Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 01:26
Static task
static1
Behavioral task
behavioral1
Sample
d4996cbfebc931df1511b6daa6f51d5623a41fd275b4022b99de34f23c1bd461.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d4996cbfebc931df1511b6daa6f51d5623a41fd275b4022b99de34f23c1bd461.exe
Resource
win10v2004-20241007-en
General
-
Target
d4996cbfebc931df1511b6daa6f51d5623a41fd275b4022b99de34f23c1bd461.exe
-
Size
1.2MB
-
MD5
156fd655d4aa8b31311d089401226a42
-
SHA1
319ffb454a5dec4fb59fca008171f38a808a8291
-
SHA256
d4996cbfebc931df1511b6daa6f51d5623a41fd275b4022b99de34f23c1bd461
-
SHA512
7dfb1815df7338142ca2c9d3873086f3e36206090b2197ac863c5c18e9dcceca160c8724fa84bbf5e8adc42e9b34d7c5877a1e7b783a8dce9185fc335fb73214
-
SSDEEP
24576:Kg60JY2tAtZNMaMIcqyPl1Q9AXUY/jIU:Kg6PtMdtm9AXHjIU
Malware Config
Extracted
Protocol: smtp- Host:
s82.gocheapweb.com - Port:
587 - Username:
[email protected] - Password:
london@1759
Extracted
agenttesla
Protocol: smtp- Host:
s82.gocheapweb.com - Port:
587 - Username:
[email protected] - Password:
london@1759 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/memory/2172-1136-0x0000000021A90000-0x0000000021AB6000-memory.dmp family_xworm behavioral2/memory/2172-1178-0x0000000023CB0000-0x0000000023CD4000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5032 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ljmijamD.pif -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk ljmijamD.pif File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk ljmijamD.pif File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\apihost.exe.lnk ljmijamD.pif -
Executes dropped EXE 33 IoCs
pid Process 3980 alpha.pif 3756 alpha.pif 2620 alpha.pif 4672 xpha.pif 1464 per.exe 3900 pha.pif 4056 alpha.pif 2096 alpha.pif 1640 alpha.pif 2172 ljmijamD.pif 1492 alg.exe 2816 DiagnosticsHub.StandardCollector.Service.exe 2968 fxssvc.exe 3744 elevation_service.exe 3428 elevation_service.exe 2204 maintenanceservice.exe 3960 msdtc.exe 4340 OSE.EXE 5112 PerceptionSimulationService.exe 2200 perfhost.exe 1616 locator.exe 4368 SensorDataService.exe 2080 snmptrap.exe 4072 spectrum.exe 848 ssh-agent.exe 4044 TieringEngineService.exe 552 AgentService.exe 1404 vds.exe 840 vssvc.exe 2352 wbengine.exe 1528 WmiApSrv.exe 744 SearchIndexer.exe 1792 apihost.exe -
Loads dropped DLL 1 IoCs
pid Process 1464 per.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ljmijamD.pif Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ljmijamD.pif Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ljmijamD.pif -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Dmajimjl = "C:\\Users\\Public\\Dmajimjl.url" d4996cbfebc931df1511b6daa6f51d5623a41fd275b4022b99de34f23c1bd461.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" ljmijamD.pif -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 93 api.ipify.org 94 api.ipify.org 104 checkip.dyndns.org -
Drops file in System32 directory 31 IoCs
description ioc Process File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe ljmijamD.pif File opened for modification C:\Windows\system32\SearchIndexer.exe ljmijamD.pif File opened for modification C:\Windows\system32\msiexec.exe alg.exe File opened for modification C:\Windows\system32\SgrmBroker.exe ljmijamD.pif File opened for modification C:\Windows\system32\spectrum.exe ljmijamD.pif File opened for modification C:\Windows\system32\AgentService.exe ljmijamD.pif File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\AgentService.exe alg.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe ljmijamD.pif File opened for modification C:\Windows\system32\TieringEngineService.exe ljmijamD.pif File opened for modification C:\Windows\System32\vds.exe ljmijamD.pif File opened for modification C:\Windows\system32\wbengine.exe ljmijamD.pif File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\e1d937933e6c0d63.bin alg.exe File opened for modification C:\Windows\system32\locator.exe ljmijamD.pif File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\System32\SensorDataService.exe alg.exe File opened for modification C:\Windows\system32\msiexec.exe ljmijamD.pif File opened for modification C:\Windows\system32\vssvc.exe ljmijamD.pif File opened for modification C:\Windows\System32\msdtc.exe ljmijamD.pif File opened for modification C:\Windows\SysWow64\perfhost.exe ljmijamD.pif File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\System32\alg.exe ljmijamD.pif File opened for modification C:\Windows\system32\AppVClient.exe ljmijamD.pif File opened for modification C:\Windows\system32\SgrmBroker.exe alg.exe File opened for