Overview
overview
10Static
static
100400b38bff...69.exe
windows7-x64
70400b38bff...69.exe
windows10-2004-x64
708577362fd...77.exe
windows7-x64
708577362fd...77.exe
windows10-2004-x64
70b0f1d67f6...b0.exe
windows7-x64
70b0f1d67f6...b0.exe
windows10-2004-x64
712fc2e604c...40.exe
windows7-x64
712fc2e604c...40.exe
windows10-2004-x64
71df5732dfa...d3.exe
windows7-x64
71df5732dfa...d3.exe
windows10-2004-x64
721babdc975...43.exe
windows7-x64
1021babdc975...43.exe
windows10-2004-x64
102b802f4d27...ab.exe
windows7-x64
72b802f4d27...ab.exe
windows10-2004-x64
738d5cf2bdc...08.exe
windows7-x64
738d5cf2bdc...08.exe
windows10-2004-x64
73c59836d51...eb.exe
windows7-x64
73c59836d51...eb.exe
windows10-2004-x64
7498ef9748d...7a.exe
windows7-x64
7498ef9748d...7a.exe
windows10-2004-x64
7666cdaf066...f8.exe
windows7-x64
7666cdaf066...f8.exe
windows10-2004-x64
76a426d2bbc...1a.exe
windows7-x64
76a426d2bbc...1a.exe
windows10-2004-x64
772606a3ad1...98.exe
windows7-x64
772606a3ad1...98.exe
windows10-2004-x64
772afc3f26c...60.exe
windows7-x64
1072afc3f26c...60.exe
windows10-2004-x64
10743f0e2d18...a9.exe
windows7-x64
7743f0e2d18...a9.exe
windows10-2004-x64
77ac9ad7a4a...90.exe
windows7-x64
77ac9ad7a4a...90.exe
windows10-2004-x64
7Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23/12/2024, 20:55
Behavioral task
behavioral1
Sample
0400b38bff44e2b0ba89f392af3ec1febbe980255086e3d21ca375f8742b0a69.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0400b38bff44e2b0ba89f392af3ec1febbe980255086e3d21ca375f8742b0a69.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
08577362fde99723e8821dda6871a3ea10d41ff7e7840b89458ca6813db84477.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
08577362fde99723e8821dda6871a3ea10d41ff7e7840b89458ca6813db84477.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
0b0f1d67f69a4c98db74330aced27c3de03745796ab86fc1edfc79cc6d6d79b0.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
0b0f1d67f69a4c98db74330aced27c3de03745796ab86fc1edfc79cc6d6d79b0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
12fc2e604cb1785f16d728b8e74ef1a2405891bd94202aaa0c87d87638edd840.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
12fc2e604cb1785f16d728b8e74ef1a2405891bd94202aaa0c87d87638edd840.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
1df5732dfafe442990fe6cd028f96212d27e68c2922f9acfd74e8dd9f75e93d3.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
1df5732dfafe442990fe6cd028f96212d27e68c2922f9acfd74e8dd9f75e93d3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
21babdc97540ee61d23b9f1b431716e3987dfe8b35fe21e38b4dace528f49e43.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
21babdc97540ee61d23b9f1b431716e3987dfe8b35fe21e38b4dace528f49e43.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
2b802f4d27860689db050439e05e067bc7e87dca596fa28765f4e3aceea2b4ab.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
2b802f4d27860689db050439e05e067bc7e87dca596fa28765f4e3aceea2b4ab.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
3c59836d51379ebb763312245230900e181afa69064f6c8c999f1bf0d7672feb.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
3c59836d51379ebb763312245230900e181afa69064f6c8c999f1bf0d7672feb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
498ef9748dc6e96db88710804addbe0025e6a816e6edfa6f084a7fc0e92c737a.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
498ef9748dc6e96db88710804addbe0025e6a816e6edfa6f084a7fc0e92c737a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
666cdaf066bdff233bc4dc1673a8580d8dfc2d1ba893d8bb78f6b8cd511f33f8.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
666cdaf066bdff233bc4dc1673a8580d8dfc2d1ba893d8bb78f6b8cd511f33f8.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
6a426d2bbc5b6c93082546d8098bbee627b97595ddefd07f06f7c94da0e14a1a.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
6a426d2bbc5b6c93082546d8098bbee627b97595ddefd07f06f7c94da0e14a1a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
72606a3ad198f24ee496d3f483c193121f4d9b895ac6880dda8e6406e8d16698.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
72606a3ad198f24ee496d3f483c193121f4d9b895ac6880dda8e6406e8d16698.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
72afc3f26cacbc0b9a5dca8a10186451bb91c77fa445ab15639e96623dd64e60.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
72afc3f26cacbc0b9a5dca8a10186451bb91c77fa445ab15639e96623dd64e60.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
