Analysis
-
max time kernel
299s -
max time network
301s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 00:59
Static task
static1
Behavioral task
behavioral1
Sample
30092024_0059_x.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
30092024_0059_x.exe
Resource
win10v2004-20240802-en
General
-
Target
30092024_0059_x.exe
-
Size
1.4MB
-
MD5
81c067dc4e31a48f590f84ed0baf221c
-
SHA1
fa83ebb45efa14f0f88f0f00cf63bc9a46880911
-
SHA256
3fc1433cd0c6745b46ddc85b7fdde0d73ef45821af2a2b8d16cbc2c19df92fff
-
SHA512
02ef9c19fb21ba427ab01ad5412b7b45a0ee8a86d178e149c63ab6b76469892851ecf5e3934b79b1865590ac014a31a6f2603e8e53cfd759b8a7398c5a0ba1bb
-
SSDEEP
24576:yDE6kndjL6i8soGiR01lqY21j+qP3THodi3PGy7:yAhtaA2x+83zodij
Malware Config
Extracted
Protocol: smtp- Host:
s82.gocheapweb.com - Port:
587 - Username:
[email protected] - Password:
london@1759
Extracted
agenttesla
Protocol: smtp- Host:
s82.gocheapweb.com - Port:
587 - Username:
[email protected] - Password:
london@1759 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral2/memory/764-2-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-7-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-9-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-23-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-11-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-10-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-16-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-15-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-14-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-12-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-13-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-8-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-44-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-46-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-66-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-65-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-64-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-63-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-62-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-61-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-59-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-58-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-57-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-56-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-55-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-54-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-53-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-52-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-48-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-45-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-43-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-42-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-39-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-38-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-37-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-34-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-33-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-30-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-28-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-60-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-27-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-26-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-51-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-49-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-50-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-47-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-22-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-40-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-41-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-36-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-21-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-35-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-19-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-20-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-32-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-18-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-31-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-17-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-29-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-24-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 behavioral2/memory/764-25-0x0000000002C00000-0x0000000003C00000-memory.dmp modiloader_stage2 -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4308 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation lxsyrsiW.pif Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation server_BTC.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TrojanAIbot.exe.lnk server_BTC.exe -
Executes dropped EXE 30 IoCs
