Analysis
-
max time kernel
291s -
max time network
296s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2025, 09:02
Static task
static1
Behavioral task
behavioral1
Sample
INQ_MB2-Materials_Specifications.exe
Resource
win10v2004-20250314-en
General
-
Target
INQ_MB2-Materials_Specifications.exe
-
Size
1.9MB
-
MD5
3556f7f4d6925435827cfb674bdbd313
-
SHA1
ee25215f2803fe7447b972c6d4a9c343361969e4
-
SHA256
43b81ca09ffa6f564d6ee5d2a1e5966d57810c23daef8c5a18ffa2b75afb1dba
-
SHA512
88585ed9ba7ce94c39307d4b114f43d9b7670168fb9d5313b9969f11bc42d116e459cd7bc5bdf899f175b16c5558a58ffe7c235ed4ae806e546c1126a01ad973
-
SSDEEP
49152:0o0c++OCvkGs9FaXcnVkKuVhnQY3Dmg27RnWGj:tB3vkJ9z3knQ2D527BWG
Malware Config
Extracted
Protocol: smtp- Host:
mail.dkplus.com.tr - Port:
587 - Username:
[email protected] - Password:
04rf710m29
Extracted
redline
success
204.10.161.147:7082
Extracted
agenttesla
Protocol: smtp- Host:
mail.dkplus.com.tr - Port:
587 - Username:
[email protected] - Password:
04rf710m29 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x000b0000000240c2-506.dat family_redline behavioral1/memory/5336-524-0x0000000000490000-0x00000000004E2000-memory.dmp family_redline -
Redline family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\epistemology.vbs epistemology.exe -
Executes dropped EXE 28 IoCs
pid Process 1476 alg.exe 6028 DiagnosticsHub.StandardCollector.Service.exe 5416 fxssvc.exe 5008 elevation_service.exe 4812 elevation_service.exe 4608 maintenanceservice.exe 4700 msdtc.exe 3644 OSE.EXE 4748 PerceptionSimulationService.exe 5920 perfhost.exe 4152 locator.exe 4696 SensorDataService.exe 2196 snmptrap.exe 5544 spectrum.exe 2628 ssh-agent.exe 2996 TieringEngineService.exe 3308 AgentService.exe 4376 vds.exe 2816 vssvc.exe 3076 wbengine.exe 6064 epistemology.exe 2360 WmiApSrv.exe 3228 epistemology.exe 4308 epistemology.exe 2616 epistemology.exe 5336 build.exe 3428 Cmartins.exe 5028 SearchIndexer.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 60 ip-api.com -
AutoIT Executable 11 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/5664-0-0x0000000000400000-0x00000000005E3000-memory.dmp autoit_exe behavioral1/memory/5664-79-0x0000000000400000-0x00000000005E3000-memory.dmp autoit_exe behavioral1/files/0x0007000000024291-247.dat autoit_exe behavioral1/memory/6064-288-0x0000000000400000-0x00000000005E3000-memory.dmp autoit_exe behavioral1/memory/5664-273-0x0000000000400000-0x00000000005E3000-memory.dmp autoit_exe behavioral1/memory/6064-414-0x0000000000400000-0x00000000005E3000-memory.dmp autoit_exe behavioral1/memory/3228-415-0x0000000000400000-0x00000000005E3000-memory.dmp autoit_exe behavioral1/memory/3228-469-0x0000000000400000-0x00000000005E3000-memory.dmp autoit_exe behavioral1/memory/4308-468-0x0000000000400000-0x00000000005E3000-memory.dmp autoit_exe behavioral1/memory/4308-479-0x0000000000400000-0x00000000005E3000-memory.dmp autoit_exe behavioral1/memory/2616-502-0x0000000000400000-0x00000000005E3000-memory.dmp autoit_exe -
Drops file in System32 directory 51 IoCs
description ioc Process File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\system32\SgrmBroker.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\SearchIndexer.exe elevation_service.exe File opened for modification C:\Windows\system32\fxssvc.exe elevation_service.exe File opened for modification C:\Windows\System32\alg.exe INQ_MB2-Materials_Specifications.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\d8f9f29589f5d741.bin alg.exe File opened for modification C:\Windows\system32\dllhost.exe INQ_MB2-Materials_Specifications.exe File opened for modification C:\Windows\system32\SgrmBroker.exe INQ_MB2-Materials_Specifications.exe File opened for modification C:\Windows\system32\msiexec.exe alg.exe File opened for modification C:\Windows\System32\SensorDataService.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\AgentService.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\msiexec.exe elevation_service.exe File opened for modification C:\Windows\System32\msdtc.exe INQ_MB2-Materials_Specifications.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe INQ_MB2-Materials_Specifications.exe File opened for modification C:\Windows\system32\spectrum.exe INQ_MB2-Materials_Specifications.exe File opened for modification C:\Windows\system32\AppVClient.exe elevation_service.exe File opened for modification C:\Windows\system32\fxssvc.exe elevation_service.exe File opened for modification C:\Windows\system32\SgrmBroker.exe elevation_service.exe File opened for modification C:\Windows\system32\dllhost.exe elevation_service.exe File opened for modification C:\Windows\system32\SgrmBroker.exe elevation_service.exe File opened for modification C:\Windows\system32\AppVClient.exe INQ_MB2-Materials_Specifications.exe File opened for modification C:\Windows\system32\wbengine.exe INQ_MB2-Materials_Specifications.exe File opened for modification C:\Windows\system32\AppVClient.