Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 01:27
Static task
static1
Behavioral task
behavioral1
Sample
23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe
Resource
win10v2004-20241007-en
General
-
Target
23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe
-
Size
1.0MB
-
MD5
bdc3b662d1136f20f51f55a0f6a2fb9d
-
SHA1
ef8baad4f0f3f96e2d04f3c6cea1471bcd651008
-
SHA256
23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9
-
SHA512
29036ced934c7668b072c811285761a2b4cdd562b2d269e50be767e8be27589117e84bf0f34b0323912a3dea4545dab9b9e5a6046c8beb36d15ef65056a88ad8
-
SSDEEP
24576:/GBqWzMJ3rInJFhR1T6a3R6ZFlR+gKT44VoIOL7zk:/CHnca8YL6L
Malware Config
Extracted
Protocol: smtp- Host:
s82.gocheapweb.com - Port:
587 - Username:
[email protected] - Password:
london@1759
Extracted
agenttesla
Protocol: smtp- Host:
s82.gocheapweb.com - Port:
587 - Username:
[email protected] - Password:
london@1759 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 62 IoCs
resource yara_rule behavioral2/memory/3344-2-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-7-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-10-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-16-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-53-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-56-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-66-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-65-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-64-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-62-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-61-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-60-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-59-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-57-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-55-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-54-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-52-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-51-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-50-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-49-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-48-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-47-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-46-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-44-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-43-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-42-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-40-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-39-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-38-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-37-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-63-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-32-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-58-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-28-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-45-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-24-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-23-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-41-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-22-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-21-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-20-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-36-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-12-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-19-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-35-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-34-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-18-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-33-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-17-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-31-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-30-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-29-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-27-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-15-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-26-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-14-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-25-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-13-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-11-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-9-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/3344-8-0x00000000029F0000-0x00000000039F0000-memory.dmp modiloader_stage2 behavioral2/memory/1032-624-0x0000000140000000-0x0000000140155000-memory.dmp modiloader_stage2 -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5092 powershell.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation lxsyrsiW.pif Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation server_BTC.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TrojanAIbot.exe.lnk server_BTC.exe -
Executes dropped EXE 33 IoCs
