Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 03:17
Static task
static1
Behavioral task
behavioral1
Sample
d1593bee0529243ba0e44b99e478aaa0N.exe
Resource
win7-20240705-en
General
-
Target
d1593bee0529243ba0e44b99e478aaa0N.exe
-
Size
1.5MB
-
MD5
d1593bee0529243ba0e44b99e478aaa0
-
SHA1
ce5a5c0ef55fe767dd56d153c9ef5eb26d122487
-
SHA256
28aaef77590b449038258f3fd0fe238433bc56077f61e17e758a581688123bee
-
SHA512
c881514b32bf50a74fac117e66b116ce85aee5dd7b88531cba2a0663b6607ce664250729881158d95fcd3af219007f47e8110a0aa84d1a1e843d69c55c2d780f
-
SSDEEP
24576:FN8NDFKYmKOF0zr31JwAlcR3QC0OXxc0H:FNgDUYmvFur31yAipQCtXxc0H
Malware Config
Signatures
-
Executes dropped EXE 22 IoCs
pid Process 4344 alg.exe 1868 DiagnosticsHub.StandardCollector.Service.exe 3028 fxssvc.exe 3652 elevation_service.exe 2648 elevation_service.exe 1172 maintenanceservice.exe 444 msdtc.exe 4088 OSE.EXE 5096 PerceptionSimulationService.exe 4932 perfhost.exe 3472 locator.exe 1768 SensorDataService.exe 4468 snmptrap.exe 2600 spectrum.exe 1592 ssh-agent.exe 5092 TieringEngineService.exe 1060 AgentService.exe 404 vds.exe 2008 vssvc.exe 2912 wbengine.exe 3332 WmiApSrv.exe 4952 SearchIndexer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 37 IoCs
description ioc Process File opened for modification C:\Windows\SysWow64\perfhost.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\system32\msiexec.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\AgentService.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\msiexec.exe alg.exe File opened for modification C:\Windows\system32\dllhost.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\SgrmBroker.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\System32\alg.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Windows\system32\fxssvc.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\SgrmBroker.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\system32\AppVClient.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Windows\System32\msdtc.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Windows\system32\spectrum.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Windows\system32\AgentService.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Windows\System32\vds.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Windows\system32\wbengine.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\system32\AppVClient.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\TieringEngineService.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Windows\system32\vssvc.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Windows\system32\fxssvc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\dllhost.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\86089287696f5a03.bin alg.exe File opened for modification C:\Windows\System32\snmptrap.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Windows\System32\SensorDataService.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\msiexec.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Windows\system32\AgentService.exe alg.exe File opened for modification C:\Windows\system32\locator.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Windows\System32\SensorDataService.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Windows\system32\SearchIndexer.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Windows\system32\SgrmBroker.exe alg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\schemagen.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe alg.exe File opened for modification C:\Program Files\Windows Media Player\wmpnetwk.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\tnameserv.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\dotnet\dotnet.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_86171\javaws.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\ktab.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\7-Zip\7zG.