
-
Filesize
671KB
MD5fdc10f0c0ee514c7ea6d4ff11be9b34d
SHA19362e6a4f4d38a38a0716f57b51b39fd97cb86c0
SHA25647ad56483f261f840def7ef4f6fffcf35f9dba765d63d3c3adc4f907369dbac8
SHA512858e1589d05478d3d88526132d5c76fcd3a6100af262c6b8bdd6ff93ee5fedfb83584d6f9b67f333a9d9218e39cf4294de68a6c4739928b5802b457cd853d545
-
Filesize
1.4MB
MD5713d23a09943a1fdc81ad96b07bb1fb0
SHA188eafe6b60f63ed9ec95a84ddb83496f0a2a143b
SHA25663d3e6527ea60f672879294d040d3130f3bc252c735ee041a52b03bd64846ce7
SHA512b6577d8229ed8d866512f4cca331cb256814f4a2a10b11bb2b32d6cf48a5dfce722e0dd9969c468a9e15d1664a53bc2291c429b16f8855e4c0ffd20a8d2e4d89
-
Filesize
1.8MB
MD59f2bb79734ed3cc46291cb5e7177f97a
SHA1a87a3b016cf5ff6ee29726af292df2fea2392020
SHA25632a32f46176bc684596029b0e01d303c4bdb2736cb79429e3485269eef97bbb3
SHA51231b2ee46855cbf5ea119f24a1169b4a5186c0d7a18ca31c20a6049ecc8c06e6cd499b9a7715ce797e053b1791cebf6351e218ce2e716e74dec89fb08b3a77aff
-
Filesize
1.4MB
MD5e99856c0699b21eaa2ae929f35ae974a
SHA18637f87b71891d18c6763a31b85d767130055728
SHA256ae52ac951591ea1bc4abd494e9d2fe0544a0b8c8e0ac0add632259297c463f21
SHA51257daf81570db7339551fdded08faad9a2e53d259a398972da7d30f0b45d2cbfdbcb8fd9d92f49cb4bfc9a9819a503880aba37ed28f55ad37a5ef90dccb849c8a
-
Filesize
885KB
MD57d31d88df6d5e4d04029be2836e4a12e
SHA1ad2e1f088021de06e189db9c292cce1e56474ef9
SHA2560bf5b16f38d63e9fd13f7effa27a69038ecc67219db740deb7e08d03b90d6db1
SHA5124fef1d76c43de7c6a8c130de1e6d91b2d2541e66ac8a95aacd6610425bb6d64d7a426107c692e10426115c471e630e68da5962e6241f9cf2ca2b3c05b0fa26c2
-
Filesize
2.0MB
MD5e89a761ebf3276f051d27e5f87d0cf0a
SHA19f3595c9f67dd7d40c68e91156852c967d1b391a
SHA25672444a0dfa5387e29e70c97eea81a9c5eac34562a2257e7e64ad15503e9dbe71
SHA5127245c8ce1cc9565a6c88594b1a9903202cdc84eaaa9ad36d02f3f2be66cc9788a1ffdc6074db9d72e292ae9e7d904b12f66bd32984f60fd96e83e9f28fa7c047
-
Filesize
661KB
MD516699230686fc3fc0f5532e5ee47314e
SHA1e397d1014e442d54648d1d0f3271aa1deb9e6b41
SHA2566562412bfbb5679e9ae081edb76ef0685faaf649dc4e8845600d3decfdac63cd
SHA512a6f9fdfc82d505decade29e1f605c30bb4b52a7c28875750ebc1c0603fb1c8301ea6d755de1144b9fdbd19c184543d22db6046ceb2336050630bd4a7bac3f1fb
-
Filesize
712KB
MD581f5036701e7a48525b73b5dc94b73f7
SHA115856a5c8bbda0b9476ad61432f2cf5dc1a7d571
SHA2561fbbfd07bfe91ce9c22433940ceae945593481dd0d379103616a90819612f2f2
