Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 18:47
Static task
static1
Behavioral task
behavioral1
Sample
letsview-setup.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
letsview-setup.exe
Resource
win10v2004-20241007-en
General
-
Target
letsview-setup.exe
-
Size
2.4MB
-
MD5
7578d269fef4ac377832c4122c78e0bb
-
SHA1
8901f9b7df38bcb2e1bfae7baab64a0d1f6b37a8
-
SHA256
9668ad0def75c0bfccfa01a0a8b4fe3aa24a4f386f0807871edb14b979ac51bf
-
SHA512
f89ed6ee3e7250a4fed1915c85ea6a58e14e6e7910a5462637ee8b9c4f61c015c4bedc337e22bab15133d1c58e6747f1ca1654bae6f195ac4174881fc5e4afaa
-
SSDEEP
49152:6+iLgXBxC4o+JMv2Dpjm0zV4LTGnZ/lD/lZyWVu8se:6+5rFDpjmEZF/
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules mDNSResponder.exe -
Creates new service(s) 2 TTPs
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\UMDF\usbmmIdd.dll DrvInst.exe -
Manipulates Digital Signatures 1 TTPs 1 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing\State = "146944" installer.tmp -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 1528 icacls.exe 3288 icacls.exe 1644 icacls.exe -
Downloads MZ/PE file
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe -
Modifies Windows Firewall 2 TTPs 3 IoCs
pid Process 624 netsh.exe 2868 netsh.exe 2300 netsh.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation letsview-setup.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation PinTaskbarTool.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation LetsView.exe -
Drops file in System32 directory 26 IoCs
description ioc Process File opened for modification C:\Windows\System32\DriverStore\FileRepository\usbmmidd.inf_amd64_2cb21e2b14e16bf2\x64\usbmmIdd.dll DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\usbmmidd.inf_amd64_2cb21e2b14e16bf2\usbmmIdd.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\usbmmidd.inf_amd64_2cb21e2b14e16bf2\usbmmidd.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{4dcf373c-988e-b640-bfe6-5cdd4eb685db}\x64 DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{4dcf373c-988e-b640-bfe6-5cdd4eb685db}\usbmmIdd.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{4dcf373c-988e-b640-bfe6-5cdd4eb685db}\SET3EAC.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{4dcf373c-988e-b640-bfe6-5cdd4eb685db}\SET3EAC.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{4dcf373c-988e-b640-bfe6-5cdd4eb685db}\usbmmidd.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{4dcf373c-988e-b640-bfe6-5cdd4eb685db} DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\usbmmidd.inf_amd64_2cb21e2b14e16bf2\usbmmidd.PNF deviceinstaller64.exe File created C:\Windows\SysWOW64\dns-sd.exe msiexec.exe File created C:\Windows\System32\DriverStore\Temp\{4dcf373c-988e-b640-bfe6-5cdd4eb685db}\x64\SET3E9A.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{4dcf373c-988e-b640-bfe6-5cdd4eb685db}\SET3EAB.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{4dcf373c-988e-b640-bfe6-5cdd4eb685db}\x64\SET3E9A.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{4dcf373c-988e-b640-bfe6-5cdd4eb685db}\x64\usbmmIdd.dll DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{4dcf373c-988e-b640-bfe6-5cdd4eb685db}\SET3EAB.tmp DrvInst.exe File created C:\Windows\system32\dns-sd.exe msiexec.exe File created C:\Windows\SysWOW64\dnssd.dll msiexec.exe File created C:\Windows\system32\dnssd.dll msiexec.exe File created C:\Windows\SysWOW64\jdns_sd.dll msiexec.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\usbmmidd.inf_amd64_2cb21e2b14e16bf2\x64\usbmmIdd.dll DrvInst.exe File created C:\Windows\SysWOW64\dnssdX.dll msiexec.exe File created C:\Windows\system32\dnssdX.dll msiexec.exe File created C:\Windows\system32\jdns_sd.dll msiexec.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\LetsView\LetsView\Usb\AdbWinApi.dll installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\is-FU9EO.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\is-EVCO4.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-ffmpeg\locale\is-QEQGP.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-filters\LUTs\is-IA9EL.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-outputs\locale\is-D8I07.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-outputs\locale\is-RU0DM.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-text\locale\is-FJF6T.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-text\locale\is-P8QJ1.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-transitions\luma_wipes\is-PNK05.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\text-freetype2\locale\is-EHS5O.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\win-dshow\locale\is-0EH7B.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\Task\fr\is-MG56M.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\is-F4BTA.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\image-source\locale\is-T9IK2.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-qsv11\locale\is-34278.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\win-decklink\locale\is-TBTS4.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\win-wasapi\locale\is-UP73R.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-ffmpeg\locale\is-24OBN.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-text\locale\is-UNURV.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-transitions\locale\is-HADCJ.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-x264\locale\is-UFKVC.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\win-wasapi\locale\is-D5RGI.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\Usb\is-9JG3D.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\usbmmidd_v2\is-5S0CG.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-libfdk\locale\is-PI2MF.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-libfdk\locale\is-9PVLD.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\text-freetype2\locale\is-JLVSB.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\win-wasapi\locale\is-GPMLP.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-outputs\locale\is-KKMKS.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-qsv11\locale\is-7ONAA.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\rtmp-services\locale\is-ATEBE.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\text-freetype2\locale\is-9UCU6.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\win-capture\locale\is-E7BIC.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\win-capture\locale\is-NB3F3.