modification C:\Windows\system32\fxssvc.exe ljmijamD.pif File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe ljmijamD.pif File opened for modification C:\Windows\System32\SensorDataService.exe ljmijamD.pif File opened for modification C:\Windows\System32\snmptrap.exe ljmijamD.pif File opened for modification C:\Windows\system32\dllhost.exe ljmijamD.pif File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe ljmijamD.pif -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 512 set thread context of 2172 512 d4996cbfebc931df1511b6daa6f51d5623a41fd275b4022b99de34f23c1bd461.exe 121 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe ljmijamD.pif File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateComRegisterShell64.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe ljmijamD.pif File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe ljmijamD.pif File opened for modification C:\Program Files\Java\jdk-1.8\bin\orbd.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe ljmijamD.pif File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe ljmijamD.pif File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe ljmijamD.pif File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe ljmijamD.pif File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe ljmijamD.pif File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe ljmijamD.pif File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleCrashHandler64.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ExtExport.exe ljmijamD.pif File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe ljmijamD.pif File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe ljmijamD.pif File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe ljmijamD.pif File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe ljmijamD.pif File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe ljmijamD.pif File opened for modification C:\Program Files\7-Zip\7zG.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe ljmijamD.pif File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe ljmijamD.pif File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleCrashHandler.exe ljmijamD.pif File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe ljmijamD.pif File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe ljmijamD.pif File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe ljmijamD.pif File opened for modification C:\Program Files\Windows Media Player\wmpnetwk.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_87843\javaw.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\klist.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe ljmijamD.pif File opened for modification C:\Program Files\Java\jdk-1.8\bin\ktab.exe ljmijamD.pif File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe ljmijamD.pif File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe ljmijamD.pif File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe ljmijamD.pif File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_87843\javaws.exe ljmijamD.pif File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\schemagen.exe ljmijamD.pif File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe ljmijamD.pif -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe ljmijamD.pif File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4996cbfebc931df1511b6daa6f51d5623a41fd275b4022b99de34f23c1bd461.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ljmijamD.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apihost.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1216 esentutl.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9939 = "ADTS Audio" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9933 = "MPEG-4 Audio" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\cabview.dll,-20 = "Cabinet File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9902 = "Movie Clip" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9937 = "3GPP Audio/Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@"C:\Windows\system32\windowspowershell\v1.0\powershell.exe",-105 = "Windows PowerShell XML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-7 = "Microsoft Devanagari to Latin Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@windows.storage.dll,-21825 = "3D Objects" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@windows.storage.dll,-21824 = "Camera Roll" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-101 = "Microsoft Excel Worksheet" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9936 = "QuickTime Movie" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-4 = "Microsoft Simplified Chinese to Traditional Chinese Transliteration" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{01BE4CFB-129A-452B-A209-F9D40B3B84A5} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000007e6912f6212fdb01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-5 = "Microsoft Transliteration Engine" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-10 = "Microsoft Hangul Decomposition Transliteration" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia\ActiveMovie SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-131 = "Rich Text Format" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-912 = "HTML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-6 = "Microsoft Cyrillic to Latin Transliteration" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E2FB4720-F45F-4A3C-8CB2-2060E12425C3} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000007eb8c6f7212fdb01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{3DBEE9A1-C471-4B95-BBCA-F39310064458} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000e57077f5212fdb01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\setupapi.dll,-2000 = "Setup Information" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-177 = "Microsoft PowerPoint Macro-Enabled Slide Show" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-12385 = "Favorites Bar" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-127 = "OpenDocument Text" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\notepad.exe,-469 = "Text Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-8 = "Microsoft Malayalam to Latin Transliteration" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-913 = "MHTML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-120 = "Microsoft Word 97 - 2003 Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000f132baf5212fdb01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-172 = "Microsoft PowerPoint 97-2003 Slide Show" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithList SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{F81B1B56-7613-4EE4-BC05-1FAB5DE5C07E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000007d7e1f6212fdb01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\msxml3r.dll,-1 = "XML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-102 = "Microsoft Excel Template" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.DVR-MS SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-140 = "Microsoft OneNote Section" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-10046 = "Internet Shortcut" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000e62088f5212fdb01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-107 = "Microsoft Excel Comma Separated Values File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9905 = "Video Clip" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithList SearchProtocolHost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3028 schtasks.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 26 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2172 ljmijamD.pif -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 3900 pha.pif 3900 pha.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 2172 ljmijamD.pif 5032 powershell.exe 5032 powershell.exe 5032 powershell.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 664 Process not Found 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeDebugPrivilege 3900 pha.pif Token: SeTakeOwnershipPrivilege 2172 ljmijamD.pif Token: SeDebugPrivilege 2172 ljmijamD.pif Token: SeAuditPrivilege 2968 fxssvc.exe Token: SeRestorePrivilege 4044 TieringEngineService.exe Token: SeManageVolumePrivilege 4044 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 552 AgentService.exe Token: SeBackupPrivilege 840 vssvc.exe Token: SeRestorePrivilege 840 vssvc.exe Token: SeAuditPrivilege 840 vssvc.exe Token: SeBackupPrivilege 2352 wbengine.exe Token: SeRestorePrivilege 2352 wbengine.exe Token: SeSecurityPrivilege 2352 wbengine.exe Token: 33 744 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 744 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 744 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 744 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 744 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 744 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 744 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 744 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 744 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 744 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 