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\System32\SensorDataService.exe elevation_service.exe File opened for modification C:\Windows\system32\SgrmBroker.exe alg.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\SysWow64\perfhost.exe INQ_MB2-Materials_Specifications.exe File opened for modification C:\Windows\system32\vssvc.exe INQ_MB2-Materials_Specifications.exe File opened for modification C:\Windows\system32\dllhost.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\msiexec.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\msiexec.exe INQ_MB2-Materials_Specifications.exe File opened for modification C:\Windows\system32\locator.exe INQ_MB2-Materials_Specifications.exe File opened for modification C:\Windows\System32\snmptrap.exe INQ_MB2-Materials_Specifications.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\system32\AgentService.exe alg.exe File opened for modification C:\Windows\system32\fxssvc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\dllhost.exe elevation_service.exe File opened for modification C:\Windows\system32\AgentService.exe elevation_service.exe File opened for modification C:\Windows\System32\SensorDataService.exe INQ_MB2-Materials_Specifications.exe File opened for modification C:\Windows\System32\vds.exe INQ_MB2-Materials_Specifications.exe File opened for modification C:\Windows\system32\msiexec.exe elevation_service.exe File opened for modification C:\Windows\system32\AppVClient.exe elevation_service.exe File opened for modification C:\Windows\system32\AgentService.exe elevation_service.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe INQ_MB2-Materials_Specifications.exe File opened for modification C:\Windows\system32\AgentService.exe INQ_MB2-Materials_Specifications.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\System32\SensorDataService.exe elevation_service.exe File opened for modification C:\Windows\system32\fxssvc.exe INQ_MB2-Materials_Specifications.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe INQ_MB2-Materials_Specifications.exe File opened for modification C:\Windows\system32\TieringEngineService.exe INQ_MB2-Materials_Specifications.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe INQ_MB2-Materials_Specifications.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2616 set thread context of 4364 2616 epistemology.exe 122 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe elevation_service.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe elevation_service.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_84812\java.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\7-Zip\7zG.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\policytool.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevated_tracing_service.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Google\Chrome\Application\133.0.6943.60\os_update_handler.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\keytool.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmiregistry.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\schemagen.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\7-Zip\7z.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe elevation_service.exe File opened for modification C:\Program Files\Google\Chrome\Application\133.0.6943.60\Installer\chrmstp.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\servertool.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaws.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Google\GoogleUpdater\134.0.6985.0\disabledupdater.exe elevation_service.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe elevation_service.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe elevation_service.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe INQ_MB2-Materials_Specifications.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe alg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language INQ_MB2-Materials_Specifications.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language epistemology.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language epistemology.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language epistemology.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cmartins.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language epistemology.