SHA5129974abe7b0da10e5c7ec27a59a3afdbba6afa529a9ab69808ce8095cd44c36f335a4eff329c4aaa58eec1e7af881e037a2858ef178d92f5bc99a8f6b010d8ed7
-
Filesize
584KB
MD5c4831a3eecde318283c8dc219e31d735
SHA1db1af622fd93f41b17d4d86a784059caf7dde7a4
SHA2567946840c09ebe40c09401cbf5e31affe4e813df3ef6b7b552e57285554f4e9eb
SHA5120b0934c2952648adcb480d910967ce2b71ed4bfa1b84a1b0d2d5aa3678ebd4ef92f5e80a3c48e6df0fc847347e00381348327e2dd2ea194e97ea3267ce981dea
-
Filesize
1.3MB
MD59d0c1f06dd030c87b67991b264a82170
SHA1be8e5944088b0d3a8e47aa5700e8644575006e32
SHA2566557a6a2cfcc13b7ccaa887902adceea439e349a6e687e7d9ae7db7a4fa29762
SHA512b65ce0ac1d63fe3045a0e6aa5c32a7f1eaff86c849c2302f29ec1193dad9dbb91eda67d00208af76c963271a6bdf503ac478108314e4f0081073387491af3ed6
-
Filesize
772KB
MD5d056810cdc7627339c81794ed0e03950
SHA14348a98cb474fd5d8250c50dc414bb5672819a2d
SHA256182fae874e3f214e72203145ef4fa7d9053829709aa6ae014c81099ef8b6947a
SHA512bb0ee193f38d6768082240a7d00689eb4f71700265ca83d22e631840eb89ac8d0e07de14350c62fd63ed966059d2f3d6ba6469e5d7a277f7a5d3aa19a0f679c6
-
Filesize
2.1MB
MD5104173ae8e32a09ad67db855e9541073
SHA1c4739310fdf11ef4dc87e32d5ffc2a39ff87e07e
SHA2569a094788bbd712474ae69cc7bd47e58b3696711e54b9ba40ca28e3dbdbe199bf
SHA512214df7f789c380fa42a82da10186a945d96a83df3c7fc1251854ded46c4ca0a1c349730b84e776e7b1d9826e5e0b4e9ce6749facdf62add7bf84ac0b2ec6d929
-
Filesize
1.3MB
MD5c5bb88fad75343f4935f64634ae5b682
SHA1d5aa35c529da8a47982f93f1fc5a9a16792ad441
SHA2560faeb09204bf69a3303bbf49a763f8d8c67426002a97f3d3b29261dab8a51006
SHA51290ff996c83e41cfbf3e5f13a39458d2786c036f3929e8abc68e10789b50fe76bcb4942cc22b4c320c8af1f089da16b076e65ada2350efac16eefc0b005445a82
-
Filesize
877KB
MD50b64d8a43f9890fcb850d4c82f29a86a
SHA12aa647da75160104235bf7038580df60485e9cca
SHA256115be94a2e26cc2aa9ff022f226190f26dc7b7d9097b2acec712b1ba274130b1
SHA512c6da6d1d485e87deb01579b12992c735baaf7b5adf27454f0edd6aaf489272052e8f0c55fdc380da362ccf80cd3b0f9c9ffdc277fc60b04e87cccf406feede04
-
Filesize
635KB
MD5b3bba0057d8922121445ed5bc9b5f5e9
SHA1a98e71223dc44737c0e42e5ef8a4728bb1a8bae8
SHA2560099fb057e77e52250b0f8d809f00d51bd6ea15ebdfe78c685bcb0659db0712a
SHA51208767bb392609592ade41f3548c3b8fc50c26068477b759f98d8f64b9d2bd9e01ece071e2c44e18c27be4369574f5c73bd0915725e591b575996a66d3b352bbb