743f0e2d18f4945d7e58bc594c448fd1540e31ffcf07fbb85b90e15d5593a8a9.exe
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
743f0e2d18f4945d7e58bc594c448fd1540e31ffcf07fbb85b90e15d5593a8a9.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
7ac9ad7a4af22b95852904323573d0774aa8b5d66f3a8b76ce9614e4fd965e90.exe
Resource
win7-20241010-en
General
-
Target
38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe
-
Size
1.6MB
-
MD5
868bfdf4196d2b563cda87412e5f1c7a
-
SHA1
73068ee0a0ca192c1d3a7b48fddd5418a2879c98
-
SHA256
38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508
-
SHA512
0371555c5df19464b8c182165831efa60cbd8300cffd612bda7fa905e1d2331fa59bb59acd878ce977ec44ae032134ee9c24a9b29c5cf95d3b27a583d2af01a0
-
SSDEEP
24576:Wxozmm5K5/TwSfVcYG3K/cJHlnFR+IGNe8j3Iz:a5LNiXicJFFRGNzj3
Malware Config
Signatures
-
Executes dropped EXE 22 IoCs
pid Process 4472 alg.exe 3436 DiagnosticsHub.StandardCollector.Service.exe 2968 fxssvc.exe 3324 elevation_service.exe 2712 elevation_service.exe 4436 maintenanceservice.exe 2796 msdtc.exe 5012 OSE.EXE 3444 PerceptionSimulationService.exe 2776 perfhost.exe 4408 locator.exe 4544 SensorDataService.exe 3208 snmptrap.exe 748 spectrum.exe 2184 ssh-agent.exe 4692 TieringEngineService.exe 4412 AgentService.exe 4420 vds.exe 3536 vssvc.exe 3432 wbengine.exe 3660 WmiApSrv.exe 1032 SearchIndexer.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 84 iplogger.org 85 iplogger.org -
Drops file in System32 directory 31 IoCs
description ioc Process File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Windows\System32\SensorDataService.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Windows\System32\vds.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Windows\system32\AppVClient.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\wbengine.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Windows\system32\fxssvc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\msiexec.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\SysWow64\perfhost.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Windows\system32\dllhost.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Windows\system32\locator.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Windows\System32\SensorDataService.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\AppVClient.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Windows\system32\SgrmBroker.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Windows\system32\TieringEngineService.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Windows\system32\AgentService.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\msiexec.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Windows\System32\snmptrap.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Windows\system32\spectrum.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Windows\system32\AgentService.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Windows\system32\dllhost.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\SgrmBroker.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\System32\msdtc.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Windows\system32\fxssvc.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\dd3ca6e0cad6a2b9.bin DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\vssvc.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Windows\system32\SearchIndexer.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Windows\System32\alg.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\keytool.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaw.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdate.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\dotnet\dotnet.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\tnameserv.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\7-Zip\7z.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\123.0.6312.123\chrome_installer.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\klist.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Program Files\7-Zip\7z.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe DiagnosticsHub.StandardCollector.Service.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language perfhost.