Analysis
-
max time kernel
290s -
max time network
299s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 01:34
Static task
static1
Behavioral task
behavioral1
Sample
20092024_0134_x.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20092024_0134_x.exe
Resource
win10v2004-20240802-en
General
-
Target
20092024_0134_x.exe
-
Size
1.1MB
-
MD5
405a1fdf46b8dedb3ffddab68c208943
-
SHA1
53d054bc36633bdd9793410458a131f259e5ff33
-
SHA256
f9b8c466f15a5c19bab984e121fc6f9c49bbed94b54ac5a2dd44dd4f676a78e8
-
SHA512
6a9e7210ecc7ef3db63521cbefb0b5616a19ee1f159a2bb9c905933d7be09dede4cca064cd6edbf724d7165176ae426e161767507d5fa884f104604bbf8891ac
-
SSDEEP
24576:jkcL46wGlmCQ4dviIbWBFREfuFlFnP06vtSRDZZdI39v5SPfWxtPtnwpZz2MXMGq:jQnrIxf2dsjrMSehaaVt
Malware Config
Extracted
Protocol: smtp- Host:
s82.gocheapweb.com - Port:
587 - Username:
[email protected] - Password:
london@1759
Extracted
agenttesla
Protocol: smtp- Host:
s82.gocheapweb.com - Port:
587 - Username:
[email protected] - Password:
london@1759 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral2/memory/4644-2-0x0000000002C20000-0x0000000003C20000-memory.dmp modiloader_stage2 -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2692 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation lxsyrsiW.pif Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation server_BTC.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TrojanAIbot.exe.lnk server_BTC.exe -
Executes dropped EXE 35 IoCs
pid Process 4388 alpha.pif 2868 alpha.pif 2728 alpha.pif 3436 xpha.pif 3644 per.exe 4944 pha.pif 4268 alpha.pif 4460 alpha.pif 2580 alpha.pif 1060 lxsyrsiW.pif 2400 alg.exe 1472 DiagnosticsHub.StandardCollector.Service.exe 5040 neworigin.exe 2960 server_BTC.exe 3804 elevation_service.exe 4652 fxssvc.exe 1648 elevation_service.exe 1308 maintenanceservice.exe 3240 OSE.EXE 4216 TrojanAIbot.exe 4736 msdtc.exe 1992 PerceptionSimulationService.exe 1988 perfhost.exe 2220 locator.exe 4812 SensorDataService.exe 4612 snmptrap.exe 224 spectrum.exe 4716 ssh-agent.exe 640 TieringEngineService.exe 4772 AgentService.exe 2304 vds.exe 1880 vssvc.exe 3736 wbengine.exe 4268 WmiApSrv.exe 4392 SearchIndexer.exe -
Loads dropped DLL 1 IoCs
pid Process 3644 per.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wisrysxl = "C:\\Users\\Public\\Wisrysxl.url" 20092024_0134_x.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 16 drive.google.com 19 drive.google.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 45 api.ipify.org 47 api.ipify.org -
Drops file in System32 directory 40 IoCs
description ioc Process File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\system32\AppVClient.exe elevation_service.exe File opened for modification C:\Windows\System32\msdtc.exe elevation_service.exe File opened for modification C:\Windows\system32\SgrmBroker.exe elevation_service.exe File opened for modification C:\Windows\System32\snmptrap.exe elevation_service.exe File opened for modification C:\Windows\system32\spectrum.exe elevation_service.exe File opened for modification C:\Windows\system32\vssvc.exe elevation_service.exe File opened for modification C:\Windows\System32\alg.exe lxsyrsiW.pif File opened for modification C:\Windows\system32\AppVClient.exe lxsyrsiW.pif File opened for modification C:\Windows\system32\TieringEngineService.exe elevation_service.exe File opened for modification C:\Windows\system32\wbengine.exe elevation_service.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe elevation_service.exe File opened for modification C:\Windows\System32\SensorDataService.exe elevation_service.exe File opened for modification C:\Windows\System32\vds.exe elevation_service.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\10ff3075ffa85a2e.bin alg.exe File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\system32\fxssvc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\fxssvc.exe elevation_service.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe elevation_service.exe File opened for modification C:\Windows\system32\locator.exe elevation_service.exe File opened for modification C:\Windows\system32\dllhost.exe elevation_service.exe File opened for modification C:\Windows\SysWow64\perfhost.exe elevation_service.exe File opened for modification C:\Windows\system32\AgentService.exe elevation_service.exe File opened for modification C:\Windows\system32\dllhost.exe elevation_service.exe File opened for modification C:\Windows\system32\AgentService.exe elevation_service.exe File opened for modification C:\Windows\system32\dllhost.exe lxsyrsiW.pif File opened for modification C:\Windows\System32\SensorDataService.exe elevation_service.exe File opened for modification C:\Windows\system32\fxssvc.exe lxsyrsiW.pif File opened for modification C:\Windows\system32\AppVClient.