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-113 = "Microsoft Excel Binary Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9939 = "ADTS Audio" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000002265dd8777a4db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@C:\Windows\System32\Windows.UI.Immersive.dll,-38304 = "Public Account Pictures" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdf SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.svg\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xht\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-184 = "Microsoft PowerPoint Macro-Enabled Design Template" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@windows.storage.dll,-34583 = "Saved Pictures" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{C120DE80-FDE4-49F5-A713-E902EF062B8A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000161fbb8877a4db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9902 = "Movie Clip" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@C:\Windows\System32\setupapi.dll,-2000 = "Setup Information" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@C:\Windows\System32\ieframe.dll,-915 = "XHTML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WTV\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WTV SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-120 = "Microsoft Word 97 - 2003 Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-103 = "Microsoft Excel Macro-Enabled Worksheet" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E37A73F8-FB01-43DC-914E-AAEE76095AB9} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000005be998877a4db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@windows.storage.dll,-21825 = "3D Objects" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@C:\Windows\system32\zipfldr.dll,-10195 = "Compressed (zipped) Folder" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{487BA7B8-4DB0-465F-B122-C74A445A095D} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000700f6a8877a4db01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-127 = "OpenDocument Text" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000ed8cc58777a4db01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-172 = "Microsoft PowerPoint 97-2003 Slide Show" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithList SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5383EF74-273B-4278-AB0C-CDAA9FD5369E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000a84d278877a4db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9911 = "Windows Media Audio shortcut" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9936 = "QuickTime Movie" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@C:\Windows\System32\ieframe.dll,-24585 = "Cascading Style Sheet Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2 SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000006a0d88777a4db01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-102 = "Microsoft Excel Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-175 = "Microsoft PowerPoint Slide Show" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xht SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@C:\Windows\system32\wmphoto.dll,-500 = "Windows Media Photo" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-142 = "Microsoft OneNote Table Of Contents" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@"C:\Windows\system32\windowspowershell\v1.0\powershell.exe",-103 = "Windows PowerShell Script" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{01BE4CFB-129A-452B-A209-F9D40B3B84A5} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000006dc5fe8777a4db01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9934 = "AVCHD Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-140 = "Microsoft OneNote Section" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@C:\Program Files\Common Files\system\wab32res.dll,-10100 = "Contacts" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-124 = "Microsoft Word Macro-Enabled Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9907 = "MIDI Sequence" SearchProtocolHost.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 3428 Cmartins.exe 3428 Cmartins.exe 3428 Cmartins.exe 6028 DiagnosticsHub.StandardCollector.Service.exe 6028 DiagnosticsHub.StandardCollector.Service.exe 6028 DiagnosticsHub.StandardCollector.Service.exe 6028 DiagnosticsHub.StandardCollector.Service.exe 6028 DiagnosticsHub.StandardCollector.Service.exe 6028 DiagnosticsHub.StandardCollector.Service.exe 6028 DiagnosticsHub.StandardCollector.Service.exe 5336 build.exe 5336 build.exe 5336 build.exe 5336 build.exe 5008 elevation_service.exe 5008 elevation_service.exe 5008 elevation_service.exe 5008 elevation_service.exe 5008 elevation_service.exe 5008 elevation_service.exe 5008 elevation_service.exe 5336 build.exe 5336 build.exe 4812 elevation_service.exe 4812 elevation_service.exe 4812 elevation_service.exe 4812 elevation_service.exe 4812 elevation_service.exe 4812 elevation_service.exe 4812 elevation_service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 6064 epistemology.exe 3228 epistemology.exe 4308 epistemology.exe 2616 epistemology.