pid Process 1400 alpha.pif 1932 alpha.pif 1476 alpha.pif 736 xpha.pif 4076 alpha.pif 764 alpha.pif 1040 alpha.pif 4376 lxsyrsiW.pif 4192 alg.exe 4908 neworigin.exe 4940 server_BTC.exe 5044 elevation_service.exe 4508 elevation_service.exe 1032 maintenanceservice.exe 4904 OSE.EXE 3316 TrojanAIbot.exe 1108 DiagnosticsHub.StandardCollector.Service.exe 3448 fxssvc.exe 3628 msdtc.exe 4496 PerceptionSimulationService.exe 3676 perfhost.exe 3100 locator.exe 4312 SensorDataService.exe 2468 snmptrap.exe 4472 spectrum.exe 4784 ssh-agent.exe 1512 TieringEngineService.exe 4896 AgentService.exe 1392 vds.exe 1144 vssvc.exe 1020 wbengine.exe 3276 WmiApSrv.exe 1052 SearchIndexer.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wisrysxl = "C:\\Users\\Public\\Wisrysxl.url" 23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 43 api.ipify.org 44 api.ipify.org -
Drops file in System32 directory 26 IoCs
description ioc Process File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe elevation_service.exe File opened for modification C:\Windows\system32\AppVClient.exe lxsyrsiW.pif File opened for modification C:\Windows\System32\msdtc.exe elevation_service.exe File opened for modification C:\Windows\system32\locator.exe elevation_service.exe File opened for modification C:\Windows\system32\SgrmBroker.exe elevation_service.exe File opened for modification C:\Windows\system32\spectrum.exe elevation_service.exe File opened for modification C:\Windows\System32\vds.exe elevation_service.exe File opened for modification C:\Windows\system32\AppVClient.exe elevation_service.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\System32\snmptrap.exe elevation_service.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe elevation_service.exe File opened for modification C:\Windows\system32\TieringEngineService.exe elevation_service.exe File opened for modification C:\Windows\system32\vssvc.exe elevation_service.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\7ce3dbd4cad6a2b9.bin alg.exe File opened for modification C:\Windows\system32\AppVClient.exe alg.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe elevation_service.exe File opened for modification C:\Windows\system32\fxssvc.exe elevation_service.exe File opened for modification C:\Windows\system32\msiexec.exe elevation_service.exe File opened for modification C:\Windows\system32\AgentService.exe elevation_service.exe File opened for modification C:\Windows\system32\SearchIndexer.exe elevation_service.exe File opened for modification C:\Windows\System32\alg.exe lxsyrsiW.pif File opened for modification C:\Windows\system32\dllhost.exe elevation_service.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe elevation_service.exe File opened for modification C:\Windows\SysWow64\perfhost.exe elevation_service.exe File opened for modification C:\Windows\System32\SensorDataService.exe elevation_service.exe File opened for modification C:\Windows\system32\wbengine.exe elevation_service.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3344 set thread context of 4376 3344 23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe 108 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe alg.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroTextExtractor.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateCore.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe elevation_service.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\plugin-container.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ADelRCP.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe alg.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\LogTransport2.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaws.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleCrashHandler.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\keytool.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaws.exe elevation_service.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\notification_helper.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe elevation_service.exe File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdate.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\pack200.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe elevation_service.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdateOnDemand.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\policytool.exe elevation_service.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\policytool.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ielowutil.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe alg.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe alg.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe elevation_service.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ieinstal.exe elevation_service.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaws.exe alg.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\private_browsing.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe alg.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe elevation_service.