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateOnDemand.exe alg.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe d1593bee0529243ba0e44b99e478aaa0N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe alg.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe d1593bee0529243ba0e44b99e478aaa0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language perfhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1593bee0529243ba0e44b99e478aaa0N.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-111 = "Microsoft Excel Macro-Enabled Template" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{C120DE80-FDE4-49F5-A713-E902EF062B8A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000d63fed7cf8edda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9925 = "MP3 Format Sound" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\cabview.dll,-20 = "Cabinet File" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{AEB16279-B750-48F1-8586-97956060175A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000003c855875f8edda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-913 = "MHTML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9937 = "3GPP Audio/Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-24585 = "Cascading Style Sheet Document" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{F81B1B56-7613-4EE4-BC05-1FAB5DE5C07E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000009f4a5d75f8edda01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xhtml\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithList SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E2FB4720-F45F-4A3C-8CB2-2060E12425C3} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000024235675f8edda01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithList SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{3DBEE9A1-C471-4B95-BBCA-F39310064458} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000038d54775f8edda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-101 = "Microsoft Excel Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\mshta.exe,-6412 = "HTML Application" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-915 = "XHTML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-140 = "Microsoft OneNote Section" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9939 = "ADTS Audio" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9914 = "Windows Media Audio/Video file" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-184 = "Microsoft PowerPoint Macro-Enabled Design Template" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-115 = "Microsoft Excel 97-2003 Worksheet" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000003c855875f8edda01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-180 = "Microsoft PowerPoint 97-2003 Template" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5383EF74-273B-4278-AB0C-CDAA9FD5369E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000009e43907cf8edda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-121 = "Microsoft Word 97 - 2003 Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9923 = "Windows Media playlist" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9933 = "MPEG-4 Audio" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.svg SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@windows.storage.dll,-21825 = "3D Objects" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-12385 = "Favorites Bar" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9935 = "MPEG-2 TS Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-124 = "Microsoft Word Macro-Enabled Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\Windows.UI.Immersive.dll,-38304 = "Public Account Pictures" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{97E467B4-98C6-4F19-9588-161B7773D6F6} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000007ed05b7cf8edda01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xhtml SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-182 = "Microsoft PowerPoint Template" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\wmphoto.dll,-500 = "Windows Media Photo" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\msxml3r.dll,-1 = "XML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-123 = "Microsoft Word Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-103 = "Microsoft Excel Macro-Enabled Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-131 = "Rich Text Format" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-175 = "Microsoft PowerPoint Slide Show" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates SearchFilterHost.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1868 DiagnosticsHub.StandardCollector.Service.exe 1868 DiagnosticsHub.StandardCollector.Service.exe 1868 DiagnosticsHub.StandardCollector.Service.exe 1868 DiagnosticsHub.StandardCollector.Service.exe 1868 DiagnosticsHub.StandardCollector.Service.exe 1868 DiagnosticsHub.StandardCollector.Service.exe 1868 DiagnosticsHub.StandardCollector.Service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4908 d1593bee0529243ba0e44b99e478aaa0N.exe Token: SeAuditPrivilege 3028 fxssvc.exe Token: SeRestorePrivilege 5092 TieringEngineService.exe Token: SeManageVolumePrivilege 5092 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 1060 AgentService.exe Token: SeBackupPrivilege 2008 vssvc.exe Token: SeRestorePrivilege 2008 vssvc.exe Token: SeAuditPrivilege 2008 vssvc.exe Token: SeBackupPrivilege 2912 wbengine.exe Token: SeRestorePrivilege 2912 wbengine.exe Token: SeSecurityPrivilege 2912 wbengine.exe Token: 33 4952 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 4952 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4952 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4952 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4952 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4952 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4952 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4952 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4952 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4952 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4952 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4952 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4952 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4952 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4952 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4952 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4952 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4952 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4952 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4952 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4952 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4952 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4952 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4952 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4952 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4952 SearchIndexer.exe Token: SeDebugPrivilege 4344 alg.exe Token: SeDebugPrivilege 4344 alg.exe Token: SeDebugPrivilege 4344 alg.exe Token: SeDebugPrivilege 1868 DiagnosticsHub.StandardCollector.Service.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4952 wrote to memory of 2108 4952 SearchIndexer.exe 113 PID 4952 wrote to memory of 2108 4952 SearchIndexer.exe 113 PID 4952 wrote to memory of 3348 4952 SearchIndexer.exe 114 PID 4952 wrote to memory of 3348 4952 SearchIndexer.exe 114 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1593bee0529243ba0e44b99e478aaa0N.exe"C:\Users\Admin\AppData\Local\Temp\d1593bee0529243ba0e44b99e478aaa0N.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4344