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 5664 INQ_MB2-Materials_Specifications.exe Token: SeAuditPrivilege 5416 fxssvc.exe Token: SeRestorePrivilege 2996 TieringEngineService.exe Token: SeManageVolumePrivilege 2996 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 3308 AgentService.exe Token: SeBackupPrivilege 2816 vssvc.exe Token: SeRestorePrivilege 2816 vssvc.exe Token: SeAuditPrivilege 2816 vssvc.exe Token: SeBackupPrivilege 3076 wbengine.exe Token: SeRestorePrivilege 3076 wbengine.exe Token: SeSecurityPrivilege 3076 wbengine.exe Token: SeDebugPrivilege 3428 Cmartins.exe Token: SeDebugPrivilege 1476 alg.exe Token: SeDebugPrivilege 1476 alg.exe Token: SeDebugPrivilege 1476 alg.exe Token: SeDebugPrivilege 6028 DiagnosticsHub.StandardCollector.Service.exe Token: SeTakeOwnershipPrivilege 5008 elevation_service.exe Token: 33 5028 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 5028 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5028 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5028 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5028 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5028 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5028 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5028 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5028 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5028 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5028 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5028 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5028 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5028 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5028 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5028 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5028 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5028 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5028 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5028 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5028 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5028 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5028 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5028 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5028 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5028 SearchIndexer.exe Token: SeDebugPrivilege 5008 elevation_service.exe Token: SeDebugPrivilege 5336 build.exe Token: SeDebugPrivilege 4812 elevation_service.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 5664 INQ_MB2-Materials_Specifications.exe 5664 INQ_MB2-Materials_Specifications.exe 6064 epistemology.exe 6064 epistemology.exe 3228 epistemology.exe 3228 epistemology.exe 4308 epistemology.exe 4308 epistemology.exe 2616 epistemology.exe 2616 epistemology.exe -
Suspicious use of SendNotifyMessage 10 IoCs
pid Process 5664 INQ_MB2-Materials_Specifications.exe 5664 INQ_MB2-Materials_Specifications.exe 6064 epistemology.exe 6064 epistemology.exe 3228 epistemology.exe 3228 epistemology.exe 4308 epistemology.exe 4308 epistemology.exe 2616 epistemology.exe 2616 epistemology.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 5664 wrote to memory of 6064 5664 INQ_MB2-Materials_Specifications.exe 108 PID 5664 wrote to memory of 6064 5664 INQ_MB2-Materials_Specifications.exe 108 PID 5664 wrote to memory of 6064 5664 INQ_MB2-Materials_Specifications.exe 108 PID 6064 wrote to memory of 1788 6064 epistemology.exe 111 PID 6064 wrote to memory of 1788 6064 epistemology.exe 111 PID 6064 wrote to memory of 1788 6064 epistemology.exe 111 PID 6064 wrote to memory of 3228 6064 epistemology.exe 112 PID 6064 wrote to memory of 3228 6064 epistemology.exe 112 PID 6064 wrote to memory of 3228 6064 epistemology.exe 112 PID 3228 wrote to memory of 5328 3228 epistemology.exe 115 PID 3228 wrote to memory of 5328 3228 epistemology.exe 115 PID 3228 wrote to memory of 5328 3228 epistemology.exe 115 PID 3228 wrote to memory of 4308 3228 epistemology.exe 116 PID 3228 wrote to memory of 4308 3228 epistemology.exe 116 PID 3228 wrote to memory of 4308 3228 epistemology.exe 116 PID 4308 wrote to memory of 2152 4308 epistemology.exe 118 PID 4308 wrote to memory of 2152 4308 epistemology.exe 118 PID 4308 wrote to memory of 2152 4308 epistemology.exe 118 PID 4308 wrote to memory of 2616 4308 epistemology.exe 119 PID 4308 wrote to memory of 2616 4308 epistemology.exe 119 PID 4308 wrote to memory of 2616 4308 epistemology.exe 119 PID 2616 wrote to memory of 4364 2616 epistemology.exe 122 PID 2616 wrote to memory of 