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server_BTC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TrojanAIbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxsyrsiW.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language neworigin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 668 esentutl.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4444 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-10046 = "Internet Shortcut" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-5 = "Microsoft Transliteration Engine" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-4 = "Microsoft Simplified Chinese to Traditional Chinese Transliteration" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000009223c4996b35db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Common Files\system\wab32res.dll,-10100 = "Contacts" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\msxml3r.dll,-1 = "XML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-912 = "HTML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\setupapi.dll,-2000 = "Setup Information" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5383EF74-273B-4278-AB0C-CDAA9FD5369E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000009ce1829a6b35db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-7 = "Microsoft Devanagari to Latin Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-8 = "Microsoft Malayalam to Latin Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9909 = "Windows Media Audio/Video file" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-103 = "Microsoft Excel Macro-Enabled Worksheet" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdf\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@"C:\Windows\system32\windowspowershell\v1.0\powershell.exe",-105 = "Windows PowerShell XML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\wshext.dll,-4803 = "VBScript Encoded Script File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E2FB4720-F45F-4A3C-8CB2-2060E12425C3} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000009ce1829a6b35db01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@windows.storage.dll,-21825 = "3D Objects" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9932 = "MP4 Video" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-120 = "Microsoft Word 97 - 2003 Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9939 = "ADTS Audio" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-184 = "Microsoft PowerPoint Macro-Enabled Design Template" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-177 = "Microsoft PowerPoint Macro-Enabled Slide Show" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.DVR-MS\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@windows.storage.dll,-21824 = "Camera Roll" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\ieframe.dll,-12385 = "Favorites Bar" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9902 = "Movie Clip" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\C:\Windows\system32,@elscore.dll,-6 = "Microsoft Cyrillic to Latin Transliteration" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{1E589E9D-8A8D-46D9-A2F9-E6D4F8161EE9} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000ad98d9996b35db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9936 = "QuickTime Movie" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-107 = "Microsoft Excel Comma Separated Values File" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.DVR-MS SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9905 = "Video Clip" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\Windows.UI.Immersive.dll,-38304 = "Public Account Pictures" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9934 = "AVCHD Video" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\System32\acppage.dll,-6005 = "Shortcut to MS-DOS Program" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9938 = "3GPP2 Audio/Video" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-126 = "Microsoft Word Macro-Enabled Template" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000d6e5069a6b35db01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-127 = "OpenDocument Text" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E\@"C:\Windows\system32\windowspowershell\v1.0\powershell.exe",-103 = "Windows PowerShell Script" SearchProtocolHost.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3604 schtasks.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 15 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3316 TrojanAIbot.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4908 neworigin.exe 4908 neworigin.exe 5092 powershell.exe 5092 powershell.exe 5044 elevation_service.exe 5044 elevation_service.exe 5044 elevation_service.exe 5044 elevation_service.exe 5044 elevation_service.exe 5044 elevation_service.exe 5044 elevation_service.