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1868
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:5108
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3652
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2648
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:1172
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:444
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:4088
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:5096
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4932
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:3472
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:1768
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:4468
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:2600
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:1592
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:1744
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:404
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:3332
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
PID:2108
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 8962⤵
- Modifies data under HKEY_USERS
PID:3348
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5d7960913396920370ead8116da41bb63
SHA1168c390fdf51b9e2492699d1803530d94c56e9bd
SHA25668cd17892a4959038a108312c0cdfd69c1cfdcb3ee23f90826621f2e78b97c1f
SHA51255a790cda47b29178f6c4fafb8610a3d1f435b6e92d24b2f7560855dc56833e326cbb6b0b890aa7856df2e31dfe8656dce659ce668b8b846d2b851c96affcf90
-
Filesize
1.6MB
MD5643dea89e43b8177ebada8dd8b83cc7a
SHA1a854b1110fb912bebe6285d1e839aa70af0cd9da
SHA25601b5c718be3296004a36581ce659dea01b1d2499ad3082c29ab79f9baef61b96
SHA51204f40e4bc3e2f2f0d790c805ea6b760a7a74e9a9cb306b89f7bf824e145bfe31e8d60a4c491f37bd911e0b79b347dd6af0d3926146cf662cf35522ea2d9f905d
-
Filesize
2.0MB
MD52795d74e1227e65e17e2413112144e42
SHA12b360e2149a021f9a9008b9277a26f3ebe0a8dde
SHA2565120162e5d449ef7476c024823989c7ff3e059944a46daa797dc1cf20d86406d
SHA5123aba754b4c3d9f32a9556f08bc5f59efeba0d54e8bafba584573ec30bbcf4bef3f447d4c8c36b22ebe8617600fd6f0f8fbb5ab3685ae04b4712f7920988e58ce
-
Filesize
1.5MB
MD506c35929d936145a6e8f9a5562093dc8
SHA1969a3ec3b212b1d202421b6267292b08925535ca
SHA256854b4cf894c69e1d37732054a2a53b0007da53bc186e31867536c039823e4578
SHA5123a3cd47d6b8346e9666fd71c8d91b5bc7410b6edb7349e334b1bbf9881e6693cd2c28d12710025b0ac63df62c5c522e25dc8a64af79adc472a89e8bd6de2a862
-
Filesize
1.2MB
MD53b91e0659bd6d3eca055b42a1944cba0
SHA16e2aee76adb61474c9ad7641abd4baebc4ad0e1a
SHA2568946d969388b309d852148eb349b0d18f7e107a6ea4a18ad3e85b9727905e476
SHA51273b5b76d0f4052b620e0a0dfd88392c229fdea3a4b5c9d9acc6d6333b5b9cb060b4755f5d2d606be94f8593a6975a4283bb706b3326147c1b09805d6597f3d34
-
Filesize
1.4MB
MD574c7c757ec54502563dca030ca82bcf2
SHA18c1078635e31b95ad1dcf9adf00f7ff4358ff6af
SHA2566bebc5ad937e5f3e74ce79d98c26fe35a0b3962fccf5c9700b93e4df88279ef7
SHA512c03dec4b88c479429d70fcfe66c50e745f71cfbb1fb23801fbbf8677ae7ba0eeb8598be42a24e06f9889f11c9617985d7f23d0ab7613cc9d277770abed7b8118
-
Filesize
1.7MB
MD54ab298e279598089714c106551688e6f
SHA175aadee0fa129686b2ef14edce3cbc8d04f33ff1
SHA25692e4404cb93808b242b6afa0bce940afbb99c5312adf8c32c0e3b1b615094d81
SHA5129f05a9e28146fd47fb3cb05117c888bfe0b4f8be3669a68175d4c563705c808d7cf45378f541e5e53cc3575d62faa10661e2cc33a40afa7db3d1db1134b80516
-
Filesize
4.6MB
MD53dc8f9e8764dcdde4d90f7b9e837584b
SHA1c12fea7e2573f46e313a523cfa88b361d1c557aa
SHA256ec98595e5ffa72d18aabc759aebbf6b043c5cc400fa4e57284a9911ccc7e689c
SHA51256b54b9f6493248726922b15aed4bf2be2d77aa2be0abbbebb06c78303d91c9480644a295206c117e46ea9ba68b75d4bbb104d4c66e919c009502771dbd2f358
-
Filesize
1.8MB
MD56d0cc121eeed83c86792bdd42abd3d8c
SHA1036932a504862d90962ba9d5972b120663549e18
SHA256de41a1ff800f06dbfbf1d0f2b76f8f616416e404892a77ef7a3158efce3dedc7
SHA512338a4fd59b5d555c3650def4417ed81cd28bbef32072fd3e53a46125619dc13c265b4e58eae37adbcddc84efdb295ec34f48fbc097826865d63c4f8b99341cfe