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe elevation_service.exe File opened for modification C:\Windows\system32\AppVClient.exe elevation_service.exe File opened for modification C:\Windows\system32\fxssvc.exe elevation_service.exe File opened for modification C:\Windows\system32\SgrmBroker.exe elevation_service.exe File opened for modification C:\Windows\system32\msiexec.exe elevation_service.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe lxsyrsiW.pif File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\system32\dllhost.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\msiexec.exe elevation_service.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\SearchIndexer.exe elevation_service.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4644 set thread context of 1060 4644 20092024_0134_x.exe 109 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\notification_helper.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\InputPersonalization.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\123.0.6312.123\chrome_installer.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe alg.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javacpl.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe elevation_service.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe elevation_service.exe File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe alg.exe File opened for modification C:\Program Files\dotnet\dotnet.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\unpack200.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdate.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{0FB57C99-87FD-409C-9C0C-AE5A1CAE1BFE}\chrome_installer.exe elevation_service.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\orbd.exe elevation_service.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\klist.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\keytool.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe elevation_service.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe elevation_service.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe elevation_service.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe elevation_service.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxsyrsiW.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neworigin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20092024_0134_x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TrojanAIbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server_BTC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2388 esentutl.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3680 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{3DBEE9A1-C471-4B95-BBCA-F39310064458} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000e1b73ac4fd0adb01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-172 = "Microsoft PowerPoint 97-2003 Slide Show" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-101 = "Microsoft Excel Worksheet" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9905 = "Video Clip" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9932 = "MP4 Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9937 = "3GPP Audio/Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\windows.storage.dll,-10152 = "File folder" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xht\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-7 = "Microsoft Devanagari to Latin Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-8 = "Microsoft Malayalam to Latin Transliteration" SearchIndexer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5383EF74-273B-4278-AB0C-CDAA9FD5369E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000030dd60c4fd0adb01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia\ActiveMovie SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.svg\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-1 = "Microsoft Language Detection" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-126 = "Microsoft Word Macro-Enabled Template" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@windows.storage.dll,-34583 = "Saved Pictures" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9934 = "AVCHD Video" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.DVR-MS\OpenWithList SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{01BE4CFB-129A-452B-A209-F9D40B3B84A5} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000d64ed3c4fd0adb01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\cabview.dll,-20 = "Cabinet File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\Windows.UI.Immersive.dll,-38304 = "Public Account Pictures" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-131 = "Rich Text Format" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-120 = "Microsoft Word 97 - 2003 Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-114 = "OpenDocument Spreadsheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-912 = "HTML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000003eb0d5c4fd0adb01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-5 = "Microsoft Transliteration Engine" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\wshext.dll,-4804 = "JavaScript File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-107 = "Microsoft Excel Comma Separated Values File" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@windows.storage.dll,-21825 = "3D Objects" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9907 = "MIDI Sequence" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-115 = "Microsoft Excel 97-2003 Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\wshext.dll,-4802 = "VBScript Script File" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-142 = "Microsoft OneNote Table Of Contents" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9914 = "Windows Media Audio/Video file" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-170 = "Microsoft PowerPoint 97-2003 Presentation" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E2FB4720-F45F-4A3C-8CB2-2060E12425C3} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000caa870c5fd0adb01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\msxml3r.dll,-2 = "XSL Stylesheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-10046 = "Internet Shortcut" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9935 = "MPEG-2 TS Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9936 = "QuickTime Movie" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-176 = "Microsoft PowerPoint Macro-Enabled Presentation" SearchProtocolHost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4836 schtasks.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 22 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 19 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4216 TrojanAIbot.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 4944 pha.pif 4944 pha.pif 5040 neworigin.exe 5040 neworigin.exe 2692 powershell.exe 2692 powershell.exe 1472 DiagnosticsHub.StandardCollector.Service.exe 1472 DiagnosticsHub.StandardCollector.Service.exe 1472 DiagnosticsHub.StandardCollector.Service.exe 1472 DiagnosticsHub.StandardCollector.Service.exe 1472 DiagnosticsHub.StandardCollector.Service.exe 1472 DiagnosticsHub.StandardCollector.Service.exe 3804 elevation_service.exe 3804 elevation_service.exe 3804 elevation_service.exe 3804 elevation_service.exe 3804 elevation_service.exe 3804 elevation_service.exe 3804 elevation_service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 48 IoCs
description pid Process Token: SeDebugPrivilege 4944 pha.pif Token: SeTakeOwnershipPrivilege 1060 lxsyrsiW.pif Token: SeAuditPrivilege 4652 fxssvc.exe Token: SeDebugPrivilege 5040 neworigin.exe Token: SeDebugPrivilege 2960 server_BTC.exe Token: SeDebugPrivilege 2692 powershell.exe Token: SeDebugPrivilege 4216 TrojanAIbot.exe Token: SeDebugPrivilege 2400 alg.exe Token: SeDebugPrivilege 2400 alg.exe Token: SeDebugPrivilege 2400 alg.exe Token: SeDebugPrivilege 1472 DiagnosticsHub.StandardCollector.Service.exe Token: SeTakeOwnershipPrivilege 3804 elevation_service.exe Token: SeRestorePrivilege 640 TieringEngineService.exe Token: SeManageVolumePrivilege 640 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 4772 AgentService.exe Token: SeBackupPrivilege 1880 vssvc.exe Token: SeRestorePrivilege 1880 vssvc.exe Token: SeAuditPrivilege 1880 vssvc.exe Token: SeBackupPrivilege 3736 wbengine.exe Token: SeRestorePrivilege 3736 wbengine.exe Token: SeSecurityPrivilege 3736 wbengine.exe Token: 33 4392 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 4392 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4392 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4392 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4392 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4392 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4392 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4392 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4392 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4392 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4392 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4392 