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9907 = "MIDI Sequence" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-124 = "Microsoft Word Macro-Enabled Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithList SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{C120DE80-FDE4-49F5-A713-E902EF062B8A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000d32c050a7d55db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-103 = "Microsoft Excel Macro-Enabled Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-142 = "Microsoft OneNote Table Of Contents" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-912 = "HTML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-127 = "OpenDocument Text" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-194 = "Microsoft Excel Add-In" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9902 = "Movie Clip" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WTV\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9925 = "MP3 Format Sound" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-120 = "Microsoft Word 97 - 2003 Document" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000008d524a0a7d55db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-140 = "Microsoft OneNote Section" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-178 = "OpenDocument Presentation" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-182 = "Microsoft PowerPoint Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\acppage.dll,-6002 = "Windows Batch File" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-172 = "Microsoft PowerPoint 97-2003 Slide Show" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-914 = "SVG Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000009ce1b8097d55db01 SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{1E589E9D-8A8D-46D9-A2F9-E6D4F8161EE9} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000078a21a0a7d55db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-24585 = "Cascading Style Sheet Document" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000000e164f0a7d55db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-101 = "Microsoft Excel Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\msxml3r.dll,-1 = "XML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E37A73F8-FB01-43DC-914E-AAEE76095AB9} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000048c2bc0a7d55db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-180 = "Microsoft PowerPoint 97-2003 Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{80009818-F38F-4AF1-87B5-EADAB9433E58} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000c306fe097d55db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\msxml3r.dll,-2 = "XSL Stylesheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9932 = "MP4 Video" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{3DBEE9A1-C471-4B95-BBCA-F39310064458} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000007708c0097d55db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9939 = "ADTS Audio" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\mshta.exe,-6412 = "HTML Application" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-174 = "Microsoft PowerPoint Presentation" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5383EF74-273B-4278-AB0C-CDAA9FD5369E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000000a86e00a7d55db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\windows.storage.dll,-10152 = "File folder" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{AEB16279-B750-48F1-8586-97956060175A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000062d6b00a7d55db01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@windows.storage.dll,-21825 = "3D Objects" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.DVR-MS SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WTV SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-114 = "OpenDocument Spreadsheet" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-12385 = "Favorites Bar" SearchProtocolHost.