-
Filesize
24.0MB
MD50995e83f4a64390471ac1899574e13a1
SHA12e116aaac175ea4a20e55b984c5c8254c6ed0df5
SHA256c5faf886692fc42c5a2c5c9ddf4d0e8fadfab2dfaa3d7b07a85a0a5c6e8ea502
SHA512434f8fc9685dcde6596309998a6d4fc0d85bd445cf6c7a46758355dc037abfa1033dfbc6cbeae6ea6f816d5c08ead2964405829e5a69ea3109c9be83a61a7023
-
Filesize
2.7MB
MD51fbaae2f45bc3d1725ea67626e735db7
SHA1dc71f47dae8f3a7493f821941d06228ca0577085
SHA256fde9ba5c2f9c3f8c9f6d47ea2968aa17053aa6584439106433746db79d6d6843
SHA51230e96a1ed2bf198493f2fb854df837c4d66831d7433450f00bd97203c5f12d8c76a76d214e6afdaaf9d6d0ed8d523db46b47066f2feac98723809c5cd5c5f4e0
-
Filesize
1.1MB
MD529362fcae98a9a747632a6ce517a2944
SHA1c8b96e5a300dc0f2f74d0dbf3bd61bfc6c20b108
SHA25690091cd2dea6cfd3b02999e661b186fa0eff93d2a7429b9a177073bb006fe2d8
SHA51279f5c0ca3b62f3c0d336daa6dfae0ffd7e50ec69517bd0b5cb9fc7334a41aff82456677ab91ec6e81d0620368d48e1a41dbf8576cccf13d61cd66d9c846c4e31
-
Filesize
1.7MB
MD5e5f3c796cd01941588da53cfd437e03f
SHA14495c436dec64e4017fd68b3dff23d04101e24ee
SHA256e053f9ff69b652efae5a230782d470c5aae278e390a4390cc789078dd54b704b
SHA512ede750786113cb8ae9c9c1107e87aa6797584214cf0b42f344580ec426a03b0636123970c45e30988c740528cf4071222ea7c35501ff2b6d56ec8f9ecaee622c
-
Filesize
1.5MB
MD55094c3e81d041d840162e944b4580020
SHA1a0bb100920e894f05ff17de97f335b246aebc110
SHA25627e11a2be5f84afca7b1abcc4161c61d590526cac637932e46d53b9ea350ab06
SHA5120e267baab8bef8d1cc5e313abe91a69690d9df52ea069d00f5bf7e81a1b5ac51f9ebc3e0375b225bd2bf40f2c324846e4901b69938732bc7048dd6af860ab936
-
Filesize
4.6MB
MD51c839280db595ca77a0b6414e4a80c65
SHA1f1349fcdd44dc5bdc486a44b6281f6fd2711c9c1
SHA256aab713a798a317b0a7d5f2329367e80a7580e0adf7023600f31cff1ebf408713
SHA5121788aadf46b22aae17f6225eac568c2cac6c986996e157bb08bc8cb33499af06668a051e76e65410fc026e4547f2db299b45967f5758d4539cf212be5fb91b5c
-
Filesize
4.6MB
MD53340431b732b1b752e0f1b4dc7414778
SHA1f0e0b3c3598bbedd261e7f339b2720058b05d302
SHA2564951aa303fcff8189688a08f383f6095a0cdbf7c4c192f271dbb9310a0ee0eb2
SHA5121ebae86e13b5a2fdcfa2d95f5491e805b5c452b86a6b7cb47136bf0323975332fb4b412b336a57d7ca2649cc5468daebb5e425ce6c4ba1c08b105e10d3900e61
-
Filesize
1.9MB
MD555138c8c43400157df737fe51bcb08b2
SHA1c2e889d48bcf40598e694c2386f60f5ba530acc6
SHA256299f76e21270bf6f8362d1bcc08bc7af2eaf53140290c33eac015003e733eb4a
SHA512242383fae9714d03882dfb6e8f9a38084d15f4609c8e621a91e3ef99fe3843b04c48749eeb8232403c593f75ff25d4f78ce664d3b0d0d264350098fafbf54637
-
Filesize
2.1MB
MD5530a551cc72fe8c337314e7da602a502
SHA1179e627c0e267d062c9adb62a4bd033a60d78e3f
SHA2563cca9972fca85b71cfa21f61c468fecb0e97daf03588d70d773156ea4c274dc7
SHA51295f2c3f1ee7819b3ec90a8e3d01f1cc9ea1dd7d5a1619e676c659ce3748335a7066de9b8afcb2461aec2c66300cc7f2fe2b711a9d8c41bbe17a3b680c763086b
-
Filesize
1.8MB
MD5eb29b8f05c78671c03a8218ba59ea91c
SHA1ee66500df3d56d85bf6e907cd8a431acea4ecdf6
SHA256e86819363855254d926cf72430df6a92152ffe836d3a26cf13f6a3070ea7d0ce
SHA5120a0f4ebe7f766b0e90158b8304d3e9cda3f0e438e31cedb87508b51ae4317354fe472cf756df41f280fc350c9831afee84f3f97509d32358c876304a33949bc6
-
Filesize
1.6MB
MD5c24f47c0112813ebab26e603b1080096
SHA1194cba9e09b79e753b616b3ae9addffc5bd42a11
SHA2565d0e627eae3473b7430bb9457b566e587e9e27935a7e09a46dc34bfd0aaea14e
SHA512e2533982f63a8f5ce39977b2ecc488bd35b67c224894c23bf40367c22a825651c117f7a928d833ea538007ce235f88473c21759cccb5b788c8e70ce111aa6c79
-
Filesize
1.4MB
MD5905626915f605190a1b323cfdfa34db9
SHA103b666599c01e4949b98b8a60c3b2f2363909a89
SHA256c694be14696b7b086be3d2f4afd23a702a1525f6ab190800c6cee826a22ac3cd
SHA5126668c15b393fc554596a8a1b971cb52159da137066159234c0f4109cc399cd3e4c159873ab206d35ae1bc1c645949760b4b119f856380671a00107ddb031444c
-
Filesize
1.4MB
MD5618698d9956056a0eb2959aec735a266
SHA101dce9166a4d27050e302b4742adb7f8e7b38a47
SHA2568b19dea15637fba479f1a22b1f0c5c26f31ea4b017c43c1f9ef7d8727294a1bf