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4392 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4392 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4392 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4392 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4392 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4392 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4392 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4392 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4392 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4392 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4392 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4392 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4392 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4392 SearchIndexer.exe Token: SeDebugPrivilege 3804 elevation_service.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5040 neworigin.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4644 wrote to memory of 2652 4644 20092024_0134_x.exe 89 PID 4644 wrote to memory of 2652 4644 20092024_0134_x.exe 89 PID 4644 wrote to memory of 2652 4644 20092024_0134_x.exe 89 PID 2652 wrote to memory of 3504 2652 cmd.exe 91 PID 2652 wrote to memory of 3504 2652 cmd.exe 91 PID 2652 wrote to memory of 3504 2652 cmd.exe 91 PID 2652 wrote to memory of 2388 2652 cmd.exe 92 PID 2652 wrote to memory of 2388 2652 cmd.exe 92 PID 2652 wrote to memory of 2388 2652 cmd.exe 92 PID 2652 wrote to memory of 4388 2652 cmd.exe 93 PID 2652 wrote to memory of 4388 2652 cmd.exe 93 PID 2652 wrote to memory of 4388 2652 cmd.exe 93 PID 2652 wrote to memory of 2868 2652 cmd.exe 94 PID 2652 wrote to memory of 2868 2652 cmd.exe 94 PID 2652 wrote to memory of 2868 2652 cmd.exe 94 PID 2652 wrote to memory of 2728 2652 cmd.exe 95 PID 2652 wrote to memory of 2728 2652 cmd.exe 95 PID 2652 wrote to memory of 2728 2652 cmd.exe 95 PID 2728 wrote to memory of 3436 2728 alpha.pif 96 PID 2728 wrote to memory of 3436 2728 alpha.pif 96 PID 2728 wrote to memory of 3436 2728 alpha.pif 96 PID 2652 wrote to memory of 3644 2652 cmd.exe 97 PID 2652 wrote to memory of 3644 2652 cmd.exe 97 PID 3644 wrote to memory of 3524 3644 per.exe 98 PID 3644 wrote to memory of 3524 3644 per.exe 98 PID 3644 wrote to memory of 4944 3644 per.exe 101 PID 3644 wrote to memory of 4944 3644 per.exe 101 PID 2652 wrote to memory of 4268 2652 cmd.exe 103 PID 2652 wrote to memory of 4268 2652 cmd.exe 103 PID 2652 wrote to memory of 4268 2652 cmd.exe 103 PID 2652 wrote to memory of 4460 2652 cmd.exe 104 PID 2652 wrote to memory of 4460 2652 cmd.exe 104 PID 2652 wrote to memory of 4460 2652 cmd.exe 104 PID 2652 wrote to memory of 2580 2652 cmd.exe 105 PID 2652 wrote to memory of 2580 2652 cmd.exe 105 PID 2652 wrote to memory of 2580 2652 cmd.exe 105 PID 4644 wrote to memory of 1928 4644 20092024_0134_x.exe 107 PID 4644 wrote to memory of 1928 4644 20092024_0134_x.exe 107 PID 4644 wrote to memory of 1928 4644 20092024_0134_x.exe 107 PID 4644 wrote to memory of 1060 4644 20092024_0134_x.exe 109 PID 4644 wrote to memory of 1060 4644 20092024_0134_x.exe 109 PID 4644 wrote to memory of 1060 4644 20092024_0134_x.exe 109 PID 4644 wrote to memory of 1060 4644 20092024_0134_x.exe 109 PID 4644 wrote to memory of 1060 4644 20092024_0134_x.exe 109 PID 1060 wrote to memory of 5040 1060 lxsyrsiW.pif 112 PID 1060 wrote to memory of 5040 1060 lxsyrsiW.pif 112 PID 1060 wrote to memory of 5040 1060 lxsyrsiW.pif 112 PID 1060 wrote to memory of 2960 1060 lxsyrsiW.pif 114 PID 1060 wrote to memory of 2960 1060 lxsyrsiW.pif 114 PID 1060 wrote to memory of 2960 1060 lxsyrsiW.pif 114 PID 2960 wrote to memory of 2692 2960 server_BTC.exe 120 PID 2960 wrote to memory of 2692 2960 server_BTC.exe 120 PID 2960 wrote to memory of 2692 2960 server_BTC.exe 120 PID 2960 wrote to memory of 4836 2960 server_BTC.exe 122 PID 2960 wrote to memory of 4836 2960 server_BTC.exe 122 PID 2960 wrote to memory of 4836 2960 server_BTC.exe 122 PID 2960 wrote to memory of 4216 2960 server_BTC.exe 124 PID 2960 wrote to memory of 4216 2960 server_BTC.exe 124 PID 2960 wrote to memory of 4216 2960 server_BTC.exe 124 PID 2960 wrote to memory of 3696 2960 server_BTC.exe 125 PID 2960 wrote to memory of 3696 2960 server_BTC.exe 125 PID 2960 wrote to memory of 3696 2960 server_BTC.exe 125 PID 3696 wrote to memory of 3680 3696 cmd.exe 127 PID 3696 wrote to memory of 3680 3696 cmd.exe 127 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\20092024_0134_x.exe"C:\Users\Admin\AppData\Local\Temp\20092024_0134_x.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\lxsyrsiW.cmd" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\esentutl.exeC:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o3⤵PID:3504