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe 3436 DiagnosticsHub.StandardCollector.Service.exe 3436 DiagnosticsHub.StandardCollector.Service.exe 3436 DiagnosticsHub.StandardCollector.Service.exe 3436 DiagnosticsHub.StandardCollector.Service.exe 3436 DiagnosticsHub.StandardCollector.Service.exe 3436 DiagnosticsHub.StandardCollector.Service.exe 3436 DiagnosticsHub.StandardCollector.Service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe Token: SeAuditPrivilege 2968 fxssvc.exe Token: SeDebugPrivilege 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe Token: SeRestorePrivilege 4692 TieringEngineService.exe Token: SeManageVolumePrivilege 4692 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 4412 AgentService.exe Token: SeBackupPrivilege 3536 vssvc.exe Token: SeRestorePrivilege 3536 vssvc.exe Token: SeAuditPrivilege 3536 vssvc.exe Token: SeBackupPrivilege 3432 wbengine.exe Token: SeRestorePrivilege 3432 wbengine.exe Token: SeSecurityPrivilege 3432 wbengine.exe Token: 33 1032 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 1032 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1032 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1032 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1032 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1032 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1032 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1032 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1032 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1032 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1032 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1032 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1032 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1032 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1032 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1032 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1032 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1032 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1032 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1032 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1032 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1032 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1032 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1032 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1032 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1032 SearchIndexer.exe Token: SeDebugPrivilege 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe Token: SeDebugPrivilege 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe Token: SeDebugPrivilege 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe Token: SeDebugPrivilege 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe Token: SeDebugPrivilege 1612 38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe Token: SeDebugPrivilege 3436 DiagnosticsHub.StandardCollector.Service.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1032 wrote to memory of 3212 1032 SearchIndexer.exe 108 PID 1032 wrote to memory of 3212 1032 SearchIndexer.exe 108 PID 1032 wrote to memory of 2904 1032 SearchIndexer.exe 109 PID 1032 wrote to memory of 2904 1032 SearchIndexer.exe 109 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe"C:\Users\Admin\AppData\Local\Temp\38d5cf2bdcab25afb95cda0fd3abc7911469a4c4442966b941e930947099f508.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
PID:4472
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3436
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:2892
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3324
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2712
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:4436
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2796
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:5012
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:3444
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2776
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:4408
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4544
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:3208
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:748
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:2184
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:3216
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:4692
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:4420
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3536
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3432
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:3660
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
PID:3212
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 800 804 812 8192 808 7842⤵
- Modifies data under HKEY_USERS
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5d4e62578d3f7ee81d2730747f0542ba4
SHA1dd823ec8791d0f2e72fe3b963e1806a8a7a5a0d6
SHA256c51dd1cf50b11039a0ba57d6af75e9f2d0147e8dff2846cbdfa6f43d725f21cf