pid Process 2300 alpha.pif 4784 alpha.pif 4832 alpha.pif 4412 xpha.pif 3320 lxsyrsiW.pif 2288 alg.exe 3956 DiagnosticsHub.StandardCollector.Service.exe 3784 neworigin.exe 1292 server_BTC.exe 2524 elevation_service.exe 1592 elevation_service.exe 1396 maintenanceservice.exe 4864 OSE.EXE 4068 TrojanAIbot.exe 2684 fxssvc.exe 2056 msdtc.exe 3924 PerceptionSimulationService.exe 1976 perfhost.exe 4836 locator.exe 1984 SensorDataService.exe 2232 snmptrap.exe 4168 spectrum.exe 1104 ssh-agent.exe 5032 TieringEngineService.exe 4672 AgentService.exe 3640 vds.exe 2816 vssvc.exe 2416 wbengine.exe 3532 WmiApSrv.exe 1756 SearchIndexer.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wisrysxl = "C:\\Users\\Public\\Wisrysxl.url" 30092024_0059_x.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 20 drive.google.com 23 drive.google.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 50 api.ipify.org 51 api.ipify.org -
Drops file in System32 directory 33 IoCs
description ioc Process File opened for modification C:\Windows\system32\dllhost.exe elevation_service.exe File opened for modification C:\Windows\system32\locator.exe elevation_service.exe File opened for modification C:\Windows\System32\snmptrap.exe elevation_service.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\9001dac52dbdc151.bin alg.exe File opened for modification C:\Windows\system32\AppVClient.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\dllhost.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\fxssvc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Windows\system32\AppVClient.exe elevation_service.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe elevation_service.exe File opened for modification C:\Windows\system32\spectrum.exe elevation_service.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe elevation_service.exe File opened for modification C:\Windows\system32\AppVClient.exe lxsyrsiW.pif File opened for modification C:\Windows\system32\dllhost.exe lxsyrsiW.pif File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe elevation_service.exe File opened for modification C:\Windows\system32\TieringEngineService.exe elevation_service.exe File opened for modification C:\Windows\system32\vssvc.exe elevation_service.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\SgrmBroker.exe elevation_service.exe File opened for modification C:\Windows\System32\vds.exe elevation_service.exe File opened for modification C:\Windows\system32\fxssvc.exe alg.exe File opened for modification C:\Windows\SysWow64\perfhost.exe elevation_service.exe File opened for modification C:\Windows\system32\wbengine.exe elevation_service.exe File opened for modification C:\Windows\system32\fxssvc.exe lxsyrsiW.pif File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\System32\alg.exe lxsyrsiW.pif File opened for modification C:\Windows\System32\SensorDataService.exe elevation_service.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\System32\msdtc.exe elevation_service.exe File opened for modification C:\Windows\system32\msiexec.exe elevation_service.exe File opened for modification C:\Windows\system32\AgentService.exe elevation_service.exe File opened for modification C:\Windows\system32\SearchIndexer.exe elevation_service.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe lxsyrsiW.pif File opened for modification C:\Windows\system32\fxssvc.exe elevation_service.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 764 set thread context of 3320 764 30092024_0059_x.exe 101 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdate.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javacpl.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ktab.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{4896B57A-BA2E-425E-ACC6-3260D1FD1C27}\chrome_installer.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdb.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_81359\javaws.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe elevation_service.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_81359\java.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_81359\javaw.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe elevation_service.exe File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe elevation_service.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmid.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateComRegisterShell64.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaws.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\ktab.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe alg.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\keytool.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe elevation_service.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe alg.exe File opened for modification C:\Program Files\7-Zip\7z.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe elevation_service.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe DiagnosticsHub.StandardCollector.Service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe DiagnosticsHub.StandardCollector.Service.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe elevation_service.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server_BTC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neworigin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30092024_0059_x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxsyrsiW.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TrojanAIbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1504 esentutl.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName spectrum.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3584 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@windows.storage.dll,-21825 = "3D Objects" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@windows.storage.dll,-21824 = "Camera Roll" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-116 = "Microsoft Excel Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-123 = "Microsoft Word Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9907 = "MIDI Sequence" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@"C:\Windows\system32\windowspowershell\v1.0\powershell.exe",-105 = "Windows PowerShell XML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{33154C99-BF49-443D-A73C-303A23ABBE97} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000b1167d85d412db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-174 = "Microsoft PowerPoint Presentation" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\zipfldr.dll,-10195 = "Compressed (zipped) Folder" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-142 = "Microsoft OneNote Table Of Contents" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-912 = "HTML Document" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{C120DE80-FDE4-49F5-A713-E902EF062B8A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000007b036a85d412db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-177 = "Microsoft PowerPoint Macro-Enabled Slide Show" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-182 = "Microsoft PowerPoint Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{AEB16279-B750-48F1-8586-97956060175A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000eaa24885d412db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-184 = "Microsoft PowerPoint Macro-Enabled Design Template" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000012c88d85d412db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-124 = "Microsoft Word Macro-Enabled Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9938 = "3GPP2 Audio/Video" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.svg\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia\ActiveMovie SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-127 = "OpenDocument Text" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-194 = "Microsoft Excel Add-In" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-914 = "SVG Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-180 = "Microsoft PowerPoint 97-2003 Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\notepad.exe,-469 = "Text Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-915 = "XHTML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\msxml3r.dll,-2 = "XSL Stylesheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9911 = "Windows Media Audio shortcut" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9933 = "MPEG-4 Audio" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-115 = "Microsoft Excel 97-2003 Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\windows.storage.dll,-10152 = "File folder" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-12385 = "Favorites Bar" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{3DBEE9A1-C471-4B95-BBCA-F39310064458} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000095e00585d412db01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-178 = "OpenDocument Presentation" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9935 = "MPEG-2 TS Video" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\setupapi.dll,-2000 = "Setup Information" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-101 = "Microsoft Excel Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-170 = "Microsoft PowerPoint 97-2003 Presentation" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xht SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\acppage.dll,-6005 = "Shortcut to MS-DOS Program" SearchProtocolHost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3948 schtasks.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 23 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 25 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4068 TrojanAIbot.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 3784 neworigin.exe 3784 neworigin.exe 3784 neworigin.exe 4308 powershell.exe 4308 powershell.exe 4308 powershell.exe 3956 DiagnosticsHub.StandardCollector.Service.exe 3956 DiagnosticsHub.StandardCollector.Service.exe 3956 DiagnosticsHub.StandardCollector.Service.exe 3956 DiagnosticsHub.StandardCollector.Service.exe 3956 DiagnosticsHub.StandardCollector.Service.exe 3956 DiagnosticsHub.StandardCollector.Service.exe 2524 elevation_service.exe 2524 elevation_service.exe 2524 elevation_service.exe 2524 elevation_service.exe 2524 elevation_service.exe 2524 elevation_service.exe 2524 elevation_service.