744 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 744 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 744 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 744 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 744 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 744 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 744 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 744 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 744 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 744 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 744 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 744 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 744 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 744 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 744 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 744 SearchIndexer.exe Token: SeDebugPrivilege 2172 ljmijamD.pif Token: SeDebugPrivilege 2172 ljmijamD.pif Token: SeDebugPrivilege 2172 ljmijamD.pif Token: SeDebugPrivilege 2172 ljmijamD.pif Token: SeDebugPrivilege 2172 ljmijamD.pif Token: SeDebugPrivilege 5032 powershell.exe Token: SeDebugPrivilege 1492 alg.exe Token: SeDebugPrivilege 1492 alg.exe Token: SeDebugPrivilege 1492 alg.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2172 ljmijamD.pif 2172 ljmijamD.pif -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 512 wrote to memory of 2736 512 d4996cbfebc931df1511b6daa6f51d5623a41fd275b4022b99de34f23c1bd461.exe 99 PID 512 wrote to memory of 2736 512 d4996cbfebc931df1511b6daa6f51d5623a41fd275b4022b99de34f23c1bd461.exe 99 PID 512 wrote to memory of 2736 512 d4996cbfebc931df1511b6daa6f51d5623a41fd275b4022b99de34f23c1bd461.exe 99 PID 2736 wrote to memory of 2192 2736 cmd.exe 101 PID 2736 wrote to memory of 2192 2736 cmd.exe 101 PID 2736 wrote to memory of 2192 2736 cmd.exe 101 PID 2736 wrote to memory of 1216 2736 cmd.exe 102 PID 2736 wrote to memory of 1216 2736 cmd.exe 102 PID 2736 wrote to memory of 1216 2736 cmd.exe 102 PID 2736 wrote to memory of 3980 2736 cmd.exe 103 PID 2736 wrote to memory of 3980 2736 cmd.exe 103 PID 2736 wrote to memory of 3980 2736 cmd.exe 103 PID 2736 wrote to memory of 3756 2736 cmd.exe 104 PID 2736 wrote to memory of 3756 2736 cmd.exe 104 PID 2736 wrote to memory of 3756 2736 cmd.exe 104 PID 2736 wrote to memory of 2620 2736 cmd.exe 105 PID 2736 wrote to memory of 2620 2736 cmd.exe 105 PID 2736 wrote to memory of 2620 2736 cmd.exe 105 PID 2620 wrote to memory of 4672 2620 alpha.pif 106 PID 2620 wrote to memory of 4672 2620 alpha.pif 106 PID 2620 wrote to memory of 4672 2620 alpha.pif 106 PID 2736 wrote to memory of 1464 2736 cmd.exe 109 PID 2736 wrote to memory of 1464 2736 cmd.exe 109 PID 1464 wrote to memory of 848 1464 per.exe 110 PID 1464 wrote to memory of 848 1464 per.exe 110 PID 1464 wrote to memory of 3900 1464 per.exe 113 PID 1464 wrote to memory of 3900 1464 per.exe 113 PID 2736 wrote to memory of 4056 2736 cmd.exe 115 PID 2736 wrote to memory of 4056 2736 cmd.exe 115 PID 2736 wrote to memory of 4056 2736 cmd.exe 115 PID 2736 wrote to memory of 2096 2736 cmd.exe 116 PID 2736 wrote to memory of 2096 2736 cmd.exe 116 PID 2736 wrote to memory of 2096 2736 cmd.exe 116 PID 2736 wrote to memory of 1640 2736 cmd.exe 117 PID 2736 wrote to memory of 1640 2736 cmd.exe 117 PID 2736 wrote to memory of 1640 2736 cmd.exe 117 PID 512 wrote to memory of 3876 512 d4996cbfebc931df1511b6daa6f51d5623a41fd275b4022b99de34f23c1bd461.exe 119 PID 512 wrote to memory of 3876 512 d4996cbfebc931df1511b6daa6f51d5623a41fd275b4022b99de34f23c1bd461.exe 119 PID 512 wrote to memory of 3876 512 d4996cbfebc931df1511b6daa6f51d5623a41fd275b4022b99de34f23c1bd461.exe 119 PID 512 wrote to memory of 2172 512 d4996cbfebc931df1511b6daa6f51d5623a41fd275b4022b99de34f23c1bd461.exe 121 PID 512 wrote to memory of 2172 512 d4996cbfebc931df1511b6daa6f51d5623a41fd275b4022b99de34f23c1bd461.exe 121 PID 512 wrote to memory of 2172 512 d4996cbfebc931df1511b6daa6f51d5623a41fd275b4022b99de34f23c1bd461.exe 121 PID 512 wrote to memory of 2172 512 d4996cbfebc931df1511b6daa6f51d5623a41fd275b4022b99de34f23c1bd461.exe 121 PID 512 wrote to memory of 2172 512 d4996cbfebc931df1511b6daa6f51d5623a41fd275b4022b99de34f23c1bd461.exe 121 PID 744 wrote to memory of 4364 744 SearchIndexer.exe 158 PID 744 wrote to memory of 4364 744 SearchIndexer.exe 158 PID 744 wrote to memory of 3980 744 SearchIndexer.exe 159 PID 744 wrote to memory of 3980 744 SearchIndexer.exe 159 PID 2172 wrote to memory of 5032 2172 ljmijamD.pif 163 PID 2172 wrote to memory of 5032 2172 ljmijamD.pif 163 PID 2172 wrote to memory of 5032 2172 ljmijamD.pif 163 PID 2172 wrote to memory of 3028 2172 ljmijamD.pif 164 PID 2172 wrote to memory of 3028 2172 ljmijamD.pif 164 PID 2172 wrote to memory of 3028 2172 ljmijamD.pif 164 PID 2172 wrote to memory of 1792 2172 ljmijamD.pif 169 PID 2172 wrote to memory of 1792 2172 ljmijamD.pif 169 PID 2172 wrote to memory of 1792 2172 ljmijamD.pif 169 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ljmijamD.pif -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ljmijamD.pif