SHA5128ad97ad0dab33c3990c89ccb8e3fecb2b134d3096762e2c8755feff677d86fa0f8be6da316fbe68356c03d060d05bc236a3fd79e1ccf6d9e8ea101c7d7df07a7
-
Filesize
1.4MB
MD5c6877e4f9ed41fc6aff5c7e85bbc4517
SHA190761ff92b7bebba4d246e5fbdef68b827cdfaab
SHA2569987a3ba2a5d4d81ccc1374ffa07e0796d0d28a22ad73d4e194749d81350cd2b
SHA5129d040fca5b69c07be4d9fddd814d6764b33e2bd679c5d856d9e51acdd1cd3d856210290c2bdc7c0257ff2690451e98d8d96a46d076029cd6b6a4af74d3679021
-
Filesize
1.8MB
MD5748317060f0ccb43226c22c88d57ab49
SHA1b6ddce04175391eebeb45699949a30472702a575
SHA2561ee8eb47e6ca39c1cdf82577f99a26e7da0eab240fda23b74f9a57180aeeea6a
SHA5124e6c7a00ae07c3cd478c6dc368a766e36d1942528d0a945cacc239a30bf179053caf6e509617b20589c1c4342376707a7ff8ad6af8382da6af6fd70fa4838d14
-
Filesize
1.5MB
MD569a5113b9948d6c3f59105245c386a8b
SHA124f6786a9e15937c05fa0b58986cc91886284573
SHA25660a9f3535110147af587c9c7432c4269001d07ee511f8e294f9755ced070b86a
SHA51223007df3e6dd55054ba64b2ce979a7a027b40c45663905ff4b52f6006737ad88b41d0a583f1220b734f8f3d939719f53cd04ac9f4222402f2c9c2987ffd75f11
-
Filesize
1.2MB
MD5810ed62cbe094ff80177964bf16090cd
SHA1070b948f2924a9bcfdebd8ab01a4f677a4d76679
SHA256d09ca90e55a1296310740335139a3644d80706c66eef6cec259b50ad7dc769cd
SHA5123b7a2638a0a653cc838bcdd66b05e72757f151f050c3861e8bec21aa0b9d389f26df4434a7e3e7527d2f0560d7b14d397e1b4f3bd1be7ab85e074e27c17ab4bd
-
Filesize
1.2MB
MD5b78102fefd5625e6e5cabbb20f6c1296
SHA1191bd4b3d6b609df389848901690056466180470
SHA256c0fb0a49975f4a7a39828f6d5c2c8f71273e26f2240501032e2921478e69244a
SHA512303698f4748effe12c60ba0afe7bb649cdf324adcb49eaa6fb1f9efd920dcc3922d8326f82d0af0050cc1b6d5bc4697befa5f1aa962b2ac0732da2c56cd547fe
-
Filesize
1.5MB
MD5196493030e7f6104ef0b540324ebc503
SHA165dea963f6ce5380c4bfe81f6d3d440115e1819f
SHA256a0dae853f78cf569c63b065b2c5305d366362119e90c46b28827e51d971466de
SHA51225de83ffd801105ebed6bf54c113847d52d05882e2ec408136e0f61915ce0f63d7e86bbd23a9262e9a802d69ebb3f8313b1ffb8fd8512c729340aad94e01d986
-
Filesize
4.6MB
MD5c1015aa5f623dcee952fbbbdfd6114bd
SHA123a5f42a3f5539dfd297f4530c1d3303e2011ead
SHA2567b70aa2cea2dd0e9a4c26e006a54b793230108ddb912bd97fffcda3a33a76448
SHA512611879cbf18bd29abe7b2cbd7f2983c6dd0bb418523825c7e916b5fbffcb93dca38caad11ea7fcac4cd6867c3aead59b2c04d94a90f95ed8839290386d026488
-
Filesize
1.6MB
MD536a81af5a631d7ac678ced84ff1a318b
SHA1de661e3e12fa35fe8fada850a40293b0961873d0
SHA2565c9438e390dfa5414ece4a9021e19bba597aec02bbc8ec73f3c1b4141e855574
SHA512d1865108ab339f4c573167bfcd4098b293428e2babffead6ab985905797a9877bfca31b45cf60d6a3f64b9b9a8967fd7132adc2bfaf6f602e2ac6e9d49d5a543
-
Filesize
24.0MB
MD5ffbe4cbdc06384ab699410db560647aa
SHA1298b29ea46595b352e1f92004bc082c4bec2066f
SHA2569357bfff007b41bf0146b84f06ea26ffd4f44fc771140ae613484b33d1993677
SHA512f1cc1b7ca34050385a8639790254ea791e1c6b3e1f101db8eadc8ad50371ad6fec197e351a08b677f1f31616d3acff63862bc1b189f00fa258ee3c8564b56bc6
-
Filesize
2.7MB
MD53aa4e85681b9ffb3f1a6d91bfaac4565
SHA140cf31ff3b332f9b9735e89493706b2fee425a9f
SHA2564327dc354a4e2973c4c74a2f279736959e8bd69633d8607d9b7982055b3219a0
SHA512279ffcfd9353ef32cc3ad2a20c02f94a1bc7a79796851548c003d11a2930050eb69ffdcb9c53c721893af45d0b4570a85cb82e1390d5f914342ab7a327588984
-
Filesize
1.1MB
MD5b9717f54292eb8521ca94c7aecf07257
SHA1a66ece11be4af278e6ed0d5f8abf490c5324b250
SHA256bb0c3752365ceffd193aec34d30a439ee74ec9b1db6a958465f9779a2b5b63bb
SHA51298b311cd006deea6ff7a51457d8b9496eab8abe85d19a9a6ed102e9220c564b5088504db49e69a126da3b4c7617780445f17463cb5291c9eb1969214b26b357b
-
Filesize
1.5MB
MD574b355b36ab6b8f5c64a74fce8c87772
SHA1b1b4a31aaaf44378e366fbfeba89e91b51d33413
SHA256a434396ec1938bf88d52330327700915bbbff5df27e663fc89476544588bc2ac
SHA51223cefae235d77057e00baae1650baf86d85d5f81f187d6f41ab83bba4fc8acc24d22c288753683b13665e9a709570038121d8c2604be8796cad48d90868f45a9
-
Filesize
1.3MB
MD518763cb72e2a9eb864da5c18b49e501b
SHA1500726e1382048ff71e59b65e41d73c1260b28d8
SHA2561be0768bca2f962bc8f0dfdd758b9c608259120ce89cc11af6ad292cc3eac097
SHA512147879e658855dff492784a733feccc35cae7267761167b3a487e3a39fd88ab836cf18528872d830784e36b9dce44ac991a528541446be194de689a065b9d63f
-
Filesize
4.6MB
MD591d475626f82d261b69933474b807d4d
SHA1a70c39b68f6ca66e0d5cbfdacf1adcc48ba455ca
SHA2566a2e6536580c9e60f5e966659060c34a10838228e53721e6f503eb0bd88704c9
SHA51204a9633bd947ebaa50a29c1b0f3a227e418d9c9d16e1e5e2d3ca686336e6aa872985fd2ed01a572f03d102701f3099b7441e58fe16906f5b6389a883640bd624
-
Filesize
4.6MB
MD59d311a83df1226255d0f8cd8915a6754
SHA1bb56920ed0b1293d34afa98589ee833884724f92