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\win-decklink\locale\is-0JF1O.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-outputs\locale\is-82Q5V.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-outputs\locale\is-RENUE.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-transitions\luma_wipes\is-LS7IH.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\win-wasapi\locale\is-3R29R.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\image-source\locale\is-D9PE0.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-libfdk\locale\is-BD333.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-x264\locale\is-FEJP1.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\text-freetype2\locale\is-DI7E7.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\win-capture\locale\is-8M837.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\win-decklink\locale\is-1CTKL.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-libfdk\locale\is-K70KM.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-qsv11\locale\is-LCJUF.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\win-capture\locale\is-96PKM.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\win-decklink\locale\is-CTILR.tmp installer.tmp File opened for modification C:\Program Files (x86)\LetsView\LetsView\api-ms-win-core-memory-l1-1-0.dll installer.tmp File opened for modification C:\Program Files (x86)\LetsView\LetsView\gtest.dll installer.tmp File opened for modification C:\Program Files (x86)\LetsView\LetsView\SharpVectors.Rendering.Gdi.dll installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\libobs\is-CK57J.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\coreaudio-encoder\locale\is-K460H.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-filters\locale\is-V66L3.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-outputs\locale\is-1SHND.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\rtmp-services\locale\is-LPKMF.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\win-capture\locale\is-FM2GF.tmp installer.tmp File opened for modification C:\Program Files (x86)\LetsView\LetsView\api-ms-win-core-xstate-l2-1-0.dll installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-text\locale\is-Q5RI4.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\rtmp-services\locale\is-FNRKK.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\rtmp-services\locale\is-NMM5O.tmp installer.tmp File created C:\Program Files (x86)\LetsView\LetsView\usbmmidd_v2\is-T8NLA.tmp installer.tmp -
Drops file in Windows directory 26 IoCs
description ioc Process File created C:\Windows\Installer\e57edcb.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSIF1D7.tmp msiexec.exe File created C:\Windows\Installer\{56DDDFB8-7F79-4480-89D5-25E1F52AB28F}\RichText.ico msiexec.exe File created C:\Windows\INF\c_display.PNF deviceinstaller64.exe File opened for modification C:\Windows\Installer\MSIF10A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF11B.tmp msiexec.exe File created C:\Windows\Installer\{56DDDFB8-7F79-4480-89D5-25E1F52AB28F}\Bonjour.ico msiexec.exe File opened for modification C:\Windows\Installer\{56DDDFB8-7F79-4480-89D5-25E1F52AB28F}\RichText.ico msiexec.exe File opened for modification C:\Windows\ LetsView.exe File opened for modification C:\Windows\INF\setupapi.dev.log deviceinstaller64.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\inf\oem3.inf DrvInst.exe File created C:\Windows\inf\oem3.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\e57edcb.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIEF71.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIEFDF.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\SourceHash{56DDDFB8-7F79-4480-89D5-25E1F52AB28F} msiexec.exe File opened for modification C:\Windows\Installer\MSIF0F9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF311.tmp msiexec.exe File opened for modification C:\Windows\Installer\{56DDDFB8-7F79-4480-89D5-25E1F52AB28F}\Bonjour.ico msiexec.exe File created C:\Windows\Installer\e57edd0.msi msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe -
Executes dropped EXE 8 IoCs
pid Process 4308 installer.exe 812 installer.tmp 2380 mDNSResponder.exe 2804 Process not Found 4716 WXCastService.exe 1308 PinTaskbarTool.exe 4644 LetsView.exe 4520 deviceinstaller64.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1196 sc.exe 2740 sc.exe 1092 sc.exe 4644 sc.exe -
Loads dropped DLL 64 IoCs
pid Process 812 installer.tmp 3448 MsiExec.exe 3448 MsiExec.exe 3448 MsiExec.exe 2700 MsiExec.exe 2700 MsiExec.exe 3208 MsiExec.exe 1988 MsiExec.exe 1968 MsiExec.exe 4716 WXCastService.exe 4716 WXCastService.exe 4716 WXCastService.exe 4716 WXCastService.exe 4588 letsview-setup.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe 4644 LetsView.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PinTaskbarTool.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language letsview-setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LetsView.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installer.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WXCastService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icacls.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs deviceinstaller64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID deviceinstaller64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\LowerFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID deviceinstaller64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\UpperFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 deviceinstaller64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom deviceinstaller64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Service DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 deviceinstaller64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\LowerFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID deviceinstaller64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\UpperFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\LowerFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom deviceinstaller64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs deviceinstaller64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 deviceinstaller64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 LetsView.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString LetsView.