4364 2616 epistemology.exe 122 PID 2616 wrote to memory of 4364 2616 epistemology.exe 122 PID 2616 wrote to memory of 4364 2616 epistemology.exe 122 PID 4364 wrote to memory of 5336 4364 svchost.exe 123 PID 4364 wrote to memory of 5336 4364 svchost.exe 123 PID 4364 wrote to memory of 5336 4364 svchost.exe 123 PID 4364 wrote to memory of 3428 4364 svchost.exe 124 PID 4364 wrote to memory of 3428 4364 svchost.exe 124 PID 4364 wrote to memory of 3428 4364 svchost.exe 124 PID 5028 wrote to memory of 3512 5028 SearchIndexer.exe 141 PID 5028 wrote to memory of 3512 5028 SearchIndexer.exe 141 PID 5028 wrote to memory of 744 5028 SearchIndexer.exe 142 PID 5028 wrote to memory of 744 5028 SearchIndexer.exe 142 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\INQ_MB2-Materials_Specifications.exe"C:\Users\Admin\AppData\Local\Temp\INQ_MB2-Materials_Specifications.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5664 -
C:\Users\Admin\AppData\Local\sacculation\epistemology.exe"C:\Users\Admin\AppData\Local\Temp\INQ_MB2-Materials_Specifications.exe"2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:6064 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\INQ_MB2-Materials_Specifications.exe"3⤵PID:1788
-
-
C:\Users\Admin\AppData\Local\sacculation\epistemology.exe"C:\Users\Admin\AppData\Local\sacculation\epistemology.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\sacculation\epistemology.exe"4⤵PID:5328
-
-
C:\Users\Admin\AppData\Local\sacculation\epistemology.exe"C:\Users\Admin\AppData\Local\sacculation\epistemology.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\sacculation\epistemology.exe"5⤵PID:2152
-
-
C:\Users\Admin\AppData\Local\sacculation\epistemology.exe"C:\Users\Admin\AppData\Local\sacculation\epistemology.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\sacculation\epistemology.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\build.exe"C:\Users\Admin\AppData\Local\Temp\build.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5336
-
-
C:\Users\Admin\AppData\Local\Temp\Cmartins.exe"C:\Users\Admin\AppData\Local\Temp\Cmartins.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
-
-
-
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6028
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:3776
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5416
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5008
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:4608
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:4700
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:3644
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:4748
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:5920
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:4152
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4696
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:2196
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:5544
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:2628
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:1720
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3308
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:4376
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3076
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:2360
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
PID:3512
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 8962⤵
- Modifies data under HKEY_USERS
PID:744
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD512231f0d82ac60400bc134ef1c2964a3
SHA158a9a17eeca9ea28067521b3d0aac3bf0af43080
SHA256e87cae0d653863cd004e8d51f280b1c30ec121b7c41f36b624ae6545b87c7041
SHA512b0661051c5206cde8564ba3c173aa0c14ab70e59e61bae484ce0d1f50d56b64294daa2e78c3dae3f134f81d6c9634aa4cc2c4c8dac3042ac1e981630f01bbd30
-
Filesize
1.3MB
MD589f204981b6e1d959c20e2d7f6f0b91b
SHA146cdde1400ee7252eab54cf4e4458f9606d23c3b
SHA256faa427468e7aefaca2e882bcb9c54aca3179bd2d21eac4dfc4f10cf8e8b3ccb5
SHA51287058e3963be025c9df42001e0a292cc19420a95f1794a44f9bd4fb43f90b1f426e95c873cfe88b8c7b07eff3ed6bbdb8ddddae2c5d265b503211cf97dcf5585
-
Filesize
1.6MB
MD57a80a0d580653344f65d9c526fc5ecf9
SHA1c35b0318c53f91c87a0ecde7bfa2565e0de36703
SHA2563327b3ecd1cc36089702396a15a63a901e9261098c9ae2bb2398c417fc8f7faa
SHA5129b9337fb1fc80f64cf763601417be9f6ab70d77613fe9b259cfa1d0f28eb9a25b369cc1435d5554e0d068061b103eed3ec199093f231bd196bc93e6b488089e9
-
Filesize
1.5MB
MD581ff1faa49ea3b6c85ce650a681e556b
SHA1200734066f937091dcd85a2d8523c310ebfb2b97
SHA25660d3148e407793956a03b073b26e438db0ad613c456bfb054f5806154aa8c405
SHA5126b2daddf125f5078768ac649fe54eead51fe690054f40fa7ea71098071acbada05871517225c53bf31614154a57f4e7cd44fbf292eecdfa533726451280beef3
-
Filesize
1.2MB
MD5a32018c892ffe3f410fbf148cb778706