SHA256ca8376413dfadca7f07d4655e8b7bce39fff0c6441bba4f4d942bada160deb90
SHA51212fc064ea28c536ab25a7892923eaab7bfa146b3569d60f3738e8a0ae59fa44c0e8f690babf6d222312544e7b49084873d8fdad6791a030b6f21a5e4b79499cb
-
Filesize
1.9MB
MD51666adb8c69975e037e03d63adee2cbf
SHA1aa19f961413698978b5d33e2d53fedc11b158c50
SHA256e0ff3ec53d08e2773fad9975ade881a25fd52fc61684ae3be56cb91371c2a521
SHA51238b16a60c6b08b203d2fcbf17977bbd092cccc87591c610b79027c9f099b226eb296f687fe078658dfec75b922fe83355fd8933beab47bbf8214c7b815d74fb7
-
Filesize
2.1MB
MD5215675567883b9d875d5fcaeb9f2a7ff
SHA19b7f90d7eda6d107f3f87707fda391bd72dacb54
SHA25645ac8f8d946978627ac5e6f0ff7a211f1a76f83b229f5e07d8237cfd055dc6b6
SHA512a642c8bbab0d3f398dad6e0a426bd56a1f82e50d61e29c66bdecae6bded0b6f5d0ef8ec8213f8975232155f0ad30fd02950855a7c0e4cc7d6fe2606943054d03
-
Filesize
1.8MB
MD586015832a835c8fd799cb09f5a5f7676
SHA1ad6abcf1e782e5f825d3ea2717d9b669d1db831b
SHA2564a0c6b9de343e8a84e531d5a3de3778c2ef82f075c9bbfa89156a0dd6b38ce7b
SHA5120e4e6deeabc181fc37cf9711acf0f55a8b1480d0fb7bdd5d99c7bca9985999303a7ed606e9ec4775037993784ab284bb26af4a7ec0845f2cc16d040b7be7ed5a
-
Filesize
1.6MB
MD54901f03b6b160fd70aaac9772460ef36
SHA190da52e5f47f7ea4ff4298ce6b0fce6a40836d06
SHA2565091315cecba2531fe0df889696849167f7393cba305c68a996c831545eb9c5a
SHA512b7bc20c8123b25f426bee340c8e6bb3b3e27b52ae2551093a180323f8fac1966928077adc0275946b6e958e862aeba85500df63ec3d8cb4e0b03c11d93774ba7
-
Filesize
1.2MB
MD56310702f94a97ab4407346f5ca0a84e6
SHA1a16c6e231b11b51ffb22033e258084e14a546a8f
SHA2565a6bbee19cfd025709ed18228e7222fe40c268891fdf4d6102fd7ddb6c29abe0
SHA51245d6cc79ad20e52493c6880f19a4af2584819fca51e9f7dfe24989c7349307812733adc4d3edb1bc43d1a97735c0a1529a19df8ffaeffa03304ca389adf1a009
-
Filesize
1.2MB
MD507ad5d16e4b22df304589ecff1369c4f
SHA193af9942646f3d3f258cd90e3258ac4af0c8f66f
SHA2563a4f129c49ec0f2aacb8d9fb291aab5f95743498b3dacc6ea0d78ded852c5e30
SHA512000d19824834273be06c1bd007239651d12424541addccc04b84876c37d1441094cbf4c67f4fb1478da0f96987b79a08e71465c3899d98734479e73a41e4cfba
-
Filesize
1.2MB
MD560a06e2d0a510e58e8aefedfaa0a31c2
SHA151a924eb21212eb41dda567dd71e7d07e7a048c4
SHA2561b8c3769afd7a39281c110d75d837718cd92f7e4ac9df75e82ad448111a6a558
SHA512550e16fa6f181604e27cc932fba02be3ee1a47bd84a58e268004939e1ccd823b47bd088bbe132bc5f64e5d1c4b8203b4a1035c327859182e3427063acd8d0518
-
Filesize
1.3MB
MD5a3409dfc317d1e63180d71ab631178c4
SHA16af91040bc7e906c067dfa306c2828af7d944611
SHA256966980ff0c46ef33e3e5bf0354a9397736354ea46896d6f7b4fbcbdbb0d9900b
SHA5125af239a44b84d47db28afbbafc53e0012bd678d6d70e29e7bde8d51e5e55bf6ebf120c0f5392252f9a608c6382f1dfae7428955f8c3b96da999966489c54eb09
-
Filesize
1.2MB
MD5afa6a455c9484cce5f5f87fb2ea88e8f
SHA1330f38845c4aaf78b699c51519bf32f8f5e2350b
SHA25613b53e49e6222e14968068d60f454adc39510b30afbe13e8a2c9d330df77e7b6
SHA5129641672dbc710e8f38533f99443ec389ec1a44586c73aa5b48a5bb0f4db067ab23cac2acf10e8900cc9c2e5e75da8a4cc71b349572a7860fe3f062ce7db892fc
-
Filesize
1.2MB
MD5180fe58e3a5f4a4500a87acb65c76721
SHA13606932e91bd28db588d1966043eb0ce94ecda3b
SHA256792855f1317aaba5aad5a9d5fe831b4a79156125a8dbb178ef1dd9ec8f3a86ae
SHA5124c545298628da5196990c25c7e267087985c65681ff72167bd5ce744ec7538dd905171dc1923e3cfdf2f1fa3c504ca17db188befc1ff6f7857b9abe63e9ea730
-
Filesize
1.2MB
MD5714aea531bbfcbde3f4329207b66c859
SHA1da9d660a9229c98d19766acc592895ae76f09389
SHA25632ece58e5edd95097d94906601cbd9811272f6bd616eb31ac5a2a2fcc72d8884
SHA512a9c7178646182cef8ceccbb99b7dd50473bdf74eadfed6d7f588cad0fc701dd30b7235136eabb1cf58cb630276c9aa291649b0180ae34090f84460ba4ae15e16
-
Filesize
1.5MB
MD5f69f32bbb0e35f7ad2ff1466474ea4e3
SHA17462e9d8f82609e8161ce3ceb8976964e9d0e7cb
SHA2566ee5d4cb4ba65f31f12f1014a2c8550e6b6a98a99281f1092f748af5d769e97d
SHA512a223ff5a96dbe51b2d404473ce898879bca15221ba20b9692b831d95fa204aba499648e51384bede5248d9919d62644a52568b1ae30d7fe5e2ab69af59f1373c
-
Filesize
1.2MB
MD5a31c870c06216cb4c5932aef633db92a
SHA1c9b37ded3e89e754093a9735109b4228459b042d
SHA256dc0337f43a61389e0a8b8850a1ddb00582dac65df55c23b1b2957e1932f2600c
SHA5120a17306ddf71153aa67f2a239ac6a7de036180d41f0576959e827eb49d7b66836ad2a4ea20de25096c3416af40be9534711f80ad1dc4d8b4a5b7630be8059fd5
-
Filesize
1.2MB
MD53f0f4e6f2ab93821781203e810835ee0
SHA1e215a5387ce47ef3e87f5edbfe4eaa6322fcc4c4
SHA256ba4ed0b2d5fe17d08458b15cc93f067af06aba448bce4d773b2921f06e2a41f6
SHA512b3051af9b5cb7700819765e95a3109f7da9f71f6f5de6844403003d27344413919bcb09659bed52ae6d7e3c8b97ff7b614c57d96556abf763b0f2ab0c6cab24f