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3320 lxsyrsiW.pif Token: SeDebugPrivilege 3784 neworigin.exe Token: SeDebugPrivilege 1292 server_BTC.exe Token: SeDebugPrivilege 4308 powershell.exe Token: SeDebugPrivilege 4068 TrojanAIbot.exe Token: SeDebugPrivilege 2288 alg.exe Token: SeDebugPrivilege 2288 alg.exe Token: SeDebugPrivilege 2288 alg.exe Token: SeAuditPrivilege 2684 fxssvc.exe Token: SeDebugPrivilege 3956 DiagnosticsHub.StandardCollector.Service.exe Token: SeTakeOwnershipPrivilege 2524 elevation_service.exe Token: SeRestorePrivilege 5032 TieringEngineService.exe Token: SeManageVolumePrivilege 5032 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 4672 AgentService.exe Token: SeBackupPrivilege 2816 vssvc.exe Token: SeRestorePrivilege 2816 vssvc.exe Token: SeAuditPrivilege 2816 vssvc.exe Token: SeBackupPrivilege 2416 wbengine.exe Token: SeRestorePrivilege 2416 wbengine.exe Token: SeSecurityPrivilege 2416 wbengine.exe Token: 33 1756 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 1756 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1756 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1756 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1756 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1756 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1756 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1756 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1756 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1756 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1756 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1756 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1756 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1756 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1756 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1756 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1756 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1756 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1756 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1756 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1756 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1756 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1756 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1756 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1756 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1756 SearchIndexer.exe Token: SeDebugPrivilege 2524 elevation_service.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3784 neworigin.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 764 wrote to memory of 3436 764 30092024_0059_x.exe 90 PID 764 wrote to memory of 3436 764 30092024_0059_x.exe 90 PID 764 wrote to memory of 3436 764 30092024_0059_x.exe 90 PID 3436 wrote to memory of 2372 3436 cmd.exe 92 PID 3436 wrote to memory of 2372 3436 cmd.exe 92 PID 3436 wrote to memory of 2372 3436 cmd.exe 92 PID 3436 wrote to memory of 1504 3436 cmd.exe 93 PID 3436 wrote to memory of 1504 3436 cmd.exe 93 PID 3436 wrote to memory of 1504 3436 cmd.exe 93 PID 3436 wrote to memory of 2300 3436 cmd.exe 94 PID 3436 wrote to memory of 2300 3436 cmd.exe 94 PID 3436 wrote to memory of 2300 3436 cmd.exe 94 PID 3436 wrote to memory of 4784 3436 cmd.exe 95 PID 3436 wrote to memory of 4784 3436 cmd.exe 95 PID 3436 wrote to memory of 4784 3436 cmd.exe 95 PID 3436 wrote to memory of 4832 3436 cmd.exe 96 PID 3436 wrote to memory of 4832 3436 cmd.exe 96 PID 3436 wrote to memory of 4832 3436 cmd.exe 96 PID 4832 wrote to memory of 4412 4832 alpha.pif 97 PID 4832 wrote to memory of 4412 4832 alpha.pif 97 PID 4832 wrote to memory of 4412 4832 alpha.pif 97 PID 764 wrote to memory of 3584 764 30092024_0059_x.exe 100 PID 764 wrote to memory of 3584 764 30092024_0059_x.exe 100 PID 764 wrote to memory of 3584 764 30092024_0059_x.exe 100 PID 764 wrote to memory of 3320 764 30092024_0059_x.exe 101 PID 764 wrote to memory of 3320 764 30092024_0059_x.exe 101 PID 764 wrote to memory of 3320 764 30092024_0059_x.exe 101 PID 764 wrote to memory of 3320 764 30092024_0059_x.exe 101 PID 764 wrote to memory of 3320 764 30092024_0059_x.exe 101 PID 3320 wrote to memory of 3784 3320 lxsyrsiW.pif 105 PID 3320 wrote to memory of 3784 3320 lxsyrsiW.pif 105 PID 3320 wrote to memory of 3784 3320 lxsyrsiW.pif 105 PID 3320 wrote to memory of 1292 3320 lxsyrsiW.pif 106 PID 3320 wrote to memory of 1292 3320 lxsyrsiW.pif 106 PID 3320 wrote to memory of 1292 3320 lxsyrsiW.pif 106 PID 1292 wrote to memory of 4308 1292 server_BTC.exe 111 PID 1292 wrote to memory of 4308 1292 server_BTC.exe 111 PID 1292 wrote to memory of 4308 1292 server_BTC.exe 111 PID 1292 wrote to memory of 3948 1292 server_BTC.exe 112 PID 1292 wrote to memory of 3948 1292 server_BTC.exe 112 PID 1292 wrote to memory of 3948 1292 server_BTC.exe 112 PID 1292 wrote to memory of 4068 1292 server_BTC.exe 115 PID 1292 wrote to memory of 4068 1292 server_BTC.exe 115 PID 1292 wrote to memory of 4068 1292 server_BTC.exe 115 PID 1292 wrote to memory of 3120 1292 server_BTC.exe 116 PID 1292 wrote to memory of 3120 1292 server_BTC.exe 116 PID 1292 wrote to memory of 3120 1292 server_BTC.exe 116 PID 3120 wrote to memory of 3584 3120 cmd.exe 118 PID 3120 wrote to memory of 3584 3120 cmd.exe 118 PID 3120 wrote to memory of 3584 3120 cmd.exe 118 PID 1756 wrote to memory of 4896 1756 SearchIndexer.exe 140 PID 1756 wrote to memory of 4896 1756 SearchIndexer.exe 140 PID 1756 wrote to memory of 4856 1756 SearchIndexer.exe 141 PID 1756 wrote to memory of 4856 1756 SearchIndexer.exe 141 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\30092024_0059_x.exe"C:\Users\Admin\AppData\Local\Temp\30092024_0059_x.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\lxsyrsiW.cmd" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\esentutl.exeC:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o3⤵PID:2372