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4376 lxsyrsiW.pif Token: SeDebugPrivilege 4908 neworigin.exe Token: SeDebugPrivilege 4940 server_BTC.exe Token: SeDebugPrivilege 5092 powershell.exe Token: SeDebugPrivilege 3316 TrojanAIbot.exe Token: SeDebugPrivilege 4192 alg.exe Token: SeDebugPrivilege 4192 alg.exe Token: SeDebugPrivilege 4192 alg.exe Token: SeTakeOwnershipPrivilege 5044 elevation_service.exe Token: SeAuditPrivilege 3448 fxssvc.exe Token: SeRestorePrivilege 1512 TieringEngineService.exe Token: SeManageVolumePrivilege 1512 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 4896 AgentService.exe Token: SeBackupPrivilege 1144 vssvc.exe Token: SeRestorePrivilege 1144 vssvc.exe Token: SeAuditPrivilege 1144 vssvc.exe Token: SeBackupPrivilege 1020 wbengine.exe Token: SeRestorePrivilege 1020 wbengine.exe Token: SeSecurityPrivilege 1020 wbengine.exe Token: 33 1052 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 1052 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1052 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1052 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1052 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1052 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1052 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1052 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1052 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1052 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1052 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1052 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1052 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1052 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1052 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1052 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1052 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1052 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1052 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1052 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1052 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1052 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1052 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1052 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1052 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 1052 SearchIndexer.exe Token: SeDebugPrivilege 5044 elevation_service.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4908 neworigin.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 3344 wrote to memory of 4520 3344 23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe 94 PID 3344 wrote to memory of 4520 3344 23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe 94 PID 3344 wrote to memory of 4520 3344 23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe 94 PID 4520 wrote to memory of 4424 4520 cmd.exe 97 PID 4520 wrote to memory of 4424 4520 cmd.exe 97 PID 4520 wrote to memory of 4424 4520 cmd.exe 97 PID 4520 wrote to memory of 668 4520 cmd.exe 98 PID 4520 wrote to memory of 668 4520 cmd.exe 98 PID 4520 wrote to memory of 668 4520 cmd.exe 98 PID 4520 wrote to memory of 1400 4520 cmd.exe 99 PID 4520 wrote to memory of 1400 4520 cmd.exe 99 PID 4520 wrote to memory of 1400 4520 cmd.exe 99 PID 4520 wrote to memory of 1932 4520 cmd.exe 100 PID 4520 wrote to memory of 1932 4520 cmd.exe 100 PID 4520 wrote to memory of 1932 4520 cmd.exe 100 PID 4520 wrote to memory of 1476 4520 cmd.exe 101 PID 4520 wrote to memory of 1476 4520 cmd.exe 101 PID 4520 wrote to memory of 1476 4520 cmd.exe 101 PID 1476 wrote to memory of 736 1476 alpha.pif 102 PID 1476 wrote to memory of 736 1476 alpha.pif 102 PID 1476 wrote to memory of 736 1476 alpha.pif 102 PID 4520 wrote to memory of 4076 4520 cmd.exe 104 PID 4520 wrote to memory of 4076 4520 cmd.exe 104 PID 4520 wrote to memory of 4076 4520 cmd.exe 104 PID 4520 wrote to memory of 764 4520 cmd.exe 105 PID 4520 wrote to memory of 764 4520 cmd.exe 105 PID 4520 wrote to memory of 764 4520 cmd.exe 105 PID 4520 wrote to memory of 1040 4520 cmd.exe 106 PID 4520 wrote to memory of 1040 4520 cmd.exe 106 PID 4520 wrote to memory of 1040 4520 cmd.exe 106 PID 3344 wrote to memory of 4680 3344 23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe 107 PID 3344 wrote to memory of 4680 3344 23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe 107 PID 3344 wrote to memory of 4680 3344 23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe 107 PID 3344 wrote to memory of 4376 3344 23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe 108 PID 3344 wrote to memory of 4376 3344 23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe 108 PID 3344 wrote to memory of 4376 3344 23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe 108 PID 3344 wrote to memory of 4376 3344 23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe 108 PID 3344 wrote to memory of 4376 3344 23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe 108 PID 4376 wrote to memory of 4908 4376 lxsyrsiW.pif 111 PID 4376 wrote to memory of 4908 4376 lxsyrsiW.pif 111 PID 4376 wrote to memory of 4908 4376 lxsyrsiW.pif 111 PID 4376 wrote to memory of 4940 4376 lxsyrsiW.pif 112 PID 4376 wrote to memory of 4940 4376 lxsyrsiW.pif 112 PID 4376 wrote to memory of 4940 4376 lxsyrsiW.pif 112 PID 4940 wrote to