-
Filesize
1.4MB
MD5aa32863841f5321a3053d0592120d59e
SHA11a41213b39a782c79ea82e2b5fb1c63464877195
SHA25685aa0ea532d07901598004a0f9481a5174b5c040d8c6aa4afc1a329ab808c033
SHA5129c38dff90250981e7fdb88597c9ad4a14cbc1a360d25b957cf8ec26f29edfbd3c5b9f3f0330ffde2a6bd59ea222177ff3b8aadb5f5ceb5eb54997f5b150b511e
-
Filesize
1.2MB
MD5be384311b0243fa53cc0d0998cec6d5e
SHA1a71cdd6a5457cc4070e47782fadcb52cba0369df
SHA256e952b9b5f6765c5c8c4e69fc7d3b8f6506763ab49855328b4b8d61327365de3c
SHA51248c138d7028054a2971ca9081df8b31da98b05e4825772af5ed7e68b290f77a8c2c3079a0c641605da885f2b45a70439409ac1b447ac278e2eb7dfdec19d0fee
-
Filesize
1.2MB
MD5e5956fb0a4ae4858ad95c48c43eb35d5
SHA19860ddad6b005281564a4908c92ba8ead9f20b07
SHA25632963ef35a8559f9251c89cf7875efa3679d3d5a8d299313eb12e4c16c080017
SHA51286043d45e748d441cf30168d08795ef8b615467a69228b7ef19fdf8545a58ecb193044c42349152752d14702dafe7460f28f038692eb6978bd7b383538de87c8
-
Filesize
1.4MB
MD5cc83d9117c8ce58cbe906a4a795c06f1
SHA1cdfbb08cb81653a26b337a18ac9e65915073b5f8
SHA256678f1e509d2cba7b76086158a23fb4231a6f669eda45360647dc9732672bc99e
SHA512d7693427df6817005b28b0a77f99ce8e78035397811da817f5b6f6df98aa9101d2676aa538bb232e44903a9685a269667a57cb5fd5318badc74fc757be8fb7eb
-
Filesize
1.5MB
MD57081b30cb7af68c9820d5dad4de1fb95
SHA18d2abb1660b9b9b30877ece7586a9c0d446d2c94
SHA25622401744a33dde0e0cce94988abda362feace0e9eabbd83e606357a954f296a2
SHA512a656e93889e61a69fa782e2230bc35517fb01200fcc31c9bb03409e017d43b88f627628b8a4ddd7162f687871beaf9f4b2c01a27dc07d59803deba68a24fa90b
-
Filesize
1.7MB
MD5735028e8e66b48733a00eed91b5acd56
SHA197b35d5c67007f209333699153185c8a6bdbb952
SHA25608f0c2405c8587871d7c3435cc72310920dc5794c4c83465ea91debfe916956d
SHA51242c9940bee0ee2429f56913ab96a632d3d750c057ca9810250c37eb02dd4f64a4be2703fd95e98eebd53603e3c8488a28886c123e10e92b7d5a192d04d1eb1e0
-
Filesize
1.5MB
MD53cf252c7d19125d8c2006d3991a06087
SHA1cbf0b5b6c81b901f5df419a270d752061dbacd5c
SHA2568b3f87974eba55890ab69fe5eee12198c70516f225dd2732cadcb1a6ff769a4d
SHA5124748e46b08800da4e7ebac32232c12620d3f4307f1362fb25515819277948d49ec9c8c5343f707ca9d6dfaa1e3fdb9f700bf3c2f821d7f0389be8df104535f08
-
Filesize
1.4MB
MD5486607b970d2f740460b85f39a30ebed
SHA1d1dc109573f904c527697c1fa7206564e1227a9c
SHA2565a0a74c595406bf996dfc905283c56bae8d8ca4aa18dc6a7fe4c9eb3f4f36395
SHA5125b54b3eb0700171b0799f97e2f1775e6b73e5221483227b332bf6d1031528ef748d66961dd7df88d7cbbf6d021943244a67b040946485b297b5b260a7feeb71b
-
Filesize
1.2MB
MD51f30ae5bf3a3f1132c054fcd34fad5d4
SHA198ce298d2dc946731cbed8dd2bb9747ec49473a6
SHA256e2eb11497bc1c34a9ce694902af7ef93de32649c94cf7d4cd4bb1ffaaca23b2c
SHA51256dd233675e8b5f207d860edfdf68ea58b7d98cb763f6a1b8808aad087643901146f63cfb425f8e7d9dc68bd59ae54fddcb567a5ca081aa321c0770b75387c60
-
Filesize
1.7MB
MD5934f172dc1dfa92c1b5f5f23473a1751
SHA1d170955fa46029f88b4feb525e4f3d872f43a779
SHA2569ea06df19e054f8e1baa8f5e9028e75784877d3a98afb12fccd21a19674d0f5d
SHA512622b43548339ea241e14f2d67e6dda5b0190b1d95ac5f467a246919d60d9af45760c6c2037e059593771e2c25764851d13e765163fe8061254bf560bb2f111d5
-
Filesize
1.3MB
MD5314374de59029d878182e46738113bd6
SHA12252f472b8b7d44e594a445126b334528e416375
SHA25614923ee6ecf819f81449f77ae1ca6dd906d447a96c80ab31da3bfaf4e35e3119
SHA51211df323e22752923a4df60d4003a979422b95103f26ba47c1babe808b3ffb165a8dec096d511aa5df2aaf5ac0ed8b1a78f80c59ee5116937482634a95f5aafd1
-
Filesize
1.2MB
MD5509ce7381b948b41216d32e1bacc2298
SHA12f9e63e6ea2d86bc008aac6662cd812264934638
SHA2569142ba9ff58b7d854d391b4d788611dabce653b8ba9be5842d3ade986d0c7df1
SHA5124f27a45df6f335716d2aad4386853ad039bbf2af452b1a6061bfee1c8e2a5128954e72743949201813e6b69b5087f1d23c01dd1dbb86280c565ec5f53c3f458e
-
Filesize
1.2MB
MD5f72baec72bccea3128866def0b8b06d0
SHA14edbf65e84653abebaf45d5ca9e9073146aec8f1
SHA256a7e8b2d080723125cdfae029a6691a19dafd060be4f51da5eded79471823a596
SHA512b9fc3b142fdce0d68d5859e7e3e5041d7848dde0d9f022d1c61034dc931094cc7122e12e8b2b7714ff5104313ccb8520216514e74776aea2b4ad4c136e0b3106
-
Filesize
1.6MB
MD58ef2b3ce9a72099753fa3a541fbc691f
SHA1ee4612d1ceb43a3c94d27ca6a9e131acc5f92014
SHA2561eafbdf6e62d6e0e7e7d52a2330a7821da4ef77f44554c124e39faa4765995dd
SHA512729a920b9a99108aa31eb81c30792682a2396eb02594e4b4017eef46ee201c6b7caf11ece0363964227b1dff954a1dd67a3dd3c96933c8cc0b860661b3c872ef
-
Filesize
1.3MB
MD58413a98224d6f28188952b3f0f96f3c3
SHA166ef40231260ec6dbc5f467ea288859a11ca0abf
