Analysis
-
max time kernel
292s -
max time network
300s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 07:09
Static task
static1
Behavioral task
behavioral1
Sample
10122024_0709_PURCHASE..REQUIRED..DETAILS..000124.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
10122024_0709_PURCHASE..REQUIRED..DETAILS..000124.exe
Resource
win10v2004-20241007-en
General
-
Target
10122024_0709_PURCHASE..REQUIRED..DETAILS..000124.exe
-
Size
1.2MB
-
MD5
66a85b087ff82e8bf665a8055689e514
-
SHA1
c2b60e409d26e3aee3f5e48b6ce73865fd434ad4
-
SHA256
18b2a588242fa4c92af05cf27f5f22c8e83b42db17c40ab4307012c685b98755
-
SHA512
bdd11ff5a14e5ceca242d4d423c48204c73343fbe9368de5a4be112c588462c7ede0dff4d70280e4a972694753bce6989dd13968fb67b1908bd6baf7fa393fb0
-
SSDEEP
24576:zPMPVEhH8frMNVO1wyWYVtcqqvHP7R3Eb1v7kcER8:zPUyOShq0HFA7TER8
Malware Config
Extracted
Protocol: smtp- Host:
webmail.thematman.com.au - Port:
587 - Username:
[email protected] - Password:
matman22#
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral2/memory/1728-2-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-10-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-12-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-18-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-34-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-51-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-66-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-65-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-64-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-63-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-62-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-61-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-60-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-58-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-59-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-48-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-45-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-44-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-26-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-40-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-39-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-37-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-57-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-36-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-56-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-35-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-55-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-54-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-53-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-33-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-52-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-32-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-50-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-31-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-49-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-30-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-47-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-29-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-46-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-28-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-27-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-43-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-42-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-25-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-41-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-24-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-38-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-22-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-20-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-19-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-16-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-17-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-15-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-14-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-13-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-11-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-8-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-6-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-7-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-9-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 behavioral2/memory/1728-5-0x0000000002D10000-0x0000000003D10000-memory.dmp modiloader_stage2 -
Executes dropped EXE 32 IoCs
pid Process 3748 alpha.pif 1688 alpha.pif 5016 alpha.pif 4784 xpha.pif 4952 per.exe 4780 pha.pif 4740 alpha.pif 4696 alpha.pif 4700 alpha.pif 4824 ymafvvdS.pif 640 alg.exe 1148 DiagnosticsHub.StandardCollector.Service.exe 4624 fxssvc.exe 2624 elevation_service.exe 3640 elevation_service.exe 2820 maintenanceservice.exe 1540 msdtc.exe 3476 OSE.EXE 1860 PerceptionSimulationService.exe 2100 perfhost.exe 4680 locator.exe 1968 SensorDataService.exe 2660 snmptrap.exe 5072 spectrum.exe 4088 ssh-agent.exe 4472 TieringEngineService.exe 4152 AgentService.exe 764 vds.exe 2120 vssvc.exe 2140 wbengine.exe 2320 WmiApSrv.exe 3928 SearchIndexer.exe -