SHA51223d676fea5a99c61958655c9b15890ae03fdc24c6533d77f1b5cb60daeb0989b99d62daa254606c8e71ae18ca12f860908faa7e182715e65a704dfc13c80ce03
-
Filesize
1.4MB
MD59c01eee7e6487b1d3680023ecb8f962c
SHA1fd0519ac2fcd8358fa6fecf09ae079e223aa1b6b
SHA25686051a84b0feea1ff67beb541f4e760ae1a0ab2243ed6f1f865648815040490f
SHA51264116b85681448719c4ce4ed7cda317b443e12d55529a97c758e403468bcfb42ef629f3a3a6339876fa6d94d72d5aa53638e3ba3024666d59f18e101fc01c1be
-
Filesize
1.5MB
MD531bbfb504c3c2cba1072bcce6ef2bbd8
SHA1bb1d73215d9e67f229f3b4c6ff0048a685434654
SHA25680fb1cf2c71c6de4e1bfc666e64f436c733ef0762bc742a48de3b1c7fc64b415
SHA5127ce85d3b5aa3faebbfd9f804abff45adef64712b7a3218353eb9405d7a7f24ff85e5c5dfaaa9ff4963b7deccee1f5114377aecf0d9bfe648f310039d4db80740
-
Filesize
1.4MB
MD57092b4878cfec213f70025a36af6b0d6
SHA1cbe7fc88ed2d64cb9b8075498dd7b69c99debc2b
SHA25691a388f032ccf87f7a170cb2fb5b073c1228426d3c886548076075a5914ec224
SHA51288d5d6022962c1dfb09326601ea47101804fe4744830619283aa328f9ee06667220f7a04eb727b88437de798884f89a5f97e7a250cda7d424bb91261c6d6c883
-
Filesize
1.4MB
MD5159dd6a2aa2cc9a7b2121ff492ee6804
SHA11487f73ab61cd4e8915e79c634a205cbaccfd496
SHA25665f549d68513caf8953d0df153d70aaa59cb3759e426c5b0d7386aba076fc79d
SHA51244ef2171e2b3fe63eb3b8dfb73d775e1b985815d1be1806e0253b846465d4f9ae5de9042a8d6a9dd32e64f2c449570b87d6497295e897b9b12cc53d10ae5bf5e
-
Filesize
1.4MB
MD50b9ae0a3059eb87e01a557207a02a5c3
SHA1a54926939785bf1a5b62e01baad13ea97c658fed
SHA25617d9ef311bdfca3e60ef1c84ded6f65e6784643cc13ff8e7048ad415e1228238
SHA512e6cdf62eef96a74122eb6091dd448a4deb1d6ca9fe78269789ca013eda0c87ff78eb380570dbae36480cc32dfc62875893666687eb9579d6cb5a25d689990fa8
-
Filesize
1.7MB
MD5e0a09c5761b3959b9b3ee4b287db1cce
SHA1b2ccb6b248137f767c3f0b06d47bae7e556c1018
SHA256813ae6d7642c43bb69662e56399da5799cdbdd9b3022de4ab846edf577e570fc
SHA512d8a3619cba319b583b4afb0c3b978aefbd5483ea1b8ef440cb4543ca31e3fc2c28e9cedc07cc60cdfd74961342376055d49b3fa22a7a01d48aeaa57a711e5164
-
Filesize
1.4MB
MD5c0db77013a7b13f426e66e89b62f862d
SHA15f365d06c824672da8664dace3a70535f31badf7
SHA2566432db77153cbeac3442427641ac97dc078f3b74706144c675b2563e41282589
SHA512d31bacffbf5c93995dc469c82d69cb4994c62a7e13bc4cd04a3468eb18146268d09c9d764b959b0606284e137e620135b7ec2d8ea22e4b420244ca9180afdc1f
-
Filesize
1.4MB
MD585372c5865d9ea0fd7c58aa6a357d161
SHA1a78b897511b643a7045650e0770752938356b3cf
SHA256c0ff6a52255242ce39d53727789a49e63d61d59eaf1ecb060ab88e1e86c287e0
SHA51238bb67ab8eddf30cbd93e80caedbe3b61d5967a6657248ab29f1c3204fb25e05953d8c13686e61941c63972c88c28dd8b5d1b9471b830a10a5bddc3b147955ef
-
Filesize
1.6MB
MD5f9bffc53b753ee93a095cc581888cd3b
SHA17720dfe7e9bea4ab76855a44137755892d984dd4
SHA256938e75a1ebfae7ba750f8bd85b78284d8f2f4d3fdfae89e0d810c419e85daa86
SHA512e23fb4c531a0e877c6ec48be7c925ee0a762081d3d7438c36cf1d180edd01346db90bbc36fa55d6a172dbb24b11dad7e9f4afddf959e818e8328a143821f1b86
-
Filesize
1.4MB
MD541f8ae59665ff2b650a18899328e3368
SHA16d0b4a0ec1d7a18fd61755f66926535fcf49659d
SHA25651bd7f8f2fac69d15aafd5014908169f0fb7e76e879d4301deaba56ae9e73605
SHA51234111955a03593ceadaaa80f7aff1cfc099e3cc590b20ba8826b66c10a1953f0ef198ac3fab4980f4627bd1abb07efbfc929b4fc8df1f08d3363e32491e182cc
-
Filesize
1.4MB
MD5301e1d029f2b21d26ab1739b811475e5
SHA1672c7f94f19f291d3cc37d5c623d1cc8c4d13f48
SHA2560aaf67c434b2409871239f20877181d186a64319a646de4f5360ae9d5b582fff
SHA512b9550f8c98a5686641aaf596461ad5251de1bebf55661b83607f6701c643ea00e6adfaf98b9f50cdb92673aad86ccdaa50f4720a128c2d3f80f04966e2495beb
-
Filesize
1.6MB
MD556cf29257f55b451b54b0b9c07da20a7
SHA10abadbc529dc5e8b9277dc4b290969a4ac38903e
SHA25618657f229664009629328d01d61702996f0fc955dec3e1e49f4db212473d83d5
SHA5128986e25db8e9a88c2845151beb1d5ea368e88536c1a3e332a1204ab9790c89f582ea9d03f94485c0bc03c5dd08c865ff88fd4e47a17f385782b95ba61d7a9307
-
Filesize
1.7MB
MD594d14a91948ad2c911e86978a96e54c2
SHA16c07acfa7da02bb1fb7c3875095e37169d1a6f88