-
-
C:\Windows\SysWOW64\esentutl.exeC:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1504
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows "3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2300
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4784
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 103⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Public\xpha.pifC:\\Users\\Public\\xpha.pif 127.0.0.1 -n 104⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4412
-
-
-
-
C:\Windows\SysWOW64\esentutl.exeC:\\Windows\\System32\\esentutl.exe /y C:\Users\Admin\AppData\Local\Temp\30092024_0059_x.exe /d C:\\Users\\Public\\Libraries\\Wisrysxl.PIF /o2⤵PID:3584
-
-
C:\Users\Public\Libraries\lxsyrsiW.pifC:\Users\Public\Libraries\lxsyrsiW.pif2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\neworigin.exe"C:\Users\Admin\AppData\Local\Temp\neworigin.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3784
-
-
C:\Users\Admin\AppData\Local\Temp\server_BTC.exe"C:\Users\Admin\AppData\Local\Temp\server_BTC.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\ACCApi'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4308
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /tn AccSys /tr "C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe" /st 01:05 /du 23:59 /sc daily /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3948
-
-
C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe"C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:4068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpACE5.tmp.cmd""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\timeout.exetimeout 65⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3584
-
-
-
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3956
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:1592
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1396
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:4864
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:4556
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2056
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:3924
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:1976
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:4836
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:1984
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:2232
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4168
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:1104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:3512
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4672
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:3640
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2416
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:3532
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
PID:4896
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 8962⤵
- Modifies data under HKEY_USERS
PID:4856
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD597c5ff249353b77bed26232b0c12b088
SHA1e23b9885e16baa408e81b740a7b9bb2b1b346c8e
SHA2562740579214213927350b8e0e7100b23731fd613c60227942848b38db58534d3c
SHA512086323f6f87e7a011651a8ff4924158d33a1cc533d7dc87d161a98d3fa70345db7b1a0246d4c622489099de8acaca886be295569b7c48a3fcd0f19df279d7a1c
-
Filesize
1.3MB
MD5dc694eebd259ed6059b287cc01ad512b
SHA1c07e18dfafeafa9c93f6992fd32ab203736814c5
SHA2560f916fc780bd6bacc738a21e06babb230e301857a9cb8a8128e018374cdfc532
SHA51222da3688646bb1d6eea523485ec4e4dc2041ce7ce9dff7ba102a0828d2e6c3ce9f2b5d0adf276b282d42d43644c170aec0c2e45d279aff8e20bdd65fa4763bed
-
Filesize
1.6MB
MD57ddcc46a5e241cd46225edfb50fbbf9e
SHA164c83db1839e120f071695884e5e85e29a4207a7
SHA25664923a06a8559e0688d6e9cc61f567d7e2be0ce06c5cc86323842037ef3ddb6d
SHA512dc4c63d0f5ad615c05e8ab904e0fb86f2d64fdfa53c3d4d62f15cc12a054ee58657e339207cb5165716467da241991cd1de70b3a51ef44a6e41aba47a6ba7779
-
Filesize
1.5MB
MD5378da63689ba4fa3be005b24591709de
SHA174b3a57d7126272ba409f7d157cffcae99ec23d3
SHA2565387431f2912d53e2eba687bb425d165d97f69e92c59fa5d9c66990f7c044eae
SHA512bee0f985a9dd52dda28d5e68e0e25fb7bea2cec71f459ac967b8bebf0651e585c1d29c1c5cb1b6924805a96d9ad216c426857e6a62b8bd79b98175eae70c7ad3
-
Filesize
1.2MB
MD5f9a475ee308d14eb1f71d53b2df316dc
SHA1793e8741aa59bcb77b0698e293471d3141370113
SHA256fea8c6410909140c933f626c46aadca33d13535f76e3b0fa209078bbd422eaf9
SHA5129c286901bfb0209d4b02f10a4e3c7fd579994055a7a8239cd1439ecd218a89360b7cccfef26dc40198e8941a6c9d1466bc3ab14d6a1e7b008610ff40fb265551
-
Filesize
1.1MB
MD5cd57977a36cd9f800bd285a20b0dca03
SHA1da6918152296a49ae8e53db4c03b3d2dfffc95e2