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4996cbfebc931df1511b6daa6f51d5623a41fd275b4022b99de34f23c1bd461.exe"C:\Users\Admin\AppData\Local\Temp\d4996cbfebc931df1511b6daa6f51d5623a41fd275b4022b99de34f23c1bd461.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\ljmijamD.cmd" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\esentutl.exeC:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o3⤵PID:2192
-
-
C:\Windows\SysWOW64\esentutl.exeC:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1216
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows "3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3980
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3756
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 103⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Public\xpha.pifC:\\Users\\Public\\xpha.pif 127.0.0.1 -n 104⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4672
-
-
-
C:\Windows \SysWOW64\per.exe"C:\\Windows \\SysWOW64\\per.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SYSTEM32\esentutl.exeesentutl /y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe /d C:\\Users\\Public\\pha.pif /o4⤵PID:848
-
-
C:\Users\Public\pha.pifC:\\Users\\Public\\pha.pif -WindowStyle hidden -Command Add-MpPreference -ExclusionExtension '.exe','bat','.pif'4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3900
-
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c del "C:\Users\Public\xpha.pif"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4056
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \SysWOW643⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2096
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1640
-
-
-
C:\Windows\SysWOW64\esentutl.exeC:\\Windows\\System32\\esentutl.exe /y C:\Users\Admin\AppData\Local\Temp\d4996cbfebc931df1511b6daa6f51d5623a41fd275b4022b99de34f23c1bd461.exe /d C:\\Users\\Public\\Libraries\\Dmajimjl.PIF /o2⤵PID:3876
-
-
C:\Users\Public\Libraries\ljmijamD.pifC:\Users\Public\Libraries\ljmijamD.pif2⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:2172 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\ACCApi'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /tn AccSys /tr "C:\Users\Admin\AppData\Roaming\ACCApi\apihost.exe" /st 01:33 /du 23:59 /sc daily /ri 1 /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3028
-
-
C:\Users\Admin\AppData\Roaming\ACCApi\apihost.exe"C:\Users\Admin\AppData\Roaming\ACCApi\apihost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1792
-
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:2816
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:4356
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3744
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3428
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:2204
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:3960
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:4340
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:5112
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:2200
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:1616
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4368
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:2080
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4072
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:848
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:4640
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4044
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:552
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:1404
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:840
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:1528
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
PID:4364
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 8962⤵
- Modifies data under HKEY_USERS
PID:3980
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD56c249df8e469bcb860a69cedae2d79e2
SHA17eb7b89c71b96d4cea0deb85dc9d164288f3e587
SHA256ec4956a9d71bd1e6743cda975d4468be975a9ad0ee9cae2b9314b846d394887e