SHA25673419785791e8b2a0ab82b97069a402426b00c098a30eab191272e652ce0774a
SHA51202e4a74ee59c343dd007a365ee68104ce787ca3307be11b79825b8ddfe8885523b7932ea1a4157edc2fdf3e01b562f8590dac3eb937c6d3beec8895089816b87
-
Filesize
1.9MB
MD5df917f522dba2678b3d9e2685e39b7f4
SHA1b0c6ce24685ab45b1e147c9eaf9e50cd73960e3e
SHA256c1a403fc691b234464e249e6064938ca966d7ef13ca06ed1ec6a8e591605b4bf
SHA51229c6d537259c952409a7242ca1569900050e68ae1a2f30d2b84c5bdf67688bf80ed175b6adb0160ca7dcc92b8a46ccb95d0378987a3d204d3c64ade88f87674c
-
Filesize
1.4MB
MD5cda5b285b16b2ccb86ea5428153f0058
SHA16da06800b6f768b5ae6efb8a1936d33d946d2a54
SHA2564f54c5b469bfc6e70b168af87ad5ef5e1b8a35880364cd68ab2d66feff3d282c
SHA512ac688ffdbf0596b2350a2b2a211884c6b89350b6df32334587af1cab87239631013189a63280d0ea04d8c822e1c2309194e0269e67380f01b3035f9f927867e1
-
Filesize
1.5MB
MD5264f4f0548ffa30151cf130a3d480c8c
SHA1bb725ebc713e542ebdfa283833831a35f3b9be0c
SHA2565003c89c4b486682f64a5c7fa41e668631ad44548b4711d4be0e5a1244b6c25c
SHA5124ba578656d6515310b0bad8234928bdf5f3caddde589b24f9f9fc63c05fb9ccc2e59ac03774ab1acc497781a593140e920605e17235f7636ed0287382690973a
-
Filesize
1.6MB
MD5c7efd1bceaaf8411acccdcd0378d571e
SHA1387405679aff5d36e2951510ce7f3f6b1114cbde
SHA2566362eaaf94fae2485dedfa3c81265eb9daf27c972d8a41f5300c548419059e60
SHA512e2feb134a4f7acf5719bb1bec2d2dd63edd1ff3163854cb27b73e68403d42fb52aef0f988c4ebaec5f8976bf290b39d1ee18e2a57f377c36e1d4b73680b8e29e
-
Filesize
1.4MB
MD59e12d81f0707cc6a67f15ca6544a65b8
SHA1a8d99569dd9e911dcf803e3b80c5388952b4c5a8
SHA256159660e8f90f74d1010e8845a76884581575f33a7e452b55052266eb9b9ca98f
SHA51285b0f99d9b978acd4f3ae8a1b5971febac8675b7ee08ff95889c0ccdc3a2c3d6ca0e32cee5b9b173f51f5f5ca86915bbcaa8558b48e7e87a565180ba1eb943ba
-
Filesize
1.7MB
MD55254e48225d359c7694358ac05ed4a0a
SHA1a5258403bfaf8ec60819ffb1a898cf9aff0cfba9
SHA256acbb3caacb45c7a77a676a6313eef0f667b99c024de347dd95e64e0ad2d31521
SHA512233b86a90cca9c9725cb446996a3809a9f75e5b38e0080119166b8273e07f05e1513743680e5463e74bcef6dec8563d20a9332ce976dd46032521aab7183ea42
-
Filesize
1.5MB
MD55674318e790bd1747d9a11d19041ee69
SHA18f0117cb30c16ea8fb54731909202a669aa813b5
SHA25605f488159c6be10d0128886f055897ee6c0e0cdb9698f7ce95366442609f3b2f
SHA512be7136968724a233ceb45dc30ba28b99ceb010aaa303ce698d80a3d9b96251a6ad5569a31265a18afe1c5dea4520c4f8cd81cb4b3a63d3943a73993ea06ba3a1
-
Filesize
1.2MB
MD5f2f0a5f0cdebbdf51915feea8568cb77
SHA100c0ea0f38b5be90776bf0409a5ad54f9056a28f
SHA2566be75f21bdf0edf52e3e68b9c0d511fdb88ec838d25cd71e949e18cdd71e7dfb
SHA512b8732633121f32610973140373b35b0e10b4f9828eaa603ee902332a1464043cc99826785964d1caa6feb04ccb0194bdf64b0fc0917af389afb3b40e93fcb376
-
Filesize
1.4MB
MD5c5648badf481c0ac9275b183cbc4126f
SHA12caea844b67d266730ca71088aefde7d733323cc
SHA2562b07d01e224c490784b301e453524a382a988906050113f95180b2985901dc4a
SHA512275e8fed3bab8d80eaed6792ab254c1d0b008689d60e5f9a343466fc41090db26b768016723e1183213c2542ccd6b537ec1edb66c4be8c477ce9c163c0768d37
-
Filesize
1.8MB
MD59a4f39d52c4b5cc35dc07802d58e1e42
SHA19801c49c0989ef71c4988d17d0677c58de45cfdc
SHA25637498bcba6dbec13c36bfdc639ea2de24d80860a422d78f4b635ec137a53430e
SHA51288c10d2c46df6329023ae6f5ab8bfac8a894277811c7e926519564a2ec55368874aeeddc839379d6fcbb6b35073cef6880ac77e8b79a17811d0449ef3f3bf5fc
-
Filesize
1.5MB
MD521707dc431e8b81efa89294bd103d5d2
SHA1a57510caba996c61b4e3079417319e65c7298333
SHA256dc55e272b7c5fa5e1e5052a3b6071f10f94851c82dc39f08b79948a6b9452ca0
SHA5129dfd76b6defb0232a4162089a0b2da8c4e2f0a316896828eaba2b3723524dd15aba4fe41a6fbce3c9ab1d6ad098d337fbb06a3560e412e047433aa63848b4188
-
Filesize
1.4MB
MD5a5e7c1e81e438d1c1e5e09e2492ab6e5
SHA17eb9be894e24f1c8e7fd96a5b60436e131193d15
SHA256bb39b9e1d6b03e751deb736e5ab5d12db23bd93fa0af131e1cc5b4cb6128325f
SHA5126f90e946f8ec2cb289b19af2f566f0da86cc38808691dc11be5aeec1265b0658068879fd9f44787c95b140d794a0b4eead3dfa264b9d1e517d8a96deae278386
-
Filesize
1.8MB
MD51f3b6933c6cd7da5c71ef1908b61c35a