SHA174506d647c72855b94b54099e37fa46d1cc1558b
SHA256c0c149611641ac402d72dc4c44951a660a4b5319aedb56c291390178d5e89a6d
SHA5128b459821509e86e78c6b5eee92b649835048b2e08534431948506e540ee69ba942b095c71af48312ff4001da2a07e36bc8889829d33e2cd8134528ecec454961
-
Filesize
1.1MB
MD5d1a44650f348cc5205101b7503a6b95e
SHA12f41d69daebcfe28cd1bfcf602ce15f918c0ba7a
SHA25664c8926c0c969390fde858b4b3cd38272b79fccfaf00e07627b7f8c6b273c12b
SHA512af2cd9a67d1547119d8b98948a7fce23d9eb5bca6795d989b7b1f06ad0f549729144763b24df796cb262f79559eb6d0a68462beb766cb24d3d2e674bd53e63ed
-
Filesize
1.3MB
MD5bab24196fcc66f567e87c9a91f385a64
SHA10a4c3a3ca677bc50152aed204fc104e569546952
SHA25629cec284819f01e663fa2d8b40b391dbb89b6d83c8c9d450725eaf89172bc790
SHA512e39429b1038bfc631c215b359b510aaa3b9f0c211ebb5d760f8c4795e1005f5ae2489f989118d3a26ea1a6197b64a954504c5bc02bc78765bb03ced159a9499f
-
Filesize
4.6MB
MD550baf51865a000f8c5b77d7b51d97148
SHA195ef8d80515ed9bcf9721be3e7d30c5c83e1e22f
SHA256a30924cd770174ea2ea47590f2982bbb76db8a9eccfe22f37a25276245a7a66c
SHA5127a707867d0ef0ee16028dc8cf2f1da3023ceb398a2eac021f0f10cfde721767f4c2a990721c07d749a3a9a0dc552f639aba2c00b077fc5011f3c153f9ac240e5
-
Filesize
1.4MB
MD51305e8ee624f231c8ecae3ba18237c80
SHA16c3ecbe912ac7c63b53bdf45e27c589129512222
SHA2561d008a789c662a1ebdd1a8bd37d89dad2ce7c39b77e3a8dca2be624bafb40657
SHA512e20a6b9baa84bc033214c65ac23670a91956e69289293515291d808e536d38ab19f63b5a6674777dda14e33ba27089966fc03884a714e2043564fe22cff953de
-
Filesize
24.0MB
MD51b5f6c259a7f40a6e59ec49c10a5e169
SHA125f958d016c8e61e7a12ab9aa920a30a9a17d269
SHA25606fe9942ffbe60a2cc35cc3040cff2e71352963025a5ee1e9670b4d083760358
SHA512d6bc8de79946cceb5d69c06f0a1ddadcb640c4198bfdb38694dd49400f08457b1e60caa6d28e073b708081bb9f863511becfa8cb8c878c4a34e0107eb7052b62
-
Filesize
2.7MB
MD5cc558306897639f7bff72c8308f924bc
SHA11f3f2164eada30ca5e4b88039cea51061a19a9dd
SHA256ec0d44cc5ddb95568ade74795d4fbbaceeca6b569c2657bc4ddf1b67ff06ce48
SHA51233ca2a1da5bbd1ec4b6c8017f6132643bd5c2fb3bd0a55e016f04243d23e9dca7ba4fd918cc0f96939a30cc5dad7f9cadab80f406d04f11406842f5d9660cded
-
Filesize
1.1MB
MD52423b0ecfb2f292ba91e6e39f74a50b0
SHA13830a343d9b3bd9f4e0e3cf73e0809439ad1f9cc
SHA256b855ff1df265b2004e8e800c95b97741d62880c5d09a10c78b11f8fe310623fe
SHA512a9167f417b73dd3e2cf7e834eaff027851ae13448e9ac80d3d7416c8e2fd2af0e622a1847247cc9fb050c88e16bca78e2e1030500d0517f9e275e95e23e5c19f
-
Filesize
1.3MB
MD5f6188f470114c48611fda79c208f108e
SHA134c757fb37efaacffe18759e80680d245b75fbb1
SHA25660520f01229370c6020d5ce730aa55738dc710e28ddba060b58cf703efc20360
SHA512d4fff8e09b31c2301dcd5fb72909457fc232b9a23cec0c7d915924c202906991734696aceef91ed5676e4550221a7c5c9a8dbd1143873b6c4236fa6a1f7062ba
-
Filesize
1.2MB
MD51c1ec1acf572c2de874fdcc4e214da5d
SHA14c4c9a5ab3cb76b63dd8049b2e996b75f02b5e14
SHA256e475e99aeba3708833056162e75a10e769450e8dd537b19137648315b8a88d55
SHA512295ab67e938f4b43bf171e56595afab73ff03f822f0903111ca25669f0abd1ab5bdd06f2381002282767742153ce7a9f3563e4b2a42e71933c679247ccecf73e
-
Filesize
6.6MB
MD5fd8a84126fd735d210d8aed0664686a0
SHA163b8b1f9c3b1bac630f49a8444afd46e0f9797c2
SHA25680ee8b7a9424db0de5606c61256c42f9f1fca7474c31e1b9b744577605c57e99
SHA512430cd284e24826a9cc3c2f7ba89b4ea76ea8a74d0b7893d273357def1f89b3cf22b4872992393976cc4059f860a0e5f82d561c7df51ff14983a2134aadbf32f6
-
Filesize
6.6MB
MD5f12cf4ae15c78f2de71ff9c403ddc788
SHA156d02b531f50d436958a4d61a7a7591ae4ba76ed
SHA2568ae16a5fbbeefc57cdf67c43a1ec5cbbe326cab97f02222d3a72693f790762df
SHA51243e74fe35916a82f9c424b9504f4e0cda038acec120b9eceb1333fbfebd3edc6259995d78f4e4fe67916712bfa61676cc77a4caf8341a5e7ca885c26db4e360b
-
Filesize
1.9MB
MD53e6000f716cbe2bf6cba91e52bd21f08
SHA183317ee637e6e82e3bb8309b78f0f596b5b22061
SHA25680be7a1e752c6b05918cb8b5128bb315ed7b777cb04dd8a921ba7bac01ece471
SHA512c744e2b0b4a184e5ea80da7fcbc243a5c232c96921e9920c3f4830e823e3ce8a622f49d3078e159f6871a375bccb2d5cbeaf9af5fb9ce5ab8e305086e89fbd69
-
Filesize
3.3MB
MD5f623f8e233276f80ce6a5bd94c83a97a
SHA1bb968603d054b9ca39a192955c9746ed2ec86f41
SHA256bfb03805ef2b0bd2f8cb36c43fc1c5541537beff83352523886726a7bc4444b6
SHA512a58e98cbc1c356fe296cd5af136adb197e2105d805160f3ccafdd142d100b796f5d6b60ae9890bab18e5038e566b0e56fe265a55bd2c500e13d819874034a0ee
-
Filesize
2.3MB
MD5644f75af33342cc011e93215379cd86c
SHA17da3741287c8a2689a40968364c12684e93512a2
SHA256519b7fa2d712af8eab06af9b479e68d80298104cf0b8ba3c860db6793ce2500e
SHA512899b90fc36e9047039de7033eef807b2cc4d82b4a8d492a0651b18e3b412910c7af9956791614dacd18b061126ba11effa91ff3be938c90568fb5ad9a0b6bafe
-
Filesize
1.9MB
MD5f429e536cfd475f5ee369ac25bb45450
SHA1d399ad8b644003acae2181364fb604a43b1ee676
SHA2564fc904ff803a0f208d7288c842a3d35146564c51e5b3f441830923b8782717e9
SHA5124cccc40123d6c42e7568b2236295441a8f780aad600491b2528a99322bdb620cf786a80316dc74773e3c3b9220d6c27e5aaee371e30be47cd0609b4e54cdf77f