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz LetsView.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\LetsView.exe = "11001" installer.tmp Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION installer.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION installer.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION installer.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\LetsView.exe = "11001" installer.tmp Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION installer.tmp Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\LetsView.exe = "11001" installer.tmp Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\MAIN\FeatureControl\FEATURE_BROWSER_EMULATION installer.tmp -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople deviceinstaller64.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs deviceinstaller64.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{5E93C5A9-7516-4259-A67B-41A656F6E01C}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AFEE063C-05BA-4248-A26E-168477F49734}\TypeLib\ = "{18FBED6D-F2B7-4EC8-A4A4-46282E635308}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\AppID\Bonjour.DLL msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7FD72324-63E1-45AD-B337-4D525BD98DAD}\ = "PSFactoryBuffer" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{24CD4DE9-FF84-4701-9DC1-9B69E0D1090A} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5E93C5A9-7516-4259-A67B-41A656F6E01C}\ = "DNSSDRecord Class" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{29DE265F-8402-474F-833A-D4653B23458F}\ProxyStubClsid32 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7FD72324-63E1-45AD-B337-4D525BD98DAD} msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\1523EA646D34FC14C8FD9E203C58611D msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9CE603A0-3365-4DA0-86D1-3F780ECBA110}\TypeLib\Version = "1.0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7FD72324-63E1-45AD-B337-4D525BD98DAD}\TypeLib\ = "{18FBED6D-F2B7-4EC8-A4A4-46282E635308}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{8FA0889C-5973-4FC9-970B-EC15C925D0CE}\NumMethods msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\Bonjour.DLL\AppID = "{56608F9C-223B-4CB6-813D-85EDCCADFB4B}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{29DE265F-8402-474F-833A-D4653B23458F}\ = "IDNSSDService" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Bonjour.DNSSDRecord.1\ = "DNSSDRecord Class" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7FD72324-63E1-45AD-B337-4D525BD98DAD}\InprocServer32\ThreadingModel = "Both" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8BFDDD6597F70844985D521E5FA22BF8\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8BFDDD6597F70844985D521E5FA22BF8\Version = "50397184" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8BFDDD6597F70844985D521E5FA22BF8\SourceList msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{7FD72324-63E1-45AD-B337-4D525BD98DAD} msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{24CD4DE9-FF84-4701-9DC1-9B69E0D1090A}\ProgID msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BEEB932A-8D4A-4619-AEFE-A836F988B221}\AppID = "{56608F9C-223B-4CB6-813D-85EDCCADFB4B}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{21AE8D7F-D5FE-45CF-B632-CFA2C2C6B498} msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7FD72324-63E1-45AD-B337-4D525BD98DAD}\InprocServer32 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{BEEB932A-8D4A-4619-AEFE-A836F988B221}\Programmable msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{7FD72324-63E1-45AD-B337-4D525BD98DAD}\TypeLib msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{BEEB932A-8D4A-4619-AEFE-A836F988B221}\TypeLib msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AFEE063C-05BA-4248-A26E-168477F49734} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{24CD4DE9-FF84-4701-9DC1-9B69E0D1090A}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{5E93C5A9-7516-4259-A67B-41A656F6E01C}\TypeLib\ = "{18FBED6D-F2B7-4EC8-A4A4-46282E635308}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AFEE063C-05BA-4248-A26E-168477F49734}\ = "TXTRecord Class" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{8FA0889C-5973-4FC9-970B-EC15C925D0CE} msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8BFDDD6597F70844985D521E5FA22BF8\Assignment = "1" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{24CD4DE9-FF84-4701-9DC1-9B69E0D1090A} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BEEB932A-8D4A-4619-AEFE-A836F988B221}\AppID = "{56608F9C-223B-4CB6-813D-85EDCCADFB4B}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{29DE265F-8402-474F-833A-D4653B23458F}\NumMethods\ = "19" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8FA0889C-5973-4FC9-970B-EC15C925D0CE}\ProxyStubClsid32\ = "{7FD72324-63E1-45AD-B337-4D525BD98DAD}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{24CD4DE9-FF84-4701-9DC1-9B69E0D1090A}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{18FBED6D-F2B7-4EC8-A4A4-46282E635308}\1.0\0\win32\ = "C:\\Windows\\SysWOW64\\dnssdX.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{24CD4DE9-FF84-4701-9DC1-9B69E0D1090A}\ProgID\ = "Bonjour.DNSSDService.1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{AFEE063C-05BA-4248-A26E-168477F49734}\InprocServer32\ = "C:\\Windows\\system32\\dnssdX.dll" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{BEEB932A-8D4A-4619-AEFE-A836F988B221}\VersionIndependentProgID msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{7FD72324-63E1-45AD-B337-4D525BD98DAD}\NumMethods msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Bonjour.TXTRecord.1\CLSID msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8BFDDD6597F70844985D521E5FA22BF8\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Bonjour.DNSSDService.1 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{21AE8D7F-D5FE-45CF-B632-CFA2C2C6B498}\ = "_IDNSSDEvents" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8FA0889C-5973-4FC9-970B-EC15C925D0CE}\ProxyStubClsid32\ = "{7FD72324-63E1-45AD-B337-4D525BD98DAD}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AFEE063C-05BA-4248-A26E-168477F49734}\AppID = "{56608F9C-223B-4CB6-813D-85EDCCADFB4B}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{AFEE063C-05BA-4248-A26E-168477F49734}\VersionIndependentProgID msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7FD72324-63E1-45AD-B337-4D525BD98DAD} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5E93C5A9-7516-4259-A67B-41A656F6E01C}\ProgID\ = "Bonjour.DNSSDRecord.1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{21AE8D7F-D5FE-45CF-B632-CFA2C2C6B498}\ = "_IDNSSDEvents" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ PinTaskbarTool.