memory of 5092 4940 server_BTC.exe 117 PID 4940 wrote to memory of 5092 4940 server_BTC.exe 117 PID 4940 wrote to memory of 5092 4940 server_BTC.exe 117 PID 4940 wrote to memory of 3604 4940 server_BTC.exe 118 PID 4940 wrote to memory of 3604 4940 server_BTC.exe 118 PID 4940 wrote to memory of 3604 4940 server_BTC.exe 118 PID 4940 wrote to memory of 3316 4940 server_BTC.exe 121 PID 4940 wrote to memory of 3316 4940 server_BTC.exe 121 PID 4940 wrote to memory of 3316 4940 server_BTC.exe 121 PID 4940 wrote to memory of 3184 4940 server_BTC.exe 122 PID 4940 wrote to memory of 3184 4940 server_BTC.exe 122 PID 4940 wrote to memory of 3184 4940 server_BTC.exe 122 PID 3184 wrote to memory of 4444 3184 cmd.exe 124 PID 3184 wrote to memory of 4444 3184 cmd.exe 124 PID 3184 wrote to memory of 4444 3184 cmd.exe 124 PID 1052 wrote to memory of 4900 1052 SearchIndexer.exe 146 PID 1052 wrote to memory of 4900 1052 SearchIndexer.exe 146 PID 1052 wrote to memory of 3016 1052 SearchIndexer.exe 147 PID 1052 wrote to memory of 3016 1052 SearchIndexer.exe 147 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe"C:\Users\Admin\AppData\Local\Temp\23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\lxsyrsiW.cmd" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\esentutl.exeC:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o3⤵PID:4424
-
-
C:\Windows\SysWOW64\esentutl.exeC:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o3⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:668
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows "3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1400
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1932
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 103⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Public\xpha.pifC:\\Users\\Public\\xpha.pif 127.0.0.1 -n 104⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:736
-
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c del "C:\Users\Public\xpha.pif"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4076
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \SysWOW643⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:764
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1040
-
-
-
C:\Windows\SysWOW64\esentutl.exeC:\\Windows\\System32\\esentutl.exe /y C:\Users\Admin\AppData\Local\Temp\23b47a050614d71d7081f8e0313c972e9e6b1df6c9eec10f59b6ee06d0506ec9.exe /d C:\\Users\\Public\\Libraries\\Wisrysxl.PIF /o2⤵PID:4680
-
-
C:\Users\Public\Libraries\lxsyrsiW.pifC:\Users\Public\Libraries\lxsyrsiW.pif2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\neworigin.exe"C:\Users\Admin\AppData\Local\Temp\neworigin.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4908
-
-
C:\Users\Admin\AppData\Local\Temp\server_BTC.exe"C:\Users\Admin\AppData\Local\Temp\server_BTC.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\ACCApi'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5092
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /tn AccSys /tr "C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe" /st 01:34 /du 23:59 /sc daily /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3604
-
-
C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe"C:\Users\Admin\AppData\Roaming\ACCApi\TrojanAIbot.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
PID:3316
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA44A.tmp.cmd""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\timeout.exetimeout 65⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4444
-
-
-
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:4192
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4508
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:1032
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:4904
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:1108
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:3960
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3448
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:3628
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:4496
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:3676
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:3100
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4312
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:2468
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4472
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:4784
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:4692
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4896
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:1392
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1144
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1020
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:3276
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
PID:4900
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 8962⤵
- Modifies data under HKEY_USERS
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5e194abf21bfb911b8ec44a43d252fb7b
SHA10b8ff541f4bf449d9a8f3811e53517f108bf2238