-
Filesize
2.1MB
MD5aec714c347cc06e26c199d2e4b93754a
SHA1c8977f1235d564b85dffe6937f5940428d764c7d
SHA256b0ea762cc22d67ed71d8ade4a62f838233e887ddf2cfdf91bd5eb0ca5c9a35fb
SHA5129dbbfddc545c31e5253f954e7d96d13769c42183cee66ebe1c91010a20d0295b5efc1ce880b705e9ad38fe8a125c65e63f0f59c7d3493461d71ae3fb721e74d5
-
Filesize
1.6MB
MD5657aa3abffd1d00932f675984317ec3d
SHA1d77b01942eb6c53e654f41d51a95c34bbfc327c9
SHA256a8c6c69e6255749df0c0eb670299e4147e06371adbec154d379edb5133bf7eb9
SHA512717b63c9bc70f575336f529c49532a691748811d4192ff85284d3e870b013bcb502251c2ee9ed4555baee14afad1d06ecdb47fad588a74577ad85d0e0ff38c55
-
Filesize
1.1MB
MD5e6fb2426b6a0a4d9b58969798aa5e8e5
SHA1dbf785ccc1f0a0f3987c9829908d3e5d8e539091
SHA256c3e3a4e6df11b3b82067a2b156429c9f50a204dffaadb3f4d6f14710034e3c24
SHA512eee02e22126c3277967538227a411f4151e54ddd4a6f6216fc461511578d947db2354277b3f49f338dc02d551729ce31a0929f4331b5a31d90f51aa8fa9cb6c9
-
Filesize
1.1MB
MD5a0cbdc590a1be3a0045b09acfa4fd5e0
SHA12088cc58dd3c4e5985baf096917b6ab243169c87
SHA2569a9bf9ee174616d60ec3f0a18d2907f48424a8591a7a272a4953ac5abf44f7e3
SHA512bba58ba5f9611917a6e26c79f763acf76760f2d91b807d36886ddd5ede70aee5b04146c0b95e799c4ae62fa5554144b499f775c5898463e8f38c948ed34d9761
-
Filesize
1.2MB
MD5ea17b89f326d0399511f1f33adeb0831
SHA1de3f4e71348c9fb2413ac3747583e583e92d8413
SHA256f5354472f60b62fd6cdf8736cb1bf58a09efd12ddeb04cc761157cdf402640fb
SHA512c490ffbbfeb8959a72f6147e836a71f4ef0c4eb386bb91a5979964bf1197dfc3d83f3aa21b7f0201caf3234a387146bd7b5d826058c4097a20eaec6516a2fb04
-
Filesize
247KB
MD565b6608a990b2ccf94df5039f31a474d
SHA17e8478b76217639b63b10cedafdbc16a472da3a5
SHA2568a6ce01f31abcd7c369b2c89932ec966a8e275ed392965def516c65f94efbc95
SHA5127ece11b7c85bafcaaa71e58bfb405354588845dfa4c06e922ef852c40bf46261482d63f8b91c2614d8ed6fcbb7023f0f1c63db0e60f0152f4e858280d6894a75
-
Filesize
444KB
MD5f755d5edb5b7e7fa5aa306687d5a218c
SHA1e69ea5bc844e387c87b0cc96cdb7ef59df26cb7d
SHA256a4c5363b05e064c42c4ea6f613521f5484b155840c5778715a2b0ae08b831a9a
SHA512fecfdf3d644eb63dc113a6f24ff6d716d6f36051f5d7f02cb446acde7b2da39a572283310a81e1fcc9ca497eb003afa59756683b2662371527364d396c68fa29
-
Filesize
300KB
MD5209b15fade618af5831e6e2528a4fedc
SHA12efc49db01f3df2c1cd0a528c75e466a9478b698
SHA256f07a706c0554ed9363bd396dd49f788a0df232caf0af01161d831a12b95d964d
SHA5123431efa0cfe6c2262ed07a9fe084567d9548e586efcfa752e0cec455e07f8a3e6b3acacacef77317881a0682358cf92d37abad80730560c33cb1e2d564afa8be
-
Filesize
552KB
MD597040cc24a72c458a18e767cc6b1c043
SHA14f6d8a2906cf577c1cafd6e760bc0157c5b8175a
SHA2567489f2fe76e66ba9672cb71c8b4bbdf437a69b192802b7da94aa749f56fe0e26
SHA5127cba22ffb4a77b289ca807ebdb2f81f56fa0b182534a492b3c28503c0a392af6621287d0bc6c15e8f7d8f1a9a7b25c8fc3ebe0e64fe574a89760329a7b61ad31
-
Filesize
1.9MB
MD53556f7f4d6925435827cfb674bdbd313
SHA1ee25215f2803fe7447b972c6d4a9c343361969e4
SHA25643b81ca09ffa6f564d6ee5d2a1e5966d57810c23daef8c5a18ffa2b75afb1dba
SHA51288585ed9ba7ce94c39307d4b114f43d9b7670168fb9d5313b9969f11bc42d116e459cd7bc5bdf899f175b16c5558a58ffe7c235ed4ae806e546c1126a01ad973
-
Filesize
12KB
MD5fbe17adcc48ea342fee9fe81bc1d45f5
SHA15374ec56ea05db3dffc2351e79de86f500095c8d
SHA256387788a6dd7fe97f980ef9e94db1c7826ef919421799ecb10241129491e2159c
SHA512d138c861766b3ce730aaa3dfc0eed4c546441e5214f7d37e5a5767dcdf80b79e3a7c615d0d50fac1505752c47ccd716741550fd04f5ca6bf54d96c0cdf87faa0
-
Filesize
1.1MB
MD5f2bfa53728a0310506e4c740c0bfc4a6
SHA11062f2cffde471eb2684d7427fc8605686106fcc
SHA256a6d10415a404a7272ea4d5acbebc0f0def1ef96d685f0d974e0178aa86f38293
SHA5129828360f84753c92a129d6cc31b3131fc0cfd772d7085d0b5bd6f568ad139575f662412e0adc5ffb2ffa21f84a6b28c9762b7fb54b9bc963f31337da8aa0adde
-
Filesize
1.7MB
MD58b1c4971f86c05e5e392f5affb00336a
SHA10d9a6295b0549961fe959ce572c19bebb7885b39
SHA2568904f2cef78a1cd3a8e7b6c1699727955b82e1a88e58c972f2908532afd17e9e
SHA5126e3a93e3567caf12db4b47e39ab6e8a93e5787bf1bd1b9ff1f7da4e69d0cfeb8d2198a6783727da24aa76cba639bf1fcef9261068460503f73d34a6b223131b1
-
Filesize
1.2MB
MD59140d33da74377a1e41d7ccdc52202e6
SHA1c360598495ef8507f1acbdcc2e91e819530dfc3d
SHA25657a89dffe7bd8eebe1ad08f757479d142b13454f529b4789d04f1243ba8cbde7
SHA512089264b71b0af92d7c65137a50fcf5abc521d6ee46af362901fcebe39cbbd2254997161df5b42939120e5e6735324458b662ad1eae520cff225aaa1bb5cf01f9
-
Filesize
1.2MB
MD5cbfc9cd94b6eb6403f9d5233445dd929
SHA1202bf2e0852f16e76c35e85c745f873069dcecd5
SHA256df29fa2a601ff59105b7a0c7203cb9d55747272e53898180590513f1bbeded03
SHA5123f25fac32eeefb7b792d7b0778f2a457bec78193deb241e1f61b1adf89586721be0a4f482d4f0f0d6d22a5266a59b47f3da1d172fff0d80cdc42a1ec32251c2d
-
Filesize
1.1MB
MD5268153e8e69044ec00b7348b3bb0718f
SHA17acc2da3c40f0ec2939a9e48767b22b56d08109e