SHA512b4057d02f4e092663e6f4ca8e44d71277c2a87a27e7551f26287d3914db20ba083d8287bd366abe26ba511b3a7955cd15fb2c8a2dd7e205074de47893722f104
-
Filesize
1.3MB
MD5f08683a01d0a96da432a3a8e8be75653
SHA1457479e768e15f9798163d725b47ba77541c0039
SHA256d4b031613b49d3c2df1a6dd15756b4bd22b6cf3b5db3230e41d7f15d435f2834
SHA512818e0c503d089c3e0f64a96f892f9e421ceb44c1bd8f8fedfd98c51b959b2ff83fbda9fc4bd117633ba2b4fa5c8e6a5e6839c79644c18e53dd4e5473fd354d06
-
Filesize
1.6MB
MD518c631b98dce316d3ecd86586153d173
SHA168854e9aa788c641a0777f56b7bc969f3be120ad
SHA256d855bae790dd48da108b1b35ebaa1cf9008dba5d0b32ac9a04675aac7e835067
SHA5127e970db82dc7a6c7a2b010cf03b658ba10e594296b55353203a54cb85eae3a14aedf47bf1801b1547d5fc83ce1c6dd253b208f66ce84baa1ac78f3e2d425c52a
-
Filesize
1.5MB
MD54486557b30fb35b86808ee7ba420fb12
SHA1bee83d462b76953005b8b88dd7ca24a2dcd911bf
SHA256a2804594c4a4542129e9620e54bf34490889838b6285428c00b92639ba544ba8
SHA51213d800f06192a32db8e34266180c09ae75e43e091339cb4233fef4a3689a00d2c384126a960cbcedf7b5ce6ca277d81bf0201786b27677bf54aa596c398fdfab
-
Filesize
1.2MB
MD50c6b2b387ba59956f06da44c6ab14b29
SHA16e3a8fc54e2f7f2ee76f1cf628502c6c70f93174
SHA25690e4e72dca61ed4712933d269c4f8d6d80b671e27a4fa4528b0b95693de8be06
SHA512dd0df2c9dd923ed259bbc53e2e3a021eb48863fb878dee1acc284983aee4953c9fdd73e6e41257451fdff02d6532cd89d9756b92e675ed5345dedc966495ce67
-
Filesize
1.1MB
MD5bf90da3d0af4e1221dfcc5f5d5b53ef7
SHA174a7e0e542b7b2bd1a46fc1e8320ab55888b56ab
SHA256403e5dc8c7c5d92136a015c0ec70de8c252278d2389beb6e1b58c86c44b4ccf1
SHA51242c8bd4b150b95f3e6bb9f32436029752e0a36c73cae1d5af7c4411390dd00e2b2330e70dd137ab08ad822cc60d5f65cc23d48305e400c0c220878b089083f6a
-
Filesize
1.3MB
MD5b62b787fc07b81df63fe97fe066678f2
SHA17bb6a633bfb7b86d301daa81b0f8f6f60e5cc27e
SHA2566b6a38d4212e726a5222e3f458f36785f6d22fc807aebd5be74f3772c4c624ce
SHA51263cf196d70220ff4004aee6b4a76c77057faafc5527f36330d8e44a88f7c8b75cc3046044bd844d6a0704003d316deb073714ab0c4cd5b49e58f0625e89186ae
-
Filesize
4.6MB
MD559421d5d38aedadc94a3d0a0257d9d38
SHA1cbc88f961dcf0b45608bbe3b7195284f6c1d0851
SHA256521a5ccf6fb46e7b7be9b5f40fb7d5bd2eef6df6ad7a5c86127c529e648d46ab
SHA512d33d72bafc68a76b293836c4fc4c483b13836e30f83f108a6fae1d2a27e8a3e4745a265b10cdcd4a1bf74c55e0a8caca2d65be64c74652acf407ed1468a099dd
-
Filesize
1.4MB
MD5d402266ded335b2411d717cd49f7369e
SHA190429eed69c54b8bd47188b7a928b8dbcb06bb19
SHA256b9762cda27f913d4fd16d712ce85c904284497a2be0621fe50028cce8fc07e7d
SHA512563a2facd41e41253ea5db1df01ab0ce6fc20e944e756cd2fcd0d4d90c94525f97b522c6ef31fd5c64241ccceb42ceb0a2721dab6c9a1655ed56ed157cc57c9d
-
Filesize
24.0MB
MD55b1d6ffb4c789c3d390f5ab9f133ab8f
SHA1212a51e4c9eea3529e140043f0bb76c0ef25b7b9
SHA2562283418a3d5c4b515b0dd3065a9ff50d0eea0d92a21ccbe2926942958773d4d7
SHA5124c6faebdb7ec8bd1e96c4c7a4470bbd0e80a6c48a213916451c0c0ab1b82a89e7c335099fb290607d587343f6e75fa9909a1f3ef7325b1f3ca33343c81645da7
-
Filesize
2.7MB
MD599d7812c716a14dd1055e6f5416bc0b1
SHA1189c240759cf7744bf0afa76d6f75e0f23ff1e09
SHA256db5d436739bb40b0e36f238f4e54683ce86cba30ae274cdbc154f442e0bc276d
SHA512f1441defd6cadf86657ef838452f1c09d99066d2efa90fd412ea54fb9ca85ae5b06bee4545d0f1750411723aae453c0a8bdca533a6c2d546b3ec36d07f2ca2a9
-
Filesize
1.3MB
MD580542e6ddacf095e2cfbc42028984b11
SHA1c92828774fcc23e7f58fd4680c65ee29453aec97
SHA25666e228197875f448ccb764b1644311925d9013966e26a816ae1b8dc9272cef63
SHA512451a2d3fc36c9fca14ebf16ae98dd9b21a2397e5c626ee0aae152cbd1285075afd9d5ee50b514b7dc129b54ad145a62d2d1473bd69ba361e49e6ba64bb753a65
-
Filesize
2.1MB
MD5e19186a4ffbb887adda2c790b85fa713
SHA1118d1586172f4f01d65c5cdb0664896a9efe4adb
SHA256df698a51b0400e0d43c5f8ebb44e70f1ca8155eb6efc673c456ba41a988ada98
SHA5121d593730a63638baea3b13628b7574c6dc376612a69132d2a67b6160418a8b21dc9470aa8687985b3fa39e1bad12538bbd12843652300c533addd424923a918f
-
Filesize
1.5MB
MD5208b7eb0842754e1c318fd52eaf2aed7
SHA1b902b06248cd5803043dd1a0d0a62c9ed3c1c38c
SHA256877bb842a09011cd3f8b3d8bf6c6cc2f4a705e83db67bb46e2ad3e4cae1a51f8
SHA51227f33fe7d5243906dbc59b91cde1713ccf687a414c6724895cea8bb3ae43c2042b4acc3887b8c525cfc049649052106ed8e5b827b7891469ae67b806c172db39
-
Filesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
104B
MD5597d7c7bb34e78f2bb95c2b964b8e8db
SHA1ed20e2b4a574b88aee4bfb2bbf4072fcc27c52f0
SHA256f450b5a3ad6e96192bf6b44e8bb796a552a37742d4bef6ce7acd63c359ffcdf9
SHA5124c9bcd21f7da56bc3b10c455ca18ab9aab405ea5618856c4d0c65eae5488c197d3d7fd66dbee5b56a2341fe63d6ad77c2f0af5878477d9634cd7345aa9e0f265
-
Filesize
1.6MB
MD5f25963b148fc1f30363ba66517209671
SHA1b002c9046452c9a2caacc51751e24bf7968a7bea
SHA256267b19dd34a745f5078b639151c4a75f302cca8cfd79b6a7ee8555e4d45198eb