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{24CD4DE9-FF84-4701-9DC1-9B69E0D1090A}\AppID = "{56608F9C-223B-4CB6-813D-85EDCCADFB4B}" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{18FBED6D-F2B7-4EC8-A4A4-46282E635308} msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{7FD72324-63E1-45AD-B337-4D525BD98DAD}\TypeLib msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{7FD72324-63E1-45AD-B337-4D525BD98DAD}\TypeLib\ = "{18FBED6D-F2B7-4EC8-A4A4-46282E635308}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8FA0889C-5973-4FC9-970B-EC15C925D0CE}\NumMethods\ = "14" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Bonjour.DNSSDEventManager.1\CLSID\ = "{BEEB932A-8D4A-4619-AEFE-A836F988B221}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{24CD4DE9-FF84-4701-9DC1-9B69E0D1090A}\TypeLib\ = "{18FBED6D-F2B7-4EC8-A4A4-46282E635308}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5E93C5A9-7516-4259-A67B-41A656F6E01C}\InprocServer32\ = "C:\\Windows\\system32\\dnssdX.dll" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{AFEE063C-05BA-4248-A26E-168477F49734}\InprocServer32 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 812 installer.tmp 812 installer.tmp 4716 WXCastService.exe 4716 WXCastService.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4644 LetsView.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid 4 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4432 msiexec.exe Token: SeIncreaseQuotaPrivilege 4432 msiexec.exe Token: SeSecurityPrivilege 3112 msiexec.exe Token: SeCreateTokenPrivilege 4432 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4432 msiexec.exe Token: SeLockMemoryPrivilege 4432 msiexec.exe Token: SeIncreaseQuotaPrivilege 4432 msiexec.exe Token: SeMachineAccountPrivilege 4432 msiexec.exe Token: SeTcbPrivilege 4432 msiexec.exe Token: SeSecurityPrivilege 4432 msiexec.exe Token: SeTakeOwnershipPrivilege 4432 msiexec.exe Token: SeLoadDriverPrivilege 4432 msiexec.exe Token: SeSystemProfilePrivilege 4432 msiexec.exe Token: SeSystemtimePrivilege 4432 msiexec.exe Token: SeProfSingleProcessPrivilege 4432 msiexec.exe Token: SeIncBasePriorityPrivilege 4432 msiexec.exe Token: SeCreatePagefilePrivilege 4432 msiexec.exe Token: SeCreatePermanentPrivilege 4432 msiexec.exe Token: SeBackupPrivilege 4432 msiexec.exe Token: SeRestorePrivilege 4432 msiexec.exe Token: SeShutdownPrivilege 4432 msiexec.exe Token: SeDebugPrivilege 4432 msiexec.exe Token: SeAuditPrivilege 4432 msiexec.exe Token: SeSystemEnvironmentPrivilege 4432 msiexec.exe Token: SeChangeNotifyPrivilege 4432 msiexec.exe Token: SeRemoteShutdownPrivilege 4432 msiexec.exe Token: SeUndockPrivilege 4432 msiexec.exe Token: SeSyncAgentPrivilege 4432 msiexec.exe Token: SeEnableDelegationPrivilege 4432 msiexec.exe Token: SeManageVolumePrivilege 4432 msiexec.exe Token: SeImpersonatePrivilege 4432 msiexec.exe Token: SeCreateGlobalPrivilege 4432 msiexec.exe Token: SeRestorePrivilege 3112 msiexec.exe Token: SeTakeOwnershipPrivilege 3112 msiexec.exe Token: SeRestorePrivilege 3112 msiexec.exe Token: SeTakeOwnershipPrivilege 3112 msiexec.exe Token: SeRestorePrivilege 3112 msiexec.exe Token: SeTakeOwnershipPrivilege 3112 msiexec.exe Token: SeRestorePrivilege 3112 msiexec.exe Token: SeTakeOwnershipPrivilege 3112 msiexec.exe Token: SeRestorePrivilege 3112 msiexec.exe Token: SeTakeOwnershipPrivilege 3112 msiexec.exe Token: SeRestorePrivilege 3112 msiexec.exe Token: SeTakeOwnershipPrivilege 3112 msiexec.exe Token: SeRestorePrivilege 3112 msiexec.exe Token: SeTakeOwnershipPrivilege 3112 msiexec.exe Token: SeRestorePrivilege 3112 msiexec.exe Token: SeTakeOwnershipPrivilege 3112 msiexec.exe Token: SeRestorePrivilege 3112 msiexec.exe Token: SeTakeOwnershipPrivilege 3112 msiexec.exe Token: SeRestorePrivilege 3112 msiexec.exe Token: SeTakeOwnershipPrivilege 3112 msiexec.exe Token: SeRestorePrivilege 3112 msiexec.exe Token: SeTakeOwnershipPrivilege 3112 msiexec.exe Token: SeRestorePrivilege 3112 msiexec.exe Token: SeTakeOwnershipPrivilege 3112 msiexec.exe Token: SeRestorePrivilege 3112 msiexec.exe Token: SeTakeOwnershipPrivilege 3112 msiexec.exe Token: SeRestorePrivilege 3112 msiexec.exe Token: SeTakeOwnershipPrivilege 3112 msiexec.exe Token: SeRestorePrivilege 3112 msiexec.exe Token: SeTakeOwnershipPrivilege 3112 msiexec.exe Token: SeRestorePrivilege 3112 msiexec.exe Token: SeTakeOwnershipPrivilege 3112 msiexec.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 812 installer.tmp 4644 LetsView.exe 4644 LetsView.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4644 LetsView.exe 4644 LetsView.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4588 wrote to memory of 4308 4588 letsview-setup.exe 88 PID 4588 wrote to memory of 4308 4588 letsview-setup.exe 88 PID 4588 wrote to memory of 4308 4588 letsview-setup.exe 88 PID 4308 wrote to memory of 812 4308 installer.exe 92 PID 4308 wrote to memory of 812 4308 installer.exe 92 PID 4308 wrote to memory of 812 4308 installer.exe 92 PID 812 wrote to memory of 1196 812 installer.tmp 93 PID 812 wrote to memory of 1196 812 installer.tmp 93 PID 812 wrote to memory of 1196 812 installer.tmp 93 PID 812 wrote to memory of 2740 812 installer.tmp 95 PID 812 wrote to memory of 2740 812 installer.tmp 95 PID 812 wrote to memory of 2740 812 installer.tmp 95 PID 812 wrote to memory of 4432 812 installer.tmp 97 PID 812 wrote to memory of 4432 812 installer.tmp 97 PID 812 wrote to memory of 4432 812 installer.tmp 97 PID 3112 wrote to memory of 3448 3112 msiexec.exe 99 PID 3112 wrote to memory of 3448 3112 msiexec.exe 99 PID 3112 wrote to memory of 2700 3112 msiexec.exe 100 PID 3112 wrote to memory of 2700 3112 msiexec.exe 100 PID 3112 wrote to memory of 2700 3112 msiexec.exe 100 PID 3112 wrote to memory of 3208 3112 msiexec.exe 101 PID 3112 wrote to memory of 3208 3112 msiexec.exe 101 PID 3112 wrote to memory of 3208 3112 msiexec.exe 101 PID 3112 wrote to memory of 1988 3112 msiexec.exe 102 PID 3112 wrote to memory of 1988 3112 msiexec.exe 102 PID 3112 wrote to memory of 1968 3112 msiexec.exe 103 PID 3112 wrote to memory