SHA1dd9311df54f5a8c9740f5ff2084522e022c6f952
SHA256a80472354d8e251ca332ef7048f62c170605d58966c0ae87b3a5634d20a52fc2
SHA512818d13386015574435a948aeb96b45f994fc92fcd6757a0c770022e08c10d91f4eacde906c44d2a213395bcf1aa02a10e94382173cafaec41324a400fd4331d7
-
Filesize
1.4MB
MD54994859912e374a2afdb180cc44e4d4e
SHA11ab9df1f1ef3e1a6aa0ce6ec501a648e2342a6a5
SHA2561277ab3880573b58092b9d168a49ab4c1d62803dab5f7a4d746eb7e3bcba91dd
SHA51203d4b16a82649df0456b300cb00411622adbde7cbc0a39d6a81a6f440ad9fe8b7d8e03190e2e94c8fcfe085cbfe44f901feb10317a5fae43eb2c5eecb3383b63
-
Filesize
1.7MB
MD58d1e95717778d6ca4c000e9c743b9dbb
SHA1cfcab7685451e38dde0dcd0f7bbc8641a09fdd90
SHA256ab604ec27dd110839c4bd33872ec5ba2b242c775b68d561c733bc1e9b523fa3e
SHA5123e86c6125fcddb9d9f32d39bb67dc7e54de8f37148b304ae3918cc812faaa7bb5d56db06863df0abfd2933f6b165202670089df3525a0049beb5c559800b68cf
-
Filesize
2.0MB
MD5f30e6a54f3b846bbca090c412f2fa07a
SHA1a744aa7834ce2620559f47b4cccfc28d17e5883b
SHA25690886637a06a91ebffd6c90eade378274166ba6305a399d451b4a7f894cf41df
SHA5126473d7bad775b317803658e74fe38df7bfcad821d239cd30c0d64819b501ef00f615dbde05114878d78016ea9fea1cbb76716160e7866b7f1791ee285cfcc205
-
Filesize
1.5MB
MD5780801c33d0b0dce7fefc21dd4dc62e1
SHA12fc40163605eca0c8dfb5924679d49f123489bd7
SHA256ab9011c90d70576d58ed57dd7fdfde8e4f91b7ba6afc5eb3c8b6a2826b5b7611
SHA5120af684b5871c2dc432cd303e72f1dae742c39f8bbef0aebc92fc8048891c6b54f115b63b8ac99bb619775c25862e23c2e20877a01141be377f9777b0ce2fef14
-
Filesize
1.6MB
MD5807ac8858909b96c8b53f9ebe11d6ee4
SHA1d24b3c654161cf2ff49bac1266540eae025d1a79
SHA256b9b458e88d404f5f858e397cc7e4e088729196ae9f608f4dc8eee479394307c7
SHA5121dbc7d1a1e812cf4be97f85b5a07e3ad00aacae0909fc3cdb380dde5126ef8930cbd0da17312847404a1feda3be456d687fb50f3135c595f325d4d19deb84173
-
Filesize
1.4MB
MD5fdbafca83c669c6cd124b79218ce3b79
SHA1150d1aae820546e40f7f7aa9a4c80d5dadbe74cc
SHA256b6b9779eea7142f60e401a27ab4e0a48702bde1b50c1c20c4dfbcd21ff72461e
SHA5126d70b208882a4c228e9057099ccf2d56ff63172925f84980d30dc9eb70622058d84d2444b990edf5a2a91817525192a194c9f5a3796617937df607f879efd974
-
Filesize
1.3MB
MD5090e350fa30e423f6ebcbcf6218e2b69
SHA1bd9aeaa0a285abbcebde1e1ead1699fc2a46a8fc
SHA25664015a504f2dcd2d63be22cba9207e004c497a00189992c4df99b621a2a68568
SHA512600d570ce6df2f77b15b64618247925553437e8d288c9ee29a96df8b7100e5f652f485ed2c7d78285b8b68b24d1d1a878d1ebbd17871d83dd23e9d79956efa05
-
Filesize
1.6MB
MD5d69b3ec15943aadac3cce63e71f8f424
SHA1a80ebaf3395d7a8ec1e2f9d4cb84ade4f5b3bc5c
SHA256e1e3aed2de5306158714482a5e52988967babcd1b1e3ed2bd388afd9bf4adf0b
SHA512c345ab27bc68e7900a739c3cf94b9c7747ed202a09255978ea3229ca3a7b2e7276e74459d1efe4ff58be54ab88a2a7cb38fb690242469aa9525ad1ed7377d294
-
Filesize
2.1MB
MD5f77a6a8bd249c3322dcd3fb69e92573f
SHA16cc1a798033b4d539818275424adcdc4867d633b
SHA256e8c6401350e3a0bc6aa70142b0fb4b9e4e150a6d7c79dec3cca270e67706de76
SHA51228ee68b3ba3eccab31abf1f6107a40e3a4aa99b4ccec4e0dcc4e562490573cb5b662017956d9ddb7ce2c5d3cda1b57ae940b0f30ae808b3eeb2d23a7370a7e01
-
Filesize
1.3MB
MD5ebc6c90ff29b6f6ac22b1d64449a9b7a
SHA17d35eaf52acd10122b970e7c8a7614c0b174656d
SHA2567971d81625d3e995ecf0ecbce7c213329716ea098b1dd42c6e0e4cdb598a97be
SHA512819d2f5a7b00e6e6984aef9a45e7031931403c2dabec8443c79d89b15445be174f19edebecdf7f2e671ff9e6cc692f05a282e2115edf7531d8f524eb32c4cc55
-
Filesize
1.7MB
MD5bfa4d8d00969355fa68737e425c17697
SHA1342e4efd1d44bd2761a7871cfc2fe5948cad8d0a
SHA256c2305b8824b21074ad41348862d224fbe29420744359f26fdea3791952df5edb
SHA5124f53049ff1010a2938c54e36fecf8f53c42fc1c7514c4958215ad63fc2f2b5aec8d4348612959eabdae2e7ea79cdebde55714df2a466607398e56e5e09cd8feb
-
Filesize
1.5MB
MD5dfd2bb8ac138c2fd3673de3a5b737167
SHA1a7750f756d1f3a54ed77013760038f1c631aa093
SHA2560acc39a37eecb96d6a1544289bf953d9a78a29035b11c3782778780dcdfaf6a8
SHA5120a6b1b57f3f576ed5fdace60248e0064705b638477b2ec248614d0923a725bec3319a2d5ae3600a8e25a1753debed6adb4b7efb3d1de4e0b9fcebc9a48a9dc49