Loads dropped DLL 1 IoCs
pid Process 4952 per.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ymafvvdS.pif Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ymafvvdS.pif Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ymafvvdS.pif -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Sdvvfamy = "C:\\Users\\Public\\Sdvvfamy.url" 10122024_0709_PURCHASE..REQUIRED..DETAILS..000124.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 42 checkip.dyndns.org -
Drops file in System32 directory 38 IoCs
description ioc Process File opened for modification C:\Windows\system32\spectrum.exe ymafvvdS.pif File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe ymafvvdS.pif File opened for modification C:\Windows\system32\SearchIndexer.exe ymafvvdS.pif File opened for modification C:\Windows\system32\msiexec.exe alg.exe File opened for modification C:\Windows\system32\AgentService.exe alg.exe File opened for modification C:\Windows\system32\SgrmBroker.exe alg.exe File opened for modification C:\Windows\System32\SensorDataService.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\fxssvc.exe ymafvvdS.pif File opened for modification C:\Windows\System32\msdtc.exe ymafvvdS.pif File opened for modification C:\Windows\system32\msiexec.exe ymafvvdS.pif File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe ymafvvdS.pif File opened for modification C:\Windows\System32\vds.exe ymafvvdS.pif File opened for modification C:\Windows\system32\vssvc.exe ymafvvdS.pif File opened for modification C:\Windows\SysWow64\perfhost.exe ymafvvdS.pif File opened for modification C:\Windows\system32\TieringEngineService.exe ymafvvdS.pif File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\system32\dllhost.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\fxssvc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\msiexec.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\locator.exe ymafvvdS.pif File opened for modification C:\Windows\System32\SensorDataService.exe ymafvvdS.pif File opened for modification C:\Windows\system32\SgrmBroker.exe ymafvvdS.pif File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe ymafvvdS.pif File opened for modification C:\Windows\System32\SensorDataService.exe alg.exe File opened for modification C:\Windows\system32\SgrmBroker.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\AgentService.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\System32\alg.exe ymafvvdS.pif File opened for modification C:\Windows\system32\AgentService.exe ymafvvdS.pif File opened for modification C:\Windows\system32\wbengine.exe ymafvvdS.pif File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe ymafvvdS.pif File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\system32\AppVClient.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\ac484b7d38f5360d.bin alg.exe File opened for modification C:\Windows\system32\dllhost.exe ymafvvdS.pif File opened for modification C:\Windows\System32\snmptrap.exe ymafvvdS.pif File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\system32\AppVClient.exe ymafvvdS.pif -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1728 set thread context of 4824 1728 10122024_0709_PURCHASE..REQUIRED..DETAILS..000124.exe 107 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe ymafvvdS.pif File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe ymafvvdS.pif File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe ymafvvdS.pif File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe alg.exe File opened for modification C:\Program Files\dotnet\dotnet.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe alg.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe ymafvvdS.pif File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe ymafvvdS.pif File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe ymafvvdS.pif File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleCrashHandler.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe ymafvvdS.pif File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe ymafvvdS.pif File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe ymafvvdS.pif File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaws.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_86328\javaws.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe ymafvvdS.pif File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe ymafvvdS.pif File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe ymafvvdS.pif File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe ymafvvdS.pif File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateComRegisterShell64.exe ymafvvdS.pif File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe ymafvvdS.pif File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe ymafvvdS.pif File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe ymafvvdS.pif File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe ymafvvdS.pif File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\notification_helper.