-
-
C:\Windows\SysWOW64\esentutl.exeC:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2388
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows "3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4388
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2868
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 103⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Public\xpha.pifC:\\Users\\Public\\xpha.pif 127.0.0.1 -n 104⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3436
-
-
-
C:\Windows \SysWOW64\per.exe"C:\\Windows \\SysWOW64\\per.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\SYSTEM32\esentutl.exeesentutl /y C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe /d C:\\Users\\Public\\pha.pif /o4⤵PID:3524
-
-
C:\Users\Public\pha.pifC:\\Users\\Public\\pha.pif -WindowStyle hidden -Command Add-MpPreference -ExclusionExtension '.exe','bat','.pif'4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c del "C:\Users\Public\xpha.pif"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4268
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \SysWOW643⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4460
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2580
-
-
-
C:\Windows\SysWOW64\esentutl.exeC:\\Windows\\System32\\esentutl.exe /y C:\Users\Admin\AppData\Local\Temp\20092024_0134_x.exe /d C:\\Users\\Public\\Libraries\\Wisrysxl.PIF /o2⤵PID:1928
-
-
C:\Users\Public\Libraries\lxsyrsiW.pifC:\Users\Public\Libraries\lxsyrsiW.pif2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\neworigin.exe"C:\Users\Admin\AppData\Local\Temp\neworigin.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5040
-
-
C:\Users\Admin\AppData\Local\Temp\server_BTC.exe"C:\Users\Admin\AppData\Local\Temp\server_BTC.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\ACCApi'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /tn AccSys /tr "C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe" /st 01:40 /du 23:59 /sc daily /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4836
-
-
C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe"C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp2016.tmp.cmd""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\SysWOW64\timeout.exetimeout 65⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3680
-
-
-
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2400
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:1716
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3804
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4652
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
PID:1648
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:1308
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:3240
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:4736
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:1992
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:1988
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:2220
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4812
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:4612
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:224
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:4716
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:2608
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:640
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4772
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:2304
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3736
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:4268
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4392 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
PID:2860
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 920 924 932 8192 928 9042⤵
- Modifies data under HKEY_USERS
PID:1460
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5a7bebfaa60355bcae9799861b6a2ec86
SHA1f3a3490a07d0d1863aaaab594892302bd1380f1c
SHA25618de28182e413703d2fd8a763f0f9002b75baf7528674fe4021c2ee59617e60a
SHA512ca2b8c8260810c82ea16a2ed48059c3af2c83879f06afaf9b564ae5e7f20706693ea2c88a3395ca2ff53c9e96aad62b6736eb673cde95440aa55690d9047487e
-
Filesize
1.3MB
MD5cc2ed17413a606a1c3806c285ece3af9
SHA173b2389e9cdefa791db7e03a97c9ddc074b354b6
SHA25670dbf59267fd2a685981a4d952f25f1c495a4f67a375144f79f1ef2fa509298f
SHA5125ff57c8b5bf267e5b35582e5393fb4de561fbf559e87d24aa6388731c32d8fbc2f92b45cefb86d6b921b952d481601e2146b2269b1e068132d0186e932f49baa
-
Filesize
1.6MB
MD5b91241ba39a9e6f1c71a3f871d66fd6c
SHA18613aceb89b8e13b0e97e53a5970443ac7b2ab54