SHA25670f49f5a8d372eee7642e0c38cfd03daf74737ad024a897f05ab4f954f33d6f2
SHA51271efbaefe863c1cfd083cd9e6d201ff3aa475b77844fb6949581ef9e5c8721e1b7e9c9a73f4f541278e92f666cb8c21b1f4642d1c23322ba2b647bd35cfcad6d
-
Filesize
1.3MB
MD5eb7a1807235a0f19c4de7902e67ea5bb
SHA13143bcb1b4328ca231c38a9b4bffc37af56e2bbe
SHA2569ada55ba2b5fb48b026bf20d28b6eb592c0db488bab25555076691a70f4cf718
SHA5121d0fb35097819cabb9417b51376cdde974c30ada782feadd4f4496ad147a26d0068398129c5922c01bacfcba588b1691b53967a14c413024ec70fecafaf2fb22
-
Filesize
1.6MB
MD54c06025d5242f13c34e176f41fd85307
SHA1d81b2289d8567a2b8ddd7364de1b34a1704b4538
SHA256adaef9ec50b3be3f253ed67bb7811e379103b03250cb68955e64307f330b4628
SHA51255b70668298e81fcc96a3bcdc961384f2e2b695b9bc2bc3af85845e6e61449ead1ed614f0d6c737d3f9c89db9d357e9062ce93b6fc23a9779cdd8c17ec3a7eb6
-
Filesize
1.5MB
MD556904ea9267a56886efccfd3a3e94ae0
SHA190c349ec8b17f47a07c96f395cd36738c299302c
SHA256f34fe3624a1a6eb39c1c783a77620b162aab8421d13301854a760c2892872b33
SHA512247757ba68709c34db27f8f833ced71fb2fa944f3fa37fab522cb3d1aaeb8b3fea7e745b8c5e07d9813605002394945907400ab2a49018600ebd767ba04f6770
-
Filesize
1.2MB
MD5485cfc2ef67e4e0a2a4fab5787578b0d
SHA19a993b5deeab25a53c0247074c655dc27bd334c5
SHA256b0fc90676637065cc167c44d0506d6a51fa9b27afecedcad3ce17b9c9e75fefe
SHA512ad01450fce8367e898923426dae37321677b248535aa81c0c9d5f8a23c64f768e876ed7f89fbaf41126eb5608d253578728d9c4bafec8ac0bf8df927609328ae
-
Filesize
1.1MB
MD57ebd8fbdc16f9c23aa323776fcd4ad44
SHA1eb3775712ab332f9a3810d6ad9e0bf3287b2a256
SHA256c91b8b14c29fb9ee7207022ebacf17cd58c625e1e881b32aeb1920bfa44857e7
SHA512de27032b4243cb3957938e079ff5fc68cc859633c712443c18ce76f89164a0908dc65678844bbda06863ed08d4e6089406a373c5d2920625ca1d4579f462f388
-
Filesize
1.3MB
MD5e160296c3bc331907266cc4c902ae7f5
SHA10fc4ddda5482eae469819c636b2fc2c6b6829948
SHA25624511b82add8f7513615512fc0655e2caaeb979356afdbe4f64bce5b0b8bda4b
SHA512b2c611e4b558b09afd267a570d928f1fdbb0ef1acb171e7c16bb6f4b4c405631afd97349f618e7ece47895fdf2128156de825c8c24cf9aea4ad7384aa3f0e99c
-
Filesize
4.6MB
MD5fd1241f738d006ea4043cd67b86ebf79
SHA15abcd1dceae64c0d863e6e283847d5195df9c46c
SHA256361042939b3cd0c10e15612938bc7ea1de8e3133f8f51d42222e6cff08d07168
SHA512125743ca0a03f3162a9a22f3d21480cd5c671e691c5923dc0b7279bd8b4dd5cf293b0a3cc7fd3fe49507955ecd17cdd5cf8998ca0dce1abef8f6346c54e9771a
-
Filesize
1.4MB
MD5e30d4e85af850c04475c77cf2a884baa
SHA1868c3db04e936a1e12ee4bcca6f2b484cfdce542
SHA256c53601131d86b9fe4f8050b633f6abc6238680b01e847bddb6074aec1219bbea
SHA5126a95ed9deb8886dc7694b73ece71bf86d83be16da4ac7943e34f14a7e69b779fc299dd8c868154bf0fc14e09812963ccb6cc1617609bbadc54da5b93abb34093
-
Filesize
24.0MB
MD57d89d04ae876ca5ff4bdace0fa4e56c1
SHA14385a1b42e54af4f5e718ade8b062c85901b7143
SHA256cbb5905f0a58b9e682fcf6248e0c1bf4877fdb9f0dbab83736657d79cb8842dc
SHA512e5ba82148716ec8804b220c52c5a43bb5e8c1f16bb40452bb20433b6a8eb9693ec0ec36d83fc5145e82b6cd5f43d8c6d645a18bc85e2c6896c9785fdb330378f
-
Filesize
2.7MB
MD58f6fd065c673592b0641e28e92a170e5
SHA109b547800cac701bff6660e85ee3d8c089ca2919
SHA256bb8ec3d9069787b14499c126fb437044c2549be73a3b85438ec6b6788eaef0b9
SHA512d506e3bd6a097865e9ba9b56421d96982ada98d15c966529bdead8a9c5c62d31aed4a7ec4a4c10585e43297fbe03ab0877261043aaa4284d65b4c82c8a9dcc07
-
Filesize
1.1MB
MD50329a39706e420ef0758dc289a715902
SHA1083359c5150caa459212d427df4b717653b9df25
SHA25686842c784213223c97979f44709e2a97fcf3cdeb5fccf111d63e196f9a0e412e
SHA5126e03813cd2460adf3d15f278493fc482a934ec9aa1e702fc272000c4bbc43fdd0ff8522e11cdcb5f6a6fedf719174e6af28fad9fb5d11c164dfc606792d5d4c8
-
Filesize
1.3MB
MD59e82efe6b2e706f30b0624c75230cc0b
SHA1a659174166e2568a2354973820ba5d519f48a995
SHA2568bba6461e9e6f0121aebd0316fdea044f2e095e60d2ad5add66066677beb5382
SHA51230ed75fa8a424d8116700f1f24b627d324542dcb72f88ca77d72caae27980fa7cfb01eb7fdcf10d851e3b08afd2a2ac9d634aa184ed98ad0d4f829cae1a6e698
-
Filesize
1.2MB
MD5c2343a96ba8dacead2dff8e2c3759aab
SHA159dc71ff10ad667b488dc8c1a5c9a7e284d73be4
SHA2563094257307fc220bacebee211b6a4b4a1a7828d2d1ef459ba42650b15a525ccc
SHA512be7adf641c49cdd7f244d53ee0e93cbbdf1fb99c89cb77d561a63f75e8c85b570a80615ee79dbed78dac30cfc8ab1e6c7f5f3b6d221894eef834c016f169859d
-
Filesize
4.6MB
MD5a38db38afc7ae476afea269afa370dde
SHA166ebfcc2fafec7b560e70ff76d99b8c94b202127
SHA256468682e7a813c36fc42a052fecc72bd02a190f76d09b0deca20f23145b498729
SHA512b0917aab631cf0ce8e51d41af69b6d2f8bdc855f4beabbe39809fc22830bdc8b5aa153dca1142a638feb0344a61df0cd71f59f118ad87e5511a51fd337bdab45
-
Filesize
4.6MB
MD5dce94c265d2838cdea439b8db3243f4a
SHA136bf51bf39a3970786224473f33e88584cda9a71
SHA256bce82bb5263d39ecdf44e12d7d580d2c6bb09e77312ee4cad44695cdc56069f0
SHA512da9bf6d117c484ab5069ec3dc26ec8a88f5a606a19d9fe28802c5755d69ba5cbed708805babb643fe2a50869bbf00ca3f6fd3a1423bbe0d5156226c51170549a
-
Filesize
1.9MB
MD550c67c6a973e1995bc327fdc169a5c7f
SHA1c28a8c680593a3b26d88559890979b376d32c4d4
SHA25676ada5d5036c57d41b1f3444c9f7627a3e36446170d57ef490f820b75a9cefbc
SHA5124e8dbccef48ae218a611df0f01273dbd5dd559b0e0cc6c92e697307f4fbd59702c13305b00ed4e46508e9bc21234022b05a8cd7acb48461aedefa5390a6ba575