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe ymafvvdS.pif File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe ymafvvdS.pif File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe ymafvvdS.pif File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe ymafvvdS.pif File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe ymafvvdS.pif File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe ymafvvdS.pif File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe ymafvvdS.pif File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe ymafvvdS.pif File opened for modification C:\Program Files\Java\jre-1.8\bin\javaws.exe ymafvvdS.pif File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe ymafvvdS.pif File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe ymafvvdS.pif File opened for modification C:\Program Files\Java\jdk-1.8\bin\schemagen.exe ymafvvdS.pif File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_86328\javaws.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe ymafvvdS.pif -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe ymafvvdS.pif File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10122024_0709_PURCHASE..REQUIRED..DETAILS..000124.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ymafvvdS.pif -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1120 esentutl.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-170 = "Microsoft PowerPoint 97-2003 Presentation" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-194 = "Microsoft Excel Add-In" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@windows.storage.dll,-21824 = "Camera Roll" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-12385 = "Favorites Bar" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-914 = "SVG Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-142 = "Microsoft OneNote Table Of Contents" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\notepad.exe,-469 = "Text Document" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{C120DE80-FDE4-49F5-A713-E902EF062B8A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000168f6dacd24adb01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-131 = "Rich Text Format" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9937 = "3GPP Audio/Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\Windows.UI.Immersive.dll,-38304 = "Public Account Pictures" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Common Files\system\wab32res.dll,-10100 = "Contacts" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-10046 = "Internet Shortcut" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\acppage.dll,-6005 = "Shortcut to MS-DOS Program" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\msxml3r.dll,-2 = "XSL Stylesheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-140 = "Microsoft OneNote Section" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000005532efabd24adb01 SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000d5de5cacd24adb01 SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E2FB4720-F45F-4A3C-8CB2-2060E12425C3} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000005d0683acd24adb01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9905 = "Video Clip" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@"C:\Windows\system32\windowspowershell\v1.0\powershell.exe",-105 = "Windows PowerShell XML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\msinfo32.exe,-10001 = "System Information File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-182 = "Microsoft PowerPoint Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\wshext.dll,-4804 = "JavaScript File" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.svg SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9909 = "Windows Media Audio/Video file" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-177 = "Microsoft PowerPoint Macro-Enabled Slide Show" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{3DBEE9A1-C471-4B95-BBCA-F39310064458} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000db0be8abd24adb01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-121 = "Microsoft Word 97 - 2003 Template" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000e2a361acd24adb01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-124 = "Microsoft Word Macro-Enabled Document" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{1E589E9D-8A8D-46D9-A2F9-E6D4F8161EE9} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000f6f512acd24adb01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-180 = "Microsoft PowerPoint 97-2003 Template" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9934 = "AVCHD Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\mshta.exe,-6412 = "HTML Application" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia\ActiveMovie SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@windows.storage.dll,-34583 = "Saved Pictures" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\msxml3r.dll,-1 = "XML