SHA256edadd29d0efa3a45c921556530befd5ac6dcd90c8a71b2089065fdd4451c64e5
SHA5128b781c78e39b3a3b2867e480ac6a571fc0e2d4d556d636ad5d09627b3b9993abb72fd0ffd9cc422faa52fa5b05e84d8fb22402ef9214556a4b3b2c8ec949ae18
-
Filesize
1.3MB
MD5c0f61570d4e6659aad4d097920c83efa
SHA138c32f3b67365b6d4e07166df9303bb375633806
SHA2560a867d5963954153e489c3c806c0967676123ad1349e50f2ffa6e21bcb4bc4c3
SHA51252aa1a6f8235c2e00c98edbeee20f72fe1ad8e507ad9c2549c3365f098e66bead2450882714984901dbb665d68a1cf75e8c728150dfa647b1348802cd4761374
-
Filesize
4.6MB
MD5e3f704f3aab23a60cb8f16c1b3cf63b7
SHA1870f8c8ae01d9b3722f7899d02b15195ca67cafe
SHA2563dc129b51eba6bdb9cad01eaa8058f0d543e431b011ffdfeeda8b210ee1ed931
SHA51209b6b10e6c9f2f1ae4f0a5992aaa3aaf0e419b853116e3de0653f5e8541bc7c82d60ee465c24cbbcecf3036cac62ccf8bd4812b64b16ba1466d3f3473f87a561
-
Filesize
1.4MB
MD55e398ede2120b0bbe1688e542a3f476e
SHA1ed8eabee8eb2c8df554feb611913cfbf6567aa0c
SHA2565959caa028cb31db6affa4263859bfe38cf6f0fbee6e51aa57ef916aef93a013
SHA512c6652417ef80498c21ca053685f2c647ff5660a6ee424e769ca545cc3b96122b28e964f61ffa0b0080b91b8aa57073d37287fc06a94a23d9ca184c1aab782f88
-
Filesize
24.0MB
MD5eb96ee62768da6634d83854b32b68d67
SHA13745a4066847271de66c6ddb2d70697824caa11b
SHA256806a110e788a56d761821699cf560c89beb732a6ec39ac52fd7b1cf8a99ba200
SHA512cca4ad514aa12750e84d8750225dcbdf3e9b579004b75f41b43dbd4739df17b360ae01bc972c3b5bb4b81a16fef32e959fcd69f3fe0937deb1479d3841b05c3c
-
Filesize
2.7MB
MD59647423fb9418c3c991c47325910ff0a
SHA1a9e7c91bf62beb2a6845abfbd341334a2f7c81b1
SHA2566a8225e8abff4db8b08b3eb6ef9fb17bef2416191b18b69727b1699549f4721d
SHA5120b02391907342c22a045351c159e5519082516527380f9549f39d6f8e2c98aeb0e49ddc788fc07501e7c295cb9e71961f95e49866b9e75dbd5718088bb0ea6f6
-
Filesize
1.1MB
MD579232cbb8ceaff8db09e44f06939b59c
SHA1f437cd67b5340e4e036a2cdd9ef919407734f2d8
SHA256760b0c88a3f20953b5e16d8d58c45b39b533763034e05aa85dd35991056c66dd
SHA512086ab4d8dc82f428200c286ea4e84d20184834087b6366bcbecd5ed6598a71498ed1bd57443e076b43b159366068434acfdb7db840660e8f91ae2ff06d01bba6
-
Filesize
1.3MB
MD5d01e47391676f4cbb0b0649acc5a6daf
SHA1f677d677f86f561c6ccfe757146b2e9a260ea0cd
SHA256f8fe229e81b206a131f3a3c2a806720640d080494949851f57a7f1b701da5e37
SHA51238079e41c5f1e9d1e77ee3e117fefb32755a51d3c9b69f1ffb516dce4fb46196ff6b4718142b6b96c6768149e2814bc6e6e7f6417a714e3870202c69c8ce042f
-
Filesize
1.2MB
MD5635356d98b813b4fd8bcad1332087d21
SHA1c108d76bf4d514f9f95e607302f08e9e878578ed
SHA2567bd0939b85d432f36a57041f0d1c5abbf45ce2db8d560420cf8d78751c494f0b
SHA512c779f305043e39ec386f922efa080c392c3c57d82767c51c00dd35c988987a343312db3654c4a48b9237c41e9a50353548a9dae710904028b188026189846ed9
-
Filesize
4.6MB
MD5fbeb3388a4d70d34568324f54253030a
SHA182a37cfc5fc7f7f185eaae36f8f0a3781815d308
SHA256d361591f5558097b28362e1aaa8330851e490de12c10f31feb5c61e268eec8f8
SHA51222beab735acac4379e319539fde461359fd0006b4b685ededbaad2b6f9acead787cfda37e551389dac5ed92afc73831e2e90b8023fffa5818c903952a20109a5
-
Filesize
4.6MB
MD52bdb95a08b34dc535c9f830d121300c8
SHA12bd9e450ae1cb5e050e3018fdc192baf0a8e06f3
SHA2562d15af025d47de120e80f32d885a19a3852131d3642842e3e210a1ed9c2e5dc5
SHA512f7b973fc49b3586c0384710a9e91064f0371c90388cd5b0ce0d60b2b3efad2293d9d6d3d2e7e5107b95c45e140a1cb40a060c695212b532202115028f86c7441
-
Filesize
1.9MB
MD5aa5280b9a57f8c3a7a6d810cd9c2b9f4
SHA187a1500639d5e65274cd501c12749d1b51b9c9b0
SHA256d45fe7d38155b87c825f97c1519f1656606c7befef9b5ad50fa4faf35e4e791e
SHA512734411ed859ecacffccacf2a5258ac47e135ccf4069e02160cd9e96871f65a888c6034ee9fbbb4e3eaba44ac2dff47c43037449f50b0001d7a3049061a33f98d
-
Filesize
2.1MB
MD5c5825f7d413ec9452315d152a235883c
SHA1e1febb9b4b2bbbee95daeaa5f9dbccab4ccfa870
SHA2564e99f10ecfe5e45dead5886880301eb4c87968deac359b53a78d913c1440aa19
SHA51210395d795c464a5fb8fe1125a1500709dbbd8f8a6a8ff12dddd7aaf551161bde0390549d877ec26766f4a37eef63f3d9d69085152a14912f0ecdbe82d50d1c3e
-
Filesize
1.8MB
MD5bf560b4c8424bdcb219375b9834955ee
SHA15577a4080f969991263da9a2c06ccd0ae9a884bc
SHA2567be34e803f6dccb96934d5260ce26b1625c8135fb5a8fb0ce84b693b031e3741
SHA512dc911ee08d3090a851baaddb8bb07114cbe56f1de699f5f86062a3e58e4dcd8640d4be14acfa2023f57c8077d936b3f316a1e2673fe246b5415dc762c5c61c26
-
Filesize
1.6MB
MD50fbcb204f9293108bf56f142a559457c
SHA1ad11135eca1635f6fc1b32b46ebd89fcde8c71e1
SHA25677efb85e4dc9f23723e1aa41e3bfd7cc3fb52a88051c6c0d9d1d240e2958422b
SHA512c5dc6c702002d67a7c8d9e2a0e13a14fd11e71413ae4011d6109459f2f0f0b3c244857980d6bd72eb22eb07dfb69356d317fccf0dc88d58ca2e6f6ba3eb03d60
-
Filesize
1.1MB
MD50a7c38cb3afaf8036fdeef698a066c68
SHA103d7123f6c22f7decd14587d27e0580a54aed800
SHA256c05e8715a8cc040e0330595f93fc2ece078813af2847cc52792a418cea0a9a92
SHA5127778aa0007c36fb0fdf4d169afa7e7af2e87a83f670f81c084525f5221332b72e05b72c1d377cb65b493307b13e2188ff0d65a6315cef997a895fb2c859e5d3e
-
Filesize
1.1MB
MD5d61bd260d0d48e6cea4c42d427ce3920
SHA1531fb941f62cd00b299758e3418818b5f5815d42
SHA256673d6895f75b387d841b09933c8d7bee32e3b21f32c13a8276291097699a9134
SHA51229ba3fafa277249cec1cba0a62f339d772dd16a17c0b57893368c7b9c6273d9bbb0d0fef2390b4bd92794c6055a1d02503f165690ebd773abd861cf76d16aa81
-
Filesize
1.1MB
MD5abe4f5c5b9d055b220bc40685fbbe6ce
SHA148e83ef0c15755cdbf5948bfe5c8bb646b05ab86