-
Filesize
2.1MB
MD5aad75efd783fd6071fa77fb704cc75b9
SHA19de2008396fc62b48ab85e06269c6823a4590849
SHA256f656b50d7345ef0b6ab6dc5573ad4909fec7bc2df062cd07445dc0231c78889d
SHA512982bb7178e419dae4fd68ed1c3f1a451a8bd147eaed746e53f07ad7038e39149934dd0431af74c27ccccf82a1bc9ef2d62bd3372ffb2094b722b6be1e1f81e0f
-
Filesize
1.8MB
MD594fdf6ba13a927b134348525a3becbb5
SHA13ede83974fadc2a5de29172bc9e736869982c0a6
SHA256249951325c23a6661fb45d0ea6566c669ce41566ab6a72e69c941a99a9675b8d
SHA512e82fa82d8d242e4ac50bc4f287be94079f909bc4a874e153f0c59493cd90df77e0f9a24ecab4a9d71db7e2d45069d2d5087ef29976f6ac9249e943544b59f4d1
-
Filesize
1.6MB
MD56beb6eb424aed7f880a656c6679509ab
SHA1df461520fd207d1512c0a771542b2b2f7b424499
SHA256ae1c6228b7a48477ca4a67cb1dd46bbd3bee083d443fec19dc065ad22e7bd665
SHA5127c9c48332e96b81232c064815e44f9b7cf6e6110b9888da06ee33676da2eddcbe818c397653e5244af1ba184682c4df628d0efa8557cfe5de31eb82da9b218b8
-
Filesize
1.1MB
MD594ca1ccf200a7ab7bbc9727e2ddfebef
SHA1f09c367f8eb31e1949502b0873b616cfb9e63758
SHA25642bdda4e9a991fc8dc86cb72eb0e082a51982bb23203df69a4ef3c0f3e997f26
SHA512cbc46722faf666c3cfd3f8a6ef3c6647b6271cd8e3ec3b45941b40cc7679e95aec7d163c562401dc59dc373d20249e421f7e0c2964e20ad77f973c45d010e139
-
Filesize
1.1MB
MD5a96b458b3d9aa3cbf0fd37ed043937f3
SHA112721a7fc6aa116a1b95d071b8c92c7c15fef122
SHA256ebfb6d1546c27e479d2e6ef1d142afed99e1145072ee46509e66401f8b81acc7
SHA512e6205903e407a10c3e2c67c4fc03a10189a296f3ac5a8329d65de2381f7904223bcb4e1422d1b29378050bfa3f34a4c0cffe2980b3a8f65787810d640431ad40
-
Filesize
1.1MB
MD54d443d389cf589cd81d2926b135d1410
SHA1c956a1cfea36f33dbe3a091edfa6c26b6e618492
SHA256a83c971e3fade81363bb19dd194dfce6dd7798c45dadc9c8af83576edfee97cc
SHA51201470acd64e03c591732ed186f2b3dd119712b4ac09d46ea2deea2129418f43fc420a0c9a9ecc94990e6fe5b4ad8b4d64cd933d1636aa3f57126d7fb153bed49
-
Filesize
1.2MB
MD53a552d55d0f37ec97c18d4fb18390a52
SHA1a5236573ad64c6bda309f553932ca9ef39253376
SHA256151f0aa82b0346eff950dc372aaac3d79a2bf2b7ec832a46baca7b1f8ac4aab8
SHA512fb2826671c0ceb6fd92033dc5bf7f47e54316af8ec8ce267afaa1699652765117d9beb05bfb712d2d42b7ee57f96f343657b99428d1a7b2050981e86501aea0c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
244KB
MD5d6a4cf0966d24c1ea836ba9a899751e5
SHA1392d68c000137b8039155df6bb331d643909e7e7
SHA256dc441006cb45c2cfac6c521f6cd4c16860615d21081563bd9e368de6f7e8ab6b
SHA5129fa7aa65b4a0414596d8fd3e7d75a09740a5a6c3db8262f00cb66cd4c8b43d17658c42179422ae0127913deb854db7ed02621d0eeb8ddff1fac221a8e0d1ca35
-
Filesize
226KB
MD550d015016f20da0905fd5b37d7834823
SHA16c39c84acf3616a12ae179715a3369c4e3543541
SHA25636fe89b3218d2d0bbf865967cdc01b9004e3ba13269909e3d24d7ff209f28fc5
SHA51255f639006a137732b2fa0527cd1be24b58f5df387ce6aa6b8dd47d1419566f87c95fc1a6b99383e8bd0bcba06cc39ad7b32556496e46d7220c6a7b6d8390f7fc
-
Filesize
162B
MD5d4a2ac5988bee0e1068a00b5284c129d
SHA1c506a60601cb6f5d1d9d434ad50aa1e46c7e1d4a
SHA256dcad94afe3be328bda25268867313889d8d83c6ea09d05bd24eb848556f66457
SHA51299ebbd5a654c0c51b24209da8999d250761553b55b4800f5fd10ca8654ecd24febec367eeefaecae1f22af542ca39819012048950287558bb818a6116c24295f
-
Filesize
60KB
MD5b87f096cbc25570329e2bb59fee57580
SHA1d281d1bf37b4fb46f90973afc65eece3908532b2
SHA256d08ccc9b1e3acc205fe754bad8416964e9711815e9ceed5e6af73d8e9035ec9e
SHA51272901adde38f50cf6d74743c0a546c0fea8b1cd4a18449048a0758a7593a176fc33aad1ebfd955775eefc2b30532bcc18e4f2964b3731b668dd87d94405951f7
-
Filesize
66KB
MD5c116d3604ceafe7057d77ff27552c215
SHA1452b14432fb5758b46f2897aeccd89f7c82a727d
SHA2567bcdc2e607abc65ef93afd009c3048970d9e8d1c2a18fc571562396b13ebb301
SHA5129202a00eeaf4c5be94de32fd41bfea40fc32d368955d49b7bad2b5c23c4ebc92dccb37d99f5a14e53ad674b63f1baa6efb1feb27225c86693ead3262a26d66c6
-
Filesize
231KB
MD5d0fce3afa6aa1d58ce9fa336cc2b675b
SHA14048488de6ba4bfef9edf103755519f1f762668f
SHA2564d89fc34d5f0f9babd022271c585a9477bf41e834e46b991deaa0530fdb25e22
SHA51280e127ef81752cd50f9ea2d662dc4d3bf8db8d29680e75fa5fc406ca22cafa5c4d89ef2eac65b486413d3cdd57a2c12a1cb75f65d1e312a717d262265736d1c2
-
Filesize
18KB
MD5b3624dd758ccecf93a1226cef252ca12
SHA1fcf4dad8c4ad101504b1bf47cbbddbac36b558a7
SHA2564aaa74f294c15aeb37ada8185d0dead58bd87276a01a814abc0c4b40545bf2ef
SHA512c613d18511b00fa25fc7b1bdde10d96debb42a99b5aaab9e9826538d0e229085bb371f0197f6b1086c4f9c605f01e71287ffc5442f701a95d67c232a5f031838
-
Filesize
1.1MB
MD5e08968a40b12008470cac75f379face2
SHA1faca424476bd6fb5d0285c72b4486bfafb9415ce
SHA2562459ac844df342a611f9aa3ffba726026efa5192c4a167f4f54b239c821f272f
SHA5122d168836c0a459662b800c3cdcaba0777e066cbd94c31e5a0f22a5082d826b9231437c3f54aa84c296e253c39b28797c2bfac877ac377a8bb887a4326e3a1c03
-
Filesize
1.7MB
MD5e4fcfc45d5522912a08c3690bb600687
SHA17c131c32e2ec0d8d928625fd5648d0dd0209630c
SHA25661059cceac1e619babbe3c44f10f1c4701b5a9502ea083d61b3f41f465550c3e
SHA51237a2b8e69d0bf0d0d32be6c6e96806487c4737c488c502e36f2413e5d2a7c94b27c7ba78fbd16220f98ec82d2c5404812d44dffafa8dfcd6e697caf0d153f1f9
-
Filesize
1.2MB
MD5d4b553856360d60295f872c092124d88
SHA17f8c2efd8dfe5587c08f720d0f8c999220b4ecb0