of 1968 3112 msiexec.exe 103 PID 3112 wrote to memory of 1968 3112 msiexec.exe 103 PID 812 wrote to memory of 4492 812 installer.tmp 106 PID 812 wrote to memory of 4492 812 installer.tmp 106 PID 812 wrote to memory of 4492 812 installer.tmp 106 PID 812 wrote to memory of 624 812 installer.tmp 107 PID 812 wrote to memory of 624 812 installer.tmp 107 PID 812 wrote to memory of 624 812 installer.tmp 107 PID 4492 wrote to memory of 1092 4492 cmd.exe 110 PID 4492 wrote to memory of 1092 4492 cmd.exe 110 PID 4492 wrote to memory of 1092 4492 cmd.exe 110 PID 4492 wrote to memory of 4644 4492 cmd.exe 111 PID 4492 wrote to memory of 4644 4492 cmd.exe 111 PID 4492 wrote to memory of 4644 4492 cmd.exe 111 PID 812 wrote to memory of 2868 812 installer.tmp 113 PID 812 wrote to memory of 2868 812 installer.tmp 113 PID 812 wrote to memory of 2868 812 installer.tmp 113 PID 812 wrote to memory of 2300 812 installer.tmp 115 PID 812 wrote to memory of 2300 812 installer.tmp 115 PID 812 wrote to memory of 2300 812 installer.tmp 115 PID 812 wrote to memory of 3288 812 installer.tmp 117 PID 812 wrote to memory of 3288 812 installer.tmp 117 PID 812 wrote to memory of 3288 812 installer.tmp 117 PID 812 wrote to memory of 1644 812 installer.tmp 119 PID 812 wrote to memory of 1644 812 installer.tmp 119 PID 812 wrote to memory of 1644 812 installer.tmp 119 PID 812 wrote to memory of 1528 812 installer.tmp 121 PID 812 wrote to memory of 1528 812 installer.tmp 121 PID 812 wrote to memory of 1528 812 installer.tmp 121 PID 812 wrote to memory of 1308 812 installer.tmp 123 PID 812 wrote to memory of 1308 812 installer.tmp 123 PID 812 wrote to memory of 1308 812 installer.tmp 123 PID 4716 wrote to memory of 964 4716 WXCastService.exe 131 PID 4716 wrote to memory of 964 4716 WXCastService.exe 131 PID 4716 wrote to memory of 964 4716 WXCastService.exe 131 PID 964 wrote to memory of 4520 964 cmd.exe 133 PID 964 wrote to memory of 4520 964 cmd.exe 133 PID 3064 wrote to memory of 4380 3064 svchost.exe 135
Processes
-
C:\Users\Admin\AppData\Local\Temp\letsview-setup.exe"C:\Users\Admin\AppData\Local\Temp\letsview-setup.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\installer.exe"C:\Users\Admin\AppData\Local\Temp\installer.exe" /VERYSILENT /SUPPRESSMSGBOXES /FORCECLOSEAPPLICATIONS /DIR="C:\Program Files (x86)\LetsView\LetsView" /LANG=English2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\is-FMIU2.tmp\installer.tmp"C:\Users\Admin\AppData\Local\Temp\is-FMIU2.tmp\installer.tmp" /SL5="$70042,46659782,920064,C:\Users\Admin\AppData\Local\Temp\installer.exe" /VERYSILENT /SUPPRESSMSGBOXES /FORCECLOSEAPPLICATIONS /DIR="C:\Program Files (x86)\LetsView\LetsView" /LANG=English3⤵
- Manipulates Digital Signatures
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\sc.exe"sc" stop LetsViewService4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1196
-
-
C:\Windows\SysWOW64\sc.exe"sc" delete LetsViewService4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2740
-
-
C:\Windows\SysWOW64\msiexec.exe"msiexec.exe" /i "C:\Program Files (x86)\LetsView\LetsView\Bonjour64.msi" /quiet4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4432
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C ""C:\Program Files (x86)\LetsView\LetsView\usbmmidd_v2\wxcastservice_start.bat""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\sc.exesc create LetsViewService binPath= "C:\Program Files (x86)\LetsView\LetsView\usbmmidd_v2\..\WXCastService.exe" start= auto5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1092
-
-
C:\Windows\SysWOW64\sc.exesc start LetsViewService5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4644
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall delete rule name="LetsView" program="C:\Program Files (x86)\LetsView\LetsView\LetsView.exe"4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:624
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="LetsView" dir=in action=allow program="C:\Program Files (x86)\LetsView\LetsView\LetsView.exe" enable=yes4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2868
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="LetsView" dir=out action=allow program="C:\Program Files (x86)\LetsView\LetsView\LetsView.exe" enable=yes4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2300
-
-
C:\Windows\SysWOW64\icacls.exe"icacls" "C:\ProgramData\LetsView\LetsView" /grant Users:(OI)(CI)(F) /t4⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:3288
-
-
C:\Windows\SysWOW64\icacls.exe"icacls" "C:\Program Files (x86)\LetsView\LetsView" /grant Users:(OI)(CI)(F) /t4⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:1644
-
-
C:\Windows\SysWOW64\icacls.exe"icacls" "C:\Users\Admin\Documents\LetsView\LetsView" /grant Users:(OI)(CI)(F) /t4⤵
- Modifies file permissions
- System Location Discovery: System Language Discovery
PID:1528
-
-
C:\Users\Admin\AppData\Local\Temp\is-2P31Q.tmp\PinTaskbarTool.exe"C:\Users\Admin\AppData\Local\Temp\is-2P31Q.tmp\PinTaskbarTool.exe" /unpin "C:\Program Files (x86)\LetsView\LetsView\LetsView.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1308
-
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding 1EC6A77642BB87B497E4C3374C290CFD2⤵
- Loads dropped DLL
PID:3448
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B9688E804032F7B271792FE2E8F029A52⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2700
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 321DD39A2FF4BD9865E4F0C5369420BE E Global\MSI00002⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3208
-
-
C:\Windows\System32\MsiExec.exe"C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files\Bonjour\mdnsNSP.dll"2⤵
- Loads dropped DLL
PID:1988
-
-
C:\Windows\syswow64\MsiExec.exe"C:\Windows\syswow64\MsiExec.exe" /Y "C:\Program Files (x86)\Bonjour\mdnsNSP.dll"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1968
-
-
C:\Program Files\Bonjour\mDNSResponder.exe"C:\Program Files\Bonjour\mDNSResponder.exe"1⤵
- Modifies firewall policy service
- Executes dropped EXE
PID:2380
-
C:\Program Files (x86)\LetsView\LetsView\WXCastService.exe"C:\Program Files (x86)\LetsView\LetsView\usbmmidd_v2\..\WXCastService.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\LetsView\LetsView\usbmmidd_v2\..\usbmmidd_v2\usbmmidd.bat"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Program Files (x86)\LetsView\LetsView\usbmmidd_v2\deviceinstaller64.exedeviceinstaller64.exe install usbmmidd.inf usbmmidd3⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Executes dropped EXE