SHA256f1ada4096e27e7eb79317082810b3be3545b844908e0e035f0138395262df16d
SHA512b030017a6c4508940558a01c780c4ed6ac289ba34afdd597875b2083a5f46d6fb546e0688851fece7cc68da7800fc8519cbfc963b0c254770be9c0315e76dd27
-
Filesize
1.1MB
MD5c422229772158fdf12122c398c1df3c2
SHA13558eb29ef5d2261cff39654c97e09cc5a1e8478
SHA256886962e001092e5443421ff680b598474cdc703cb97c83bed03ecd23223857d6
SHA512a7878fd0d2217090a14f08ef8e2d86d71c51cef5e5fc3772a4cbe891d9821c285678fc92371eda341f8e0e22df2621c43cd09ee876c0c709f9b1269b9d4d146c
-
Filesize
1.1MB
MD584ad3b4955a01370f5d4630c3beb13f2
SHA176a619716516580cc87ec7e690525e5e9571b63f
SHA256d282bf6d62e1afc91f33356d519c380e8bcf378f5fbd573d66bde26397d33c1b
SHA512b2b74d7918dfca5ee489fc5e87448e7bd08add5caca444cd266882ac8909db9204f543450d7c7a630f28f38a18e0c1e7511eacc2a209c0804a74132e744dc6ff
-
Filesize
1.1MB
MD5ab8e635303ba0966daf93f8fcd669c88
SHA14f40b23cca719d3abdebefed3dd358c7e1fea403
SHA25601ed9c465611af9664bfff492237cc15df636ca2bd73279ed6a0a74608d73c2d
SHA512adababab2f179ce769508791b88360b45b596b718aeaa5e107460609598e9b64e71be562fd7a097d0b7df9b0e5ab82c3942738ef10ca9a9781b52a280cdb5214
-
Filesize
1.1MB
MD51f7548dd74430b4c1cc8cb77f7b76b43
SHA1ea86a25ca4241668b090632419e065d952b54c2a
SHA256676ab7f0868c0a17d94457fedd939f2559a3a5643c1a0cbe21bbbdacf0cba11d
SHA5126cc214985e71603ad0b01c74f0ac7983ec02814f53bf5610a6885477452dab125a8cda2e7a2a40421e63530817e3e1a02cb67740d68d377a45728dba290aa209
-
Filesize
1.3MB
MD53542432fd57c323d07b0f19036e5f7d3
SHA17d3fa23ed2e19c877b50c547bee6f8536309ee9c
SHA256514ae1c8e29de3974aaf6dc6c8da496951ba5c481cefcc4479b030b01fbe81e3
SHA5128edb9223ed6a9e139514f9fbdd29f32a27ba7082096c813881994ca62ba041075d96911d77fa668e4ac62b108511b3b21dd8d7ae14a6e7514c399315d3dd21e2
-
Filesize
1.1MB
MD54ce94cb7746a71a90110cb0b4a13332d
SHA1768966f78c180f3779125a6a996161d05327fb32
SHA2562c86cf2a2758f33cb363a862a310f1a4338ee0ea1a80f810a4be716d9b4d9a16
SHA512a5398a38968f7d5a43f62f67e71418696341697b9683e9b10f76201e64ec66cc9da71573a760d21f618d78f689101ab596cacdaeb9e31674c0c071a431f19fe9
-
Filesize
1.1MB
MD55f3b8e1a10252995efeb2c3a0c656a6c
SHA1f5a1ff07c661ec247e7c00aca0e676b8c85e6188
SHA256c7dab2090c56bde9348174929180019a8d12e0481405c6837ab22ea2a458f1b3
SHA5125771b18f3b2cf688b4f8e7074697635fa39dc9cc34d70dae5da23f411a7e1f260f7e5fe4e5eb8c292c3bcd254c1e9934f192389daac735964568a86c8f370810
-
Filesize
1.2MB
MD53ec17c8cd49724ad10160e2526a8ebcf
SHA13584944f4de1d790975ed0d5cd5fbe7f852fb020
SHA2562cb2ca25f02ed177438bed7c8962f1f52351c5bb9b3ba17ef8dadfcbe3f2fe2a
SHA512a6ffcc32f2a15ed2735814c3c9c3baf5d2671134cfbdf73b125731594e57d5eb6cc3d68010bbefd6cbf798097b7555718e7b2aa179c9291335f5bff8c1c81cf4
-
Filesize
1.1MB
MD527b3c20ee6010df97f91e279f4346e8b
SHA158e3dea5f9c5e389e732826c83ae2ac2d743035f
SHA2567f54fe4aec6430d4f215f101758844d2fa597db93604c481f5fc39e5ad7eee08
SHA512bddc1c6406f28cd726b6a676690cd3c31c72f15baae2d08bfb3ab28a6de33f430b65b010c5ab3f259750499ea332e54c2719e4dc236e535bfc7eb4990e09623d
-
Filesize
1.1MB
MD5a21259e4ec8305bf34e80dfa987bab9b
SHA1f70b10b0d19820f867d57c90101217c427b5f423
SHA2568ffa3170d36959c9721b6b14b0d532425b0aebb28b6de664515f6d0ae6c73e26
SHA51227b085163a7fbe208085c655b15c9b3457e30843f3775948ef9f38220e9a4e48d6ff6da7e29ea219a540d294f46bb770ffa09b76c8562b6cf3ca52146ce0fb86
-
Filesize
1.2MB
MD5101bd020ef02344d78c147b96eef7dc7
SHA12b3e096d50f91e3537c4736807baad40888df002
SHA2564f427dab5d3c99a1e883163aa17f09d76f5af55ea8c6a39dce0e4cdb1f607076
SHA51239d4ab5ef25509d8ff48267383aac0907e0017d58162b126a3522134f7f50551fba5aa957b2cf092a86519c4a6eb8b99177e87de53dde8bd20a23c0949a43e04
-
Filesize
1.3MB
MD5e5381000e8b5727249cd6cfd406ed41c
SHA194cb8c446b254a90ba27b5ce6a119870c5e8f853
SHA25655d4aa164fa988f3da6f8883cc0cfc5d087612d9c81cd18b76b91b457201310e
SHA5129aff15bdcc46243be390df9116a68378081fc1a7d6d1b08951740fb7aab89f4bc9620bc0160537e7ff9fb437b3d9fa8a9dbe6deb9e9ae0811edfb36a4f645ee2
-
Filesize
1.5MB
MD5a26170067cbac42c802cf5cbbab0b603
SHA19af104ee7be0bedbb3f3c048016066a5f6c7ce28
SHA256d2a0c4395f34449926ae971bf266aa7bbdee36eb4f438f3f714c6a9411be63a6
SHA5127317a4e3d0acbc45c11b9ddd3963cf22307e585add2c19fa1b2bc9e3a02d20b020a5fe145c06ebfe2c73eec08159d818dd851ddfc0a911282d093dad03ae7aec
-
Filesize
1.1MB
MD5e4becd44baefccf416ed3647807593dc
SHA17c86d4694e84c5633196f492721cdcdff7a42088
SHA256d2c35459930dae1ca4276bf1ea75070b7c529b0b500fe58689423dfc78f9c168
SHA512fbd426c081bab1dea08966c0a7e9fbaac0f23628d8d48769f698d28a5e73f1d533ff753bd02b7b86550fa940535f182daf9a0a29a7e56ad94598a997660020a3
-
Filesize
1.1MB
MD5407ca20aaf048cada721059780b9bc05
SHA19c262415a65d19fa522dafdca9bec19ae88d7703
SHA2565255cd9d0081439a6304fa0cb75c05210067041b2f6833ea3920c5f069145df4
SHA512041e4ce8a170890c44ee2e1348bfbe0472e60b6ab6aa68ea2a8aace630eeeb61f3ca656210e9be3ba69121f8896f2ad2fe00a176ba403ceae80570623e0eae8f
-
Filesize
1.1MB
MD513ea5abb5fa293b4400a9b59e176caff
SHA13aace2226254da46983cefd4c5c5026d9c8c77a1
SHA2565727182b9dc67b7b5adaf460ad791bc015e0f75b994251aca957b6a3377a1b77
SHA51270e447bf4c6663cae9fe95e66102442968ac7e2c321176ef010c6911d7e91cf2285335c4293ffbf3e042275d0864040cf6e8b8c79ff2b26bd35c2ab53b3fa573
-
Filesize
1.1MB
MD5656aa606aaa6f2e86af57307c131d524