SHA256f3ad27823ea7cfd55449041c255a8ec27c76f76cd923e5a85d5f05831525aa6c
SHA5127bf6f885e7f72173b319e493462b78a18e5375c34bec70af7f730d1c24f8d1fa50ca880e77446099ae3061127ad8c98b39fcfb2b35fea99c53e57c8f78384cb6
-
Filesize
1.4MB
MD58f90cd7b1a3ac5ab1726441ffa330249
SHA132a1a45d36778a6e63764fc5e6648f3974624e30
SHA25647b7d2d5150f663590d2332389671ae06b876cd0abc729186c388e7d4e980f91
SHA512ca98ecec0073d28a7311ca6978c71e94724f0e0c89585dc6089c59db439e44393bd44d57496b9a195a2932d60fe818ba07f32ba52a1eb03f89350a048aef0ce4
-
Filesize
1.8MB
MD580ad856c496112a1dbd7cfe4d3dce8a9
SHA1280a23a075752e10e72c6129b2fecb9c0e115e36
SHA256bf92b83a68d2bb5b19a6c5f2cdd54e00f185c83856153869f2ef61d7042765ae
SHA51299fcdbc2e23b4b1092f8fedaa8f19adda93081888a5f7d6a6a51c76e4c17d4ca50ba37a8401a441d1acc27b8c0df3e2ebc85d2555d62350808a32d0abe959d7e
-
Filesize
1.4MB
MD53f0a996fbad41688c5d94df1ddd8118d
SHA1a80c80c4f0bbd75c41821b932a5e79647d8b2c98
SHA256f3da77731fb7833550d2ee211e0d3b66518815ea1b52d6fa7d50b9c13dcec1c3
SHA5120fd1895274e769fcac2a1ebd19a7072073c54e949135a8f42d207d9ffdc6c9a6ebe5979a1e51c721634ee4b56be813d9fd36fb68ae79f957ea106f41beae4dc3
-
Filesize
1.5MB
MD51cb339c16dab5b0fce274c76bc975f10
SHA1da7971a7528ab38e95a4faad3963b167aaecd448
SHA256f49b5620c7e15c4c8a174673cbc4ffb7e2892f63a129099e599738f3fefee5c0
SHA512866d435b8adfbc1d43a079e7a6d5620ff70b0ee780b12bd630ce332c0ca27067831402e5e2fba25d094637a9e592f0be8a2e2de9cb3f299070fa3011f8a8076a
-
Filesize
2.0MB
MD5b206b4b43527a34a182ddb696f46737b
SHA1f2451f08c67fce214aaec9c86af6a977c2961b2f
SHA256d1ac5756347f27952d77f2138353748522cede1f1ebc11245661ee1615c91a1f
SHA5123de70eec8664b8437bcabbcd562c0abd2cc519073a4a32894fced9018b1001a2849d43a76d9c54a678aebae13443b8ecc96f17247bf213568c7078506a2ccb4d
-
Filesize
1.3MB
MD52cecaf7f4669a3a62ec75514608ffa1c
SHA1f57c9e6ac48c6dfdea4d2d6b577a730492d79070
SHA256b9406ed3b174e05e4f718dc68b2c1ffa732576700ec938fb3ccd96c78cdaf98c
SHA512b658ef7715a1d440c6f3e38cfcd516e9676267cd93bec934faf373ac7b5ea4fa7296a422e88793c7c1700d17ee96f5f37bd9f1a10ee3f5ee7cbc52c5b3b82a63
-
Filesize
1.4MB
MD5a24b13bc51a2e3ae422712daee85e0d9
SHA12155a77318a7841aeb0ab112f40405e52f4be9de
SHA256c126a00a47383a8eb6561973386604d22a5021d4826a73fe2eea0fb90b3d87c3
SHA5123c5b916db11dc2ec3ec098db349a63781172bfbf14c480df1671512420da00e71ff0554115a58c6a0a78a3c2f6673818e13f9839175da7017cfdbf29ffea42af
-
Filesize
1.2MB
MD55ea60bb2c0679be4a4a808f1b8012cba
SHA1c0edc535f75d0a66f3d1f37357b006776b5feb63
SHA25698c612e0e0820ebb2919ff0c2026e39cfac28468ecfcdaab9794f4eb1fc0d388
SHA512b4fb7d537911e1810296c71a95e65640eec5d82261616559cf7a3f0ad2179aaf02f0b3d67bde8b0c9f6730dbec97927e621d103ac3df593902c53186fa2d71fd
-
Filesize
1.3MB
MD58ecf8384289d3b0725904eedda154745
SHA1cd36d21e3a123e4dbf47a91ae09c2e91de01cbd8
SHA256c43f9f324066a379bd124cae79dd6ddb18cb8afc34b88f11006cada637dbdfa1
SHA51251b24c9a672767d68b4c72ef0ffa48086faefd6ced0e6f1bdcbc811eed47925973bc9f518818b4b844b388c699a4d16ed6f6fb52f1bffe488101660844980b9c
-
Filesize
1.4MB
MD5e50d2dc6d498b1b238de317fc95d252e
SHA1170d240c5392ffa435f0a9aab84ae3f954a8d14d
SHA25688afd5a1dc574cd287079a9ba519195082167ddb83e2c9151eae77ba431eef2b
SHA51234a3dd39264f69f5a6f32a91c901676f29892347ce377fda7220a92f8b1562982d95c31dff8443018d6d801a77e5e27a0c07a86227a6fc2b4f2bae79b3402cf0
-
Filesize
2.1MB
MD5e6d1e8ff1fdc41d79c0ddbd1e08917a8
SHA1709bf412633ad3de28d0a3764c80ce0da1d25ad8
SHA2565c64ccf366d35c597d783746c449fe670e19076a8451ff54c8afc2edce07fe86
SHA512fe61b89a4757d5eed087da63754015a319738612faf39a6f03f5dfa61ef641397cfda2bcee6f8b1a6bbee782684f9b9dbcc863f60cfcb2d56490b0b30f8895fb
-
Filesize
1.3MB
MD56276222d0302d3a0b19547ec7d8cc2c0
SHA13403f99884a17777dfe699147d4fa01479fca10b
SHA2565bb4b78ef58b8ee8ee02d1a1ea04ab74f70acabab991f2356f831dddd877882f
SHA512dc49811b96dae0a7308e4ce282188e5fc946620c4e551547991a40acc266a87d8240f5e04c5736eea77dcdee29a59d7a3e960f1ed7017fa451fb71fe7e904778
-
Filesize
1.5MB
MD5020d86a8d1100f1ac03c64e915ccb095
SHA1ac34627372a86ea056226ef4f8b0299474af8e97
SHA256621bb1ef767db3cec6190bfc5228c6b0b9ce0001709b8588f9c794c138fb44eb
SHA5125e0d5b70ce2c8be79e11015f024e11872cc535162def59c78b1fc0cc52c1ca6224427f7887ed1ccbc3c273d26f93f1bd464fd2d8cee9d66ef0fb5d143170cd89
-
Filesize
1.3MB
MD5f0a59c1137ffa1ed75252edf514b789e
SHA17a1c1942b978c69518109848c39e148b35f87aee
SHA256ca19c3595c0fc625aaca9e06fb97d7b0ca17d34ea0b0542e40680cf5da1c189a
SHA51282e1e4cbabb7c6793947720e960a71bd53df7bc075c0f330c8130307196988e8a79497649e35f6b30e7f26f11f7566228f16cd3393bea8c1ff3dcff3ef667ee2