Document" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{8082C5E6-4C27-48EC-A809-B8E1122E8F97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000ed28c8acd24adb01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-125 = "Microsoft Word Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-915 = "XHTML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\windows.storage.dll,-10152 = "File folder" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9902 = "Movie Clip" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5383EF74-273B-4278-AB0C-CDAA9FD5369E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000003a6a47acd24adb01 SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{01BE4CFB-129A-452B-A209-F9D40B3B84A5} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000008e5553acd24adb01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-913 = "MHTML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchProtocolHost.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 16 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 4780 pha.pif 4780 pha.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 4824 ymafvvdS.pif 1148 DiagnosticsHub.StandardCollector.Service.exe 1148 DiagnosticsHub.StandardCollector.Service.exe 1148 DiagnosticsHub.StandardCollector.Service.exe 1148 DiagnosticsHub.StandardCollector.Service.exe 1148 DiagnosticsHub.StandardCollector.Service.exe 1148 DiagnosticsHub.StandardCollector.Service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 668 Process not Found 668 Process not Found -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeDebugPrivilege 4780 pha.pif Token: SeTakeOwnershipPrivilege 4824 ymafvvdS.pif Token: SeAuditPrivilege 4624 fxssvc.exe Token: SeDebugPrivilege 4824 ymafvvdS.pif Token: SeRestorePrivilege 4472 TieringEngineService.exe Token: SeManageVolumePrivilege 4472 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 4152 AgentService.exe Token: SeBackupPrivilege 2120 vssvc.exe Token: SeRestorePrivilege 2120 vssvc.exe Token: SeAuditPrivilege 2120 vssvc.exe Token: SeBackupPrivilege 2140 wbengine.exe Token: SeRestorePrivilege 2140 wbengine.exe Token: SeSecurityPrivilege 2140 wbengine.exe Token: 33 3928 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 3928 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3928 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3928 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3928 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3928 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3928 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3928 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3928 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3928 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3928 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3928 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3928 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3928 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3928 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3928 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3928 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3928 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3928 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3928 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3928 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3928 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3928 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3928 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3928 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3928 SearchIndexer.exe Token: SeDebugPrivilege 4824 ymafvvdS.pif Token: SeDebugPrivilege 4824 ymafvvdS.pif Token: SeDebugPrivilege 4824 ymafvvdS.pif Token: SeDebugPrivilege 4824 ymafvvdS.pif Token: SeDebugPrivilege 4824 ymafvvdS.pif Token: SeDebugPrivilege 640 alg.exe Token: SeDebugPrivilege 640 alg.exe Token: SeDebugPrivilege 640 alg.exe Token: SeDebugPrivilege 1148 DiagnosticsHub.StandardCollector.Service.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1728 wrote to memory of 4608 1728 10122024_0709_PURCHASE..REQUIRED..DETAILS..000124.exe 88 PID 1728 wrote to memory of 4608 1728 10122024_0709_PURCHASE..REQUIRED..DETAILS..000124.exe 88 PID 1728 wrote to memory of 4608 1728 10122024_0709_PURCHASE..REQUIRED..DETAILS..000124.exe 88 PID 4608 wrote to memory of 4632 4608 cmd.exe 90 PID 4608 wrote to memory of 4632 4608 cmd.exe 90 PID 4608 wrote to memory of 4632 4608 cmd.exe 90 PID 4608 wrote to memory of 1120 4608 cmd.exe 91 PID 4608 wrote to memory of 1120 4608 cmd.exe 91 PID 4608 wrote to memory of 1120 4608 cmd.exe 91 PID 4608 wrote to memory of 3748 4608 cmd.exe 92 PID 4608 wrote to memory of 3748 4608 cmd.exe 92 PID 4608 wrote to memory of 3748 4608 cmd.exe 92 PID 4608 wrote to memory of 1688 4608 cmd.exe 93 PID 4608 wrote to memory of 1688 4608 cmd.exe 93 PID 4608 wrote to memory of 1688 4608 cmd.exe 93 PID 4608 wrote to memory of 5016 4608 cmd.exe 94 PID 4608 wrote to memory of 5016 4608 cmd.exe 