SHA25655856ed97ddcb428ba01ca27cf047c90e17c60dd5e2395b28f4deec1ac29814d
SHA5121fc9c8b46ecd41fc7198b29a8ac31589530fefd7a2a6438dd29724f0fca2fcdef4853d0c159ea9e1ff263ef273b47015b0243246c0971712c4cf912fb1b92a2a
-
Filesize
1.2MB
MD53f4385979617fdc50aaec4f04ffcc929
SHA16e4058e5ebe02f98287d6e4d4ec5b070bc80657f
SHA25629033f09bd9429869dd524725a540a3184bcf88a6922cb4d8b551b4c8f2a85ba
SHA512666ce89d2bc1116aa3434c4ef9b555cc5de6551290fba9faddaa6f7dab1c3840ad2505da7b5131e41bb4753354d520e449688d4cd940301d9a8689230cbd7694
-
Filesize
1.1MB
MD5641404b17a7a580f7156a327bbd80d5b
SHA15f14a1f55636207d518a35692a7fdea871ae0be8
SHA256dbcf3e245b9df9b817f95e912887554b7b53bf2298d92df3a5e917fa5a7d359d
SHA512bad1cf6a9d2fd74f0685d609ca56455c470d6c88b5a8fcb3231793c5be160b59fcf0162f2c41bcd3e3e5012351364ebac3a0601c27cc1a3308546a831c8a7bcb
-
Filesize
1.4MB
MD5e2b9415c06ff6a7d923ae67755367db8
SHA1d5769af73bc97021f5545f94534ebc3cb2890535
SHA256e343dea9764b112360b20300d5f41f3e981fc9abdc5313b49d45201af5486b8f
SHA5123d512c1c1d4ce14b1bd00470412faf3855f0b3164c33e1be5e18e3d53715c94a0aafc8daa0471513da8658880de797b006f26a12894772bdc6a12012b2c0679d
-
Filesize
1.2MB
MD5794d6a50b47493056c7eb8fcca0558c1
SHA18394fca2f90905a4a9f7591d91423dd03cb23559
SHA256934dcd5ae33391c53882c28f41f1256103dc8cf35091e1103f0a0a2116a3f186
SHA512e5b912ccdc9d33637d21ad7d753aae2fd199b8b408fb89acc8db5cb77976b4fc2f9aa7e7ed6f0468fc77ddbef4e821b38de6b7d5a8aaa23d9f9e811d2c5e2497
-
Filesize
1.4MB
MD54a302e6fd6c881d79f0564edb3e8b84a
SHA1dfa7ded7861d7bae10edc2e23acac1ada1bc7fe6
SHA256ed21e8b1d670ac3a79a45b66f11a0fbee6534d6dad9615f932b1a9fcd354c0b3
SHA512689c48100f947efedfe276480967c09a29948e5e75d1e382811c78b4216d00fbcbe11c5525b2232c72b4d36aade8f16ffd0909a37add048b8aa41f76f1aa0347
-
Filesize
1.8MB
MD5c89f732f06a546173e20f9d2ac13f48a
SHA17b28bbe9b7746d7ee21421d3767ceeb574434339
SHA256e9624e305f7e7a04d9b1bfd97d8831e66ae6eee0ab4b23928cc91802fef77162
SHA51240bee8bca38aa38d6e1c7c41af0c8c852d017fdb23a25ade3d4912f25ea4b4f40e950e62a286edf76335f3ef72a8f2492d9549b14e3ac245082349ab00878f3b
-
Filesize
1.4MB
MD545088ab5296d49ee16e77f26ddcd3daf
SHA1560d07f7ed5f31917577319e0587a3f6ab6744a9
SHA2567619b5a7e254f6b79d6ad8d43b83aad277d166d83155cb785099f61d90b68129
SHA5128f98c8011de3cc21476839515a4618df573233d8eb369b2d9047146eddce4ed8052c1f88f9d318340eff3cd3c33f3d203e1d92e75dce1886eea988c0fad356bc
-
Filesize
1.4MB
MD57811f9c36b4ae7cd996ed374ee0bfcfc
SHA191c9c7311a4231671768462a3dd77c9b7e7d6450
SHA2565518718b2f06a7d6c2136c5e6e00168a2762a69693a485f4e26d61c04744cee2
SHA5123d136961692bcb592e18c768a211ae9a6d48bdf02c6c90cb27cf5d67a8d0af7d3dfbefad6436b564ba009f6ae81fa9d9d7479f00d2b19d47481e654a2d173307
-
Filesize
2.0MB
MD50a826a9abcef45496cf35f6538f9e3aa
SHA12bbf46f1aacd550aae7486b75d4c34bd1d8ad99e
SHA256edc5914f4445bc8092a3cda56943d777233725595698016319287c05dfc5d2fc
SHA512b4586ce70199224f0a77715995a2047397f45331ec2a23666e83fd1bdcc6d4729e3ad2cae87c95ee6ea6a8b68485c342c5c91358edf5131bbb772fc2931579d1
-
Filesize
1.2MB
MD5d59b4f3cf2fde8dea429c0ee09c6ecc4
SHA1da552d93b88ed54ba0fa6423375f6b9c5fc7f56f
SHA2564f65e16ad144ebf355706b049cbef6fedb87bffe2a2d0565fe843b861e3d2d04
SHA512f316b682328d30f1326b9795e887bdd7c8b1db065479835e42d710f583d2c092d4f665db8be4fc305f03051292de0e45a2c2768edf18b0970e35fd34783a7de3
-
Filesize
1.2MB
MD52023ac9acf20ec14f27452383fb63963
SHA15e7746e9ac4ee7f415de158c088f902f242a2851
SHA256cf6a469c6b059e36113b95eeaff53ebb9375099ff393fa4ded4b71e4f3582dc8
SHA512d3cd184fd258bfdfd4287e7b720c3b370c1d679e812838e5780271b49862619b361abd49f3d4d16b287ce1b68b96d3aaa0627887df34eebbbe45a74fc7aeb2c1
-
Filesize
1.1MB
MD522ba3dd6d168d062b6b68bc9066a0fd6
SHA1020e4a6503bb3235cfdf27530bb932be49af4bc8
SHA2567e2cf4cbf72eed0cde0d421f3fa74f3910263663e01f5347ccc5122857c52f99
SHA512cbd70fc77fca12a770de6f48e742d7f3fbfe7db0b255ef8fa9a8895515bcca90356a43c566c5d67439ec7113558d1277c1aa535466ad2f90541c54575da2498e
-
Filesize
1.3MB
MD561e754d67c01971503da658a09f48661
SHA160849f57a628bde81257b1ebebdbb8460bfa6c3a
SHA256c0d270af90c634fce78848b503fc81ec1f84ce6b6c6d391996980359508a526f
SHA512504da26ec10ed59ca8a52470cd93d8d37de5f922a60031d330c621e4a80f81c88be08f538a664e6f5a4f4b84a5e9ecdf9d514edb8a41464f49c20a231aace19c
-
Filesize
1.3MB
MD554dbdb077b6936ab4124e54b1568b04f
SHA15923d6b32526eac12f5a45ddfd13dbfdfde75431
SHA2564db51541d123c0c7c17edcf784f64499090b8b552a84be9dcf90b6277ce30bcf
SHA51259a10eebc42b1f2d4f5dc6efbe13279a33ff667c15575aad06a0d6ae4baea1c6f102f209ac38026dd1e715669c4bc9cc9805143df146812f14614239892b99ab
-
Filesize
2.1MB
MD56f4785a09ba2147d6444b1631e1e880b
SHA1777976b0e261af8e5b7c3aaf18dceaf8b3067534
SHA25638934bc837a171a01e6e6e93d8909a423c295dd05df0454d442b0198cebc6d66
SHA5126cfb26b41e5078890902f387db4d91dd732211c147222d232e2a999effdf9085806e07ceea84e45e2603a340a438d4fa76794bab42a4a8291f9a6ac420fedf13
-
Filesize
1.3MB
MD5c022bb36cc6a387d501825e9dd24f08e
SHA11b3e08dae2329142dcdd5c704abfed763cb2169d
SHA256bc8c17d363e26ec9409033b5e7869952f501c428abc8279356d8a499115d65a6
SHA512ea7d2e222b378a5547f2edb2730023d43e106d78801b1280720a49b775ac960fc568438def1b76cbd05e2593eed8532cf2df2d596b9d632063cda8b784a9335e