SHA512b8d4f5e3d9862f03c5b0bee2e08b487218fb17d56fbc65931e0b5931b9310eaa027eff219b281d857330dead62818ec721dd6dcdfbcec9a2facce3285c9f290e
-
Filesize
1.2MB
MD5156fd655d4aa8b31311d089401226a42
SHA1319ffb454a5dec4fb59fca008171f38a808a8291
SHA256d4996cbfebc931df1511b6daa6f51d5623a41fd275b4022b99de34f23c1bd461
SHA5127dfb1815df7338142ca2c9d3873086f3e36206090b2197ac863c5c18e9dcceca160c8724fa84bbf5e8adc42e9b34d7c5877a1e7b783a8dce9185fc335fb73214
-
Filesize
4B
MD5809f68abc37251a8a63a05ffd8dbc7d5
SHA131db8f8e97948d142bb8c8ce32e07a7121866dc9
SHA256a0ec0460fc75a1eea654e7a06b4b6addb3a2f8a4dfc8cd3ea9f2356d644ab44f
SHA512c16adff55135d34367a4f8d4af021d79bd7e8ff291b10734aa92dc83d57716681b28ef726697a57560d363f8e0f82abd95ad5dcf9cd9ffd7f87c81ba8004fec1
-
Filesize
60KB
MD5b87f096cbc25570329e2bb59fee57580
SHA1d281d1bf37b4fb46f90973afc65eece3908532b2
SHA256d08ccc9b1e3acc205fe754bad8416964e9711815e9ceed5e6af73d8e9035ec9e
SHA51272901adde38f50cf6d74743c0a546c0fea8b1cd4a18449048a0758a7593a176fc33aad1ebfd955775eefc2b30532bcc18e4f2964b3731b668dd87d94405951f7
-
Filesize
66KB
MD5c116d3604ceafe7057d77ff27552c215
SHA1452b14432fb5758b46f2897aeccd89f7c82a727d
SHA2567bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301
SHA5129202a00eeaf4c5be94de32fd41bfea40fc32d368955d49b7bad2b5c23c4ebc92dccb37d99f5a14e53ad674b63f1baa6efb1feb27225c86693ead3262a26d66c6
-
Filesize
231KB
MD5d0fce3afa6aa1d58ce9fa336cc2b675b
SHA14048488de6ba4bfef9edf103755519f1f762668f
SHA2564d89fc34d5f0f9babd022271c585a9477bf41e834e46b991deaa0530fdb25e22
SHA51280e127ef81752cd50f9ea2d662dc4d3bf8db8d29680e75fa5fc406ca22cafa5c4d89ef2eac65b486413d3cdd57a2c12a1cb75f65d1e312a717d262265736d1c2
-
Filesize
442KB
MD504029e121a0cfa5991749937dd22a1d9
SHA1f43d9bb316e30ae1a3494ac5b0624f6bea1bf054
SHA2569f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f
SHA5126a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b
-
Filesize
18KB
MD5b3624dd758ccecf93a1226cef252ca12
SHA1fcf4dad8c4ad101504b1bf47cbbddbac36b558a7
SHA2564aaa74f294c15aeb37ada8185d0dead58bd87276a01a814abc0c4b40545bf2ef
SHA512c613d18511b00fa25fc7b1bdde10d96debb42a99b5aaab9e9826538d0e229085bb371f0197f6b1086c4f9c605f01e71287ffc5442f701a95d67c232a5f031838
-
Filesize
115KB
MD56d23fe871b2064c6d13580a5745f23cb
SHA150e113c0e2269cf7972466a828822803537a8f6e
SHA256c835f2a1234b62ab7684694af378f62770903d07d6fdfbe3a371509e2b4ccc67
SHA5121244be1ab0a9cabc0eb02249d4b083939e3f088ebda4b58dc03c61618fce56f27a3f58cfd74d39fb06010db7515520307766c16815f6700507a0371d03765e1a
-
Filesize
94KB
MD5869640d0a3f838694ab4dfea9e2f544d
SHA1bdc42b280446ba53624ff23f314aadb861566832
SHA2560db4d3ffdb96d13cf3b427af8be66d985728c55ae254e4b67d287797e4c0b323
SHA5126e775cfb350415434b18427d5ff79b930ed3b0b3fc3466bc195a796c95661d4696f2d662dd0e020c3a6c3419c2734468b1d7546712ecec868d2bbfd2bc2468a7
-
Filesize
1.1MB
MD599116cb86c0b4dccf362938bfeb1135b
SHA1ad7f0376e4d602ab6338197233d44e509ffc9527
SHA2567d53185df32363955823bec5be4728ec655308d153bec2089cf4e20668317276
SHA51251837565b117f40a151cf759c06a6fb1d9a24f8424c899f0e829289d3dd40358608891546965d3cc14ee960686a861f86dc129da7250827cc6ed9125755bd706
-
Filesize
1.7MB
MD5c7b1c66bdb3e4d6d70bf4f2c3a710be2
SHA119602eaa90421c61950de9a5202d9b8096da9d77
SHA256487bd5f41942cecc66c3091234e7440eda1fc5e9edeedccdb65e459d5f57706e
SHA512d077e69557f4869973c3f68d27c6aa3ab69a0f40e5bd5332b10d7ac5abfe45ecffe44be6fbf4ac489c10d946d27ce63a83ee23340d00daa24dcf131520f00a5a
-
Filesize
1.2MB
MD56b64d4baf4d810d652d61a6e49fc8e27
SHA1aa6fb5a9aee5405b75870cfc93a1208d22c3816e
SHA2564fd23caf529fed0e548048bc43ce83709708477da332868ae81d46ce25094888
SHA512198ec150ce147425a6379461b635dffcdb1e8b5f39929cb7b4127b576a820dfef4bb17d90d8fbbbd31d94bc56846b581f0092deac499cb5851ff26d94e6e2363
-
Filesize
1.2MB
MD5d334efd7b0dd9bdcc131c7949b536354
SHA11fec88af376db93c9fb252f12598e2542b572f1f
SHA25698b028a242617472926c95469db7e90a8fc68f15288d22c386c6b1a4891eac1d
SHA512c56ca1b550745af11fae716105057a8a103937f703da3214a59881f813adab9b5bdeda58d5aca52ff16fed169c5e35abc567d7bf645faf3aa8cb47f0b40baf36
-
Filesize
1.1MB
MD58f97544bc70778a0e4a2744e963f4fca
SHA195c3c78560ed7b812e52a379cdfa6ee6ec4a22f0
SHA2567b23035186d15b78920f90f5a9790497d3e26ee7088945b8e91a788bcf76f65b
SHA512028cffeeb152db0cf2644782dfcc25604074dcf3e1ba63b28d67b45bac911dbfc7224c672ecfbdab801dfff7734e524c0e37b4e92ce791e0ac970d3065313eae
-
Filesize
1.4MB
MD5cd31813d2d0be3f4112aceb9d776e6f0
SHA187f795bb02c51e72496574f70dd7ea08fe8945db
SHA256f339af5c18274aacd53efdd2373f4de2298bd9562828675586092cea7a54ce58
SHA512bb9b33be46f24151b0e04f335b6b7b62e3b9c90452616cb82c3310f4cedf22bd7a80c3a93f0b61b8016a3075f8836aa44a6aac5ed502e71773120f14a6f3ad57