94 PID 4608 wrote to memory of 5016 4608 cmd.exe 94 PID 5016 wrote to memory of 4784 5016 alpha.pif 95 PID 5016 wrote to memory of 4784 5016 alpha.pif 95 PID 5016 wrote to memory of 4784 5016 alpha.pif 95 PID 4608 wrote to memory of 4952 4608 cmd.exe 98 PID 4608 wrote to memory of 4952 4608 cmd.exe 98 PID 4952 wrote to memory of 3704 4952 per.exe 99 PID 4952 wrote to memory of 3704 4952 per.exe 99 PID 4952 wrote to memory of 4780 4952 per.exe 101 PID 4952 wrote to memory of 4780 4952 per.exe 101 PID 4608 wrote to memory of 4740 4608 cmd.exe 103 PID 4608 wrote to memory of 4740 4608 cmd.exe 103 PID 4608 wrote to memory of 4740 4608 cmd.exe 103 PID 4608 wrote to memory of 4696 4608 cmd.exe 104 PID 4608 wrote to memory of 4696 4608 cmd.exe 104 PID 4608 wrote to memory of 4696 4608 cmd.exe 104 PID 4608 wrote to memory of 4700 4608 cmd.exe 105 PID 4608 wrote to memory of 4700 4608 cmd.exe 105 PID 4608 wrote to memory of 4700 4608 cmd.exe 105 PID 1728 wrote to memory of 2024 1728 10122024_0709_PURCHASE..REQUIRED..DETAILS..000124.exe 106 PID 1728 wrote to memory of 2024 1728 10122024_0709_PURCHASE..REQUIRED..DETAILS..000124.exe 106 PID 1728 wrote to memory of 2024 1728 10122024_0709_PURCHASE..REQUIRED..DETAILS..000124.exe 106 PID 1728 wrote to memory of 4824 1728 10122024_0709_PURCHASE..REQUIRED..DETAILS..000124.exe 107 PID 1728 wrote to memory of 4824 1728 10122024_0709_PURCHASE..REQUIRED..DETAILS..000124.exe 107 PID 1728 wrote to memory of 4824 1728 10122024_0709_PURCHASE..REQUIRED..DETAILS..000124.exe 107 PID 1728 wrote to memory of 4824 1728 10122024_0709_PURCHASE..REQUIRED..DETAILS..000124.exe 107 PID 1728 wrote to memory of 4824 1728 10122024_0709_PURCHASE..REQUIRED..DETAILS..000124.exe 107 PID 3928 wrote to memory of 3096 3928 SearchIndexer.exe 135 PID 3928 wrote to memory of 3096 3928 SearchIndexer.exe 135 PID 3928 wrote to memory of 3504 3928 SearchIndexer.exe 136 PID 3928 wrote to memory of 3504 3928 SearchIndexer.exe 136 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ymafvvdS.pif -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ymafvvdS.pif
Processes
-
C:\Users\Admin\AppData\Local\Temp\10122024_0709_PURCHASE..REQUIRED..DETAILS..000124.exe"C:\Users\Admin\AppData\Local\Temp\10122024_0709_PURCHASE..REQUIRED..DETAILS..000124.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\ymafvvdS.cmd" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\esentutl.exeC:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o3⤵PID:4632
-
-
C:\Windows\SysWOW64\esentutl.exeC:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1120
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows "3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3748
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1688
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 103⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Public\xpha.pifC:\\Users\\Public\\xpha.pif 127.0.0.1 -n 104⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4784
-
-
-
C:\Windows \SysWOW64\per.exe"C:\\Windows \\SysWOW64\\per.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SYSTEM32\esentutl.exeesentutl /y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe /d C:\\Users\\Public\\pha.pif /o4⤵PID:3704
-
-
C:\Users\Public\pha.pifC:\\Users\\Public\\pha.pif -WindowStyle hidden -Command Add-MpPreference -ExclusionPath 'C:\Users'4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c del "C:\Users\Public\xpha.pif"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4740
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \SysWOW643⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4696
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4700
-
-
-
C:\Windows\SysWOW64\esentutl.exeC:\\Windows\\System32\\esentutl.exe /y C:\Users\Admin\AppData\Local\Temp\10122024_0709_PURCHASE..REQUIRED..DETAILS..000124.exe /d C:\\Users\\Public\\Libraries\\Sdvvfamy.PIF /o2⤵PID:2024
-
-
C:\Users\Public\Libraries\ymafvvdS.pifC:\Users\Public\Libraries\ymafvvdS.pif2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4824
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:640
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:5044
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4624
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2624
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3640
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:2820
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1540
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:3476
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:1860
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:2100
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:4680
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:1968
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:2660
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:5072
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:4088
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:2004
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4152
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:764