SHA256c1b38b0d40aa932d82b18dd799e52d89aee185ef8f82c97f81d395461495613c
SHA51248974bf5e54183a7a190a0da30898d381c558dd9b01a1b24bb0faee9f2a574558d2156988bf5b3ef37fde4afda8032709c8308bab1e4aaad774c40bbfcc1637f
-
Filesize
1.4MB
MD555aca2ea3d105756525cc661cc55cf8b
SHA1adbf382ba028d06f8f619e8cbc9a6adcc739f956
SHA256202cce8432f91832ceb7e12591d984a0b9c271f95935e8fcbb444c544e3bd2e8
SHA512aa56fd2f3a51b2b48bb70c1ecd9db25dd637c806c7dd5176b411b5e1c24cf7aee16876e4eeed8468bd73785b64465b8d02dcef25c2f794072ee9ecabebd7555b
-
Filesize
1.2MB
MD57168055853d7a43f05478187a43b1596
SHA171206c7712e1cb858fcb8ddd3f2071d7a53e83d5
SHA256405bee470aa513e99c0d5adbe363c665896f9aa6d17d0f603147f923a81071a5
SHA5121d04bc9289b7923e9a703e50fc64ae6341c80987c084cb7768ac25b1613ac88ab034f16bb938177336052f5961e1abd89dea650ef15c94cb8b954c6be0dfeff6
-
Filesize
1.8MB
MD5e6cb972764106c09a4b702cad52bb42c
SHA143dc3e3433bfd54df1b18b2ee8cc2b769eeeccb6
SHA2568d6ce3d3699f5cd27329e9ec7a188dda7fc48a4801a86276c0fe2aa9f8a358f0
SHA512dded551fdfe3d761104a0bfd5a7476675d450002ebb68bec44cfa6e63eb9148aa7f7e0274fd8166c3e4cc3f90853b708772a0298c7a3dbd28c70b9c2c3c1dc9d
-
Filesize
1.4MB
MD5c72ff094573405975bc9314d97a9354b
SHA131f75569613cf2c6be9c4faff03d892adfb7f6ff
SHA25670ec52aced8db14ad7495300b0c23410bd3d2e606bb1997a930e326c38aab153
SHA512f6b4fe0f3246ff7c8072a0159f7e2d391af22758a1fc475d8e121e42a90c30cedc4074fa8a4197247f0a7d9f230c180ed94c312b91e0942c3562f41f973f339d
-
Filesize
1.4MB
MD5e5975f5b9ca46abe461166527ecc4d62
SHA12aa9a0b75c50ab7df0649a7b822d53b621a6e791
SHA2562cfd10e1eb8133621b64eaca2c02f7480698c38a2dfb007a23c49b2f50ca0db7
SHA51286433cf57917f5acf5d927d95e8e184e2b002a75f71138c6ab2d10a8d52c37d40b0e07eae99f2e9bbf17bc5a56839443fb80b8a6201eb639f16cf385cad92f4f
-
Filesize
2.0MB
MD53dd49b5a6092fdde5eda3f3af77d9e72
SHA1fcc13d9c6cd47fae8ddd966799cfec4df54f0307
SHA256790cbe950be3aa0eaf8bb53c49988a8fb1ea55272acf764a049d77e8552947ad
SHA512f54768ab16e023852231c892c4c67fc49e549ddfc00cadb68c59cdd70e249eeee49877183456fdfca2dd3d91e2d911bfdd61d8bb41975fd206a72bf1f1e73034
-
Filesize
1.2MB
MD51fb81a4bb63d533a4a72bf98da111905
SHA198c9ef0430ad8c0c4bae7532b4ac290f6479d2b3
SHA25677840327d4acd1a98f6b600248a74424bcb4f4b3affe66302ca8cc25d53bad19
SHA512cd07d6b56ac147deeee77c7b89bd98167277ad04749c3b710f335237bd349166bb40c344cbc1365c35136b798c62d016532a020bab2aa70b357a82a50ca36277
-
Filesize
1.2MB
MD52b3e169fb8a2dce762f696184f7bb163
SHA18138cd96d05ac7d492466c8749a8e9af646f0f82
SHA256b25d4bc61750b290fab8a61a245bb372148cd82df3784c0738184f18c937012e
SHA5121c24986a00d993238acd56287fdbdd65eddfc0cc4a4a641f7e7c999d5e43ed40d7dec8f14c90d088511fec1f11500409088d99efb93ba60baca4c81270c36988
-
Filesize
1.1MB
MD5d7a213a526e246a1e484258062ce0af3
SHA1597e4d59bb25432f451302c6856192d4534dffbe
SHA2562333661f97cf9389e707b81d8a57d33a69d89d6bc1d4d0d4cea4fca87d7f83a0
SHA512067b7e01750c8666ece5bd4815f40fbafbffb44bb270ed7cc3e467cd401d7672a439bbbf120706621e571d091fe6ab2e5ac5fe153c165965116f875b6d776d94
-
Filesize
1.3MB
MD558f4c054f8b3ecccf01dea8e9e563646
SHA1d49c40d980963f448f224fecf32e7350fe5f6e37
SHA2560f9e2bf5f9e913e0f5b2648ec8d6877cbd604c66ae3378fdcf8f9add03ab4c31
SHA512de748abc30351bad71721dfaa0ccf263565873a196470f06ae922527531ad22afb2bcaa111ac8c7fc81fa51e28345d607733a7d1dd3c747087a1e55e66dbeb4f
-
Filesize
1.3MB
MD5e43c37a705747f74f3e3454afaac0283
SHA1db9d759e7feba5a835acca9219d1d26eb7d36eae
SHA25638ed2a17bfd95ed51d9b7197bf512b01c9f78d816c8c502ffc875a11b4b8e056
SHA51208a4a066f8bf2e457acc792c084dc95cb1eccfe85f7f6390cc72129f940befd186c7994074201ce2a5d36bc957e570319b7c808004c74a574bbc999daaf2889c
-
Filesize
2.1MB
MD55e32bb95b8eb5354f333daf43ee4ca4f
SHA10696ee2de32a9dc568ac81290a7f65f35c3fa2ac
SHA256b4c48fd95d3818273d8127686dce66d9bda9bd99191dc86906da392e95e4e304
SHA5121cc75cae09b00e2ba08a2f2b5125f62ec8b237dfd4b2efedcdcb63e54b287722e1bd89e493600a1075d60a6734049a5c45a61ed52dc5590ce1356136d30d89ef
-
Filesize
1.3MB
MD551088f3b86ed4de6196c143e37e1f6df
SHA1f40c7ba84c76088738d141dbd32fb8d3b1061d98
SHA25669e41146941c8effcfd673ff087404ac3928769d14c3ec979eac6a358914b71c
SHA512cf0a337ad76cd3183bed77996b924fa458944285126dc7ac5ddbf0aa38ff860ba7f0f12e9d76de7a54cd997ad16912ae319e20741b316ef9536f5209fd77e923
-
Filesize
1.4MB
MD54b61426469a202cb1da7bbfac458c325
SHA1c114ae04aa650041ccddc15518925cbb727ad6f8
SHA256bd3b18c8f3548f4fcedcc0f55ca85ba7bbb665e90761c12da8ac5a3a79e355e0
SHA5121f513041198941bb30e0e1d9dcdd3f60361548ef81beceb1bb729ac6324763df4a2ae00cfb55adeedcec52db364f447325b6ef1cbec5ad995f7be9ba95519603
-
Filesize
1.1MB
MD5203a851f8ee8ed3efa8611e3a6729d14
SHA1271108756663c2a0fc38f092187462a5f44b504a
SHA2561f8261c07c0ec64167bde6dc532b046d2412e152782fb619289ad5d1abef1490
SHA51218d673df5fe44e6604c18e15eb200b7b15dc7c2938c4c89050cdf86cada405a559e8ae73f1f555a23636e44e691b9cc2a40b48de83fea1ae01d3508604a88837