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:4520
-
-
-
C:\Program Files (x86)\LetsView\LetsView\LetsView.exe"C:\Program Files (x86)\LetsView\LetsView\LetsView.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4644
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x300 0x3081⤵PID:4120
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "1" "c:\program files (x86)\letsview\letsview\usbmmidd_v2\usbmmidd.inf" "9" "4f9666e1f" "000000000000014C" "WinSta0\Default" "000000000000015C" "208" "c:\program files (x86)\letsview\letsview\usbmmidd_v2"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:4380
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\DISPLAY\0000" "C:\Windows\INF\oem3.inf" "oem3.inf:d470a17d4e87d07b:MyDevice_Install:2.0.0.1:usbmmidd," "4f9666e1f" "000000000000014C"2⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:4828
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
4Windows Service
4Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
4Windows Service
4Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
3Disable or Modify System Firewall
2Modify Registry
2Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126KB
MD5e4749a0e2030b1883431c824e2435bc9
SHA175e11cd65f20f3bdd85a3540baa1636f714d2af1
SHA256aa2aa8e632c97ed4bb679c351555fb075362c919bbf6459b5fde10182816ace3
SHA512f2bc475b52119ac16fa0e7becf1bc70a1b0760fd1e203114fcae3dbb9dfbc0de6e512c2e3e868c8a6d1a3c176d02f08ab3ab5847c21fc80b662755ed447d9601
-
Filesize
381KB
MD55ea9c80f18cbc393ea7d9a2991ded4b5
SHA1b8917c5ae45d1ba5ca534058f1386fac92f5da63
SHA2567e5eb1ce44febe93686174058d51581fa00bdff0ebb84bd74bc08f6386019253
SHA5127fd949b792a40630ca385dd2bc88db9673f9106975b9f55481e2382f67986dd75b03cdf0fbf59846b513a8def0c506ac6561f6ba658775286f11d761b575513a
-
Filesize
119KB
MD5f6d02735de16705c1ebe6429592cd355
SHA1c6ee693de2c01cad34012471b70d87869969a0cb
SHA256356c49c5e1328fb181c295a84292471c566e11099e46d7a34c017931863d86a4
SHA5121e37adcdcb399f1d9f84599dcd4254b7da342f6d52f6af7faf51fe618c96fbb3754813e97cf7c5ec224dac58d341658d8422dcd8bb26549bbf4952251353cd13
-
Filesize
77KB
MD5dcb7d24b7c24bdc474a4ddbce4404c97
SHA1ddb03f0e22f632f28edbcd31208c35288d42d57e
SHA25606d8f6f58ef29fd50fa89b5bf5e5a4f2a2c4cc39583d78fbb90e931914cb572f
SHA5126e404ac3bd956e88df83ff067ea8188f3e1c1bc2319110073a108a5106495b1a4829dd3e0652a5bd3ee4d4c20ea86b589de2e46e29f139e3456a21bf7639d4a1
-
Filesize
260KB
MD578d3b2b6af66a68ba89ab685799d44cd
SHA185f7065e53378a330e74ba3bdb9bf930ad5f2472
SHA256c7161d879b9a93e17016e8f10290fac69a524690cace1761faf03879a42a1f79
SHA512f48ff08135340bb94870104f3d7b91dcfd42e14fb6c7ac87a0b2de03a05cf92cba50734d8bed4d87d64df3dd3ab331996430977e34d7b001930107c0eb9f5d09
-
Filesize
2.3MB
MD5fe167cdd26d09bb444034c8276f7bff0
SHA19731063c44946b03c826d7fe4e9f9430ea05f23e
SHA2567d7b2986d4fd35cc98af3607b1a5e2e004d6ab1116a4a9db37a66c17b63b6397
SHA512ff1f3a2aab8c8d0c65b1f88b4caa1cb019062897d424e9cc53522d9fe5be2ca8498d675f7312e70e2f5e16e65dac33341fa88179cd8be563038fdf317c8a407b
-
Filesize
2.6MB
MD586e2b390629665fbc20e06dfbf01a48f
SHA1d9f4697a6f4eceea24735822cb1df501268ca0b0
SHA25646e31e284da64d6c2d366352b8a8abcf7db28d3e2a870d8fcf15c4a6fe0a6dd1
SHA51205ecd3be5779f39db09329dda4dce0e3c49ac5d3950e92833031622b53542dadbe9e2948df35faeb4c41dbc8e01992935087c4a2975c797bd008ae177f7c3fea
-
Filesize
14.7MB
MD59a3d12e0ca0dc54b0a51c1386567b850
SHA1a3fc4e9b83be02e1a2434c3a7a9b82c7eee52a11
SHA256c1eff3cd24f86ca95955c72b7c31e26ad7c2ccface305ed23cbe71451ec767ff
SHA5120a199987d0da15c7a3628a0c750fd34870d7add0772b2321cb375fdc632ab890d74c69de7a87bfc2a4bebf4ad23b156d0c4ee0fab0f0765b84da360c0403e91a
-
Filesize
401KB
MD577b438638ec6d2b9a3e31751f851406e
SHA1559d06eeb32927fb069ba63e5fa0cc42df681137
SHA256d569d50aef8876a5c0346b8985186e5aa5cb94a20aed2539e93e8dc48ab2b447
SHA512fe61a7a2644fbfad53eba29d64db6b96475f78b3f39e2ab3ebf244147829e6549c74b14ec1dc3e72ac85e76e5f02cdfa9e4f0b5f720f63928314e5e21c99b048
-
Filesize
11KB
MD5e4dfc2bfe7b21233be21f6d1724f6d4b
SHA198aaa4e02e5e9bdec7d76a173b4b84c84f95f461
SHA2569abb11919240f1a7a0c7ff1564da0f369bbbcad24e07b27a304c845c1eacc4de
SHA512d0540a08277a3d00802bfc70941c481fbd974246d7ef6b036625a4e8c964fd5d30b88c83e0908362c1da974de497ca621e6dea9f2e26809cbadf6dcf58bc4c49
-
Filesize
10KB
MD57fec155413dacdcdf317125d0028864c
SHA1e3ec6be344dbaa41950ed4c7bbef0fa935f3e6d9
SHA256e67e489a49d060e62d84e9da69a6d75aae16bcdcf4f3a1a93c5736d38b442fbf
SHA512f9bea766ef60674b7a31737c62a9978fe5a8b12ccb7bf056ac8be6327fac37a8c73905104b47c9ea37b741aa0b3c449ab362de098d73a875ec740fd0c319c6f1
-
Filesize
10KB
MD535e0a11f1bdbff0c994f769fc5befa14
SHA1feb103ae82a609e2a65d7022dc5993e491c94045
SHA256740fe94f94043b42710641abf81693f4794d57d4de9ab552498f796046550b13
SHA5128516ba178833c2511725b973c08834fa90693a9b06b0934eec8467ee3091ea9aebe2687d71cc2615ca96a75021e4e1803a9ff52c9b635f079976f852a99bbd4d
-
Filesize
11KB
MD5fe523cf564489a7cdd4baaa99845e74f
SHA17c6e6d3456d9aba8395ece29733d75ee60a09207
SHA25674a6fa40cc3351ab22a387a94d62c4012913f6303fd4f997304c01dc691ba0fc
SHA512071d52d90f48b49188acba7a943baf3230c8caa8d820d675ee51b858865a57d7717450cc8e105236c188fc49a8ca4e1908dde5340309d1735f59bd809dd419dc
-
Filesize
14KB
MD5dd5b0d3aea79781f532712413d0a4b47
SHA1a1fa0eec8b3cc7965c36523c0caf4dc8d3919c25
SHA25636424777d41a90d57c2f129405bc0859d629402fd3c35a12e9118021c8ee7a8d
SHA512d1fd3ff61e8ba882e266c0396587086eecf01ba7b75d2590943a38a74031936c729d99da236eda3e7dbac4f2cc48823a6567b06d9fda19d12672f30663298a70
-
Filesize
11KB
MD55d02c661b442d9c5de21a77538374339
SHA17207e6d5e14ae872597cba62ce642dfb0f9839d2
SHA2569b92a8f46cbd51a70cadc0e72cf1d422a972806ff6f6459d07b7583d03c386a4
SHA512b1580d083757c344bb32bd6b99c9ae16aaad5f19040ee771a9d0d7dc9a917c956689a9b182dabce0e6a384390f3053e81cf013e6b690db1ffcab7e7036024391
-
Filesize
10KB
MD529ca2b6232e41863673be6540425039e
SHA1c3c39e0bc21b49845d17a618c414a5ba48d6ad95
SHA256af12dd95ea783bdb13873e6a175380fa7280bcde7c8d552970e14954ad43d09d
SHA512749e063c59372abc47fa8e136456a5fe733a9468f4ed7f2db81085113f35ea93187ccd1d7bbf7dcad9d43a03d6da553460ad60d4a0c1ed4bc492507e6bdb9381
-
Filesize
10KB
MD537dd1e5b624d12b45fd748a43f2c0874
SHA1681b1b4c64069ce42dde6a3d0149b02337c14f6d
SHA256be82b32df8e454d4f3fbe35f8d8393ba2ec37f1d4bd6369a163d0bfa63697e1c
SHA512c7d3b0b51ff47685eede1bb1091a930e0b752b2feb3e102b231a2fe41acc2d82d62e59a254ae298c6e38e68340eeb9e9101d4e95e65a600e4c50acf988d6f1e3