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2140
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:2320
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
PID:3096
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 8962⤵
- Modifies data under HKEY_USERS
PID:3504
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5c098098ee909f51d43e6248d7e9be5f0
SHA1d8faab8b5fe4c10f686445686abba5457967261a
SHA256f282acb06bbc74ac574527ea6784a0602193855ba233937fca04ef5b88bcd561
SHA512fb1d8a5fd5e8c21bbbab01953b5c219a785ea7f6a4b7eb0c6976309fb8cccfa08cb8f8de9ffa1a86cd60a2554b3d705c16b24f4d72e90e680f46b860e50efc56
-
Filesize
1.3MB
MD527bdb4cb2c7bd1bfe57695a06c5151fa
SHA12c5618537826746dcba31d472bcf2c92d30e508b
SHA256f8a474f996cd4b1f1de011e5d3b2ce6163489e8203514f00aea7077cd71200ef
SHA512c930949fe31e90fa682fa5c6edd6fbf0309e00ad9b5c20132914cf53cab509b7d019f4f42f868b08357915873bc8eafbfd6b48c3c8737aae02f3c4b2e88981a1
-
Filesize
1.6MB
MD5727986964e7aa3f2878796ce5df678f5
SHA1da978eb3d26946f76e3f24c1b77f13e87e3315ac
SHA25633f6663513fe5875d16d7bc190185e1af0a50ad6ea97d674e31c0a3215a7dd7f
SHA5120a8c4b59d529b3590d79d558dfb3c7a43185b262b69bcbac510f173478c1288608174b35648034588c59c1734ee5ffb553111b9f4a56a9f5418d1bd014662687
-
Filesize
1.5MB
MD59e584c205ccf3bb5ed9c1137f82e6d4f
SHA18d14f591294b456fec5a9e1105ffdeff3ebb3485
SHA25664413f3bda2d1b5b6be84a0e2cd65dc15c3d5a01613284717258db717d029074
SHA51241767311d1b075df7d50ee47917585ae2a3282998d249549ff5b78abcfcaeb272bc831915dceb27179559c60bb4315662c40ae0963ea9f1b6ac5ea9e542d810c
-
Filesize
1.2MB
MD5b2df5ca8697978b70d5fd0dc06916869
SHA163f8eae06370e76d8ebdf3bb72d6245227165828
SHA256898df57788286a1a2faf45e177127935b5c2ed7a1f748e229629e087eaea3185
SHA512fcbb18542d1e99893ee0be61ab18f20a16e5401cfdf66ad4111a2c3a91a1ca8d468bfb5c1c149f4c9c236f14e959a0c7a18b44a4e5f31c8be32cc18468c4709a
-
Filesize
1.1MB
MD53a32f7497c8948caa6789be59cd14989
SHA1fbdfb95ccaf239db53057ba5e44172a61681e809
SHA256fb0946aa89c188b70ea844debb3f7fdeed97fb707f5f681c3c8ff0114596d5b9
SHA512a5524c1d3e9beda11052c497b00889e3c3d2a9f67dfc475c4373a68e9163e0c630147511815ed48d44f50b1f310f3c8ff83ac48d4dd14bb05cc815344b37c944
-
Filesize
1.3MB
MD5832294943e0199030a6a34960a2de991
SHA15a2870d8adb3a1816d84b0650887df72c72d0596
SHA256325a8d65b1ac72b23c9b8fc429d57b094ce09e7a9b3b049cd87a900fc8e56e04
SHA512cf64b46a2866decfb20688f0c9d64975847ede57f84cac1c18b54cbc37737fe1734eab234ea8903c07bb08d54109ac38b30c8872b2f32be91a74227ddb54bf23
-
Filesize
4.6MB
MD57a0004957a3bc71086fa6d508d602bbc
SHA1d51b99eae6a05f526df6240310bb12a26ae3b08d
SHA256caf485ecf7df91ced0b491ac03369d26484282a285d71629c0371c7a36e5606b
SHA5125f9deac4892499d7e6c2fdab8110295cdc8adafcb2ea0efd7821cdb66f8b6299cacad8df5dc69d86828677080b687f9f4f42cb9bef9f083fd11d01af8107b836
-
Filesize
1.4MB
MD5638906f574f5e904de77677446187cc1
SHA1844200b261e8fb6a9a25e9cb7c59a9e2c1ef4b27
SHA2563d5383a31946a68bd0fa5a76e008ce82003218e9527d3fa2127f203175b68ed7
SHA51255f5efc9370f6b9c8054e0a99c1afff0a02e6ed4cead841742529a520a4d9e2729661a8ed0c36b26ceb4d3c08b89249811073be6ef488bd087238d7216330547
-
Filesize
24.0MB
MD5b58c4f9e6da15cccf8312ba99f1120ff
SHA1d0938ef9d5ebc844888f6a18e8e5388497c9ae47
SHA2565d0f8939fb11535302cb0cee0115760f6753e587bc06d110188a2a02beb1881c
SHA512cb2feaf6e4eba4d7ddc29ff3387acbe8a5a801f7210fb0f3ffd61cbafa8dedc39abd13b7c28e3e5bb9a138e14e193db93da9c8abe6d5d60039f3eac8c2255397
-
Filesize
2.7MB
MD565677d58ea774121427970557f2df160
SHA1b186620ae300aeb23f47bba7e954077a7b3c732f
SHA2569cddbd406d934d996505d96ac22c44cbbba93d1e0141ad688df7c4a4d544dc63
SHA5125119e75f3b5ebec8e07e8b26e36208a6da98ed5b492c6399c0c934e1d798f74b99980289ec2a86f863fbfa7f874a938258240595de5e3d838d20872236486e1e
-
Filesize
1.1MB
MD585194a6f75e8905ac323afbba79905b9
SHA186805175787c77124c9a04c42eed12b52ba8a8ea
SHA256efadb2d061b5ac28980c32acdd7bb24d0eb5c86d7b28a48cb518c22fa3316968
SHA512eb81899c9838c65eb04513473b9a7bd36290b44b98f2d1d833bde291bae2ca8cd48220d0470dba40a6cfa679765e057f8e705e2fc9c42e44f212568503645101
-
Filesize
1.3MB
MD552ca271ddb2f6a3cb5fb0b0e1e72fffa
SHA15395ca59fc7127f6017182ab812855baf4cde20f
SHA25644f7865a3e8ebe8d8505384749830070757f1da26e82473caf089476ace9ad6b
SHA512b95ce0d41e8ba44780f0f109b8b8c7219c5d69d7a85d0e2f8b606e28a9f67451bcc0aefaede231d6da9449c95c9ef1cb1a8835f162a2f55f25730969fc4f5e69
-
Filesize
1.2MB
MD53230a30077dc420ca91ecfd2c1b01ff3
SHA1cdc7bb84cd9f7e0c561a7ba51ee6ae640303b799
SHA256b17ce7d9b4e478b4c41ec9b4f491ed8999abb6f9071516dacad181d5622cf93b
SHA5124c1202c6282e8ff7b99ec81cbf3730c4068182af8cb604cecff0578dd6da3116f74925a70e070a3d6e9e28e4c0027ce211231aa34ceb258d6f2ff1291ec8d8eb
-
Filesize
2.1MB
MD51a93672e896453bd98c066d84f771a77
SHA1da49bb3730e9a3529ed8d3af8719558608715525
SHA2562c484696ef21416d706ffa4fbd819db79cc743f1e99ab44d30c66c24e5d2ce93
SHA5123eeb0e2da1a7fbd6d4a62b5a6648aca20186aa2de321923c994a6457abdb88012d31d79a681a408ffe26030be0786b9ec8bc65d9fff8e295c15e445586140bde
-
Filesize
1.5MB
MD57086f82b2f24ade37c6fefbca68d1eca
SHA1a2cccdcbb897e65fa1294a2baae69c624f3b630d
SHA2562fbf9f77b2e79d5426943066a397c3f0321ea8f5139906477cff2b866e08d48f