SHA2565074ef31f118ed5097c492a9466bdbb903a6008836bd111851aab98bf76e1369
SHA5128ac0c08de33f3a0b7e869a2951c2c37332a4f2cd849da65a4e42ae8fcc3f9d86a13d714d08a819a665c3da6770e713c21a1cdac1720e7d18493047f33e1af23f
-
Filesize
1.5MB
MD5df255fb24de43839c111cb10fdf42573
SHA168e40c28e3a88415f1708b5655b59419fb0ecfac
SHA2563946c3e51769cd0cd53898ab39da67b71a1743e1da41c3b452af823248709a0e
SHA51209e6b9d0fde1fb1bf7aedf7e05e56904749923ea3e1364eab66a9a24ddebe3b0b1792cb22aecc4d01487f9474da12d1c047c66f60ebb4d6c5714218139b49155
-
Filesize
1.2MB
MD5055cab74711014d402b74f006e5a98a2
SHA1e62cb54935e31cf482452c50977e6487052ed6a5
SHA2565544d7bb8b91ddf7f60fef892fb7ba30d18497dfbf4b82ccd30998dadf1d29d6
SHA512a0900efdcb47a1213d2c247eb5dd546f8cf6bcf38c09c5954fa3cd912e9a9adcb9f4b96a0bda6c729b90365c67cecab98d8ef0a5c04bb62b381328f81a16882e
-
Filesize
1.1MB
MD5348cb4204378f1337509d3d448cd31e4
SHA1dc4659598ab1efb6cae615577606ece98a48ffa2
SHA2560e8514105a02eec70c249c719f8b1a7df6515edf9d4dc29585f352b393256024
SHA51285c36a275163bb2a8bb249515123377ece012033d9fd598509fdcb5d126e1c5aea639332dac418d131f7295bc9f7c0f83603a4663bbbc9d712ef28e05fbdd5ed
-
Filesize
1.3MB
MD5ea805190dcd35ac3bf8b9fd1157dd204
SHA1c01a71ae56137cbd2af2a2f0f01f887995e7bfa5
SHA256bed8c5c82a57d90d8385705051b29349d9af0d268b5c8a89c782ff87f10e3ac8
SHA512183a117157602da130dcc91873d50c783aafc87b3c85f260561088fc5676f250aad276a153082be6dece5f9a12a4725851c9e423281d7b7948703bf80ff73d3d
-
Filesize
4.6MB
MD5d3d8e698627a3fee68dab9510fb57d98
SHA1022d66c8676e6693c8249978f1c7c259070a362b
SHA256b1df0b770c33d0a973ede746c82887d3823474256468ed15d8c910f4b70acedb
SHA51293fdf7fb9e8796e7397c12c319e90b9a8e7bf8a5d263e82ab041a9f94423e90e323a5a8220c6f6d45f056ae207208c81bb630a93a4aad516d8ad4c2a504dc301
-
Filesize
1.4MB
MD528fc8230119c83e1468367da412f75f5
SHA1efd2e45926f845975bf55fc1dada11beb0cee768
SHA2563f46ac498b50c9fc2e49f38ae757bad0fe18569c7d3edfc2de7f45e8970cdabd
SHA5122d9693de562894402b3da9accad480253f4356f268912c7c3756dfc841d6b907e427242c29c27f4a44468b95355db78709a2a41761e891506c1c5923126e6e04
-
Filesize
24.0MB
MD56fb477afbfb22b4e6fe4378752ece085
SHA1475bd8c15adef569cefb716bb9a8dfcbbf00d819
SHA256165a1744643427c3c1e588ebd24969fda0e0a4ba87be3c6a28d78093a5612da2
SHA51229ccf78bf33993616e2c2df2277c5c9c5b6884ac9f91253f49a3f4d82892400e9c64de7962aedd120e4471beead97779efd603b5d4346835dc3d949125512a5a
-
Filesize
2.7MB
MD560f5d6eb96e20de848260ef17fc623ce
SHA142239c9bf9b3582686f81ea69ddd8318beebe111
SHA25685e93fa307194f8b8fc095f3feb9ff4e40a848e3308abfaaca6727982c6d9d8a
SHA51275e6bc62eab14552801c036095670e644c7f19febe29c0f01d6387e4fa62eac0925421b5c31695a1f62bf2a25cde84c39fe926cc60d81907936049bbacf2d018
-
Filesize
1.1MB
MD50252798a39fd569af28f6a82a558af76
SHA10c07eba61e48670c0f95cdfbce05ed292700fc84
SHA256f697904329ddb380e7e8341226c87ed52729c4b322fc915ad5c0158b972d2d39
SHA512e82a5705aa4fdbee5271f6c570aff537f09c2d26fdeaa45c465faa5bb68d99735d2e239ce9ca6ae0685ba85fcbcf7bcba46904d7a0f85c2ef9f628eb40ad1cf5
-
Filesize
1.3MB
MD518fd88bbbba03ec8766e98abc6c6901f
SHA1222a23eaac818d592307ff2a8267914bc164eb10
SHA25673cacb9e5ba085025695ee9c1f3f32dc305a0ca4b71d68cf0f16fdcb6053b3da
SHA512c8b2b5d9e884db958467349863bb238a2de4b44c5f5b999765cffc95106f823c3b8fd4974f9f731f4760a148d5b51bba0a584362c2d530ba3bfc99d0ec57a29c
-
Filesize
1.2MB
MD5f9e7857153cc20feddc6ec5a00efd08c
SHA13bb4b4cf0cce39f5e703d15f05817d2fa7b22ee1
SHA256c830eefdd9d91940d73bf9ac83b6eda10d0ced2f41a6f141634be38cd402b55f
SHA512c975bdb8d8529d55dec207002bb742830aeb213f06fbb6d940d282d2058784f2e05a205485940b6cfcff8ed42689f56e844873300b302f1c64b64a2946c79875
-
Filesize
4.6MB
MD57755644d188ee164c5cf4f535ba9fc77
SHA1e99afdc466e0ff2349d330eabdc95c2c5858cc8e
SHA256a75c566517b2a3d118779e9693793888e8412f85b6af5ad952c26de155cea930
SHA512ade349c8eca9444c0fa4e71f5894d48b85a7994893fd28bd6230f022ced7e4c121e1565bcb4416cf00d3e3d92ab79c25c860976c5f86eb6beec76a0d07e4f333
-
Filesize
4.6MB
MD5f0a09bf71356cc5fc35f44281ee84b34
SHA13fad127e2c9532e3ba0979750724230d3d48e929
SHA2561f0d731e437bdf10e1153f4003218fba202585736f53013593566cd9d4111422
SHA5120baccfe77d94a501c754196a21f26a270603d17e1b569b6dd0277503a3dcb4e71564594998f9133a927a61db0e90750ce86267b48400263bb054b032ef7ea51b
-
Filesize
1.9MB
MD50857c18bde5f370618ea331b8ed1ff36
SHA142ac0fadab1e744798d381ca9f391218b0084629
SHA256978d1ab5678960a492da89d43a22e71e7ef4a723b042b4e259e728f19cce0850
SHA512fb8ef6402022a64796a7fc14c01d456a5f259e0f923f123bab9c29bf80eae9ecb336b2755f5f59e3f14658f0cbce5e49dca93157d0134c9d1420d0e245dffb15
-
Filesize
2.1MB
MD547e0e0cc7027b66d4e33d740d022070f
SHA1e7acbd00d37b07e5be2792b449fdc91546b6a52e
SHA256d8e2a986d87a92fffe3a7e35b8a517981ddcf3559a6285b1adcb7f263d191b1f