-
Filesize
1.2MB
MD56884cca45f61c8732a2661558df703ed
SHA19929c314dee59facd9457d3d83425bde44a63fed
SHA2564da0c206774bc75a860700ba9988e9ec5ff5998049bdcd183ebe217dc52c0216
SHA512ba150034836ef34eb4e4a00472684afa242e0420c9bc5598b0a129865f3b52da5bc10200e968d29b2c59535f297a74ab563f10c83b5deafaa45fdc3288d75ffc
-
Filesize
1.4MB
MD5098fd02d6d97077d93209f10f1e103ae
SHA1c7a9e7d2ec1ab355ef80a422b5ba33415f8f1646
SHA256570c42a7de3364618c6ac799f049d2e70f1aab0fe0236793e7c86421a54f9029
SHA5127a4f00f30e9db68ea5633d3585e372ec8250585b3fcdf7a3ed1102b4edfb2bf6664f4cff00823b6f68531fb7c20bff121f91ab838bc6d319425b68dc42e310bf
-
Filesize
1.8MB
MD544d308f9af98d828aa26f9251b7198ed
SHA1c49df7340a748451aa572fb86a1e900d6584a1fa
SHA25663f2aa2bcbe2ea5308554cce33908b4d5ceee4345c4670ee317ec843c484030f
SHA512078c21dbb4ad53f16c77c6bbc7336a217b02f4cd85f0a21cbe70251e9b19183d853058e890589d1b156a07926c7329668b73150a0318640c395dffc98b36e278
-
Filesize
1.4MB
MD5ab7253e112c1dee7e1d354313065ab53
SHA196de2269b1573a7c433801c9479e29a99f3e6b65
SHA256bff2f25dfa54b6f4a7d493b2f632517873fd8d33f18f7a6063fa7fc3e86271b0
SHA5126a43485b0a142779498dd4ac0760ed753416f930bdb70752cd5a2874522224edcae9aa18d07438a22755148029bc6d5827ddaf066f5b06815d187ed55d6948da
-
Filesize
1.4MB
MD5ae891135e57eca6a638afece649182b4
SHA11783a74884b5d6f8df1a05d0605a5cbe217c75a4
SHA2564a625e9761d021d4dea690a263dc7f9657e77f0e03f4166542192022049ae552
SHA512b4afd220fa7540b56e1d2c1b8257326d3a006f68ace12596a6285516a7d5d1dd537cbc0dc657479260ea199a5b5402d68c1a55229d5f2736068f1498420de9ff
-
Filesize
2.0MB
MD5178de827c270f70fa4a8b5c2f14edcc7
SHA1fcb21b6a0305bb769556d6eb28bd96dca8815b5f
SHA25662451b0c2bf5afca4e841dcd1acb2a5e3c3c38f71c87a538a105b82821e70e0c
SHA512d70efa5736f09d431d161f3b7f4d566dd91baa681e1aef363f2ea614dfd4fe0cb259158487327ae56a9815c87392a7cdaee1472177a033b2986ba6e94cd7c19e
-
Filesize
1.2MB
MD5e8a94236a22bd5f9475f4eaac9f7343e
SHA1a58d5045a17c7bb3f8c4ff31132f2d4cd899e741
SHA2568f220e1d4f8b9c9a5940a980d0da0e85225458db9e280b62b5f6bf5412c5ea94
SHA512cfd3b3b6cdee187f3f18b571ad1f2c5a197faeae5bd220c01c56e70a382e000924e2aa453b637d287cc22c28a108e7cddce5e78f27040aad1f86d25c3253c2ce
-
Filesize
1.2MB
MD50b82ea0ac3f908cd279ba87b12ec4416
SHA1ef1f3d2a678cc7c7d379d3db56dd28215713d9e0
SHA256ab28e439466fa792f909d38bd305cb6477c73955427fa2f6114776c0def4fb05
SHA512af8b82caf9eabcb2d961944e76eadfef4a7227b36a6dea95285b8d25a5af75b09ccf5e66d04ba7e4fb14f2597240a2d9f2664b1feaf072d0aad0abeab7ece459
-
Filesize
1.1MB
MD5c42b8ea0fd8003708fa27c886bf7c7da
SHA1f1589d90b197a6a18332860d22d25b6fb9619dd4
SHA256d21a9809bd9fa5d4d67cbce0b5a8d6b7a395d26394cf26e07f11da9332a44922
SHA512b58da802d370fdc5714678ebf7140cb7df282f86e5b8fc60d4e7bd0f28610e82099a18505b56ebfbc8c24fd7dd24b353b24516b2d6f27ec995c6a049db15f1c0
-
Filesize
1.3MB
MD58b943777bbbbaf1e6e5f1520af5e1ce9
SHA12656d9d4b23b9dae43d7f153278206525620623c
SHA256f457ee97444a157005f9cfa54bdddbd4e11681c3d65fabce0250f74403ec4c46
SHA512b5617429e9bdb19d38680ba3596c52f441654553c7a4741336229b01a5bf76fe19a134408f0c8065b97a9a5844e5968013170a8fb6b721f5139dcce3bc15466a
-
Filesize
1.3MB
MD573e60d025c69934aa47e536a2bfb6eec
SHA19f8d13a1dc775355238b533e8d20e6dcb316ba8b
SHA25661adae6c46bfc2438b6342cf1cf6db173fbb6d7b5d94b44a480efbdcf08f079c
SHA512934cdf78e9672103ebaab634f4b370f204e3e4f976ff0b2dc485b50ff17c516175ff1ebb1ecae169e6ac7cea9798397af643aa45ba14791b0e3e0eee1d7cc250
-
Filesize
2.1MB
MD5fd1cc7062ec185c228650e31a1b03173
SHA1bb6edfd7006ec654274aa14f1c14bd08fcbf08d8
SHA256a747a3de6e83a571ac05725f625b7bf70f6729c512376d30367f3ab4b46359ae
SHA512faaca70da631dff15a36823d3b3f32444da85f2131c7e2a70e6e8ab8e7ebece8914b66c50758c2856541ceb9fcf14817af6449b704b56dd52607262fd1c8aed3
-
Filesize
1.3MB
MD5f94a2864fca60339dab33c73c7e797ed
SHA11202dd7f49a71ed9e2f2c00762ac660cd203bb00
SHA256b9b6a6a474a3907985d2747bd87476fcc6769d1d3678eb7168e11fb6ded656d7
SHA512a7c72896c827fcc96e8d5a66a3f335dee31f305ea9ffc4b411b7f8780644566487e36497d2a76a4e038f44fe19e292341ad133ea821d415cc7514f8a2ca01cc3
-
Filesize
1.4MB
MD53ba4b47a38f52c494133b33eb6629f02
SHA190f1bb0f8afa029224179169f7a62be42e191f96
SHA256ff8a97cc5aaf9cf6b529f720924b2ede4e096c28a36b4cad8d4ede7b5977b9f1
SHA512a5c5eb28d932af34238da778670ac438feac6bee5edd9bdbdd04cd4f1b655db42290be71952a410237b13c9f104fb86384cc5208751841fa569850f7ef72d362
-
Filesize
1.1MB
MD512dc013071d0be73d0bfe12de976d77d
SHA133c40f1495a11abe28509fad1ca45d3c2699e529
SHA256cae78d929e622eddcf2c84e1e55e068ab66aca274d4a2a30e828719f00cab135
SHA512eb095304a61ac935fadf01967a75378a0e538d37c04d678b719df97b188d748180a6f9cc138aecfd595124b79dc3d7ea07a5afa3d03cc8bf48e30ab8086e1031