SHA512d7a6dece1dafdea5fa4f87141065b77f530e0b978b82ff1bb80f67fc31714049c702de9cd5c89862cce0a6fc83ba6756bfe69b9aeb39d801815d55ef3b23b2aa
-
Filesize
1.2MB
MD54d9dc97c8ee0e19005b03a4710f1212a
SHA1e107f05d1d340f26d679784fbb747c95799dd83b
SHA2561dcacd8942ca90f4060a20e28cf1ca82c120b97538152111fb077f140e0c9f02
SHA5125191c03b853894b7d4b7735787194b2b4050654d2e3f6050a36aae39777b4b2268d768a98806d58b9e124bd0f517aab9779f7788b51f52e3a2e88848a7fe4f4a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
4B
MD5c81f6f6f3e662f4bf9d4b1f531a70d7a
SHA19f0c4059367ad298da7867d8922788a4b6f3d872
SHA256be61e2e47725cf2607137a255cb19a3f2650dace78e3a91a72e9aad1fb1cf84e
SHA512f8663aa6b3777543787e4f8d61e322dbbd13a65195549a7ad33e07bb29d6f9139dcd9d5f0e4f4e7b109690383ab0c3703b0a541dd15ee86f7debc8021c2c7161
-
Filesize
1.6MB
MD560e35bcbec840dbc57f6e96f07092037
SHA1fb4badfca8ba6ede36d462a33455ead2536c5ea5
SHA256d3150adc33a74030de51ca0e850b5fb4465be2a5bcfb023dd4cdd4196b258a49
SHA512c685b9a169f6f034f40999bb11446522e05622fb50b86dc11a6992945c8ec31b9edc20345897b247bb08118919f46b43f49c7518ba0115a7d8da52c84a2229ac
-
Filesize
1.2MB
MD566a85b087ff82e8bf665a8055689e514
SHA1c2b60e409d26e3aee3f5e48b6ce73865fd434ad4
SHA25618b2a588242fa4c92af05cf27f5f22c8e83b42db17c40ab4307012c685b98755
SHA512bdd11ff5a14e5ceca242d4d423c48204c73343fbe9368de5a4be112c588462c7ede0dff4d70280e4a972694753bce6989dd13968fb67b1908bd6baf7fa393fb0
-
Filesize
60KB
MD5b87f096cbc25570329e2bb59fee57580
SHA1d281d1bf37b4fb46f90973afc65eece3908532b2
SHA256d08ccc9b1e3acc205fe754bad8416964e9711815e9ceed5e6af73d8e9035ec9e
SHA51272901adde38f50cf6d74743c0a546c0fea8b1cd4a18449048a0758a7593a176fc33aad1ebfd955775eefc2b30532bcc18e4f2964b3731b668dd87d94405951f7
-
Filesize
66KB
MD5c116d3604ceafe7057d77ff27552c215
SHA1452b14432fb5758b46f2897aeccd89f7c82a727d
SHA2567bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301
SHA5129202a00eeaf4c5be94de32fd41bfea40fc32d368955d49b7bad2b5c23c4ebc92dccb37d99f5a14e53ad674b63f1baa6efb1feb27225c86693ead3262a26d66c6
-
Filesize
104B
MD5473fe350f4c9b65074adc7cb07e5a1ff
SHA1d22e7cfb3c8cf2175c982c71a0c7d5d612721654
SHA256981b2926037cbcff2905cfe7b3dbaa45e5b59d60e4c806d2d5b416f44648623f
SHA51272c13e65476b2b9ca9364ea059ec6c1d963153326bb5a2dbe60eb4199b8e1a800b294314dde0f7e2d3a842b2f079535601464546acf4780c6cccbacd99b0e82b
-
Filesize
231KB
MD5d0fce3afa6aa1d58ce9fa336cc2b675b
SHA14048488de6ba4bfef9edf103755519f1f762668f
SHA2564d89fc34d5f0f9babd022271c585a9477bf41e834e46b991deaa0530fdb25e22
SHA51280e127ef81752cd50f9ea2d662dc4d3bf8db8d29680e75fa5fc406ca22cafa5c4d89ef2eac65b486413d3cdd57a2c12a1cb75f65d1e312a717d262265736d1c2
-
Filesize
442KB
MD504029e121a0cfa5991749937dd22a1d9
SHA1f43d9bb316e30ae1a3494ac5b0624f6bea1bf054
SHA2569f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f
SHA5126a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b
-
Filesize
18KB
MD5b3624dd758ccecf93a1226cef252ca12
SHA1fcf4dad8c4ad101504b1bf47cbbddbac36b558a7
SHA2564aaa74f294c15aeb37ada8185d0dead58bd87276a01a814abc0c4b40545bf2ef
SHA512c613d18511b00fa25fc7b1bdde10d96debb42a99b5aaab9e9826538d0e229085bb371f0197f6b1086c4f9c605f01e71287ffc5442f701a95d67c232a5f031838
-
Filesize
115KB
MD5fc9b64a2b1006891bf39ebf395b4eba8
SHA10e98ba291d77ff8a57b5ebe198ff0c2e6c2bea00
SHA2561093d0809ed5223c8ea2d723032c0ee2bfd1d971ad6ac69904983ec545000b3d
SHA5129d5a9716b71b436dd465cdf8ed8471747828420cec7c5dad3406072e53f8de6e31253968e55ef49dc19a8245993b00164f193a3752cc16fce3887c4737db906d
-
Filesize
94KB
MD5869640d0a3f838694ab4dfea9e2f544d
SHA1bdc42b280446ba53624ff23f314aadb861566832
SHA2560db4d3ffdb96d13cf3b427af8be66d985728c55ae254e4b67d287797e4c0b323
SHA5126e775cfb350415434b18427d5ff79b930ed3b0b3fc3466bc195a796c95661d4696f2d662dd0e020c3a6c3419c2734468b1d7546712ecec868d2bbfd2bc2468a7
-
Filesize
1.1MB
MD5fa7a9ca0089e6a9a2f07c12bfcc77fa4
SHA1ca0893bc561931f88176b0040c4b1c18eb1f99d7
SHA256eb369fa08647b02973d7124e5b708d92824a69a5786d3b702697cab93681d3a7
SHA5127f38f1906b48ac3047e1b5ab69d2f2f2b934abbda919324f0b36dce90bba8ee17ef11b86cc41874f3eea9fbdb4088fe04a615dd66d7a78640262dca6cc6e9df2
-
Filesize
1.7MB
MD503e318abd4a8f0b65d7529838fbc1eea
SHA163e4caad7352868cea933bc3d992074c89e53b1d
SHA256d9b26c82dc930b884dff78207d67a2ac9ec214430f45fbf81d0aff19ce4fa88f
SHA512a883de62bb6bf0d1f58fb9bfcf5247cd1ecca2594f7e392499a45cea4ef4b34b512d59ccbdaa259ec31dadaf0d0f5a7608b498cc0995fdfc998f64a3c7bc5aa8
-
Filesize
1.2MB
MD526a30d9c48e4fac75ad9554804132332
SHA18eb770ef229d25c49beef01b3d197eadddfce54c
SHA2567085983382a5608c608bbea4e18019a87a5ef8200bd605be2508af8ac4aae2a9
SHA5120d11c2e023b241e253e53fec40751ccfd123916d6b0933bdc706b98d9bdc60388a425125931ecf36bf23231b1b32a8cf9f2448ce0720a5621439d7342835aadd
-
Filesize
1.2MB
MD582cc1e4c63156d6d448f442ae215e065
SHA110165424c8d745c4f9e6b2d42daf22cc14762526
SHA25628d554fc83f0d46e92b3dae327a194d59ddb8a334aafa3b2236bac9498e6e8af
SHA51290c089f6852a4d0f19f3f61f46a710e78998b6fe8b73da4c999028a0f475e4744bac4a8e55fa97582ecec82f7b6218c19fcf1c5b9377c9726638728ffea92bdd
-
Filesize
1.1MB
MD5350e149e7f90c8c5707dde7096076527
SHA18f9536572193682a60632c0c80964d9f226f5eb2