-
Filesize
11KB
MD568b97e0084ea10785d16259ae1d7dcd6
SHA19f703ba656effd841a9cda729ac80f1cae8ec76a
SHA256128ab7811295eeafa4e47514962d6c3f7d9a36372fd12b03c09255ee4b4e3a8c
SHA512d0b5004c740f5ca4cd42596d022430cb44522f5b0891707e4f6c782e3e0b1a0b9b14967c69c2b794524ca508acca9956b217e7b936bf93edfe9340891426c365
-
Filesize
11KB
MD5d58c835314572b4eef8e822623ce1c9f
SHA1b5918f3e6165553f78643012f2be1e2aa49bd07b
SHA256066d586820b27ea020f84ec7818c276f45686b15e8e5623e48559c6815b9dc66
SHA512f04cf8aced4d43d74dcc15e38a794e9709318548a0fc79b4b4cdacf63e8fa039cd8702293a7617f704fd3a71b707f9c4e43ce8b4c8f051834d65b1f472b1ff2f
-
Filesize
11KB
MD5a3e431794be520354c2ba1c5ec647b77
SHA139ddee262dede53278cd83282a8fcf5ba6d66f23
SHA2565b256300259cd38e71b3525e854e1f46bc32c64e24af59f853b4827637f2eba5
SHA51248183c14130ac97d2575d67ddb8cacf60b3c9103198dc93acd1acb960ca3bb900e429e7e91cf93bcaca31a63255edae3e3929a384691d4ccc89ea84e8860b616
-
Filesize
13KB
MD5a02a03fa2d7c75f3b79f1b1c049a36a1
SHA17c2222a6c4c434bdcec82732da805cb659fe8095
SHA25676911bd316f4f94bca7806cd2a5e91125999818c37306789a26b171b44db557a
SHA51201ac8e03680e60644eb7d3a2cc881e0de28d05d23e21062779a6b2dc50d87219634791cb3b1b61688bf2a16e6d52fc1e2ad4fe6e17ff7a4bbaed7b721aee6f3e
-
Filesize
11KB
MD510d46b6447fb718a68228a82ecd0b0aa
SHA130e0e9f041b92b336ec571810dfa56772cea9234
SHA256fd43c4981b93adc51daedc428be273c6ff7616592468366a91846ed21d0a7d74
SHA51281d81782f39fe5bed592c8a394e657e97196ec3b0faca0e49397c10c36f1494e6d949650af65a746bd68979a9986e6d9adb6722e0ca30bdd6529935506b261ca
-
Filesize
10KB
MD5c07cd1da2048e760e75903c4e7017ba9
SHA1bb7538444d80759d467f9ce956628ee693013a0a
SHA25695c5530eaabe668617d67d4711ea31cbafaa0adc467568412abd6ad23893542f
SHA5122df1c48e8aeb0b736dc1579c39412a49ae532f12d4d5277b708bf77f7fbbb194bf818e3c6e35ee11621e9dc0c741de043cf85f71761dad670af0707467105c35
-
Filesize
12KB
MD502071ec8e5bc7a712807fb7fe270dfb4
SHA130404d2952d57bed3fa2d8b229e43bad1abcca05
SHA256edabf4effd1c61b2c2b0dd6827b913e3491fc9287f7c29880ad850b884d7d223
SHA512618e810c06933fb08b7424ac438ef382a9a38b815bcdac24a8bad910d8f27afe79f598f024c2cbe755390a4075a17dcbc1ac881c800113c2dce97932a3571359
-
Filesize
13KB
MD5d7cbcb3ec0293e9b4a3e68d5b89ee5a2
SHA1a7e07bf065240cbc8010d65f00019ba48371ea57
SHA256cd0670ad3702452a225735f2a43e40ed7141a45d26b01c7ce53a76ff3bda71ab
SHA512da0ea99da959e1801cc3ee22ace0e56c60e0439f85765ff6a4639e2869642d00b24fc621fc8a777691d746e4cdc3942813818b9cfb273562c3133433bcccb5f4
-
Filesize
11KB
MD5dde67fcb6f45c79f7c5d3f68f4e0a374
SHA12579d5d126a4fb60f4f8c4b30615ee337d5b4a71
SHA256b956696972c9ed819fb0ca3d138ee23f1f335f3766468bed7fd189e782e254ae
SHA5123668eb6c266edbc54767dfbe6c457cf75685f3d5144a0c4731f72365f6a7eb7db0e948e6c04621e0fd2e0734ad92c8996a38d64154bfd266ebd2676498444d48
-
Filesize
10KB
MD574aadb264f17674f0feacdb6bcdb884f
SHA1def09bad16d25e52b8381d9ec0aaee46c8f128a4
SHA256fa7abf71a5641287853ba0931f71ce8f9c8bc794397676d363ce55e8c5a9c236
SHA5127eb44141ea96fedb44f364cfcdf05bb950f3fc135de2bdba6088a4e5c2c64c5e8b380edb50aaff5095c616b7bf19a97e7444da32206ce4148b93be022667b003
-
Filesize
10KB
MD56de3b8d0e577d0bea5a9c834fe40fd5b
SHA1b3d03035c7b6d4de2f1db74e6879434c2727cefa
SHA256c5a5b195ee0becc39bb6395e8f28874942ac3974ecb716cf72d9d77d58386aca
SHA51269762553ca99f650fe26399eaa8de234f12e20fe5d936212cac2f1c7951194fe4c908b908e02f49edee60e04a4918d89de1ca8d5a87266f6b7a1a0c2aa853dc4
-
Filesize
10KB
MD51c75ae2b1d5b0dd873debaa00c1aa829
SHA1e3b1e666a79995618ede41d985346e20185b6d8d
SHA2566b22bccd328b420f7c8b3f2d57126346ace6ecec58dc4f5aca328af4f021fb55
SHA512a558b70aadaad8c1e2d052fcfd373679eca19438d516df2128bd6a58fbcd7f1194877ec72c554a927aa12cafb62c38a35a43b7d7239c9125f022869301dd4428
-
Filesize
12KB
MD54626a91ab6a26196292730b527af61f6
SHA105c5af1b8785eadc85b9533621d735f0293076e7
SHA256731a3d95efa88d260767454fda4bba1667262922eb5f9354605a880c8488aa9e
SHA5127a9cfc7d7c08aa84bf507743097b06ac927726f11ad1806959587d1ae3e6e8a4db38449176f82150e7af93b266d6be4c3ff0f9d3af7265c3263a0dffc66df554
-
Filesize
11KB
MD5d954fdca8589f4f164baf711a32516c5
SHA12a679c903ea3b54ae84c93284e8b36aecbc5c31d
SHA25672354bf1172c17d96093ce92802e83fcdad61ffb20e6ee374e437a6e9673bf0a
SHA512fd48df01d2514ef5ab8982470506f108e0ab278a55e2d16878d00459823b1adad9001bd13323c31803e0a5cf6bb159d7246bb48b42b352752bab90a45bfbab53
-
Filesize
11KB
MD52cd3c450d52025f817b38b1a52d086a8
SHA18dc978a036c084567c84ac75e97587195c7ba1fe
SHA2564e1480f61f589d98fc16e45d33ebd0418206b2e1db0d6f2c5d5b841728f7d5e9
SHA512c0fa2e52d61662ab0f6de725a075002a5278232db24709367c0824f0236e3b59ac004811b53553b72e8027cf80cc3b366383baad8c061df44ba2b5ab3559b512
-
Filesize
11KB
MD540172df88efd0e3a9db6f621ead9dc2e
SHA1c0cfc18bd14e0867fadb498c4ab8cc781985865d
SHA256661af60756f0937cf7b5d4cd27a0584ff36e46c16b99b036819168045638419a
SHA51284d85e7aedf7f7165309e9e7b6f0274fcb11b028c5c97e3fa9ff765907b1424498c0e51333f53fa07fca27cd7aa916c99ae6795bb72af75729e8468006b9572a
-
Filesize
10KB
MD5c5a081a6ad3b1845e5406244b8d28f70
SHA18abf308e5d6532c604f4865c1cf837760b6ac9b8
SHA25619be2ed62d89e8c663b4a7b02275d5c3870fb43310048aca51d813f9edd980be
SHA51275ef97cf9a75f9bf191b9ec99c9afc547848c3e530bb21dee47dbde6c0d7095e9ea3099a0e67e00e36ed69a01acef305c733d7edb980fb41fff4ce1e22197564
-
Filesize
18B
MD50ebd4c9db48f04f789e6254a92af4b97
SHA145f98976d001a97e4b18489cb73cca2aadcb1cf3
SHA25654550f5495ca78de8ab1b4d32ddec042077823cb5654808e9f9f003857125450
SHA5129b3ca441b80f23ff89094175bca2a2647d76e38277830420e933935a631a82ee010743410b632078750f4272cdc6b3362a56649ce9694a2c712367e0ab7f0e21
-
Filesize
121KB
MD5340accfd5f5f85c6d8890d5214fe7425
SHA1e40d37790bdcd5a765594b7556d2d86731a79cd0
SHA256509259c5d7f6c919e785c71b753653068b3251283ab20974e900982ca0001253
SHA512845b4cd7bf1f663ceaf82180ab942ec8af6a50ba334c39b598849c838888d0fa09effa2451a7d4a48df54a1033517e8e9f536e2e91193cf2d060e57c64d4ba80
-
Filesize
438KB
MD51fb93933fd087215a3c7b0800e6bb703
SHA1a78232c352ed06cedd7ca5cd5cb60e61ef8d86fb
SHA2562db7fd3c9c3c4b67f2d50a5a50e8c69154dc859780dd487c28a4e6ed1af90d01
SHA51279cd448e44b5607863b3cd0f9c8e1310f7e340559495589c428a24a4ac49beb06502d787824097bb959a1c9cb80672630dac19a405468a0b64db5ebd6493590e
-
Filesize
177B
MD56f71a8d4bf5abae13d55930d10120ca4
SHA1df37d7764b6263e784d4f54aade9d936511245b5
SHA256e199b95399e60fd9a604b82fe6cc0b4f330eb51281d0784daac58971b933a560
SHA5126d1fdcb8cc974024374de4dc9e17a84da2f304e44b420661ca75883150ed13f3a85ecd18080089ab9ade0d07ad37d245c5705370b87918c4c7cd0445f06a52e4