SHA1f9e42ef2655fe07a86b481b1cc15b80c8bbd9fa4
SHA256107fc462591124a93c92a2dd1c17fbf0bcf4938bde4117d4544dbf27853120d6
SHA512ee62527c6a8befad4625a7b85bed93db293f2288560669c405f92b08788a3bd7566530b90621479c9ea904e61ffd73cf93797992d65073c80212aa6e1b22dfd8
-
Filesize
1.1MB
MD5fba24a639431a945d56219ddf017bff2
SHA1567e74ae1d6eec7c05151594fba8215006cdbebf
SHA256b48b1a687c423eafac8503786f5e4c32b6d68ecbd8f4a950a80170e438dfb0aa
SHA51224cf63faaba950db1f7ef53cedf9eeeb7f9250c010f9b47423ce0d4b4703bb5774e4b59a2e52cc6d24a4c4fbc56642ad3a8c0d74d1a80e993a75d286248e19ee
-
Filesize
1.1MB
MD5de359b471e2e2fb40a9f635953cfdde9
SHA1ac0186b99cb589b51dd3321febe44a5bbce5ff36
SHA2566d69498ee45b9ec04021faeadd020cdf624ab06e61669a5ace01df36011a8677
SHA512081824085bc27f318502a2c42c96a9238610fc9f193b1c7ccac75a4b213251ef1651bbac90dd5b75bb3626e56950f0eae8897d924c796900ede9b4721e800b0a
-
Filesize
1.1MB
MD5618d6d28d13e7f7fa14b56f2bb0de740
SHA16a00d9679719e72dfc8248c7b84edc01d66e92c0
SHA2562f562898a33bad5143b6146049f3e2aa7dac3537fb53a4a2114e75e379ac7462
SHA512b962630bfb3cb9dbf5502198e3cf3cacb4867ffe44372df021fec659f5e842cad8db13fc3eda21a6a56d2faff31db0f7caa48045774850367fb415b244d581d3
-
Filesize
1.1MB
MD5fe4e73800ef71d31737956029d28680a
SHA13794258395e02bbb94222b5bfa94de9b0e1e014c
SHA256dd24b0b5e278265449354228ec05562dbf3f4ef75c3cabb4c5b3e085c66d12ad
SHA51298a8cdafc2ff80db54c6bdd8d15b85e6b6b39cf6cbe0b3850adb323b24b39d2fd6a3813f768dbfcf58d1461cb13afb32e92a91f98053773ee474450985d0064d
-
Filesize
1.2MB
MD54b3d7a551e1a3b61e4fbb96ed9c0229e
SHA1d5d1101e8e1f7079cbc4e54b542b97abcf91bf0d
SHA25606957bb268f9d1b71ce4819e64e6fe76df9bf7822d28d04b7513387fcc13136a
SHA51238aa1dd05fe21b8bb5a7c77f5a7ec7ebe81257b277718ec589a76f06c5c88b2f53992d7f7be153623182c48befc07c882110d3a8be6dcfaaa479cd8892dc5641
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
244KB
MD5d6a4cf0966d24c1ea836ba9a899751e5
SHA1392d68c000137b8039155df6bb331d643909e7e7
SHA256dc441006cb45c2cfac6c521f6cd4c16860615d21081563bd9e368de6f7e8ab6b
SHA5129fa7aa65b4a0414596d8fd3e7d75a09740a5a6c3db8262f00cb66cd4c8b43d17658c42179422ae0127913deb854db7ed02621d0eeb8ddff1fac221a8e0d1ca35
-
Filesize
226KB
MD550d015016f20da0905fd5b37d7834823
SHA16c39c84acf3616a12ae179715a3369c4e3543541
SHA25636fe89b3218d2d0bbf865967cdc01b9004e3ba13269909e3d24d7ff209f28fc5
SHA51255f639006a137732b2fa0527cd1be24b58f5df387ce6aa6b8dd47d1419566f87c95fc1a6b99383e8bd0bcba06cc39ad7b32556496e46d7220c6a7b6d8390f7fc
-
Filesize
162B
MD5a40888194de3c2aeae5e6ee02d5550c7
SHA10be639b07876638229c29fa22ef4cd90f4283403
SHA2564c2b2250656ea55a6065c65dc4cbcd87ed35aecaf6391c81c4677a357437e5cd
SHA512d9cfddcb2ef86bd5486a472cc6e8b39bddfe272861a78c00ed4d8c4294e158b45b34a6db056b60f45422d1bfdb6bb0692d24948cb7651d972d692a4b37d7c2a2
-
Filesize
60KB
MD5b87f096cbc25570329e2bb59fee57580
SHA1d281d1bf37b4fb46f90973afc65eece3908532b2
SHA256d08ccc9b1e3acc205fe754bad8416964e9711815e9ceed5e6af73d8e9035ec9e
SHA51272901adde38f50cf6d74743c0a546c0fea8b1cd4a18449048a0758a7593a176fc33aad1ebfd955775eefc2b30532bcc18e4f2964b3731b668dd87d94405951f7
-
Filesize
66KB
MD5c116d3604ceafe7057d77ff27552c215
SHA1452b14432fb5758b46f2897aeccd89f7c82a727d
SHA2567bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301
SHA5129202a00eeaf4c5be94de32fd41bfea40fc32d368955d49b7bad2b5c23c4ebc92dccb37d99f5a14e53ad674b63f1baa6efb1feb27225c86693ead3262a26d66c6
-
Filesize
231KB
MD5d0fce3afa6aa1d58ce9fa336cc2b675b
SHA14048488de6ba4bfef9edf103755519f1f762668f
SHA2564d89fc34d5f0f9babd022271c585a9477bf41e834e46b991deaa0530fdb25e22
SHA51280e127ef81752cd50f9ea2d662dc4d3bf8db8d29680e75fa5fc406ca22cafa5c4d89ef2eac65b486413d3cdd57a2c12a1cb75f65d1e312a717d262265736d1c2
-
Filesize
18KB
MD5b3624dd758ccecf93a1226cef252ca12
SHA1fcf4dad8c4ad101504b1bf47cbbddbac36b558a7
SHA2564aaa74f294c15aeb37ada8185d0dead58bd87276a01a814abc0c4b40545bf2ef
SHA512c613d18511b00fa25fc7b1bdde10d96debb42a99b5aaab9e9826538d0e229085bb371f0197f6b1086c4f9c605f01e71287ffc5442f701a95d67c232a5f031838
-
Filesize
1.2MB
MD5b1118799e71221fda3452ad1e138d52f
SHA1d54e95bfc4bdce086b2de21d93511a8300d92a8e
SHA2568e7a91117519032468033ebf2ff6d9f5ffc1572a9cea755f9475c1feb5bdc503
SHA5121f7fd98f2a7f8728c6c4eef017a47b5c113665250e69870558f861c30381639ec49e9c308864c4020ea79bb105b1e18eb698e43607591c9aca9644fdf0414e89
-
Filesize
1.2MB
MD52307d1b09420d11f8223156488093c1f
SHA1b7e1f200a83f03ba7e539ed0e59cc5efd5ac8490
SHA256261bfe6348db32aa7ccb4095c5a21b1d8777024e203022ebcb2ab59f053f4683
SHA5129b9b1af2608aadc7e55c3359da388a9e4c4997eb2d6b4567fe558808d7a3b10a42d72f62dbae978695d376e8d5e72e50dc40745ad0019e5c3d4285f81be485d3
-
Filesize
1.2MB
MD55fe3231caf88cb33410e7fba371e2829
SHA1792558d6f7f5b7bc3b48dd645465bbe37fd34edf
SHA2568af07e478fd8f95e52c1078c24824a07506f23d47930c1b235d71cd20090c839
SHA51270c966ab47bf69d79ad107d6597bc27e4854447fc60fe23f71480a85b6dcd7061394551837e6a69ec2415b7c35412c84481c90be68be4c103a98c16646ef8d50
-
Filesize
1.3MB
MD56913c3888094e492d0ab9d4a01897b44
SHA125a73d792d7ff60cc0f33e7faa35e4729709158e
SHA256972d708141caff78debd197fb2bbb0ee17a28c48e39538316696de6490de7146
SHA512037ab0dce784c6f03abcce7a47eaec477964e8520c72bda3b4d4438741adbbfefd86c816c96727437ee3bee3e425dd2b1ec9e627003bda1945df9671f0dbb1d4