SHA25647f78ded004d0c1ba1c72749791711ba4aeed7d5664fb889052126c29ebc828e
SHA5127555f37624227ebb95a95f45dbd0a0740bedf3834ff2f6c11c667e6f28cb9f9a1f22ba643828cbd329e83bcee3a46216419bba4ef5436d4964f7e9debb1018d0
-
Filesize
1.4MB
MD50d293b1ef1ffe7247244587fa862ff15
SHA17260821d62e9942850aad8cc2454d5746ae99e92
SHA2568faab70276e469bff2a2bfdb7d9629d4b81c71e8effd67811118e7632b642d6c
SHA512f1194da0a3780d3379a1559f07e601d952409a79aadef194fe51920be7c36980a74110a7448e14f4af5f1cb071fa81aca0c3c955ac388a6677fe0a4a407ad86b
-
Filesize
1.2MB
MD5b061bb64b2326a57c7b61446b8986b72
SHA1d1e9e89c4f35b98416090bcf13f7dd7a6eed6138
SHA25631b36f0312975c7b357d829d2ca0ae434aed73661e90a073e9644f19eebab392
SHA5126ed9e68c51d7cd3f22f975a3721b65e35696b5c5446bc80358190be6af9bcea573821868bc779be1506084fb4468c0304f4e85994a30006e0096335d776aa31a
-
Filesize
1.4MB
MD58189e55cfdb326e992e8239b6dae11d4
SHA1d39b23d553ac3b958c6c24318ceac2e42c3a0181
SHA2564eb127bf8b65a46c05f9bb5a414b12d466afdc107a208f388598d493232c0b01
SHA5127cfdb9320d1f9d39f9c7a79c4a5a6089c2b9599d2dadf0811d5431b716645f856748f44a671d75853c1736f657505b855f0ef6351c8cb8d1e0cf20f90127b9ae
-
Filesize
1.8MB
MD5728f4e68ef5f4d36d5f750ac9a467526
SHA175e210a74c6f4dfeb412eb03d51f4e68b2c95f37
SHA256215d6c793b4c23a769ba5792a68d7eb0da42f1a64aa11065b3c25c5a66ad451d
SHA512022236dba5479f3d3333de4be3337f004c9c1edf00ab78ff8a47ecf2e7ee5d0c695ccb444e47841043e050b912c9d28157f72da0118ec18cc3f948a88d4249ad
-
Filesize
1.4MB
MD5ffdd455007bd4cddfd2bf420f1dbb119
SHA131b27c29ece6bcdd76d9613856c28bf1484997de
SHA25676847da85e9301a37adb13a78dcc3010d06747e31a92268191e98a02d9734caa
SHA512a215b5a3027729e71ac9a4183b75a8822eb5c11a94cec6c10763610a0aa29c5d9428f41ce73abb162ec74671cb89e82d608d3207407b4b26aa6760abd3f825c0
-
Filesize
1.4MB
MD55f4d3658edd7ede191837399bc875949
SHA1580eaf6aba6a25af8c2ce2ccdcca127f2348e7ef
SHA25699e3e9aa533e6b14ffda86d0879e273b55d9ff19f788ea97b1b1fa48162bb844
SHA5123bdbfb579c0d8d556d3ab8c8fd3319661f47eb0bfa4358042d265f38a09c620f9638e414b4fc256512a14c9178db52bac9dabb5b046d2986ce62581e64ff9056
-
Filesize
2.0MB
MD5bccc9472e74240e9bdc99d60ca03f6aa
SHA178718c46098c80bc290f5f897a8a3fdf74fb5b12
SHA2568979209632202280d0d493eeda69de65941255207c38a8a2e0052a26a26b16c7
SHA512792f7046de04839142255e4ded610e1cc20f5aec22f1e111405449c0bbd049fc20c6c3e0fd3850e9622e72271d253f846ec01c8ea4471bfc56c903eee47caa0e
-
Filesize
1.2MB
MD5c83e701685042f1fa477278c6244661c
SHA1a42751e4aade29dff8ccd6aedce249c998799d82
SHA25631decd72d3ad91579954b1143c4af8aab8399505789df5522197255fc259d183
SHA51279f7ece42877663eb26149b5916988d07fd4d47cbb70030a0e90c2b86e11db9fa220f056975ec1674602efb6fe9780e08a77f36f91369cef02d8e67f25c8be06
-
Filesize
1.2MB
MD531c9e801415b559852f29d076c51b698
SHA18a93d981049144cdeeaaa72225c2e76346e368f1
SHA2568c4f47eaba265f3ecd3adcb3b0090adac7ae027e36a35b2d5f7b493a285ddac8
SHA512251aeaa5c388db578d19dd0d5b1df9e75765afed302184ca8fcc1d9b017d5606eaefc390c5b34f6fb8bde132b98d37fc55063ac2dfb29dc04298a43dbbc03737
-
Filesize
1.1MB
MD50910c56caffb52fc98abbb0a77c6931d
SHA10fee9e9e0733b2c2c7dccdd5d7ddda3ff0c99e78
SHA256a6b901c21ac6c1da2156e5399cf572973aa8399b442bf1fae3b45d0aafad1c5f
SHA5123a73fab322c76a0497e286f23532be1bd4efaea65c7d4f3626b665a92f16c1ce4bbb759586c659522e2ae76ff87c0a3a12280699c5d90284bd2d964dac8180d7
-
Filesize
1.3MB
MD5c90b941d6670d3c943aaa844bcce9116
SHA1a9f57c40138d1a9b4353596298a7a0f47bd70970
SHA25689236f1178c54db76d2362729567efbbe70122ddd6e967633226d171ef977322
SHA51243e3f386dd2f1d3f60c0f08ce64beb0376ee15e81ff64612a9915612c5b1fed80ac08bbe88912ea7fda0df1e4493e5d4c734a4c22c5256461653956ef2dbdeac
-
Filesize
1.3MB
MD56da29b0f12cc46efedfad5fc91c11b72
SHA119cee6f0116f7e372a966c415c2a7b36bad20fbe
SHA256b09788bb2258a909f5f836d1ce91627ebe100e9afd74e577cc71862657314bf1
SHA5122cd39943fa6d5e63ef7de25b570ee7c9d0cb3289ce233fc2073316ac4ccf0a7b6e803ad97839bf5f28e5b52a825b504d10b36ebeda4e5a3d43f106e23f8ac206
-
Filesize
2.1MB
MD504328441625edda2f8de07f55e11a56f
SHA18692d66950a5aeb5a221213659148776ece34f31
SHA256551eb1272d4253088a573f4b8ae3a6a0a21c229e7c0b60b8d816cf34eb52e29a
SHA512b02b9c43961f13abb71a5b82f54b8196047d144bc43b89660d0341bf781001deccbccf949af0657487771a0502c3f85132e4bbe643cfae60937b843dba82831d
-
Filesize
1.3MB
MD5a1d16395124c8b19989c890ec321c8a3
SHA17da99a37fe1d984302884c94f57d3a4962b786d8
SHA256edaf0f60bb7a5307b264085e6aa2917d0435abb57eb1f91a0c3640e40c198380
SHA512f9de773d389563480fd818159c1ae5e9e5cf110b25b1aad478c51d9ab15543b60d42122281282cdb790f3b534711698784486845e4f99f680b5934f82206f8bc
-
Filesize
1.4MB
MD52db5d436681937f46de0326500771e96
SHA19e9d06eed2131bb084d394155aab5c598673e18c
SHA2561bddc1abcf34cfe21836928be1e6e28feeb8edc5e7d7bb2f3256aaa9e1225ea2
SHA512c189426cfbe7a14ae50ea7943046811120e442a405fecd56ee8028cdd2f86c9fa34065266d6b2d0092933b1d2efa9d725817e1a17f155e8754c762e3e1613bcd
-
Filesize
1.1MB
MD5a656163d46098e4b8ea792a84aad7d0b
SHA1ff527a2f50cd6ed2e4c0aa1fff1f48d121a9c067
SHA256fb299d4423dc1772a1e0e42714bed3e2b28c43b35ea240b541244979588ce53d
SHA5121ad603c738d9f0df2e311fe0620acc289895f43fce38ef1acf3da195c815dbb25ba6701b032699f03e17acdce3d0828b0c70801e3989477c5055a8e6f6d85fe4