-
Filesize
78KB
MD51b171f9a428c44acf85f89989007c328
SHA16f25a874d6cbf8158cb7c491dcedaa81ceaebbae
SHA2569d02e952396bdff3abfe5654e07b7a713c84268a225e11ed9a3bf338ed1e424c
SHA51299a06770eea07f36abc4ae0cecb2ae13c3acb362b38b731c3baed045bf76ea6b61efe4089cd2efac27701e9443388322365bdb039cd388987b24d4a43c973bd1
-
Filesize
451KB
MD5b5c2f92ee1106dfe7bb1cce4d35b6037
SHA131070ef84c5355b082873ffc19ff60659637995f
SHA256e399c390687589194d8aad385055f0cfa7d52ad9e837d8ff95008b8eb2b34e50
SHA5127f82752b271ee35bad31a8571ae33b8cc83ef48f41937297dfc446f6f9b12da3d8b8336a527f6bbc5bc3c6627deadbd38a5f109b16c7d1386a3db36742c5a9c7
-
Filesize
130KB
MD5eaaa2b83c4764fdcfbee4a4d6546de92
SHA1961a7e7735ee8f07ca54fa7cbfb23399748f8174
SHA256043779b2c684699c89d6e8363d65baa9f31dff17d250059b56a8e3ae48c89b5b
SHA512bc569de847db42bc2b1bc0a6ee0a792269b1d7dccffc8a5f0f6130495cabb8accb5ee312a0c749ccc13c395e4969a1a5738132ebb41cfebfaaf41126ac9737d3
-
Filesize
17KB
MD5ce9a2f5a7fcfff341d6d901ad919a2ab
SHA1341f9d9a0b3fd8cfbefe0169b148dcc55688ee93
SHA256cc36a44467f41cf2dc91c126e368e357b28a0d57101472d2dfd1c06a4091cdf7
SHA5121f53e652b042ee27fe05b11ccda2ed9ae9a8f44b948b8658aa7a2d7ad2f5bd94ea16f3d9a92e65a8c65b7480517f1d05a066a4fb8d961b927d0d305399ca4e8f
-
Filesize
446KB
MD568e740877a8b371f4d4c258076bf052e
SHA1af8eae7f271a281e68d532877a1bae8591ea7ece
SHA2560ee12d84df01ccd2636e8198397143f56840cf6376973829fbb7fb5eef79efc6
SHA51248f6c9e28a306cbf09462294815019f293afde2e0b5101a267637a71e4f295471ac61c79571d8b02d65ac50f21618ba232ca888b4561dca09c5bb17bf10fb963
-
Filesize
45.4MB
MD5df9ca22ae7a8c24d359ebe38f64c0981
SHA1b7b7e10fe537b3a63ad2a4d4c79b1564d0abccf1
SHA2563e273bae3be79827fc6d8bda508c16f5b55bc7e000ce82fd217a05953fa100d7
SHA512c1d5a1c020031fe3a8e0c135ce33b75b6b5fcee49d6594ff3bd6e5df856e9d47a13f40e3bb45f176645970418cbbcc6e771a86bb0067308cfb2b6f884ad84c99
-
Filesize
130KB
MD5f7b445a6cb2064d7b459451e86ca6b0e
SHA1b05b74a1988c10df8c73eb9ca1a41af2a49647b7
SHA256bd03543c37feb48432e166fe3898abc2a7fe854b1113ee4d5d284633b4605377
SHA5129cf6d791132660d5246f55d25018ad0cf2791de9f6032531b9aca9a6c84396b8aeca7a9c0410f835637659f396817d8ba40f45d3b80c7907cccbe275a345a465
-
Filesize
2.6MB
MD588eba8cda15027aab1700db1f80570f8
SHA199499e2b3a4e66a1e289610725828b1292a4dc05
SHA256f6b079d36aadf4dcea30ac84752a528cd70185bc85d52b9e94813b8717fb713d
SHA5124038d50b67cabf8669ef493415120d1ea726c569314444fecb266913ee3eb36b7c150ec2290fdcbae1d5cc87d31697b1f497555f9f08fec93fbf2a00ca52eea3
-
Filesize
163B
MD5bde7a905d055b8ecb6df1bbf474f4f76
SHA191e5dff81215b1edd18e3cf22b49d0da12403f67
SHA25639886420010d9b59b67a037b74f6d6a4a886adb1046cc6711439a6748f14a57e
SHA5129a7a211d094ea5553794e7808bf846b75d55b275e594ffa3acc4b0eeda3da4f3fdab44a9f1bf2f338175dffd1820b13fd6d517e8e4a6ffb4d9f35426e2113241
-
Filesize
219B
MD57484c0b61ed75cf4a87297b289b02f25
SHA18f7dd66d83c6aa0f3f764bf76f98b4ad5343c779
SHA256da28c74dceba9683f4b151e5190edb779f0c1e9836f77a87fe7d9591c0febcb1
SHA5122f1b00119d8c8044f3bb95e5bec6536496700e45ce6718ef38ff74dadd64cb3c1796aa34a8cf4ad1b8dbb901de449b39b707c80ced11fab6aac9ec1087e45882
-
Filesize
671B
MD5d99a938c848a7a58aa78378f7e166606
SHA16ccb2bdd476aba9d67b2429a432bac4eb7247775
SHA256453717c8d5655fc6033460b8417228927955e5bb6ced267f05ebcb4c7dce63f6
SHA5124ddd32800082c58652a9709c9aa19f3e5572baa4ad61ecd11bfa95a19ef6313c3ac3e4592d0f3cb8e693a7fefccb66d8ddf512fc48374cec185457bd1a6d0616
-
Filesize
5KB
MD51b16c1f4ecedb712f6be387f43346ee9
SHA1135589b13f48568c9b77890347fdef9a4945dfbd
SHA256aaae1fb2fe4409173be23268758dec78a264d3dba8b433a8593fe14194af3f02
SHA5129ca18137904ed5dbd32a575d6910263dc5ec6e940ddc0cb2c6315d17b03985a09a2ab8ed7ec24562aab57476d3e45d6eede7bc7d1c26286d628bd2937bec4eca
-
Filesize
27B
MD5d785072bd43717886593f737817fff15
SHA18c7ef0936b7f5a5cec10e9b5e1278400e276e6f7
SHA2567989006d0b1b17f5e4f4e20960713600d80612c3799963454e463f689a3cf613
SHA5128bcd4ed11b248d2934bb7fed91cd8645b77f89ac75f357277a9de04e1121ef4217e982783d61c32b1e8e04d2c14eb82fab78926dc46861db511a8741a62c0c20
-
Filesize
59B
MD5ca6c5ed863b84359de0f7d0e4a05901e
SHA19870338c383a8d0d94e06b0cdd84af4beb6bb974
SHA2567fa8fe85d7505d7565ed9dceaa85ca7ca0d478cac1528597348fa990f312ae0c
SHA5124b0cbfef4db08a6a8a53d2d407093c2c93df82ada823275e185aca4cdd8fad6b4f6122c44af09569cfacfc6d79599246b90cf5718e27afa4ed27a51d60ea029d
-
Filesize
86B
MD5574329e5c00e0f8389faa4b2e0064b7e
SHA168751df643d5fceefe80ccf8ea59005c1f689539
SHA256e01782e0ad6fe923a9edd4565817f2d1695653145014a59ccdd895e0c3a98b21
SHA51203bc61017296342f451ebfa7fda96be5a5eabc6f54ed8fecd1d6d1c44f397184c1d1322650b3e3dd8ab061d532bbb76e45142171c87ee89fbdd6a12cad32e10f
-
Filesize
53B
MD5e291913097c6b7f55541437948f2f8bb
SHA1d03f060dcb8d2698caee878b8810c365471aea43
SHA2566fd2f2dddbbb1dda9a32370a2a97b306c2e546159a62de1f211ceabc2f3e14a0
SHA512a7c1e6267078772a9aaac683b4ae3312bbda8ef44dc123a477066a5cbfbad66173026218274baee774105cb3ffb29a9f7ec015b5132f27dbf05e35e03ba571a4
-
Filesize
76KB
MD5950087e828e1b7426f703678e446c799
SHA1c9f28be9b9f810132ec8d78c161e5a232491e60e
SHA2568a41eaa0d699f48661c2560aeffe4b0432cf755f1b15e31ac9aff667d498b3ee
SHA5129ab24bf84a4534e219df132a0b43874c1d6410ef802c69e65c5aaf3d0c46085470690851ef23303f9a48076e8ae552d816903e02c43c1af83e6fc3457d2acb93
-
Filesize
75KB
MD56f8e3e4f72620bddc633f0175f47161e
SHA153ed75a208cc84f1a065e9e4ece356371cac0341
SHA2562adf199f6baf245f0b07d31a3a1401d4262c3e6c98b8f10df923ceb2c937291e
SHA51280187277e78f59b7ea71ed3caa55452e730d93b8c296d5820d470776a428cbb7e7fead87240e811436f85e4d89df2b9f31d6d16658d21abf59395cab7074a869
-
Filesize
5KB
MD50a09dab1c9a7f2e685cd7f8b5bd43ec0
SHA114b5fae8397fbda873dcc9ffd5cc189f14490c28
SHA256a8750ca15a86742f3012886c9932bb974158cd2d9779cf891c730d976a47726a
SHA512f6cc96686f06f1871ae95ddbe9e553bbff506765965e4c846ee02328c6566730a9f4df493c36ab2104565d41dbd7ea67d054984163e45bc414a8f1efba293368
-
Filesize
11KB
MD5e5f60b2f3a491983eac00dc7dc7c408b
SHA12566bf2ddc9e58f5262a2b11dda0c451d5ec9468
SHA256470149c4cf9970ba59070aa7c9409c9f63a15727de99bab53e7e51f55310779f
SHA51255b31a4da61b837891be7977bdf7b96457e5b54c5216e867bb1aca4580a84145f885896b13fcb72e937d3f424fec1105b4f9c0a9706dfabbec95fb53c7a302f5
-
Filesize
69KB
MD5ee848c427145609d998725a38e7ad9af
SHA16b97d9ab1c3978cdc2d6735c227adca8f0aabddb
SHA256dc135d675127113915a7e5aa9fe57c84edad6be41d0890b265ef124ab26ea9e3
SHA5125bd0eca69d16a6fe32856978047967e44f0d49c59cd611b02e9d24ca59c0d862ad5f8a4d50c6bed816fa11e2f4fee6fabbe3d6d735224084f47161693eee8007