SHA5121f5b013d6a6b50729508e128760091ec687d9fb87996a76312270a9f45c890058095e4488c9142a050265d08025e428cbb27cc6ed2181e52c4d7a6d023c813cc
-
Filesize
1.8MB
MD5a298b5ae2c65ea25df035983814a06ca
SHA14d012fd12f866506b9c308c4d88a01a5d2ae5dcc
SHA256070b27175720a16a3caceec19959aad95413ed82d3f3b784b20b0a5fb15496ea
SHA51206a0b8044b7aee865c01975a337366b7534f1878169b39ddb1978c3fcef4dba6182fe80775359e81304ae60c6b371faa395b75a4a0c1431511d3b96a22975138
-
Filesize
1.6MB
MD58df76c2c03ffc532e74f6c7e50f24774
SHA1e8705896df7cd90fd8756bd83d7c1f7e388c36c3
SHA2564dd03c8a84667723cc4b7579c2aa329ccc80971850a3b652b14ce03c20c0a16e
SHA512b5602671c811a7800eba67e59f6aa2213d50864e02443c3a3cc413b6353df6656a5f9fcfbcd2838b604b5bad4b598f77a54a1af113200a7e2dbc2afe9400ee5d
-
Filesize
1.1MB
MD5465607badfef21a064a97e1c9e6e4316
SHA1b07a0a5bfd10a645468271834dbddc827725c3df
SHA2568e8f93b803a5cf59d0d19d3a8cd1df35fdde0abbd0f2474aad7d36031430b71e
SHA5121dc0e9dd81a6c2d9c6c6211de5658ee20e78ec92cd5f6258121dd37df2bea79fec99f46313456e10319c6cbcae5c04858f8ad0c0a59b2072c342f01d4e9174d2
-
Filesize
1.1MB
MD5a6ebfbc57cfd63b3a088a89491ec9e01
SHA12cf0fd4deee8422e3ac85b52526071fc5d233fd2
SHA256db4fe7a03bfa252c9ed6ee75cc18bec707c8df8cb41a652f7bbeca9f3a58fbac
SHA512b09f564d63e45746316dfe319ee5cbc42e4db8038f04f5846a88b456d2a85192ce98fed84f41b8fd53b273630e89f52d385ade0d576d766c81becb56f66d81cc
-
Filesize
1.1MB
MD561f46fb39a48b786b6fadaaa37f86db9
SHA14d149ddbd6be54dc1f504defbbd184401839b514
SHA256cfb858c5654225e60dbec07a8216955c62ac45a8126f4f9f14f5d20c012d2faa
SHA51298c80dc7fa3e8601cb32931785dbd0a9d1035691de04c4b523e0f2712973ba6a8b181ed59a82cf9580def4dbd711de46e4ce5fa3ca419547aa5039ee9e429e99
-
Filesize
1.1MB
MD576ee3a98263f382f85f929c10102a398
SHA13a68bd03f14fe1a06469aca84fa2c0fe826c1205
SHA256559caa5d453c7bd754485abc6d9392afe19158df740116dbe2d5b6b01fb48378
SHA51268dfa1ae5f87ac95b51b00b28c87defb4d50b5588cdfb33c6bd883d9d9629661655fc47b9d1eb1228ee9e44994417b090fbba38bce9a93597e52fe664d0e2867
-
Filesize
1.1MB
MD5d95bf860cd5975db131ee59d06e19b86
SHA178af192b937a421e245082e10225b9ebd021cbdd
SHA256023c8338b61a5a6a592a55d4da100a135b4ef036dd148b2d88856b2d827e546e
SHA51266a7baec454f4510058165082fa3d0cf0be25fbb2a697ad1a0b575b26ea37b56d40e21cfb3c3ee31ee812cf258470429a14d09839c759d6720d2a31588e29349
-
Filesize
1.1MB
MD5372d986795fefbc0920c73f78bf487f9
SHA15a7b457c9739783df98b785c7e332147257cf8b6
SHA256d772af6ea527e485c0d173b28bfae8fe1325ff74207108c07b5240b8a7643dbf
SHA5120b78327cb67682816b4f7a081ce9ede1daa80cdad8abe22d0be24527ca5ca42590928bbc3d71be99e94b5a2323a3bd8a281736a1403afbd89779ab40e0d46129
-
Filesize
1.1MB
MD509f2995004290527c74b13289d919414
SHA14eb603c7ee74bc1e7cb659f00fd869f1cba92778
SHA2568ff11c9a28effbc046eec31d82bc1339eb15ee9d207e4da794a1a65360731d50
SHA512469fe2e6da9e4c43e2d60bd6c4874661dc0b4a1d6cb9cf279ff7853044b9a3f13ca14ebbab4c3c744f2de266d74b8902e4dc409ac5516edb94ac2e1ea7e1cf23
-
Filesize
1.3MB
MD5e52e75e648ef9ac1145e314aa812857d
SHA108a1184ebd1ae05a00c092b3c31197fb66e61c42
SHA256c10cc65f1fde6d5f903546c0cadb91c75eafeab0deae004a44a79fc96b305791
SHA51230a8abb4281c493db1723daceb37e35245e23fc4c0bd7a5091da6a0c48114ff51a62be2d44fbd532623a26590bcb6cd0549d9200ffedd6ad4052541304581d6a
-
Filesize
1.1MB
MD52538a808489ca75415b9ccd64c4d367d
SHA1b07ea0626320d095e8b23b7b4948f7a042ed7187
SHA256dcb215057a24fc73498bddf339e0c3f01bc8495a1c6c2a9680282e6454aa32c1
SHA512d6f25075f0210fc50526a2f96f784c7f25335218924f86b65d1812d21ff6f24a70e3f6e481960dc672553b34d6b2c0d199c304e706c911e3b89d3edee5f88a80
-
Filesize
1.1MB
MD525cb11229ffe9ce3e114c21417aee0e2
SHA19c85cd355187595f6a117c79769b89139a5d1dbc
SHA2563c916cb3e1526997670ab37878de470aa0b59e4a5e3bf155255183fa2a10f0cd
SHA512e6098bf4a535bdefb55e84aebb21cbfb254b1a12959d37817f475c892887178caa8746faa6e5361760189a03a5f0d442b1ab639fb65f41ca82e1d38aec911b09
-
Filesize
1.2MB
MD58a84a9c92cb310aedb7742b6579d306c
SHA1a24abe9e04611045d23974fd2934ed606a067d69
SHA256b7776b344aabb523e38231c36053a738dee7a5bc8bee66e88c9c3994a7009a71
SHA51209386f54aaaae7c641f75b1705d5744dd5d6ab069f53c261bf7863171dd8817a0bd3c5e64d4cc83fa01803a7f0b8e97e6f2f2f7f161ab6567169748d56841121
-
Filesize
1.1MB
MD50651860bf49193c25d59866eedb17fb1
SHA1dbdc30ae77567ecd5f2bda3efc62ac684b2ddd6f
SHA256f12f12ec0e7777556f653b428cd27726495997f03069c15f8d2c61631e1ba536
SHA512f3e7ce4271c02f4d18e19e9c55bc213cefe92323ce9bc05a2c9c53e9c4a7dcb18eae2b925ef7eefe38e29bd96a8545a6c5fe72072886e060527177bc2f370daa
-
Filesize
1.1MB
MD52a64846f985de6a1e32f29be621883e4
SHA117e714d48682f0c65d80fb372fe1c9804d9b8bd2
SHA256598a95877cbd12798401d011375ff27c06f096a8a7120c1eef465f70fd64e19d
SHA5124a24e65965540bdab57a64b38c5c57020dad00c141e7dbcbd781ccb0e638c4fbd7f36798b246afa621a126dfe377baec685f3ea26c11c64fada3b702820e9986
-
Filesize
1.2MB
MD5cdfd1695577d1d67825f9eb14349e31a
SHA1a33f3ceb88a48a2bfe790a6c91b4786db29648a0
SHA25616fd480c635438af56395bd3f12faaa98e535593d996db267fa50af32f2120b5
SHA512dfca04ee06b4bf1180563e8c686dec1396b74d88a2bf5f12fdee4a9d69606f289e9e712189d7cb7e7184001f8cfedef6e2e18011be0d95bf29072c8ec85855ad
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
244KB
MD5d6a4cf0966d24c1ea836ba9a899751e5
SHA1392d68c000137b8039155df6bb331d643909e7e7
SHA256dc441006cb45c2cfac6c521f6cd4c16860615d21081563bd9e368de6f7e8ab6b
SHA5129fa7aa65b4a0414596d8fd3e7d75a09740a5a6c3db8262f00cb66cd4c8b43d17658c42179422ae0127913deb854db7ed02621d0eeb8ddff1fac221a8e0d1ca35
-
Filesize
226KB
MD550d015016f20da0905fd5b37d7834823
SHA16c39c84acf3616a12ae179715a3369c4e3543541
SHA25636fe89b3218d2d0bbf865967cdc01b9004e3ba13269909e3d24d7ff209f28fc5
SHA51255f639006a137732b2fa0527cd1be24b58f5df387ce6aa6b8dd47d1419566f87c95fc1a6b99383e8bd0bcba06cc39ad7b32556496e46d7220c6a7b6d8390f7fc
-
Filesize
162B
MD5e51096b2c8253312d5ea27d95f99de5a
SHA1a8e5f94ca056c4a275d6cf94f9ff2b1c50a3deee
SHA2565b1b9d32bb4bcab7670f02726b77634426b03ef489c92df55c28477acb4f56c8
SHA512e36233998c536b399825ae03b53915c2bf4d28c39dd9c8ca457fd8c05b14c9e10bde3ddb9fca9bbcab9269ed1333352783bf472291da6b7f7623bf7854e2d024
-
Filesize
60KB
MD5b87f096cbc25570329e2bb59fee57580
SHA1d281d1bf37b4fb46f90973afc65eece3908532b2
SHA256d08ccc9b1e3acc205fe754bad8416964e9711815e9ceed5e6af73d8e9035ec9e
SHA51272901adde38f50cf6d74743c0a546c0fea8b1cd4a18449048a0758a7593a176fc33aad1ebfd955775eefc2b30532bcc18e4f2964b3731b668dd87d94405951f7
-
Filesize
66KB
MD5c116d3604ceafe7057d77ff27552c215
SHA1452b14432fb5758b46f2897aeccd89f7c82a727d
SHA2567bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301
SHA5129202a00eeaf4c5be94de32fd41bfea40fc32d368955d49b7bad2b5c23c4ebc92dccb37d99f5a14e53ad674b63f1baa6efb1feb27225c86693ead3262a26d66c6
-
Filesize
231KB
MD5d0fce3afa6aa1d58ce9fa336cc2b675b
SHA14048488de6ba4bfef9edf103755519f1f762668f
SHA2564d89fc34d5f0f9babd022271c585a9477bf41e834e46b991deaa0530fdb25e22
SHA51280e127ef81752cd50f9ea2d662dc4d3bf8db8d29680e75fa5fc406ca22cafa5c4d89ef2eac65b486413d3cdd57a2c12a1cb75f65d1e312a717d262265736d1c2
-
Filesize
442KB
MD504029e121a0cfa5991749937dd22a1d9
SHA1f43d9bb316e30ae1a3494ac5b0624f6bea1bf054
SHA2569f914d42706fe215501044acd85a32d58aaef1419d404fddfa5d3b48f66ccd9f
SHA5126a2fb055473033fd8fdb8868823442875b5b60c115031aaeda688a35a092f6278e8687e2ae2b8dc097f8f3f35d23959757bf0c408274a2ef5f40ddfa4b5c851b
-
Filesize
18KB
MD5b3624dd758ccecf93a1226cef252ca12
SHA1fcf4dad8c4ad101504b1bf47cbbddbac36b558a7
SHA2564aaa74f294c15aeb37ada8185d0dead58bd87276a01a814abc0c4b40545bf2ef
SHA512c613d18511b00fa25fc7b1bdde10d96debb42a99b5aaab9e9826538d0e229085bb371f0197f6b1086c4f9c605f01e71287ffc5442f701a95d67c232a5f031838
-
Filesize
115KB
MD524288128904256e23517b0eb198ca4d9
SHA1421e52cbd7043dda9960575c8ecf572748033ddb
SHA256701f49cccf4fee58e042914518e90eeff05ef28c8a5eb043a8ecc721fdcf2571
SHA512cd11a703470b376e65649808a48cebba82f088095bfabb95f856995b7d85ff442832df5eae07b02b67bb8eec34b69dbbe0b5deaca15b79b39823527842ce4313
-
Filesize
94KB
MD5869640d0a3f838694ab4dfea9e2f544d
SHA1bdc42b280446ba53624ff23f314aadb861566832
SHA2560db4d3ffdb96d13cf3b427af8be66d985728c55ae254e4b67d287797e4c0b323
SHA5126e775cfb350415434b18427d5ff79b930ed3b0b3fc3466bc195a796c95661d4696f2d662dd0e020c3a6c3419c2734468b1d7546712ecec868d2bbfd2bc2468a7
-
Filesize
1.2MB
MD5d079d7dbcaa6c270a3b0f5c180326a7c
SHA1dfad2dbb5baaa2da3142a85203bdb14f66817f95
SHA256218d4dff575a2ea28e351b1adfde72b9fae01e0eda996cff69d7c3466f36c6b0
SHA512912ebd21cc31dface466b960b9f4b6f089d2d6fec8495a87df2e8c46b4e371494d239ddab3ac74fac382f0b5aba18b51a87ff1a85f5f5f7ed374b0ddf27da713
-
Filesize
1.2MB
MD53cfb4506005a139cdf020bc3915a1608
SHA1d17db343043f4da1c3a7578db048f87b0a7b67a4
SHA25604b901a3a6dd371076835ab52d3c97aa7863ea5e1595c7abd4ab493e0e6e120e
SHA5123366dc1385504c1beff2c0eb7d77ce412ebe74811d32fd6178488a0497b7039b594db068e1202193d61a243208a7fb38f6599c86161f36ab693e94ba9866eca5
-
Filesize
1.3MB
MD5d3f721d778d351d80bf4a8352d2cef00
SHA1b0a7af3673a3b4e87319bdfd3aea16683ac54c5f
SHA2567f036773975abb9379fcc7807b8a8871be2bc6bb083469426a570aa4029337f6
SHA5127ae24bdf43499b4f7f47cecf795ecf61e1c17aa7d8bf5ef3ac1171917600728ae2991181673ccbcac497c330f009fd26984c17551d7d5c929ea34d349e4c78ad
-
Filesize
1.2MB
MD50959f17d549a00bf0fb9efed02f465c2
SHA17b296247fb003930357eb689f08dffe6288491ae
SHA2562eab4927697f0e1062d15ec67ae791389aabf20286901220f830e953b955fe2c
SHA512ff745138453ba5d03c712713c381ab263814a31cac83e90f394ff69c48cbf648bdb7d1eff26382767aeb87350575588cff37948a2afe40c1fe6e3d8a98cfe769